Search Results - (( java implication based algorithm ) OR ( software mitigation _ algorithm ))
Search alternatives:
- software mitigation »
- implication based »
- java implication »
-
1
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
2
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…This paper provides the scholarly community with an approach to boosting service availability in web servers under slow Hypertext Transfer Protocol (HTTP) DDoS attacks through attack detection using Genetic Algorithm and Support Vector Machine which facilitates attack mitigation in a Software-Defined Networking (SDN) environment simulated in GNS3. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Quantitative and intelligent risk models in risk management for constructing software development projects: A review
Published 2016“…Indeed, this area needs more effort from scholars and researchers in quantitative and intelligent risk models to mitigate risks. As future work, we will use these hybrid models of quantitative and intelligent for mitigating software risks in cloud computing such as neural network, genetic algorithm and others artificial intelligence techniques.…”
Get full text
Get full text
Get full text
Get full text
Article -
4
Managing and controlling design process issues by using stepwise approach modelling
Published 2016“…Furthermore, we illustrated the design process issues were mitigated by control techniques in Table 40. However, we need to combine more techniques and artificial optimal algorithms to mitigate the issues in software design process.…”
Get full text
Get full text
Get full text
Article -
5
-
6
TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network
Published 2024“…Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Hardware Approach To Mitigate The Effects Of Module Mismatch In A Grid-Connected Photovoltaic System: A Review
Published 2019“…Unlike software solutions, i.e. the maximum power tracking algorithm, hardware techniques are well suited to enhance energy yield because of their inherent ability to extract energy from the mismatched module. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…To improve SDN's resilience and performance, early detection, mitigation strategies, and structured approaches are necessary. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Natural disaster mitigation system with an IoT based TTGO T-Call V1.3 ESP32 wireless module microcontroller / Muhammad Fareez Asyraf Istas Fahrurrazi
Published 2024“…The prototype system involves input and output components, including sensors, LEDs, buzzers, and an LCD display, with software specifications using Arduino IDE. The methodology entails gathering sensor data, evaluating it with a decision-making algorithm, triggering alarms, activating output devices, and transmitting data to the server via HTTP protocols. …”
Get full text
Get full text
Student Project -
11
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
12
-
13
Long-term rain attenuation probability and site diversity gain prediction formulas
Published 2007“…It includes the designing of algorithm flow which incorporated into MATLAB programming software. …”
Get full text
Get full text
Thesis -
14
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…Software security vulnerabilities have led to many successful attacks on applications, especially web applications, on a daily basis. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Analytical simulation of non-linearity effects compensation in all-optical orthogonal frequency division multiplexing systems
Published 2020“…The digital processing of the detected signals and Bit Error Rate (BER) calculation are performed by using DSP algorithm in Matlab software. In order to quantify the effectiveness of the proposed techniques, three AO-OFDM systems are demonstrated numerically before and after employing the nonlinearity mitigation techniques. …”
Get full text
Get full text
Thesis -
17
Comprehensive review on the state-of- the-arts and solutions to the test redundancy reduction problem with taxonomy
Published 2024“…The process of software testing is of utmost importance and requires a major allocation of resources. …”
Get full text
Get full text
Get full text
Article -
18
An optimized attack tree model for security test case planning and generation
Published 2018“…It involves the use of attack trees for identifying software vulnerabilities at the earliest phase of software development which is critical to successfully protect these applications. …”
Get full text
Get full text
Article -
19
-
20
