Search Results - (( construct security normalization algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- normalization algorithm »
- customization algorithm »
- security normalization »
- java application »
- construct »
-
1
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. …”
Get full text
Get full text
Thesis -
2
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…In SPHAD,statistical analysis is used to construct a normal profile using statistical formula, scoring the incoming packets, and computing the relationships between historic normal behaviour as a dependent variable against observable packet behaviours as the independent variable through linear regression. …”
Get full text
Get full text
Thesis -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
Global and local clustering soft assignment for intrusion detection system: a comparative study
Published 2017“…The ability of IDS to detect new sophisticated attacks compared to traditional method such as firewall is important to secure the network. Machine Learning algorithm such as unsupervised learning and supervised learning is capable to solve the problem of classification in IDS. …”
Get full text
Get full text
Get full text
Article -
5
Face anti-spoofing using Convolutional Neural Networks / Siti Nurul Izzah Bahrain
Published 2024“…The model facilitated a straightforward construction of the CNN, allowing for sequential handling of inputs. …”
Get full text
Get full text
Thesis -
6
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data
Published 2023“…To stop the increase in cybercrimes, everyone, including normal citizens, needs to know how secure they are while using digital appliances. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis
