Search Results - (( model detection packet algorithm ) OR ( java application using algorithm ))
Search alternatives:
- detection packet »
- packet algorithm »
- java application »
- model detection »
- using algorithm »
-
1
-
2
Embedded Ethernet System For Real-Time Communication
Published 2018“…The Ethernet network model is used to analyze the performance of the backoff algorithm in a different number of nodes. …”
Get full text
Get full text
Monograph -
3
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…One of the most persistent challenges concerning network security is to build a model capable of detecting intrusions in network systems. …”
Get full text
Get full text
Get full text
Article -
4
Flow-based approach on bro intrusion detection
Published 2017“…Packet-based or Deep Packet Inspection (DPI) intrusion detection systems (IDSs) face challenges when coping with high volume of traffic. …”
Get full text
Get full text
Get full text
Article -
5
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
Published 2008“…The FS in the local group should create a dynamic and temporary sub group whose members are only the members that requested the retransmission of the repair packet. The approaches were tested using detailed discrete-event simulation model which was developed encompassing messaging system that includes error, delay and mobility models to characterize the performance benefits of the proposed algorithms in comparison to ReMHoc protocol. …”
Get full text
Get full text
Thesis -
6
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Feature extraction based on mel-scaled wavelet packet transform for the diagnosis of voice disorders
Published 2011Get full text
Working Paper -
9
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Secure address resolution protocol proxy in software defined network
Published 2018“…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain
Published 2019“…Second, the MFO algorithm was utilised to select the optimal discriminative features. …”
Get full text
Get full text
Get full text
Article -
12
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
13
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…The proposed model also decreases percentage of ineffective generated iTrace packets in both UDP-based and TCP-based attack about 10%. …”
Get full text
Get full text
Thesis -
15
-
16
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
Get full text
Get full text
Get full text
Thesis -
17
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
18
TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network
Published 2024“…Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
20
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. This algorithm depends on the adaptability of the concept in the ITSWTCM, I2TSWTCM and M2I2TSWTCM algorithms for affecting the fairness and multiple protocols. …”
Get full text
Get full text
Thesis
