Search Results - (( java application customization algorithm ) OR ( attack decision process algorithm ))
Search alternatives:
- customization algorithm »
- process algorithm »
- java application »
- decision process »
- attack decision »
-
1
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The algorithms considered are the Naive Bays Algorithm, Decision Tree Algorithm and Hybrid Algorithm for different datasets. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…The survey covers the research conducted between 2016 and 2021(34 peer-reviewed journal articles and 28 conference papers), identifying and categorizing the main methodologies and technologies employed in generating and analyzing attack graphs. In this review, core modeling techniques for IoT vulnerability assessment are highlighted, such as Markov Decision Processes (MDP), Feature Pyramid Networks (FPN), K-means clustering, and logistic regression models, along with other techniques involving genetic algorithms like fast-forward (FF), contingent fast-forwards (CFF), advanced reinforcement-learning algorithms, and HARMs models. …”
Review -
3
Design and analysis of an early heart attack detection using openCV
Published 2022“…Millions of people die every year from heart attacks, according to research. The healthcare industry generates massive volumes of data related to heart attacks, but this data is sadly not being processed for hidden insights that could improve decision-making. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
5
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
6
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
7
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
8
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Diagnosis and treatment recommender system for myocardial infarction using decision tree and Support Vector Machines (SVM) / Wan Marzuqiamrin Wan Mansor
Published 2025“…This project presents the development process of the prototype for diagnosis and treatment recommender system for myocardial infarction using decision tree and support vector machine (SVM) algorithms. …”
Get full text
Get full text
Thesis -
11
-
12
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
13
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
Published 2020“…Decision Tree, AdaBoost, Random Forest, K-Nearest Neighbors and Naive Bayes are then used to classify each attack according to their profile features. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Comparative analysis of danger theory variants in measuring risk level for text spam messages
Published 2024journal::journal article -
15
Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making
Published 2022“…Context: Denial-of-Service Attack countermeasure techniques (DoS A-CTs) evaluation is a Multi-criteria decision-making (MCDM) problem based on different MPSoCs of IoT platform design, performance, and design overhead. …”
Get full text
Get full text
Article -
16
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
Published 2013“…This work aims to provide a full understanding of the network attacks as well as ease the process for the analysts and save their time. …”
Get full text
Get full text
Thesis -
17
Machine learning for APT detection
Published 2023“…Furthermore, standardized techniques have been enhanced to enhance their effectiveness in detecting APT attacks. The learning process relies on datasets sourced from various channels, including journal logs, traceability audits, and systems monitoring statistics. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
A stylometry approach for blind linguistic steganalysis model against translation-based steganography
Published 2023“…However, accuracy of blind steganalysis algorithms highly depend on the features selected from the input data especially when attacking embedding techniques in TBS. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Modeling and Implementation of Omni-directional soccer robot with wide vision scope applied in Robocup-MSL
Published 2009Get full text
Working Paper -
20
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis
