Search Results - (( java implementation based algorithm ) OR ( attack detection function algorithm ))
Search alternatives:
- implementation based »
- java implementation »
- function algorithm »
-
1
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
2
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
3
Detecting resource consumption attack over MANET using an artificial immune algorithm
Published 2011“…DCIIDA is introduced to detect the Resource Consumption Attack (RCA) over MANET. …”
Get full text
Get full text
Get full text
Article -
4
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
Get full text
Get full text
Thesis -
5
-
6
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
Improving intrusion detection using genetic algorithm
Published 2013“…A great deal of attention has been recently paid to anomaly detection to accomplish intrusion detection. However, a major problem with this approach is maximizing detection rate and accuracy, as well as minimizing false alarm i.e., inability to correctly discover particular types of attacks. …”
Get full text
Get full text
Get full text
Article -
8
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
9
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
Published 2021“…GEADDDC generalizes the Renyi Joint Entropy algorithm and uses a dynamic threshold to detect DDoS attacks on the SDN controller.…”
Get full text
Get full text
Thesis -
10
-
11
-
12
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
14
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
15
Spear- phishing attack detection using artificial intelligence
Published 2024“…The goal is to mitigate phishing and spam threats by using advanced algorithms to detect malicious URLs and classify messages effectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…A two layer encryption functions in PHP was designed for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
Published 2019“…The classifications of various attacks along with the intrusions detection methods have been highlighted. …”
Get full text
Get full text
Get full text
Article -
18
Layered Botnet Detection Framework Based On Signal Processing And Discrete Time Analysis
Published 2012“…Then LBDF applies both a periodogram and circular autocorrelation function to these sequences to detect any hidden periodicities. …”
Get full text
Get full text
Thesis -
19
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
20
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item
