Search Results - (( parameters detection method algorithm ) OR ( attack detection method algorithm ))
Search alternatives:
- parameters detection »
- method algorithm »
-
1
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
2
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…While the effectiveness of some machine learning algorithms in detecting certain types of network intrusion has been ascertained, the situation remains that no single method currently exists that can achieve consistent results when employed for the detection of multiple attack types. …”
Get full text
Get full text
Thesis -
3
-
4
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Published 2021“…The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. …”
Get full text
Get full text
Article -
5
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…Machine learning approaches have been widely used to increase the effectiveness of intrusion detection platforms. While some machine learning techniques are effective at detecting certain types of attacks, there are no known methods that can be applied universally and achieve consistent results for multiple attack types. …”
Get full text
Get full text
Thesis -
6
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…Most of current intrusion detection systems only use one of the two detection methods, misused detection or anomaly detection, both of them have their own limitations. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
9
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
10
Design and analysis of an early heart attack detection using openCV
Published 2022“…Hyper-parameter tuning method also has been applied to see does the algorithm increase accuracy or not.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Modelling of intelligent intrusion detection system: making a case for snort
Published 2018“…Hence, this study proposes a method for early detection of an intrusion by using Snort software. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Steganalysis: Detecting Existence of File Types Embedded in Grey Scale Image
Published 2008“…Estimating some parameters of embedding algorithm is the approach that the study used since secret message is one of its essential parameters. …”
Get full text
Get full text
Get full text
Thesis -
13
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…Unfortunately,watermark resistance to geometric attacks is the most challenge work in traditional digital image watermarking techniques which causes incorrect watermark detection and extraction. …”
Get full text
Get full text
Thesis -
14
-
15
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
Get full text
Get full text
Thesis -
16
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
Get full text
Get full text
Article -
17
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Published 2021“…This means that Multilayer Perceptron algorithm can detect APT attack more accurately. …”
Get full text
Get full text
Get full text
Other -
18
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
19
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
20
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section
