Search Results - (( java application interface algorithm ) OR ( attack selection proposed algorithm ))
Search alternatives:
- selection proposed »
- proposed algorithm »
- java application »
- attack selection »
-
1
Randomized pixel selection for enhancing LSB algorithm security against brute-force attack
Published 2017“…The results show that the proposed algorithm achieves a significant security improvement in comparison to standard LSB when it comes to defending against bruteforce attacks with a subordinate effect of image quality.…”
Get full text
Get full text
Article -
2
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…The aim of this work is to develop an improved optimization method for IDS that can be efficient and effective in subset feature selection and parameters optimization. To achieve this goal, an improved Teaching Learning-Based Optimization (ITLBO) algorithm was proposed in dealing with subset feature selection. …”
Get full text
Get full text
Thesis -
3
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…Analyses on linear, differential and short attack will be performed against the DDBC algorithm to estimate the possible success of all three attacks. …”
Get full text
Get full text
Thesis -
4
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Adaptive feature selection for denial of services (DoS) attack
Published 2017“…Adaptive detection is the learning ability to detect any changes in patterns in intrusion detection systems. In this paper, we propose combining two techniques in feature selection algorithm, namely consistency subset evaluation (CSE) and DDoS characteristic features (DCF) to identify and select the most important and relevant features related DDoS attacks. …”
Get full text
Get full text
Conference or Workshop Item -
6
Distributed Denial of Service detection using hybrid machine learning technique
Published 2014“…Genetic Algorithm (GA) and Artificial Neural Network (ANN) are deployed for feature selection and attack detection respectively in our hybrid method. …”
Get full text
Conference or Workshop Item -
7
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
Get full text
Get full text
Get full text
Thesis -
9
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…It consists of 3-stage procedures: feature ranking, feature selection and classification. Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
11
Attacks detection in 6G wireless networks using machine learning
Published 2023“…The second stage involves the feature selection approach. Correlation Feature Selection algorithm (CFS) is used to implement the suggested hybrid strategy. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Discretization algorithms have been recently proposed; however, those algorithms of discretizer are only capable to handle categorical attributes and cannot deal with numerical attributes. …”
Get full text
Get full text
Thesis -
13
An Improved Wavelet Digital Watermarking Software Implementation
Published 2012“…However, it is clearly observed that each of them is individually distinctive in terms of its scopes and applications. In this paper, a proposed system was thoroughly explained. It includes general work flow, proposed algorithms for both original method and improved method, which were named as subband matching and selective subband matching, respectively and various attacks performed for evaluation. …”
Get full text
Get full text
Proceeding Paper -
14
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
An efficient detection model of selective forwarding attacks in wireless mesh networks
Published 2012“…In our approach, we also propose a multi-hop acknowledgement based algorithm to analyze and detect the malicious behavior to defend against selective forwarding attacks in WMNs. …”
Get full text
Get full text
Get full text
Article -
16
Steganography based on utilizing more surrounding pixels
Published 2010“…Conventional LSB method’s concept is used as the benchmark for the proposed algorithms. A model structure selection based on not choosing selected pixels as immediate neighbors of the target pixel is proposed in this study to reduce image’s distortion made by embedding random bits or in other words to get a higher imperceptibility. …”
Get full text
Get full text
Thesis -
17
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
18
An improved wavelet digital watermarking software implementation
Published 2011“…This includes general work flow, proposed algorithms for both original method and improved method, which were named as subband matching and selective subband matching, respectively and various attacks performed for evaluation. …”
Get full text
Get full text
Get full text
Book Chapter -
19
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
Published 2023“…Thus, this study attempts to fill the gap by proposing a feature drift-aware algorithm for detecting the evolved XSS attacks. …”
Get full text
Get full text
Get full text
Article -
20
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article
