Search Results - (( java implementation based algorithm ) OR ( knowledge attack detection algorithm ))
Search alternatives:
- implementation based »
- java implementation »
- knowledge attack »
-
1
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
Get full text
Get full text
Conference or Workshop Item -
2
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
3
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
4
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
5
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
6
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
Improving intrusion detection using genetic algorithm
Published 2013“…A great deal of attention has been recently paid to anomaly detection to accomplish intrusion detection. However, a major problem with this approach is maximizing detection rate and accuracy, as well as minimizing false alarm i.e., inability to correctly discover particular types of attacks. …”
Get full text
Get full text
Get full text
Article -
8
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
12
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…The results show that the proposed intelligent exoplanet atmospheric retrieval (INARA) algorithm has improved accuracy and is able to detect new attack types efficiently.…”
Get full text
Get full text
Get full text
Article -
13
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Published 2009“…With the prior knowledge of DoS attacks against DNS, we used a network simulator to model DNS traffic with high variability. …”
Get full text
Get full text
Thesis -
14
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
15
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Detecting cyber-security attacks is still a challenging task. …”
Get full text
Get full text
Thesis -
16
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…Many phishing detection methods, ranging from blacklists, heuristics and visual similarity to machine learning are used to detect phishing attacks for spam emails, machine learning approaches achieve the best phishing email detection results. …”
Get full text
Get full text
Thesis -
17
-
18
KM-NEU: an efficient hybrid approach for intrusion detection system
Published 2014“…The anomaly-based Intrusion Detection Systems (IDS) are able to detect unknown attacks. …”
Get full text
Get full text
Article -
19
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
20
An improved hybrid learning approach for better anomaly detection
Published 2011“…Nonetheless, current anomaly detection techniques are unable to detect all types of attacks accurately and correctly. …”
Get full text
Get full text
Thesis
