Search Results - (( java application modified algorithm ) OR ( peer detection method algorithm ))
Search alternatives:
- application modified »
- java application »
- method algorithm »
- peer detection »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016Get full text
Get full text
Final Year Project -
4
ANALYSIS OF REAL-TIME OBJECT DETECTION METHODS FOR ANDROID SMARTPHONE
Published 2012Get full text
Get full text
Conference or Workshop Item -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
-
8
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
-
11
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
-
14
Outlier detection in circular regression model using minimum spanning tree method
Published 2019Get full text
Get full text
Conference or Workshop Item -
15
Machine learning algorithms in context of intrusion detection
Published 2016Get full text
Get full text
Conference or Workshop Item -
16
-
17
Detection of head position using chain code algorithm
Published 2007Get full text
Get full text
Thesis -
18
Detection of head position using chain code algorithm
Published 2007Get full text
Get full text
Thesis -
19
-
20
A study on advanced statistical analysis for network anomaly detection
Published 2005Get full text
Monograph
