Search Results - (( attack detection generation algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics by Al-Araji, Zaid Jasim Mohammed

    Published 2023
    “…The proposed attack graph reduced the generation time by 20% and the attack graph complexity. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Attack prediction to enhance attack path discovery using improved attack graph by Al-Araji, Zaid Jasim, Abdullah, Raihana Syahirah, Syed Ahmad, Sharifah Sakinah

    Published 2022
    “…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Attacks detection in 6G wireless networks using machine learning by Saeed, Mamoon M., Saeed, Rashid A., Gaid, Abdulguddoos S. A., Mokhtar, Rania A., Khalifa, Othman Omran, Ahmed, Zeinab E.

    Published 2023
    “…The Attacks Detection in 6G (AD6Gs) wireless networks created by this research uses a Machine Learning (ML) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5
  6. 6

    Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm by Slamet, ., Izzeldin, I. Mohd, Fahmi, Samsuri

    Published 2020
    “…As a result of implementing this system: misused detection module uses the signature of attacks to detection the known attacks; anomaly detection module can detect the unknown attacks; signature generation module extracts the signature of attacks that are detected by Anomaly Detection System module, and maps the signatures into snort rules.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System by Ahmad, A, Zainuddin, WS, Kama, MN, Idris, NB, Saudi, MM

    Published 2024
    “…The experiment was conducted in a controlled environment and conducted using custom generated co-residency denial of service attacks for testing the capability of the proposed model in detecting novel co-residency attacks. …”
    Proceedings Paper
  8. 8

    Social engineering exploitation detection (SEED) in Malaysia's SMEs using machine learning by Sia, Ken Yen

    Published 2022
    “…Most of the current detection models only provide a guideline framework in detecting such attacks which is not efficient or with low accuracy. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Cloud co-residency denial of service threat detection inspired by artificial immune system by Ahmad, Azuan, Zainudin, Wan Shafiuddin, Kama, Mohd Nazri, Idris, Norbik Bashah, Mohd Saudi, Madihah

    Published 2018
    “…The experiment was conducted in a controlled environment and conducted using custom generated co-residency denial of service attacks for testing the capability of the proposed model in detecting novel co-residency attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Design and analysis of an early heart attack detection using openCV by Muhammad Rafsanjani, Basri, Fahmi, Samsuri

    Published 2022
    “…Early detection of heart attack symptoms is a crucial part of treatment at the moment. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…A great deal of attention has been recently paid to anomaly detection to accomplish intrusion detection. However, a major problem with this approach is maximizing detection rate and accuracy, as well as minimizing false alarm i.e., inability to correctly discover particular types of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16

    Detection of Denial of Service Attacks against Domain Name System Using Neural Networks by Rastegari, Samaneh

    Published 2009
    “…The first step in our work was to generate the DNS traffic in normal and attack situations for using as the input of our intrusion detection system (IDS). …”
    Get full text
    Get full text
    Thesis
  17. 17

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…Many phishing detection methods, ranging from blacklists, heuristics and visual similarity to machine learning are used to detect phishing attacks for spam emails, machine learning approaches achieve the best phishing email detection results. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Detection of SQL injection attack using machine learning by Tung, Tean Thong

    Published 2024
    “…The system will undergo real-time monitoring through periodic analysis of website traffic statistics. Upon detection of a SQLI attack, the system will generate and transmit a comprehensive report to promptly warn the network administrator of the occurrence of the attack. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2021
    “…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper