Search Results - (( intelligence a protocol algorithm ) OR ( intelligence based flow algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2021
    “…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Evaluation of Security Metric for Artificial Internet of Things Smart Locking System by Siti Nur Hanani, Mohd Rizal

    Published 2023
    “…The primary goal of this dissertation is to evaluate the security metric for IoT based locking system and design an enhance smart locking system that leverages the capabilities of Artificial Intelligence for facial recognition from the ground up. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…The communications domain has utilized the implementation of protocols for a wide spectrum of applications. This encompasses Medium Access Control (MAC) protocols. …”
    Get full text
    Get full text
    Article
  8. 8

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    Article
  16. 16
  17. 17

    A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network by Rashid, Sami Abduljabbar, Audah, Lukman, Hamdi, Mustafa Maad, Jubair, Mohammed Ahmed, Hassan, Mustafa Hamid, Abood, Mohammed Salah, A. Mostafa, Salama

    Published 2023
    “…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network by Rashid, Sami Abduljabbar, Audah, Lukman, Hamdi, Mustafa Maad, Jubair, Mohammed Ahmed, Hassan, Mustafa Hamid, Abood, Mohammed Salah, A. Mostafa, Salama

    Published 2023
    “…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network by Rashid, Sami Abduljabbar, Audah, Lukman, Hamdi, Mustafa Maad, Jubair, Mohammed Ahmed, Hassan, Mustafa Hamid, Abood, Mohammed Salah, A. Mostafa, Salama

    Published 2023
    “…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Geographical and maximum distance on-demand routing algorithm G-MDORA by Mohammed D., Bin Mansor M., Hock G.C.

    Published 2024
    “…A vehicular ad hoc network (VANET) is an intelligent technology that allows efficient communication, secure data transmission, and traffic management. …”
    Article