Search Results - (( java application using algorithm ) OR ( attack detection protocol algorithm ))
Search alternatives:
- protocol algorithm »
- java application »
- using algorithm »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
2
Secure address resolution protocol proxy in software defined network
Published 2018“…In addition, ARP based attack detection technique combines ARP storm and ARP spoofing detection algorithms. …”
Get full text
Get full text
Get full text
Thesis -
3
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…This paper provides the scholarly community with an approach to boosting service availability in web servers under slow Hypertext Transfer Protocol (HTTP) DDoS attacks through attack detection using Genetic Algorithm and Support Vector Machine which facilitates attack mitigation in a Software-Defined Networking (SDN) environment simulated in GNS3. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
Distributed denial of service attack in HTTP/2: review on security issues and future challenges
Published 2024“…By analyzing the distinctive features of HTTP/2 protocol, the study suggests extending DDoS attack detection techniques established for HTTP/1 to the realm of HTTP/2. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Spatial Signature Algorithm (SSA): A New Approach In Countermeasuring XML Signature Wrapping Attack
Published 2024journal::journal article -
7
Intrusion detection on the in-vehicle network using machine learning
Published 2021“…This paper presents an intrusion detection method based on the Isolation Forest (iForest) algorithm that detects message insertion attacks using message timing information. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
9
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
10
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
11
Network tool for preventing DDOS attacks on cloud computing
Published 2015“…This algorithm is simple and it is based on existing security protocol and is proposed for detecting and preventing security attacks on the network by filtering packets in the network. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
-
13
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
14
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…The secure node authentication algorithm prevents attacks from accessing the network. …”
Get full text
Get full text
Article -
15
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…In this paper, the adapted streaming data Isolation Forest (iForestASD) algorithm has been applied to CAN intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In particular, issues such as collects real time attack related audit data and cooperative global detection. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
Industrial datasets with ICS testbed and attack detection using machine learning techniques
Published 2021“…The DPI provides more visibility into the contents of OT network traffic based on OT protocols. The Machine learning (ML) techniques are deployed for cyber-attack detection of datasets from the cyber kit. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…Next, the ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
text::Thesis -
20
