Search Results - (( developing detection router algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm by Slamet, ., Izzeldin, I. Mohd, Fahmi, Samsuri

    Published 2020
    “…The basis of misused detection module is snort, and anomaly detection module is constructed by using Algorithm C4.5 detectors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Distributed Denial-of-Service Defense System by Hanasi, Lidiyawatie

    Published 2006
    “…The scope of study will coverthe aspect of howthe attack detection algorithms work and identify the attack traffic, hence develop appropriate attack responses. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Microcontroller-based face recognition system with web-based application for car security by Arumugam P., Ker P.J., Tan J.Y., Mani D.

    Published 2023
    “…The system uses Eigenfaces recognition algorithm, which was developed using OpenCV and Python scripts, to perform face detection and recognition. …”
    Article
  6. 6
  7. 7

    BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS by Yasir Abdelgadir , Mohamed, Azween, Abdullah

    Published 2010
    “…In this dissertation, an immune inspired node-based distributed detection system has been implemented. The system has been analyzed, algorithms that simulate the main immune mechanisms have been mapped out, and a security framework that incorporates different immune mechanisms has been developed. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack by Izaddoost, Alireza

    Published 2008
    “…In past two decades, Internet has developed rapidly and has integrated in many aspects of human life. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…Moreover, three proposed approaches for gateway discovery are implemented; propose a forwarding algorithm, and route determination algorithm for default route and host route in MANET are investigated.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making by Al-Hchaimi, Ahmed Abbas Jasim, Sulaiman, Nasri, Mustafa, Mohd Amrallah, Mohtar, Mohd Nazim, Mohd Hassan, Siti Lailatul, Muhsen, Yousif Raad

    Published 2022
    “…Results: (1) CRITIC weighting shows that MPSoC NoC Routing Algorithm (XY and YX) is the highest weight criterion, whereas latency (clock/cycle) is the less weight criterion. (2) The Fermatean-FDOSM-based group ranking shows that the Collision Point Router Detection (CPRD) countermeasure technique is the first-ranked alternative compared to the Secure Model Checkers (SMCs) approach. (3) The DoS A-CTs priority ranks were subjected to a systematic ranking that was confirmed by solid correlation results throughout thirteen criterion weight values. …”
    Get full text
    Get full text
    Article