Search Results - (( solution detection packet algorithm ) OR ( program implementation learning algorithm ))
Search alternatives:
- implementation learning »
- program implementation »
- solution detection »
- learning algorithm »
- detection packet »
- packet algorithm »
-
1
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
2
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…This study aims to improve the detection of an anomalous behaviour by identifying the outlier data points in the packets more precisely, maximizes the detection of packets with similar behaviours more accurately while reducing the detection time. …”
Get full text
Get full text
Thesis -
3
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…Secondly, the algorithm Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with redundant packet forwarding by introducing a new method to reduce the redundant packet forwarding while in dense or sparse conditions to improve the energy consumption effectively. …”
Get full text
Get full text
Thesis -
4
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019“…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
Get full text
Get full text
Get full text
Book Chapter -
5
SVM driven approach for detecting DoS attacks in SDN environment
Published 2025“…To address this challenge, we propose a novel approach that efficiently detects DoS attacks by implementing a packet inspection process using a queuing mechanism, followed by machine learning classification using SVM and KNN algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Secure address resolution protocol proxy in software defined network
Published 2018“…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
Network intrusion detection and alert system
Published 2024“…Signature-based detection compares network traffic packets with a real-time updated database of known attack patterns, while anomaly-based detection algorithms learn normal behavior patterns and identify deviations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
Get full text
Get full text
Thesis -
10
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The analysis of learning problems shows the unavailability of interactive learning media that can support various learning styles of students in programming algorithm materials. …”
Get full text
Get full text
Get full text
Article -
11
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
Published 2009“…Under several simulations, the number of lost packets encountered by VFHO stayed as low as 20 packets when the arrival rate was a maximum of 50 packets per second, and did not exceed 10 packets in the case when packet sizes was at a maximum of 256 Bytes or when buffer size was set to 50 KB. …”
Get full text
Get full text
Thesis -
12
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…Most of the industry’s P2P bandwidth management solutions adopted Deep Packet Inspection (DPI) method for high traffic controlling accuracy. …”
Get full text
Get full text
Thesis -
13
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023Conference paper -
14
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Presently, mobility is difficult, if not impossible to detect at the application layer though easily detectable at the network layer. …”
Get full text
Get full text
Thesis -
15
A lightweight graph-based pattern recognition scheme in mobile ad hoc networks.
Published 2012“…Both algorithms show comparable detection results. Thus, the lightweight, low computation DHGN based detection scheme offers an effective security solution in MANETs.…”
Get full text
Book Section -
16
A new domain specific scripting language for automated machine learning pipeline
Published 2019“…However, in respond to the implementation difficulty, there exists a limited software tool that support easy implementation for automated machine learning based on Genetic Programming. …”
Get full text
Get full text
Article -
17
Rapid software framework for the implementation of machine learning classification models
Published 2021“…However, to implement a complete machine learning model involves some technical hurdles such as the steep learning curve, the abundance of the programming skills, the complexities of hyper-parameters, and the lack of user friendly platform to be used for the implementation. …”
Get full text
Get full text
Article -
18
Adaptive Medium Access Control (ADT-MAC) Protocol for Dynamic Medical Traffic with Quality of Service (QoS) provisioning in Wireless Body Area Network (WBAN)
Published 2025“…Additionally, an M/M/l queuing algorithm with a non-preemptive priority is modeled using SimEvents in MATLAB to validate the packet delay of different priority queues. …”
Get full text
Get full text
Thesis -
19
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…Also, this research involves in developing a machine-learning system and program via genetic algorithm that is capable of performing independent learning capability and optimization for scanning sequence using novel GA operators. …”
Get full text
Get full text
Thesis -
20
Scalable and secure SDN based ethernet architecture by suppressing broadcast traffic
Published 2021“…In general, the proposed solution utilizes SDN architecture and accommodates a multistage security algorithm. …”
Get full text
Get full text
Get full text
Article
