Search Results - (( java segmentation using algorithm ) OR ( attack detection sample algorithm ))
Search alternatives:
- java segmentation »
- sample algorithm »
- using algorithm »
-
1
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
2
Remote to Local Attack Detection Using Supervised Neural Network
Published 2010“…This technique uses sampled dataset from Kddcup99 that is standard for benchmarking of attack detection tools. …”
Get full text
Get full text
Conference or Workshop Item -
3
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…The features were optimized from 378 to 11 by using bio-inspired algorithm: particle swarm optimization (PSO). The evaluation utilizes 5000 Drebin malware samples and 3500 benign samples. …”
Get full text
Get full text
Get full text
Article -
4
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…In this paper, the adapted streaming data Isolation Forest (iForestASD) algorithm has been applied to CAN intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…The features were optimized from 378 to 11 by using bio-inspired algorithm: particle swarm optimization (PSO). The evaluation utilizes 5000 Drebin malware samples and 3500 benign samples. …”
Get full text
Get full text
Article -
6
Intrusion detection on the in-vehicle network using machine learning
Published 2021“…This paper presents an intrusion detection method based on the Isolation Forest (iForest) algorithm that detects message insertion attacks using message timing information. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Applying Neural Network to U2R Attacks
Published 2010“…The system uses sampled data from Kddcup99 dataset, an attack database that is a standard for evaluating the security detection mechanisms. …”
Get full text
Get full text
Conference or Workshop Item -
9
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…Many security practitioners have adopted different approaches to detect malware. However, its attacks continuously evolve and spread, and the number of attacks is still increasing. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
12
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
13
A clustering-based method for outlier detection under concept drift
Published 2024“…The algorithm achieves notable results, with a detection rate of 99.12% on UNSWNB-15 and a 7.9% false positive rate on NSL-KDD, marking significant progress. …”
Get full text
Get full text
Get full text
Article -
14
An enhanced android botnet detection approach using feature refinement
Published 2019“…In order to detect botnet attacks which causes immense chaos and problems to smartphones, first the Android botnet need to be analysed. …”
Get full text
Get full text
Thesis -
15
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study
Published 2025“…This study launched different ICMPv6 attacks individually and gathered five million samples for each intrusion attack. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…Intention-driven model, a sampling traceback technique, provides information about the attack flow and able to reconstruct the attack path to the source of attack by the aid of Intrusion Detection system (IDS). …”
Get full text
Get full text
Thesis -
18
Ganoderma boninense classification based on near-infrared spectral data using machine learning techniques
Published 2022“…There is yet a non-destructive and in-situ technique explored to detect ergosterol. Capability of NIR to detect few biomarkers such as mycotoxin and zearalenone (ZEN) has been proven to pave the way an effort to explore NIR’s sensitivity towards detecting ergosterol, as discussed in this paper. …”
Get full text
Get full text
Get full text
Article -
19
Android mobile malware detection model based on permission features using machine learning approach
Published 2022“…Nevertheless, current technologies indicate that Android malware attackers have find novel ways to avoid detection. …”
Get full text
Get full text
Thesis -
20
A Bayesian probability model for Android malware detection
Published 2021“…Different approaches have been adopted to overcome the malware attacks yet this spread is still increasing. To combat this issue, this study proposes an Android malware detection system based on permission features using Bayesian classification. …”
Get full text
Get full text
Get full text
Article
