Search Results - (( java application interface algorithm ) OR ( attack detection search algorithm ))
Search alternatives:
-
1
-
2
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019“…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
Get full text
Get full text
Get full text
Book Chapter -
3
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
4
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
5
-
6
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
Get full text
Get full text
Get full text
Article -
7
Improving intrusion detection using genetic algorithm
Published 2013“…GAs are search algorithms which are based on the principles of natural selection and genetics. …”
Get full text
Get full text
Get full text
Article -
8
-
9
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023“…Barium compounds; Cybersecurity; Data mining; Decision trees; Evolutionary algorithms; K-means clustering; Learning algorithms; Malware; Network security; Sodium compounds; Support vector machines; 'current; Comparatives studies; Cyber security; K-means; Machine learning algorithms; Malware attacks; Malware detection; Metaheuristic; Recent researches; Systematic literature review; Nearest neighbor search…”
Conference Paper -
10
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…This situation makes the detection of cyber-based attacks on computer networks a relevant and challenging area of research. …”
Get full text
Get full text
Thesis -
11
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
Get full text
Get full text
Thesis -
12
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Detecting cyber-security attacks is still a challenging task. …”
Get full text
Get full text
Thesis -
13
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Article -
14
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
17
Visdom: Smart guide robot for visually impaired people
Published 2025“…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
19
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
20
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis
