Search Results - (( java implication based algorithm ) OR ( user detection packet algorithm ))
Search alternatives:
- implication based »
- java implication »
- detection packet »
- packet algorithm »
- user detection »
-
1
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…FPF of SVM have merged the analyzed results of flexible packet filtering with support vector machine algorithm to get better classification of the captured network traffics and to detect anomalies. …”
Get full text
Get full text
Get full text
Thesis -
2
The optimization of stepping stone detection: packet capturing steps
Published 2006“…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
Get full text
Get full text
Get full text
Article -
3
QoS evaluation of different TCPs congestion control algorithm using NS2
Published 2006“…To achieve this, the users implement a flow control algorithm that controls the rate at which data packets are sent into the Internet. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
The optimization of stepping stone detection : packet capturing steps
Published 2006“…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
Get full text
Get full text
Get full text
Article -
5
The optimization of stepping stone detection: Packet capturing steps
Published 2006“…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism.The aim of the research is to improve the packet capturing step in stepping stone algorithm, thus, improve the response from overall detection and response system.The proposed method is to use small size of user buffer and kernel buffer.Experiments were conducted with two types of packet stream; i) 10 kbps and ii) 10 000 kbps data generated by Tfgen (packet generator) tools and nine combinations of different buffer sizes for each network packet stream were tested.Results from the experiment were analyzed. …”
Get full text
Get full text
Get full text
Article -
6
Multiuser Sensing for Opportunistic Spectrum Access in Cognitive Radio Networks
Published 2011“…CR users perform spectrum sensing and detect primary users (PUs) signal even when they are transmitting data packet. …”
Get full text
Get full text
Get full text
Citation Index Journal -
7
Multiuser Sensing for Opportunistic Spectrum Access in Cognitive Radio Networks
Published 2011“…CR users perform spectrum sensing and detect primary users (PUs) signal even when they are transmitting data packet. …”
Get full text
Get full text
Get full text
Citation Index Journal -
8
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…Intrusion Detection System (IDS) is one method to detect unauthorized intrusions into computer systems and networks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Presently, mobility is difficult, if not impossible to detect at the application layer though easily detectable at the network layer. …”
Get full text
Get full text
Thesis -
10
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Usually, it is hard to detect DDoS backscatter from the unlabeled packets, where an expert is needed to analyze every packet manually. …”
Get full text
Get full text
Thesis -
12
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…In other words, it is unable to differentiate legitimate user and attacker, when both of them sending packet via same route to the victim. …”
Get full text
Get full text
Thesis -
13
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy.…”
Get full text
Get full text
Thesis -
15
Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain
Published 2022“…Few examples are energy detection, cyclostationary detection, matched filter detection, etc. …”
Get full text
Get full text
Get full text
Thesis -
16
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…Under several simulations, the number of lost packets encountered by VFHO stayed as low as 20 packets when the arrival rate was a maximum of 50 packets per second, and did not exceed 10 packets in the case when packet sizes was at a maximum of 256 Bytes or when buffer size was set to 50 KB. …”
Get full text
Get full text
Thesis -
17
-
18
Protection Schemes for Fiber to the Home Access Networks with Intra Network Switch
Published 2008“…The survival of the network is studied by terminating the supporting 0 LT unit one after another in simulation and observing the packet delay, packet loss ratio, the buffer occupancy and also the throughput of the switch. …”
Get full text
Get full text
Thesis -
19
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…Our framework categorises the requirements for the VANET protection design via modifying AODV into three: Insure the Availability of VANET and its Services Algorithm (IAVSA), Protect Data Dissemination Algorithm (PDDA), and Secure Vehicles Authentication Algorithm (SVAA). …”
Get full text
Get full text
Get full text
Thesis -
20
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
