Search Results - (( attack detection generation algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- detection generation »
- generation algorithm »
- java application »
-
1
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…The attack graph is categorized into three sections: generation, analysis, and use of attack graph. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…The proposed attack graph reduced the generation time by 20% and the attack graph complexity. …”
Get full text
Get full text
Get full text
Thesis -
3
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
4
Attacks detection in 6G wireless networks using machine learning
Published 2023“…The Attacks Detection in 6G (AD6Gs) wireless networks created by this research uses a Machine Learning (ML) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
6
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…As a result of implementing this system: misused detection module uses the signature of attacks to detection the known attacks; anomaly detection module can detect the unknown attacks; signature generation module extracts the signature of attacks that are detected by Anomaly Detection System module, and maps the signatures into snort rules.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024“…The experiment was conducted in a controlled environment and conducted using custom generated co-residency denial of service attacks for testing the capability of the proposed model in detecting novel co-residency attacks. …”
Proceedings Paper -
8
Social engineering exploitation detection (SEED) in Malaysia's SMEs using machine learning
Published 2022“…Most of the current detection models only provide a guideline framework in detecting such attacks which is not efficient or with low accuracy. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. …”
Get full text
Get full text
Thesis -
10
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018“…The experiment was conducted in a controlled environment and conducted using custom generated co-residency denial of service attacks for testing the capability of the proposed model in detecting novel co-residency attacks. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Design and analysis of an early heart attack detection using openCV
Published 2022“…Early detection of heart attack symptoms is a crucial part of treatment at the moment. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Improving intrusion detection using genetic algorithm
Published 2013“…A great deal of attention has been recently paid to anomaly detection to accomplish intrusion detection. However, a major problem with this approach is maximizing detection rate and accuracy, as well as minimizing false alarm i.e., inability to correctly discover particular types of attacks. …”
Get full text
Get full text
Get full text
Article -
13
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Published 2009“…The first step in our work was to generate the DNS traffic in normal and attack situations for using as the input of our intrusion detection system (IDS). …”
Get full text
Get full text
Thesis -
17
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…Many phishing detection methods, ranging from blacklists, heuristics and visual similarity to machine learning are used to detect phishing attacks for spam emails, machine learning approaches achieve the best phishing email detection results. …”
Get full text
Get full text
Thesis -
18
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
19
Detection of SQL injection attack using machine learning
Published 2024“…The system will undergo real-time monitoring through periodic analysis of website traffic statistics. Upon detection of a SQLI attack, the system will generate and transmit a comprehensive report to promptly warn the network administrator of the occurrence of the attack. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
