Search Results - (( attack selection proposed algorithm ) OR ( java application interface algorithm ))

Refine Results
  1. 1

    Randomized pixel selection for enhancing LSB algorithm security against brute-force attack by Mohamad Afendee, Mohamed, Ammar, Y. Tuama, Mohamad, A. Mohamed, Abdullah, Muhammed, Zurina, M. Hanapi

    Published 2017
    “…The results show that the proposed algorithm achieves a significant security improvement in comparison to standard LSB when it comes to defending against bruteforce attacks with a subordinate effect of image quality.…”
    Get full text
    Get full text
    Article
  2. 2

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…The aim of this work is to develop an improved optimization method for IDS that can be efficient and effective in subset feature selection and parameters optimization. To achieve this goal, an improved Teaching Learning-Based Optimization (ITLBO) algorithm was proposed in dealing with subset feature selection. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…Analyses on linear, differential and short attack will be performed against the DDBC algorithm to estimate the possible success of all three attacks. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Adaptive feature selection for denial of services (DoS) attack by Yusof, Ahmad Riza'ain, Udzir, Nur Izura, Selamat, Ali, Hamdan, Hazlina, Abdullah @ Selimun, Mohd Taufik

    Published 2017
    “…Adaptive detection is the learning ability to detect any changes in patterns in intrusion detection systems. In this paper, we propose combining two techniques in feature selection algorithm, namely consistency subset evaluation (CSE) and DDoS characteristic features (DCF) to identify and select the most important and relevant features related DDoS attacks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Distributed Denial of Service detection using hybrid machine learning technique by Barati, Mehdi, Abdullah, Azizol, Udzir, Nur Izura, Mahmod, Ramlan, Mustapha, Norwati

    Published 2014
    “…Genetic Algorithm (GA) and Artificial Neural Network (ANN) are deployed for feature selection and attack detection respectively in our hybrid method. …”
    Get full text
    Conference or Workshop Item
  7. 7

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…It consists of 3-stage procedures: feature ranking, feature selection and classification. Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
    Get full text
    Get full text
    Article
  11. 11

    Attacks detection in 6G wireless networks using machine learning by Saeed, Mamoon M., Saeed, Rashid A., Gaid, Abdulguddoos S. A., Mokhtar, Rania A., Khalifa, Othman Omran, Ahmed, Zeinab E.

    Published 2023
    “…The second stage involves the feature selection approach. Correlation Feature Selection algorithm (CFS) is used to implement the suggested hybrid strategy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…Discretization algorithms have been recently proposed; however, those algorithms of discretizer are only capable to handle categorical attributes and cannot deal with numerical attributes. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An Improved Wavelet Digital Watermarking Software Implementation by Khalifa, Othman Omran, Yusof, Yusnita, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke

    Published 2012
    “…However, it is clearly observed that each of them is individually distinctive in terms of its scopes and applications. In this paper, a proposed system was thoroughly explained. It includes general work flow, proposed algorithms for both original method and improved method, which were named as subband matching and selective subband matching, respectively and various attacks performed for evaluation. …”
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    An efficient detection model of selective forwarding attacks in wireless mesh networks by Khanam, Shapla, Saleem, Habibullah Yusuf, Pathan, Al-Sakib Khan

    Published 2012
    “…In our approach, we also propose a multi-hop acknowledgement based algorithm to analyze and detect the malicious behavior to defend against selective forwarding attacks in WMNs. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Steganography based on utilizing more surrounding pixels by Afrakhteh, Masoud

    Published 2010
    “…Conventional LSB method’s concept is used as the benchmark for the proposed algorithms. A model structure selection based on not choosing selected pixels as immediate neighbors of the target pixel is proposed in this study to reduce image’s distortion made by embedding random bits or in other words to get a higher imperceptibility. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    An improved wavelet digital watermarking software implementation by Khalifa, Othman Omran, Yusof, Yusnita

    Published 2011
    “…This includes general work flow, proposed algorithms for both original method and improved method, which were named as subband matching and selective subband matching, respectively and various attacks performed for evaluation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  19. 19
  20. 20

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article