Search Results - (( java implication based algorithm ) OR ( points detection packet algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Throughput and packet overhead is improved in the NIPT algorithm with an average of 4% and 6% respctively over the PT algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…This study aims to improve the detection of an anomalous behaviour by identifying the outlier data points in the packets more precisely, maximizes the detection of packets with similar behaviours more accurately while reducing the detection time. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack by Izaddoost, Alireza

    Published 2008
    “…In other words, it is unable to differentiate legitimate user and attacker, when both of them sending packet via same route to the victim. As a result, providing incorrect information and locate false point about the source of attack. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks by Solouk, Vahid

    Published 2009
    “…Under several simulations, the number of lost packets encountered by VFHO stayed as low as 20 packets when the arrival rate was a maximum of 50 packets per second, and did not exceed 10 packets in the case when packet sizes was at a maximum of 256 Bytes or when buffer size was set to 50 KB. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Fuzzy logic based link status classification for efficient multipath routing in multi-hop wireless mesh networks by Shah, P.A., Hasbullah, H.B., Rafique, S., Rehman, S.U., Jung, L.T.

    Published 2014
    “…A main design objective of these networks is to eliminate or minimize the unavailability of network at some point. However, in infrastructure and the client part of WMN movement of nodes still creates delay as path failure detection and re-establishment consumes considerable time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…Therefore, it is difficult to rebuild these blocks from the point of reception. In addition, some packets may be lost via the limited bandwidth networks when congestion occurs. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…The SDN controller signifies a single point of failure and thus serves as a potential primary target for attackers. …”
    Get full text
    Get full text
    Thesis
  10. 10