Search Results - (( java implication based algorithm ) OR ( set detection packet algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Therefore, the first problem to be tackled is the privacy optimization of Modbus/TCP packet fields. In scientific literatures, packet anonymization is performed according to attribute types (numerical, categorical and hierarchical), not taking into consideration the singular characteristics of the Modbus packet fields, using Euclidean distance algorithms that are not capable to deal with binary data and may result in information loss. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…This study aims to improve the detection of an anomalous behaviour by identifying the outlier data points in the packets more precisely, maximizes the detection of packets with similar behaviours more accurately while reducing the detection time. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Performance study of large block forward error correction with random early detection queue policy by Almomani, Omar, Ghazali, Osman, Hassan, Suhaidi

    Published 2009
    “…In this paper, we report an investigation on performance of the forward error correction (FEC) with random early detection (RED) queuing policy. FEC is a technique that uses redundant packet to reconstruct the dropped packet, while RED is an active queue management algorithm. …”
    Get full text
    Get full text
    Get full text
    Book Section
  4. 4

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy.…”
    Get full text
    Get full text
    Thesis
  5. 5

    A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure-free electroencephalography signals by Ong, Pauline, Zainuddin, Zarita, Kee, Huong Lai

    Published 2018
    “…Properly determining the discriminative features which characterize the inherent behaviors of electroencephalography (EEG) signals remains a great challenge for epileptic seizure detection. In this present study, a novel feature selection scheme based on the discrete wavelet packet decomposition and cuckoo search algorithm (CSA) was proposed. …”
    Get full text
    Get full text
    Article
  6. 6

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure‑free electroencephalography signals by Ong, Pauline, Zainuddin, Zarita, Kee, Huong Lai

    Published 2017
    “…Properly determining the discriminative fea-tures which characterize the inherent behaviors of electro-encephalography (EEG) signals remains a great challenge for epileptic seizure detection. In this present study, a novel feature selection scheme based on the discrete wavelet packet decomposition and cuckoo search algorithm (CSA) was proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection by Ghanem, Waheed Ali Hussein Mohammed

    Published 2019
    “…However, the training datasets usually compose feature sets of irrelevant or redundant information, which impacts the performance of classification, and traditional learning algorithms such as backpropagation suffer from known issues, including slow convergence and the trap of local minimum. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks by Solouk, Vahid

    Published 2009
    “…Under several simulations, the number of lost packets encountered by VFHO stayed as low as 20 packets when the arrival rate was a maximum of 50 packets per second, and did not exceed 10 packets in the case when packet sizes was at a maximum of 256 Bytes or when buffer size was set to 50 KB. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Adaptive Medium Access Control (ADT-MAC) Protocol for Dynamic Medical Traffic with Quality of Service (QoS) provisioning in Wireless Body Area Network (WBAN) by Wan Hassan, Wan Haszerila

    Published 2025
    “…Additionally, an M/M/l queuing algorithm with a non-preemptive priority is modeled using SimEvents in MATLAB to validate the packet delay of different priority queues. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…We perform a rigorous evaluation of the proposed method by testing using Floodlight and Mininet to emulate SDN setting. We model the solution in the real setting of SDNs using High Level Petri Nets (HLPN), analyze the rules with Z language, and formally verified the correct functioning using Z3 SMT solver. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Classification of transient disturbance using Wavelet based support vector machine / Fahteem Hamamy Anuwar by Anuwar, Fahteem Hamamy

    Published 2012
    “…Fast and accurate techniques are required for detecting the disturbances so that proper mitigation of power quality problems can be implemented. …”
    Get full text
    Get full text
    Thesis
  17. 17