Search Results - (( java application customization algorithm ) OR ( construct security normalization algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…In SPHAD,statistical analysis is used to construct a normal profile using statistical formula, scoring the incoming packets, and computing the relationships between historic normal behaviour as a dependent variable against observable packet behaviours as the independent variable through linear regression. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Global and local clustering soft assignment for intrusion detection system: a comparative study by Mohd Rizal Kadis, Azizi Abdullah

    Published 2017
    “…The ability of IDS to detect new sophisticated attacks compared to traditional method such as firewall is important to secure the network. Machine Learning algorithm such as unsupervised learning and supervised learning is capable to solve the problem of classification in IDS. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Face anti-spoofing using Convolutional Neural Networks / Siti Nurul Izzah Bahrain by Bahrain, Siti Nurul Izzah

    Published 2024
    “…The model facilitated a straightforward construction of the CNN, allowing for sequential handling of inputs. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…To stop the increase in cybercrimes, everyone, including normal citizens, needs to know how secure they are while using digital appliances. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
    Get full text
    Get full text
    Thesis