Search Results - (( developing attack detection algorithm ) OR ( java application scheduling algorithm ))
Search alternatives:
- application scheduling »
- developing attack »
- java application »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…The CPU profiler of JavaTM VisualVM measures the number of invocations of scheduling event handlers (procedures) in each algorithm as well as the total time spent in all invocations of this handler. …”
Get full text
Get full text
Conference or Workshop Item -
2
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
3
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
Get full text
Get full text
Thesis -
4
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
5
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
6
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…IP-PBX face challenges in detecting and mitigating malicious traffic. In this research, Support Vector Machine (SVM) machine learning detection & prevention algorithm were developed to detect this type of attacks Two other techniques were benchmarked decision tree and Naïve Bayes. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…As a result of implementing this system: misused detection module uses the signature of attacks to detection the known attacks; anomaly detection module can detect the unknown attacks; signature generation module extracts the signature of attacks that are detected by Anomaly Detection System module, and maps the signatures into snort rules.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
9
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
10
Machine learning algorithms in context of intrusion detection
Published 2016“…Many machine learning techniques have been developed to cope with this problem. These machine learning algorithms develop a detection model in a training phase. …”
Get full text
Get full text
Conference or Workshop Item -
11
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
12
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
13
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
14
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
15
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
16
Improving Class Timetabling using Genetic Algorithm
Published 2006“…This paper reports the power fill techniques using GA in scheduling. Class timetabling problem is one of the applications in scheduling. …”
Get full text
Get full text
Get full text
Thesis -
17
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…The Controller Area Network (CAN), which is a protocol for the in-vehicle network, is lacking in security features, making the CAN bus vulnerable to a range of cyberattacks such as message injections, replay attacks, and denial of service attacks. This has prompted researchers to develop statistical and machine learning based intrusion detection systems for the CAN bus that use various features such as message timing and frequency to detect attacks. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005“…This paper reports the powerful techniques using GA in scheduling. Examination timetabling problem is one of the applications in scheduling. …”
Get full text
Get full text
Thesis -
19
Examination Timetabling Using Genetic Algorithm Case Study : KUiTTHO
Published 2005“…This paper reports the powerful techniques using GA in scheduling. Examination timetabling problem is one of the applications in scheduling. …”
Get full text
Get full text
Get full text
Thesis -
20
Secure address resolution protocol proxy in software defined network
Published 2018“…In addition, ARP based attack detection technique combines ARP storm and ARP spoofing detection algorithms. …”
Get full text
Get full text
Get full text
Thesis
