Search Results - (( attack selection process algorithm ) OR ( java application optimized algorithm ))
Search alternatives:
- optimized algorithm »
- process algorithm »
- attack selection »
- java application »
-
1
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…The research stage starts from pre-Processing, extraction, feature selection and classification processes and performance testing. …”
Get full text
Get full text
Get full text
Article -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
3
Randomized pixel selection for enhancing LSB algorithm security against brute-force attack
Published 2017“…In addition, we have embedded noise bits into the unused pixels to make the steganalysis process more difficult. The attacker not only needs to guess which pixels (out of all pixels in the image) have been selected to carry the secret, but also must arrange them in the correct order. …”
Get full text
Get full text
Article -
4
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
5
Attacks detection in 6G wireless networks using machine learning
Published 2023“…The second stage involves the feature selection approach. Correlation Feature Selection algorithm (CFS) is used to implement the suggested hybrid strategy. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
7
Message based random variable length key encryption algorithm.
Published 2009“…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. …”
Get full text
Get full text
Article -
8
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…In conclusion, this work has presented an improved optimization algorithm that can improve the accuracy of IDSs in the detection of various types of network attack.…”
Get full text
Get full text
Thesis -
9
-
10
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
11
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
12
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
Published 2023“…Thus, this study attempts to fill the gap by proposing a feature drift-aware algorithm for detecting the evolved XSS attacks. The proposed approach is a dynamic feature selection based on a deep Q-network multi-agent feature selection (DQN-MAFS) framework. …”
Get full text
Get full text
Get full text
Article -
13
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…A novel and efficient cluster head selection algorithm (ECHSA) is employed to improve the performance of the cluster head (CH) selection process in clustered WSN. …”
Get full text
Get full text
Article -
14
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…In order to improve classification performance problem, feature selection and discretization algorithm are crucial in selecting relevant attributes that could improve classification performance. …”
Get full text
Get full text
Thesis -
15
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
16
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
17
Detection of SQL injection attack using machine learning
Published 2024“…The system covers multiple stages: project pre-development, data pre-processing, feature selection, machine learning model selection, model training, model testing, implementation, and assessment. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
20
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…One of the main steps after the data collection stage of any method is selecting a subset of the features to be used for the feature selection process. …”
Get full text
Get full text
Thesis
