Search Results - (( java application customization algorithm ) OR ( software detection protocol algorithm ))

Refine Results
  1. 1
  2. 2

    Norms detection and assimilation in multi-agent systems: a conceptual approach by Ahmed Mahmoud, Moamin, Ahmad, Mohd Sharifuddin, Ahmad, Azhana, Mohd Yusoff, Mohd Zaliman, Mustapha, Aida

    Published 2012
    “…In this technique, the software agent is equipped with an algorithm, which detects and analyzes the normative interactions between local agents. …”
    Get full text
    Book Section
  3. 3

    Norms detection and assimilation in multi-agent systems: A conceptual approach by Mahmoud M.A., Ahmad M.S., Ahmad A., Mohd Yusoff M.Z., Mustapha A.

    Published 2023
    “…In this technique, the software agent is equipped with an algorithm, which detects and analyzes the normative interactions between local agents. …”
    Conference paper
  4. 4
  5. 5
  6. 6

    Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks by Akanji, Oluwatobi Shadrach, Abisoye, Opeyemi Aderiike, Iliyasu, Mohammed Awwal

    Published 2021
    “…This paper provides the scholarly community with an approach to boosting service availability in web servers under slow Hypertext Transfer Protocol (HTTP) DDoS attacks through attack detection using Genetic Algorithm and Support Vector Machine which facilitates attack mitigation in a Software-Defined Networking (SDN) environment simulated in GNS3. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Secure address resolution protocol proxy in software defined network by Munther, Munther Numan

    Published 2018
    “…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…Optimization of process allocation causes to decrease the network traffic and fairer allocation, and therefore,optimization of fault-tolerance. The new protocol is simulated with using the OPNET and the MATLAB software. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Two channel data acquisition system for heart sound segmentation algorithm based on instantaneous energy of electrocardiogram by Malarvili, M. B., J., M. Najeb, Ismail, Kamarulafizam

    Published 2003
    “…This paper presents the hardware design of 2- channel data acquisition system for heart sound and Electrocardiogram (ECG) to capture the heart sound and ECG simultaneously from patients; and software algorithm to detect the first heart sound (S1) and second heart sound(S2). …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Smart and energy aware routing for the internet of mobile things by Beh, Zi Xuan

    Published 2021
    “…The routing algorithm are developed and coded in Sen Script. In this project, the routing algorithm can perform disqualify node detection and energy aware routing. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15
  16. 16
  17. 17

    Industrial datasets with ICS testbed and attack detection using machine learning techniques by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Balla, Asaad, Tahir, Mohammad, Elsheikh, Elfatih A A, Suliman, F M

    Published 2021
    “…The performance metrics such as accuracy, precision, recall, F1 score are evaluated and cross validated for different ML algorithms for anomaly detection. The decision tree (DT) ML technique is optimized with pruning method which provides an attack detection accuracy of 96.5%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis