Search Results - (( java segmentation using algorithm ) OR ( attack detection patterns algorithm ))
Search alternatives:
- detection patterns »
- java segmentation »
- using algorithm »
-
1
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
3
DeepIoT.IDS: Hybrid deep learning for enhancing IoT network intrusion detection
Published 2021“…Recently, researchers have suggested deep learning (DL) algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks. …”
Get full text
Get full text
Get full text
Article -
4
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
5
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
6
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
7
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. …”
Get full text
Get full text
Get full text
Citation Index Journal -
8
SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan
Published 2018“…The software will be trained by using NSL KDD Cup dataset in order to make it learns about the Neptune attack and as a result, it will be able to detect and prevent such attack. …”
Get full text
Get full text
Student Project -
9
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
Get full text
Get full text
Get full text
Article -
10
A lightweight graph-based pattern recognition scheme in mobile ad hoc networks.
Published 2012“…Both algorithms show comparable detection results. Thus, the lightweight, low computation DHGN based detection scheme offers an effective security solution in MANETs.…”
Get full text
Book Section -
11
Adaptive feature selection for denial of services (DoS) attack
Published 2017“…Adaptive detection is the learning ability to detect any changes in patterns in intrusion detection systems. …”
Get full text
Get full text
Conference or Workshop Item -
12
Network intrusion detection and alert system
Published 2024“…Signature-based detection compares network traffic packets with a real-time updated database of known attack patterns, while anomaly-based detection algorithms learn normal behavior patterns and identify deviations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
An enhanced android botnet detection approach using feature refinement
Published 2019“…In order to detect botnet attacks which causes immense chaos and problems to smartphones, first the Android botnet need to be analysed. …”
Get full text
Get full text
Thesis -
15
-
16
Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest
Published 2026“…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
Get full text
Get full text
Get full text
Article -
17
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Although the statistical-based anomaly detection (SAD) method fascinates researchers, the low attack detection rates (also known as the detection of true positive) that reflect the effectiveness of the detection system generally persist. …”
Get full text
Get full text
Thesis -
18
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
19
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…The result has shown that this algorithm has increased the detection rate and reduced the false alarm rate compared with Fuzzy-ART.…”
Get full text
Get full text
Get full text
Article -
20
Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study
Published 2025“…This study launched different ICMPv6 attacks individually and gathered five million samples for each intrusion attack. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
