Search Results - (( attack detection from algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- java simulation »
- detection from »
- from algorithm »
-
1
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
2
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. …”
Get full text
Get full text
Get full text
Article -
3
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…The quantitative results acquired from the experiments are benchmarked with corresponding results acquired from the cooperative attack detection scheme. …”
Get full text
Get full text
Thesis -
5
-
6
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…Proposed real-time training dataset for SVM algorithm achieved highest detection rate of 99.13% while decision tree and Naïve Bayes has 93.28% & 86.41% of attack detection rate, respectively. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
8
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
9
Detecting resource consumption attack over MANET using an artificial immune algorithm
Published 2011“…DCIIDA is introduced to detect the Resource Consumption Attack (RCA) over MANET. …”
Get full text
Get full text
Get full text
Article -
10
Secure address resolution protocol proxy in software defined network
Published 2018“…In this thesis, a secure ARP proxy with SDN controller is proposed in order to provide full protection to SDN controller and network host from ARP-based attacks. Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…As a result of implementing this system: misused detection module uses the signature of attacks to detection the known attacks; anomaly detection module can detect the unknown attacks; signature generation module extracts the signature of attacks that are detected by Anomaly Detection System module, and maps the signatures into snort rules.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
13
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
14
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Published 2021“…The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. …”
Get full text
Get full text
Article -
15
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024“…Cloud implementations also introduce a new term, "co-residency" attack and lack of research focusing on detecting this type of attack. …”
Proceedings Paper -
16
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
17
-
18
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018“…Cloud implementations also introduce a new term, "co-residency" attack and lack of research focusing on detecting this type of attack. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…Results of experiments that compare the attack detection performance of iForestASD and iForest show that CAN traffic stream demonstrates insignificant concept drift and the detection model does not benefit from being retrained with a sliding window of latest CAN traffic, as in iForestASD. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…However, current attack graphs are suffering from a few issues. Scalability is the main issue the attack graph generation is facing. …”
Get full text
Get full text
Get full text
Get full text
Article
