Search Results - (( java implementation using algorithm ) OR ( attack detection efficiency algorithm ))
Search alternatives:
- implementation using »
- detection efficiency »
- efficiency algorithm »
- java implementation »
- using algorithm »
-
1
-
2
-
3
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
4
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
5
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
6
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
7
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
8
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
9
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…The quantitative results acquired from the experiments are benchmarked with corresponding results acquired from the cooperative attack detection scheme. Through the result comparisons, we demonstrate the significance of cooperative detection mechanism, for detecting distributed denial of service attacks in a timely and energy-efficient manner, accuracy of detection and defence, as well as false alarm rate.…”
Get full text
Get full text
Thesis -
10
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
11
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
12
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Therefore, in this research paper, a new model called Efficient Trojan Detection Model (ETDMo) is built to detect trojan horse attacks more efficiently. …”
Proceedings Paper -
13
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Distributed Denial of Service detection using hybrid machine learning technique
Published 2014“…Current paper proposes architecture of a detection system for DDoS attack. Genetic Algorithm (GA) and Artificial Neural Network (ANN) are deployed for feature selection and attack detection respectively in our hybrid method. …”
Get full text
Conference or Workshop Item -
15
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
Get full text
Get full text
Thesis -
16
SVM driven approach for detecting DoS attacks in SDN environment
Published 2025“…To address this challenge, we propose a novel approach that efficiently detects DoS attacks by implementing a packet inspection process using a queuing mechanism, followed by machine learning classification using SVM and KNN algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…Therefore, the researcher is motivated to design a new intrusion detection architecture which involves new detection technique to efficiently detect the abnormalities in the ad hoc networks. …”
Get full text
Get full text
Get full text
Thesis -
18
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
Published 2021“…Thus, this thesis proposes an efficient DDoS attack detection approach called Generalized Entropy-Based Approach with a Dynamic Threshold to Detect DDoS Attacks on Software-Defined Networking Controller (GEADDDC). …”
Get full text
Get full text
Thesis -
19
Machine learning algorithms in context of intrusion detection
Published 2016“…Although, signature based has high detection rate but it cannot detect novel attacks. …”
Get full text
Get full text
Conference or Workshop Item -
20
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis
