Search Results - (( java implementation using algorithm ) OR ( attack detection issues algorithm ))

Refine Results
  1. 1

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…This thesis proposed the use of both prevention and detection mechanisms to solve the security and privacy issues. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implement edge pruning to enhance attack graph generation using the naïve approach algorithm by Al-Araji, Zaid J., Mutlag, Ammar Awad, Syed Ahmad, Sharifah Sakinah

    Published 2024
    “…However, current attack graphs are suffering from a few issues. Scalability is the main issue the attack graph generation is facing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics by Al-Araji, Zaid Jasim Mohammed

    Published 2023
    “…However, current attack graphs are suffering from a few issues. Scalability is the main issue the attack graph generation is facing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Tole, Sutikno, Shahreen, Kasim, Rohayanti, Hassan, Zalmiyah, Zakaria, Mohd Saberi, Mohamad

    Published 2021
    “…The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. …”
    Get full text
    Get full text
    Article
  7. 7

    Attack prediction to enhance attack path discovery using improved attack graph by Al-Araji, Zaid Jasim, Abdullah, Raihana Syahirah, Syed Ahmad, Sharifah Sakinah

    Published 2022
    “…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10

    Secure address resolution protocol proxy in software defined network by Munther, Munther Numan

    Published 2018
    “…In addition, ARP based attack detection technique combines ARP storm and ARP spoofing detection algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    An Intelligence Technique For Denial Of Service (Dos) Attack Detection by Wan Nurul Safawati, Wan Manan, Tuan Muhammad, Safiuddin

    Published 2017
    “…The main issue with current detection systems is the inability to detect the malicious activity in certain circumstances. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    An intelligence technique for denial of service (DoS) attack detection by Wan Nurulsafawati, Wan Manan, Tuan Muhammad, Safiuddin, Zarina, Dzolkhifli, Mohd Hafiz, Mohd Hassin

    Published 2018
    “…The main issue with current detection systems is the inability to detect the malicious activity in certain circumstances. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Distributed Denial of Service detection using hybrid machine learning technique by Barati, Mehdi, Abdullah, Azizol, Udzir, Nur Izura, Mahmod, Ramlan, Mustapha, Norwati

    Published 2014
    “…Current paper proposes architecture of a detection system for DDoS attack. Genetic Algorithm (GA) and Artificial Neural Network (ANN) are deployed for feature selection and attack detection respectively in our hybrid method. …”
    Get full text
    Conference or Workshop Item
  15. 15

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In particular, issues such as collects real time attack related audit data and cooperative global detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  18. 18

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan by Mazlan, Muhammad Muhaimin Aiman

    Published 2018
    “…The software will be trained by using NSL KDD Cup dataset in order to make it learns about the Neptune attack and as a result, it will be able to detect and prevent such attack. …”
    Get full text
    Get full text
    Student Project
  20. 20