Search Results - (( java implementation using algorithm ) OR ( attack detection effect algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- detection effect »
- effect algorithm »
- using algorithm »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
3
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…While the effectiveness of some machine learning algorithms in detecting certain types of network intrusion has been ascertained, the situation remains that no single method currently exists that can achieve consistent results when employed for the detection of multiple attack types. …”
Get full text
Get full text
Thesis -
5
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
Get full text
Get full text
Thesis -
6
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
7
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
8
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
10
Remote to Local Attack Detection Using Supervised Neural Network
Published 2010“…This technique uses sampled dataset from Kddcup99 that is standard for benchmarking of attack detection tools. The backpropagation algorithm is used for training the feedforward neural network. …”
Get full text
Get full text
Conference or Workshop Item -
11
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
12
-
13
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
14
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
Published 2017“…Special features of connection records have been acknowledged to be used in DoS attacks. The result from this experiment will show the effectiveness of Neural Network using the backpropagation learning algorithm for detecting DoS attack.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An intelligence technique for denial of service (DoS) attack detection
Published 2018“…Special features of connection records have been acknowledged to be used in DoS attacks. The result from this experiment will show the effectiveness of Neural Network using the backpropagation learning algorithm for detecting DoS attack.…”
Get full text
Get full text
Get full text
Article -
16
DeepIoT.IDS: Hybrid deep learning for enhancing IoT network intrusion detection
Published 2021“…Therefore, it is important to design a self-adaptive model for an intrusion detection system (IDS) to improve the detection of attacks. …”
Get full text
Get full text
Get full text
Article -
17
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…To validate the research, the researcher presents case study using GLOMOSIM simulation platform with AODV ad hoc routing protocols. Various active attacks are implemented. A series of experimental results demonstrate that the proposed intrusion detection model can effectively detect anomalies with low false positive rate, high detection rate and achieve high detection accuracy.…”
Get full text
Get full text
Get full text
Thesis -
18
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
19
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
20
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…The leaking of sensitive data on Android mobile device poses a serious threat to users, and the unscrupulous attack violates the privacy of users. Therefore, an effective Android malware detection system is necessary. …”
Get full text
Get full text
Get full text
Article
