Search Results - (( attack detection problem algorithm ) OR ( java application using algorithm ))
Search alternatives:
- detection problem »
- problem algorithm »
- java application »
- using algorithm »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…The detection of unknown attacks is one of the main challenges in intrusion detection system (IDS). …”
Get full text
Get full text
Article -
3
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Published 2021“…The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. …”
Get full text
Get full text
Article -
4
Improving intrusion detection using genetic algorithm
Published 2013“…To overcome this problem, a genetic algorithm approach is proposed. …”
Get full text
Get full text
Get full text
Article -
5
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
6
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
7
Detecting resource consumption attack over MANET using an artificial immune algorithm
Published 2011“…DCIIDA is introduced to detect the Resource Consumption Attack (RCA) over MANET. …”
Get full text
Get full text
Get full text
Article -
8
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019“…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
Get full text
Get full text
Get full text
Book Chapter -
9
Detecting critical nodes for network vulnerability assessment under cascading failures
Published 2017“…In addition, an algorithm is proposed to solve problem of attacking nodes in the network with limited budget while guaranteeing the high total profits of attacked nodes. …”
Get full text
Get full text
Conference or Workshop Item -
10
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
11
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The problem statement underscores the need for robust intrusion detection mechanisms to safeguard against unauthorized access and potential data breaches. …”
Get full text
Get full text
Thesis -
12
-
13
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024“…Cloud implementations also introduce a new term, "co-residency" attack and lack of research focusing on detecting this type of attack. …”
Proceedings Paper -
14
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
15
Machine learning algorithms in context of intrusion detection
Published 2016“…Although, signature based has high detection rate but it cannot detect novel attacks. …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018“…Cloud implementations also introduce a new term, "co-residency" attack and lack of research focusing on detecting this type of attack. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
Distributed Denial of Service detection using hybrid machine learning technique
Published 2014“…Current paper proposes architecture of a detection system for DDoS attack. Genetic Algorithm (GA) and Artificial Neural Network (ANN) are deployed for feature selection and attack detection respectively in our hybrid method. …”
Get full text
Conference or Workshop Item -
20
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…One form of implementation is intrusion detection system (IDS). In IDS, the main problem for nuisance network administrators in detecting attacks is false alerts. …”
Get full text
Get full text
Get full text
Article
