Search Results - (( attack detection modified algorithm ) OR ( java implementation using algorithm ))

Refine Results
  1. 1

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique by Al Ogaili, Riyadh Rahef Nuiaa

    Published 2023
    “…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System by Ahmad, A, Zainuddin, WS, Kama, MN, Idris, NB, Saudi, MM

    Published 2024
    “…This research aims to provide a hybrid intrusion detection model for Cloud computing environment. For this purpose, a modified DCA is proposed in this research as the main detection algorithm in the new hybrid intrusion detection mechanism which works on Cloud Co-Residency Threat Detection (CCTD) that combines anomaly and misuse detection mechanism. …”
    Proceedings Paper
  5. 5

    Cloud co-residency denial of service threat detection inspired by artificial immune system by Ahmad, Azuan, Zainudin, Wan Shafiuddin, Kama, Mohd Nazri, Idris, Norbik Bashah, Mohd Saudi, Madihah

    Published 2018
    “…This research aims to provide a hybrid intrusion detection model for Cloud computing environment. For this purpose, a modified DCA is proposed in this research as the main detection algorithm in the new hybrid intrusion detection mechanism which works on Cloud CoResidency Threat Detection (CCTD) that combines anomaly and misuse detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Attacks detection in 6G wireless networks using machine learning by Saeed, Mamoon M., Saeed, Rashid A., Gaid, Abdulguddoos S. A., Mokhtar, Rania A., Khalifa, Othman Omran, Ahmed, Zeinab E.

    Published 2023
    “…Unlike the fifth generation (5G), which is well recognized for network cloudification with micro-service-oriented design, the sixth generation (6G) of networks is directly tied to intelligent network orchestration and management. The Attacks Detection in 6G (AD6Gs) wireless networks created by this research uses a Machine Learning (ML) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector by Abdulkader, Zaid A.

    Published 2018
    “…In instances when Blackhole and wormhole attacks take place in IAVSA and PDDA, a high detection rate that is close to 99% is observed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  10. 10

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  16. 16

    Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling by Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi

    Published 2011
    “…The result has shown that this algorithm has increased the detection rate and reduced the false alarm rate compared with Fuzzy-ART.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks by Malekzadeh, Mina

    Published 2011
    “…The proposed models prevent DoS and replay attacks by detecting and discarding forgery control frames belong to the attackers and thereby guarantee availability of the IEEE 802.11 wireless networks. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The system is implemented at UniSZA’s café where two different types of user will use the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project