Search Results - (( programme attack detection algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    An Intelligence Technique For Denial Of Service (Dos) Attack Detection by Wan Nurul Safawati, Wan Manan, Tuan Muhammad, Safiuddin

    Published 2017
    “…Special features of connection records have been acknowledged to be used in DoS attacks. The result from this experiment will show the effectiveness of Neural Network using the backpropagation learning algorithm for detecting DoS attack.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    An intelligence technique for denial of service (DoS) attack detection by Wan Nurulsafawati, Wan Manan, Tuan Muhammad, Safiuddin, Zarina, Dzolkhifli, Mohd Hafiz, Mohd Hassin

    Published 2018
    “…Special features of connection records have been acknowledged to be used in DoS attacks. The result from this experiment will show the effectiveness of Neural Network using the backpropagation learning algorithm for detecting DoS attack.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller by Aladaileh, Mohammad Adnan Ahmad

    Published 2021
    “…GEADDDC generalizes the Renyi Joint Entropy algorithm and uses a dynamic threshold to detect DDoS attacks on the SDN controller.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Unprecedented smart algorithm for uninterrupted SDN services during DDoS attack by Muhammad Reazul Haque, Saw, Chin Tan, Zulfadzli Yusoff, Kashif Nisar, Rizaludin Kaspin, Iram Haider, Sana Nisar, Rodrigues, J. P. C., Bhawani Shankar Chowdhry, Muhammad Aslam Uqaili, Satya Prasad Majumder, Danda B. Rawat, Etengu, Richard, Rajkumar Buyya

    Published 2021
    “…Nevertheless, it creates a significant loophole for the manifestation of a distributed denial of service (DDoS) attack straightforwardly. Furthermore, recently a Distributed Reflected Denial of Service (DRDoS) attack, an unusual DDoS attack, has been detected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…Likewise, the soft programmable switches that are directly connected to the controller running atop end host servers are attractive targets for attackers to initiate control plane flooding; apart from authorized but untrusted hosts. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…In this research, Two-Phase Authentication of Attack Detection (TPAAD) scheme is proposed and investigated for detection and mitigation of DoS attacks in SDN to increase the performance of the above-mentioned issues. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
    Get full text
    Get full text
    Thesis
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10
  11. 11

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The method used to develop this project is Rapid Application Development (RAD). …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. …”
    Get full text
    Get full text
    Final Year Project