Search Results - (( java implication based algorithm ) OR ( data detection service algorithm ))
Search alternatives:
- implication based »
- detection service »
- service algorithm »
- java implication »
- data detection »
-
1
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
2
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
3
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
4
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
5
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
6
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024Subjects:journal::journal article -
8
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
9
Energy and performance efficient resource allocation for cloud-based data centers
Published 2015“…In this study, we found that our proposed algorithms able to reduce energy consumption by 3% and 19% for host overload detection and VM selection algorithm respectively.…”
Get full text
Get full text
Thesis -
10
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
11
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…The coordinate is incorporated with a random key for data encryption. Users only can detect the location by decrypting the El-Gamal encryption.…”
Get full text
Get full text
Thesis -
12
Facial mask detection in low light environment
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
13
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…In this paper, the adapted streaming data Isolation Forest (iForestASD) algorithm has been applied to CAN intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…However, the current DBN.NIDS model is still ineffective for large-scale real-world data due to some issues: 1) the pre-training of the DBN algorithm includes simple feature learning which does not work very well to extract important features from the attack data, 2) the classification task of the DBN algorithm is a poor detection for imbalanced class dataset and 3) the design of the DBN model could be weak and need to be continuously updated by modern definitions of abnormal to detect recent attacks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
Published 2017“…Therefore, this paper concern about Denial of Service (DoS) attack, detection using Neural Network. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
An intelligence technique for denial of service (DoS) attack detection
Published 2018“…Therefore, this paper concern about Denial of Service (DoS) attack, detection using Neural Network. …”
Get full text
Get full text
Get full text
Article -
17
Preliminary analysis of malware detection in opcode sequences within IoT environment
Published 2020“…This development is opening to many security and privacy challenges that can cause complete network breakdown, bypassed access control or the loss of critical data. This paper attempts to provide a preliminary analysis for malware detection within data generated by IoT-based devices and services in the form of operational codes (Opcode) sequences. …”
Get full text
Get full text
Get full text
Article -
18
Vader lexicon and support vector machine algorithm to detect customer sentiment orientation
Published 2023“…Objective: The objective of this study is to detect customer orientation towards product or service quality, as expressed in online or social media. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024“…Cloud computing introduces concerns about data protection and intrusion detection mechanism. …”
Proceedings Paper
