Search Results - (( java implication based algorithm ) OR ( dynamic intrusion method algorithm ))
Search alternatives:
- implication based »
- java implication »
- intrusion method »
- method algorithm »
-
1
Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm
Published 2010“…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The transductive conformal prediction and outlier detection have been employed for feature selection algorithm. Traditional intrusion detection techniques have had trouble dealing with dynamic environments. …”
Get full text
Get full text
Get full text
Thesis -
3
A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud
Published 2021“…Methodology: To increase workflow reliability, we propose the Fault and Intrusion-tolerant Workflow Scheduling algorithm (FITSW). …”
Get full text
Get full text
Article -
4
Modelling of intelligent intrusion detection system: making a case for snort
Published 2018“…Hence, this study proposes a method for early detection of an intrusion by using Snort software. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Windows-Based bandwidth allocation on optical networks
Published 2009“…We hope in the next article we will make a comparison table among static and dynamic bandwidth allocations algorithms and propose an algorithm on dynamic bandwidth allocation and evaluate our proposed algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection
Published 2024“…Many traditional classification methods are inadequate in handling this fuzziness, leading to suboptimal performance in intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Router-Based bandwidth allocation on optical networks
Published 2009“…Finally in this survey, we found some roles and principles in Router-Based dynamic bandwidth allocation methods which explain them separately. …”
Get full text
Get full text
Conference or Workshop Item -
9
Static bandwidth allocation on optical networks
Published 2009“…Following that, at the end, we will propose an algorithm on dynamic bandwidth allocation and evaluate it.…”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Solid/gas concentration measurements using multiple fan beam optical tomography
Published 2008“…The application of optical sensors in process tomography involves using non-intrusive sensors to obtain vital information in order to produce images from the dynamic characteristics of a process system. …”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
-
15
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
16
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…It differs from other existing content negotiation approaches by introducing the idea of combining dynamic and static device capabilities detection methods. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
-
20
