Search Results - (( java implication based algorithm ) OR ( aiming attack using algorithm ))
Search alternatives:
- implication based »
- java implication »
- using algorithm »
- aiming attack »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
2
Cryptanalysis in cryptographic algorithm design
Published 2006“…In this paper, we review the types of attacks and focus on short-cut attacks. Short-cut attacks make use of an algorithm’s weaknesses to discover the key faster than brute-force. …”
Get full text
Conference or Workshop Item -
3
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…This study employs use Random Forest algorithm to identify and forecast attacks to dynamically locate the attack location in the network for attack graph analysis. …”
Get full text
Get full text
Get full text
Thesis -
4
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…The evaluation of the performance of these attack graph models using IoT networks or devices as case studies is also emphasized. …”
Review -
5
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…This thesis evaluates the proposed solution using flooding attacks in wireless sensor networks (i.e. a type of DDoS attack). …”
Get full text
Get full text
Thesis -
6
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…By using this algorithm, the time for computations will be decreased. …”
Get full text
Get full text
Thesis -
7
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. …”
Get full text
Get full text
Get full text
Article -
8
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The "Remote to Local (R2L) Intrusion Detection System Using Decision Tree" project aims to address the escalating threat of network intrusions by developing an effective intrusion detection system. …”
Get full text
Get full text
Thesis -
9
Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys
Published 2014“…The parameters of the dynamic S-Box have features equivalent to those in the normal algorithm AES. Static S-Box allows attackers to study S-Box and discover weak issues while by using dynamic S-Box approach, it makes difficult and more complex for attacker to do any offline study of an attack of one particular set of S- boxes. …”
Get full text
Get full text
Conference or Workshop Item -
10
Design and analysis of an early heart attack detection using openCV
Published 2022“…This research aims to detect cardiac events with the use of four different algorithms: logistic regression, decision trees, random forest, and k nearest neighbor using python language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
12
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
Get full text
Get full text
Thesis -
13
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
14
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
15
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024“…The experiment was conducted in a controlled environment and conducted using custom generated co-residency denial of service attacks for testing the capability of the proposed model in detecting novel co-residency attacks. …”
Proceedings Paper -
16
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
Published 2013“…The proposed framework aims to use cyber crime evidence to reconstruct attack intentions and estimate similar attack strategies. …”
Get full text
Get full text
Thesis -
17
Improving intrusion detection using genetic algorithm
Published 2013“…., inability to correctly discover particular types of attacks. To overcome this problem, a genetic algorithm approach is proposed. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018“…The experiment was conducted in a controlled environment and conducted using custom generated co-residency denial of service attacks for testing the capability of the proposed model in detecting novel co-residency attacks. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…More useful information about the attack flow provided by the routers along the attack path to the IDS, can provide higher accuracy to locate the attacker. …”
Get full text
Get full text
Thesis
