Search Results - (( attack selection process algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…The research stage starts from pre-Processing, extraction, feature selection and classification processes and performance testing. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Randomized pixel selection for enhancing LSB algorithm security against brute-force attack by Mohamad Afendee, Mohamed, Ammar, Y. Tuama, Mohamad, A. Mohamed, Abdullah, Muhammed, Zurina, M. Hanapi

    Published 2017
    “…In addition, we have embedded noise bits into the unused pixels to make the steganalysis process more difficult. The attacker not only needs to guess which pixels (out of all pixels in the image) have been selected to carry the secret, but also must arrange them in the correct order. …”
    Get full text
    Get full text
    Article
  4. 4

    Attacks detection in 6G wireless networks using machine learning by Saeed, Mamoon M., Saeed, Rashid A., Gaid, Abdulguddoos S. A., Mokhtar, Rania A., Khalifa, Othman Omran, Ahmed, Zeinab E.

    Published 2023
    “…The second stage involves the feature selection approach. Correlation Feature Selection algorithm (CFS) is used to implement the suggested hybrid strategy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. …”
    Get full text
    Get full text
    Article
  6. 6

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…In conclusion, this work has presented an improved optimization algorithm that can improve the accuracy of IDSs in the detection of various types of network attack.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model by Kareem Thajeel, Isam, Samsudin, Khairulmizam, Hashim, Shaiful Jahari, Hashim, Fazirulhisyam

    Published 2023
    “…Thus, this study attempts to fill the gap by proposing a feature drift-aware algorithm for detecting the evolved XSS attacks. The proposed approach is a dynamic feature selection based on a deep Q-network multi-agent feature selection (DQN-MAFS) framework. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…A novel and efficient cluster head selection algorithm (ECHSA) is employed to improve the performance of the cluster head (CH) selection process in clustered WSN. …”
    Get full text
    Get full text
    Article
  10. 10

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…In order to improve classification performance problem, feature selection and discretization algorithm are crucial in selecting relevant attributes that could improve classification performance. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Detection of SQL injection attack using machine learning by Tung, Tean Thong

    Published 2024
    “…The system covers multiple stages: project pre-development, data pre-processing, feature selection, machine learning model selection, model training, model testing, implementation, and assessment. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…One of the main steps after the data collection stage of any method is selecting a subset of the features to be used for the feature selection process. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization by Kamal Z., Zamli, Abdul Kader, ., Fakhrud Din, ., Alhadawi, Hussam S.

    Published 2021
    “…This paper introduces a new variant of a metaheuristic algorithm based on Tiki-Taka algorithm, called selective chaotic maps Tiki-Taka algorithm (SCMTTA). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  17. 17

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…By leveraging AI and machine learning, the system dynamically suggests the most suitable penetration testing tools which are Nmap, XSStrike, PwnXSS, OWASP ZAP, or Burp Suite. The SVM algorithm, a supervised learning model, plays a crucial role in improving the efficiency of tool selection, ultimately enhancing the speed and adaptability of vulnerability detection processes. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh by Mohammed Saleh, Mohammed Ahmed

    Published 2016
    “…Since the video data is still huge even after the compression process, most researchers apply their encryption approaches on a selective part of the video data whereas the compression process is performed by a different type of coding standard. …”
    Get full text
    Get full text
    Book Section
  19. 19

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Clustering is the last step of processing before classification has been performed, using k-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph