Search Results - (( software mitigation method algorithm ) OR ( java applications mining algorithm ))
Search alternatives:
- software mitigation »
- applications mining »
- mitigation method »
- java applications »
- method algorithm »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
-
10
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…To improve SDN's resilience and performance, early detection, mitigation strategies, and structured approaches are necessary. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
Get full text
Get full text
Thesis -
12
IoT-based botnet attacks systematic mapping study of literature
Published 2024journal::journal article -
13
Electricity distribution network for low and medium voltages based on evolutionary approach optimization
Published 2015“…It has been utilized to demonstrate the effectiveness of the PSO method to improve the voltage profile and minimize the cost by mitigating the total losses of the network.…”
Get full text
Get full text
Get full text
Thesis -
14
Rockfall hazard assessment based on airborne laser scanning data and GIS in tropical region
Published 2016“…The result shows the barrier in suggested location can effectively aid in rockfall hazard mitigation. The outcomes of this study prove the ability of the proposed and applied methods to make valid detection and prediction for rockfall phenomena. …”
Get full text
Get full text
Thesis -
15
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…—In today's digital landscape, the identification of malicious software has become a crucial undertaking. The evergrowing volume of malware threats renders conventional signature-based methods insufficient in shielding against novel and intricate attacks. …”
Get full text
Get full text
Get full text
Article -
16
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…In today's digital landscape, the identification of malicious software has become a crucial undertaking. The evergrowing volume of malware threats renders conventional signature-based methods insufficient in shielding against novel and intricate attacks. …”
Get full text
Get full text
Article -
17
-
18
-
19
An analytical tool for computing perimeter based on visual and coordinates analysis
Published 2024“…Leveraging advanced mathematical algorithms, including a straightforward formula for determining distances between points, PeriGo ensures precise results while mitigating the risk of human error. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019Get full text
Get full text
Get full text
Book Chapter
