Search Results - (( java application optimized algorithm ) OR ( software detection service algorithm ))
Search alternatives:
- optimized algorithm »
- software detection »
- detection service »
- service algorithm »
- java application »
-
1
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
2
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
3
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
4
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
5
-
6
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…Attackers have resorted to slow DDoS because it mimics the behaviour of a slow legitimate client thereby causing service unavailability. This paper provides the scholarly community with an approach to boosting service availability in web servers under slow Hypertext Transfer Protocol (HTTP) DDoS attacks through attack detection using Genetic Algorithm and Support Vector Machine which facilitates attack mitigation in a Software-Defined Networking (SDN) environment simulated in GNS3. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Norms detection and assimilation in multi-agent systems: A conceptual approach
Published 2023“…In this technique, the software agent is equipped with an algorithm, which detects and analyzes the normative interactions between local agents. …”
Conference paper -
8
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
9
Norms detection and assimilation in multi-agent systems: a conceptual approach
Published 2012“…In this technique, the software agent is equipped with an algorithm, which detects and analyzes the normative interactions between local agents. …”
Get full text
Book Section -
10
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
12
Facial mask detection in low light environment
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
13
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
14
Evaluation of boruta algorithm in DDoS detection
Published 2023Get full text
Get full text
Get full text
Article -
15
-
16
-
17
-
18
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
Published 2021“…GEADDDC generalizes the Renyi Joint Entropy algorithm and uses a dynamic threshold to detect DDoS attacks on the SDN controller.…”
Get full text
Get full text
Thesis -
19
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…However, due to this flexible SDN architecture, it makes it vulnerable to different attacks such as Denial of Service (DoS)/Distributed Denial of Service (DDoS), Man in the Middle (MITM), spoofing and intrusion etc. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
