Search Results - (( development mitigate detection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- development mitigate »
- implication based »
- java implication »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
2
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…This study contributes to the ongoing research in detecting and mitigating slow HTTP DDoS attacks with emphasis on the use of machine learning classification and meta-heuristic algorithms.…”
Get full text
Get full text
Get full text
Get full text
Article -
3
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…The task of detecting fake news is highly important to mitigate the misleading information spreading. …”
Get full text
Get full text
Get full text
Thesis -
4
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
Get full text
Get full text
Thesis -
5
SIMULATION AND ANALYSIS OF HARMONIC DETECTION AND MITIGATION SYSTEM USING ACTIVE FILTER
Published 2019“…The main objective for this study is to analyse the harmonics components in AC power system using Fast Fourier Transforms (FFT) algorithm. Other than that, the objective is also to design and develop the harmonic detection system for power quality of AC power system. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Artificial Intelligence Application in Power Generation Industry: Initial considerations
Published 2023Conference Paper -
7
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
Published 2020“…The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
Get full text
Get full text
Journal -
8
-
9
-
10
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…IP-PBX face challenges in detecting and mitigating malicious traffic. In this research, Support Vector Machine (SVM) machine learning detection & prevention algorithm were developed to detect this type of attacks Two other techniques were benchmarked decision tree and Naïve Bayes. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…These integrations reduce detection latency and false positives while supporting timely threat mitigation. …”
thesis::doctoral thesis -
12
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…Next, we developed a Constant Global False Alarm Rate (CGFAR) with Constant Global Detection Rate (CGDR) algorithm to mitigate the Cooperative SS (CSS) requirements. …”
Get full text
Get full text
Thesis -
13
Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol
Published 2023“…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
Get full text
Get full text
Student Project -
14
Network intrusion detection and alert system
Published 2024“…This project aims to develop an intelligent and comprehensive network intrusion detection and alert system (NIDAS) to enhance network security and provide real-time threat mitigation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019“…Therefore, this authentication process must be further investigated to develop efficient security techniques. This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
Get full text
Get full text
Get full text
Book Chapter -
16
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…Overall, this research underscores the potential of machine learning approaches for detecting malware and offers valuable guidance for the development of successful malware detection systems.…”
Get full text
Get full text
Get full text
Article -
17
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…Overall, this research underscores the potential of machine learning approaches for detecting malware and offers valuable guidance for the development of successful malware detection systems.…”
Get full text
Get full text
Article -
18
Skin burn degree detection using Convolutional Neural Network / Nur Amaleen Aishah Salehuddin
Published 2024“…This project aims on the development of a Skin Burn Degree Detection system utilizing Convolutional Neural Network (CNN) algorithms. …”
Get full text
Get full text
Thesis -
19
-
20
Development of intelligent early warning system for steam turbine
Published 2023“…The ANN models and the hybrid artificial intelligence (AI) of ANN with Genetic Algorithm (GA), which is able to detect steam turbine trip for Malaysia Jana Manjung (MNJ) power station were developed. …”
Article
