Search Results - (( java implementation using algorithm ) OR ( attack detection issues algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- detection issues »
- issues algorithm »
- using algorithm »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…This thesis proposed the use of both prevention and detection mechanisms to solve the security and privacy issues. …”
Get full text
Get full text
Thesis -
2
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…However, current attack graphs are suffering from a few issues. Scalability is the main issue the attack graph generation is facing. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…However, current attack graphs are suffering from a few issues. Scalability is the main issue the attack graph generation is facing. …”
Get full text
Get full text
Get full text
Thesis -
5
Detecting resource consumption attack over MANET using an artificial immune algorithm
Published 2011“…DCIIDA is introduced to detect the Resource Consumption Attack (RCA) over MANET. …”
Get full text
Get full text
Get full text
Article -
6
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Published 2021“…The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. …”
Get full text
Get full text
Article -
7
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
-
10
Secure address resolution protocol proxy in software defined network
Published 2018“…In addition, ARP based attack detection technique combines ARP storm and ARP spoofing detection algorithms. …”
Get full text
Get full text
Get full text
Thesis -
11
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
Published 2017“…The main issue with current detection systems is the inability to detect the malicious activity in certain circumstances. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
An intelligence technique for denial of service (DoS) attack detection
Published 2018“…The main issue with current detection systems is the inability to detect the malicious activity in certain circumstances. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Distributed Denial of Service detection using hybrid machine learning technique
Published 2014“…Current paper proposes architecture of a detection system for DDoS attack. Genetic Algorithm (GA) and Artificial Neural Network (ANN) are deployed for feature selection and attack detection respectively in our hybrid method. …”
Get full text
Conference or Workshop Item -
15
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In particular, issues such as collects real time attack related audit data and cooperative global detection. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
18
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
19
SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan
Published 2018“…The software will be trained by using NSL KDD Cup dataset in order to make it learns about the Neptune attack and as a result, it will be able to detect and prevent such attack. …”
Get full text
Get full text
Student Project -
20
