Search Results - (( basic attack detection algorithm ) OR ( java application stemming algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…In this research, Two-Phase Authentication of Attack Detection (TPAAD) scheme is proposed and investigated for detection and mitigation of DoS attacks in SDN to increase the performance of the above-mentioned issues. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A hybrid particle swarm optimization - extreme learning machine approach for intrusion detection system by M.H., Ali, Mohamad, Fadlizolkipi, Ahmad Firdaus, Zainal Abidin, Nik Zulkarnaen, Khidzir

    Published 2018
    “…There are several limitations that facing intrusion-detection system in current days, such as high rates of false positive alerts, low detection rates of rare but dangerous attacks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection by Ghanem, Waheed Ali Hussein Mohammed

    Published 2019
    “…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…Unfortunately,watermark resistance to geometric attacks is the most challenge work in traditional digital image watermarking techniques which causes incorrect watermark detection and extraction. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad by Abd Rahman, Abdullah Sani, Ahmad, Samsiah

    Published 2022
    “…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. By using Microsoft Visual Basic 6.0, the Graphical User Interfaces (GUIs) of the application to provide an easy or user-friendly monitoring application. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An enhance embedding method using edge and textures detection for image steganography by Al-Maliki, Alaa Jabbar Qasim

    Published 2024
    “…By embedding in noisy zones using edge and texture detection which complicates feature extraction, making hidden information more secure and statistically less detectable than basic LSB matching techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…My Ph.d is focusing on constructing a detection system of malicious spam email and DDoS attack using a large number of dataset which are obtained by a server that collect double-bounce email and darknet for malicious spam email detection system and DDoS backscatter detection system, respectively. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancement of network security by use machine learning by Hasan, Ahmed Raheem

    Published 2019
    “…The ANNDL uses iterations method to detect the data, do matching and identify the data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis