Search Results - (( java implication based algorithm ) OR ( points detection packet algorithm ))
Search alternatives:
- implication based »
- java implication »
- points detection »
- detection packet »
- packet algorithm »
-
1
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Throughput and packet overhead is improved in the NIPT algorithm with an average of 4% and 6% respctively over the PT algorithm. …”
Get full text
Get full text
Thesis -
2
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…This study aims to improve the detection of an anomalous behaviour by identifying the outlier data points in the packets more precisely, maximizes the detection of packets with similar behaviours more accurately while reducing the detection time. …”
Get full text
Get full text
Thesis -
3
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…In other words, it is unable to differentiate legitimate user and attacker, when both of them sending packet via same route to the victim. As a result, providing incorrect information and locate false point about the source of attack. …”
Get full text
Get full text
Thesis -
4
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…Under several simulations, the number of lost packets encountered by VFHO stayed as low as 20 packets when the arrival rate was a maximum of 50 packets per second, and did not exceed 10 packets in the case when packet sizes was at a maximum of 256 Bytes or when buffer size was set to 50 KB. …”
Get full text
Get full text
Thesis -
5
Performance analysis of wormhole attack on AODV in MANET / Muaz Adib Azfar Azhar
Published 2022Get full text
Get full text
Student Project -
6
-
7
Fuzzy logic based link status classification for efficient multipath routing in multi-hop wireless mesh networks
Published 2014“…A main design objective of these networks is to eliminate or minimize the unavailability of network at some point. However, in infrastructure and the client part of WMN movement of nodes still creates delay as path failure detection and re-establishment consumes considerable time. …”
Get full text
Get full text
Conference or Workshop Item -
8
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…Therefore, it is difficult to rebuild these blocks from the point of reception. In addition, some packets may be lost via the limited bandwidth networks when congestion occurs. …”
Get full text
Get full text
Thesis -
9
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…The SDN controller signifies a single point of failure and thus serves as a potential primary target for attackers. …”
Get full text
Get full text
Thesis -
10
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
