Search Results - (( java adaptation optimization algorithm ) OR ( construct security normalization algorithm ))
Search alternatives:
- adaptation optimization »
- normalization algorithm »
- security normalization »
- java adaptation »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. …”
Get full text
Get full text
Thesis -
3
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…In SPHAD,statistical analysis is used to construct a normal profile using statistical formula, scoring the incoming packets, and computing the relationships between historic normal behaviour as a dependent variable against observable packet behaviours as the independent variable through linear regression. …”
Get full text
Get full text
Thesis -
4
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Global and local clustering soft assignment for intrusion detection system: a comparative study
Published 2017“…The ability of IDS to detect new sophisticated attacks compared to traditional method such as firewall is important to secure the network. Machine Learning algorithm such as unsupervised learning and supervised learning is capable to solve the problem of classification in IDS. …”
Get full text
Get full text
Get full text
Article -
6
Face anti-spoofing using Convolutional Neural Networks / Siti Nurul Izzah Bahrain
Published 2024“…The model facilitated a straightforward construction of the CNN, allowing for sequential handling of inputs. …”
Get full text
Get full text
Thesis -
7
Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data
Published 2023“…To stop the increase in cybercrimes, everyone, including normal citizens, needs to know how secure they are while using digital appliances. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis
