Search Results - (( attack detection modified algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- detection modified »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
4
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
5
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024“…This research aims to provide a hybrid intrusion detection model for Cloud computing environment. For this purpose, a modified DCA is proposed in this research as the main detection algorithm in the new hybrid intrusion detection mechanism which works on Cloud Co-Residency Threat Detection (CCTD) that combines anomaly and misuse detection mechanism. …”
Proceedings Paper -
6
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
7
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
8
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018“…This research aims to provide a hybrid intrusion detection model for Cloud computing environment. For this purpose, a modified DCA is proposed in this research as the main detection algorithm in the new hybrid intrusion detection mechanism which works on Cloud CoResidency Threat Detection (CCTD) that combines anomaly and misuse detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Attacks detection in 6G wireless networks using machine learning
Published 2023“…Unlike the fifth generation (5G), which is well recognized for network cloudification with micro-service-oriented design, the sixth generation (6G) of networks is directly tied to intelligent network orchestration and management. The Attacks Detection in 6G (AD6Gs) wireless networks created by this research uses a Machine Learning (ML) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…In instances when Blackhole and wormhole attacks take place in IAVSA and PDDA, a high detection rate that is close to 99% is observed. …”
Get full text
Get full text
Get full text
Thesis -
11
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
Get full text
Get full text
Get full text
Article -
13
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
15
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…The result has shown that this algorithm has increased the detection rate and reduced the false alarm rate compared with Fuzzy-ART.…”
Get full text
Get full text
Get full text
Article -
16
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
Published 2011“…The proposed models prevent DoS and replay attacks by detecting and discarding forgery control frames belong to the attackers and thereby guarantee availability of the IEEE 802.11 wireless networks. …”
Get full text
Get full text
Thesis -
17
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A lightweight cryptographic mutual authentication protocol which is resistant to tracking, denial of service (DoS) and replay attacks is proposed as a prevention mechanism. The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
18
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
19
File integrity monitor scheduling based on file security level classification
Published 2011“…System files are common targets by the attackers. File integrity monitoring tools are widely used to detect any malicious modification to these critical files. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…Unfortunately,watermark resistance to geometric attacks is the most challenge work in traditional digital image watermarking techniques which causes incorrect watermark detection and extraction. …”
Get full text
Get full text
Thesis
