Search Results - (( based intrusion function algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- intrusion function »
- function algorithm »
- java application »
- based intrusion »
-
1
Improving intrusion detection using genetic algorithm
Published 2013“…GAs are search algorithms which are based on the principles of natural selection and genetics. …”
Get full text
Get full text
Get full text
Article -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
3
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…Anomaly-based intrusion detection plays a vital role in protecting networks against malicious activities. …”
Get full text
Get full text
Thesis -
4
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Hashing function implementation have been using in this system as its cryptography algorithm. …”
Get full text
Get full text
Monograph -
5
Detecting resource consumption attack over MANET using an artificial immune algorithm
Published 2011“…These algorithms are used to secure both host-based and network-based systems. …”
Get full text
Get full text
Get full text
Article -
6
A multi-attribute decision model for intrusion response system
Published 2014“…The model is characterized by a new implementation of individual structure based on the response-resource matrix and a fitness function based on cost-benefit approach. …”
Get full text
Get full text
Article -
7
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
Get full text
Get full text
Get full text
Article -
8
Anomaly detection in ICS datasets with machine learning algorithms
Published 2021“…Detection techniques with machine learning algorithms on public datasets, suitable for intrusion detection of cyber-attacks in SCADA systems, as the first line of defense, have been detailed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
A security payment model for financial payment using mykad
Published 2011“…ARSA will automatically change its security algorithm based on times and attacks. If there is no attack or intrusion detected, MPM will wait for the scheduled switching within 30 minutes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
Get full text
Get full text
Get full text
Thesis -
11
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
Published 2019“…Mitigation techniques such as honeypot simulation which helps in vulnerability assessment, along with machine learning algorithms, suitable for intrusion detection and prevention of cyber-attacks in SCADA systems has been detailed.…”
Get full text
Get full text
Get full text
Article -
12
-
13
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…As a result, existing detection mechanisms are unable to detect these forms of cyber intrusions. Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
14
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
15
Classification of polymorphic virus based on integrated features
Published 2018“…The addressable problem with current malware intrusion detection and prevention system is having difficulties in detecting unknown and multipath polymorphic computer virus solely based on either static or dynamic features. …”
Get full text
Get full text
Article -
16
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…In addition, we have also successfully derived the likelihood ratio test in the determination of the number of components in GMM and the comparison of its results with those of Akaike Information Criteria (AIC) will also be highlighted in this thesis. The said algorithm uses similarity coefficient to classify the real data based on the log-likelihood function and it’s extended to detect incoming fraud calls as suspected by the telecommunication company. …”
Get full text
Get full text
Get full text
Thesis -
17
Fault identification in pipeline system using normalized hilbert huang transform and automatic selection of intrinsic mode function
Published 2018“…This paper proposed to apply Integrated Kurtosis-based Algorithm for z-filter Technique (Ikaz) for that allows automatic selection of intrinsic mode function (IMF) that’s should be used. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Conference Paper -
19
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis
