Search Results - (( process detection packet algorithm ) OR ( using optimization method algorithm ))

Refine Results
  1. 1

    A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS by Thayaaleni, Rajandran

    Published 2019
    “…The scope of this project focuses on Android Malware detection by using dynamic analysis. The methods to implement this project is through data collection, feature extraction, feature selection, and classification process. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method by Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, Alghushami, Abdullah H., Alani, Sammer

    Published 2019
    “…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  3. 3

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Anomaly behavior detection using flexible packet filtering and support vector machine algorithms by Abdul Wahid, Mohammed N.

    Published 2016
    “…The main method is related to processing and filtering data packets using different types of packet filtering on network system and, more specifically, capturing and filtering data packets transmitted on high speed communications links for errors and attackers’ detection and signal integrity analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets by Alaidaros, Hashem Mohammed

    Published 2017
    “…Packet-based detection processes every payload on the wire, which degrades the performance of network intrusion detection system (NIDS). …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…These inaccurate outcomes can compromise the reliability of IDSs and cause them to overlook the attacks. As ADS can process massive volumes of packets, the amount of processing time needed to discover the pattern of the packets is also increased accordingly and resulting in late detection of the attack packets. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Smart and energy aware routing for the internet of mobile things by Beh, Zi Xuan

    Published 2021
    “…The routing algorithm are developed and coded in Sen Script. In this project, the routing algorithm can perform disqualify node detection and energy aware routing. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Flow-based approach on bro intrusion detection by Alaidaros, Hashem, Mahmuddin, Massudi

    Published 2017
    “…Packet-based or Deep Packet Inspection (DPI) intrusion detection systems (IDSs) face challenges when coping with high volume of traffic. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Void avoidance opportunistic routing density rank based for underwater sensor networks by Ismail, Nasarudin

    Published 2021
    “…Finally, the algorithm Void Avoidance Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with the communication void by introducing a simple method to detect a void node and avoid it during the forwarding process. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Intelligent fault diagnosis for broken rotor bar using wavelet packet signature analysis by Zolfaghari, Sahar

    Published 2016
    “…As an effective signal processing, the time-scale characteristic of wavelet packet transform fused with the frequency resolution of Fast Fourier Transform named as wavelet packet signature analysis. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Anomaly detection in ICS datasets with machine learning algorithms by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Abdul Rahman, Farah Diyana, Tahir, Mohammad

    Published 2021
    “…The ICS cyber threats are growing at an alarming rate on industrial automation applications. Detection techniques with machine learning algorithms on public datasets, suitable for intrusion detection of cyber-attacks in SCADA systems, as the first line of defense, have been detailed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    SVM driven approach for detecting DoS attacks in SDN environment by Najmun, Nisa, Adnan Shahid, Khan, Azman, Bujang Masli, Nusrat, Shaheen

    Published 2025
    “…To address this challenge, we propose a novel approach that efficiently detects DoS attacks by implementing a packet inspection process using a queuing mechanism, followed by machine learning classification using SVM and KNN algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan by Omar, Mohd. Nizam

    Published 2005
    “…The parts are packet capture, identification and comparison. Among these algorithms, the best approach which produces minimum processing time from each main part has been deployed and tested as a complete stepping stone algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Multiuser Sensing for Opportunistic Spectrum Access in Cognitive Radio Networks by Armi, Nasrullah, Yusoff, Mohd Zuki, M Saad, M Naufal

    Published 2011
    “…CR users perform spectrum sensing and detect primary users (PUs) signal even when they are transmitting data packet. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  18. 18

    Multiuser Sensing for Opportunistic Spectrum Access in Cognitive Radio Networks by Armi, Nasrullah, Yusoff, Mohd Zuki, M Saad, M Naufal

    Published 2011
    “…CR users perform spectrum sensing and detect primary users (PUs) signal even when they are transmitting data packet. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  19. 19

    A Review on Soft Computing Technique in Intrusion Detection System by Sulaiman, Noor Suhana, Rohani, Abu Bakar, Norrozila, Sulaiman

    Published 2012
    “…It detects and identifies intrusion behavior or intrusion attempts in a computer system by monitoring and analyzing the network packets in real time. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis