Search Results - (( based intrusion function algorithm ) OR ( java implementation path algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…GAs are search algorithms which are based on the principles of natural selection and genetics. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…Anomaly-based intrusion detection plays a vital role in protecting networks against malicious activities. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…Hashing function implementation have been using in this system as its cryptography algorithm. …”
    Get full text
    Get full text
    Monograph
  8. 8
  9. 9

    A multi-attribute decision model for intrusion response system by Fessi, B. A., Benabdallah, S., Boudriga, N., Hamdi, M.

    Published 2014
    “…The model is characterized by a new implementation of individual structure based on the response-resource matrix and a fitness function based on cost-benefit approach. …”
    Get full text
    Get full text
    Article
  10. 10

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Anomaly detection in ICS datasets with machine learning algorithms by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Abdul Rahman, Farah Diyana, Tahir, Mohammad

    Published 2021
    “…Detection techniques with machine learning algorithms on public datasets, suitable for intrusion detection of cyber-attacks in SCADA systems, as the first line of defense, have been detailed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…ARSA will automatically change its security algorithm based on times and attacks. If there is no attack or intrusion detected, MPM will wait for the scheduled switching within 30 minutes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems by Mubarak, Sinil, Habaebi, Mohamed Hadi, Abdul Rahman, Farah Diyana, Khan, Sheroz, Islam, Md Rafiqul

    Published 2019
    “…Mitigation techniques such as honeypot simulation which helps in vulnerability assessment, along with machine learning algorithms, suitable for intrusion detection and prevention of cyber-attacks in SCADA systems has been detailed.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique by Al Ogaili, Riyadh Rahef Nuiaa

    Published 2023
    “…As a result, existing detection mechanisms are unable to detect these forms of cyber intrusions. Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
    Get full text
    Get full text
    Thesis
  17. 17

    Classification of polymorphic virus based on integrated features by A Hamid, Isredza Rahmi, Subramaniam, Sharmila, Sutoyo, Edi, Abdullah, Zubaile

    Published 2018
    “…The addressable problem with current malware intrusion detection and prevention system is having difficulties in detecting unknown and multipath polymorphic computer virus solely based on either static or dynamic features. …”
    Get full text
    Get full text
    Article
  18. 18

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…In addition, we have also successfully derived the likelihood ratio test in the determination of the number of components in GMM and the comparison of its results with those of Akaike Information Criteria (AIC) will also be highlighted in this thesis. The said algorithm uses similarity coefficient to classify the real data based on the log-likelihood function and it’s extended to detect incoming fraud calls as suspected by the telecommunication company. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Fault identification in pipeline system using normalized hilbert huang transform and automatic selection of intrinsic mode function by Hanafi, M. Yusop, M. F., Ghazali, M. F. M., Yusof, M. A., Pi Remli

    Published 2018
    “…This paper proposed to apply Integrated Kurtosis-based Algorithm for z-filter Technique (Ikaz) for that allows automatic selection of intrinsic mode function (IMF) that’s should be used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20