Search Results - (( solution detection packet algorithm ) OR ( program implementation using algorithm ))

Refine Results
  1. 1

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…A password algorithm is proposed from which a program can be written in any language deemed suitable.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity by Gurusamy, Gobi

    Published 2006
    “…Moreover, three proposed approaches for gateway discovery are implemented; propose a forwarding algorithm, and route determination algorithm for default route and host route in MANET are investigated.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…This study aims to improve the detection of an anomalous behaviour by identifying the outlier data points in the packets more precisely, maximizes the detection of packets with similar behaviours more accurately while reducing the detection time. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Void avoidance opportunistic routing density rank based for underwater sensor networks by Ismail, Nasarudin

    Published 2021
    “…Secondly, the algorithm Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with redundant packet forwarding by introducing a new method to reduce the redundant packet forwarding while in dense or sparse conditions to improve the energy consumption effectively. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method by Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, Alghushami, Abdullah H., Alani, Sammer

    Published 2019
    “…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  7. 7

    SVM driven approach for detecting DoS attacks in SDN environment by Najmun, Nisa, Adnan Shahid, Khan, Azman, Bujang Masli, Nusrat, Shaheen

    Published 2025
    “…To address this challenge, we propose a novel approach that efficiently detects DoS attacks by implementing a packet inspection process using a queuing mechanism, followed by machine learning classification using SVM and KNN algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Secure address resolution protocol proxy in software defined network by Munther, Munther Numan

    Published 2018
    “…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Network intrusion detection and alert system by To, Jin Yi

    Published 2024
    “…Signature-based detection compares network traffic packets with a real-time updated database of known attack patterns, while anomaly-based detection algorithms learn normal behavior patterns and identify deviations. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks by Solouk, Vahid

    Published 2009
    “…Under several simulations, the number of lost packets encountered by VFHO stayed as low as 20 packets when the arrival rate was a maximum of 50 packets per second, and did not exceed 10 packets in the case when packet sizes was at a maximum of 256 Bytes or when buffer size was set to 50 KB. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…Most of the industry’s P2P bandwidth management solutions adopted Deep Packet Inspection (DPI) method for high traffic controlling accuracy. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A lightweight graph-based pattern recognition scheme in mobile ad hoc networks. by Raja Mahmood, Raja Azlina, Muhamad Amin, Anang Hudaya, Amir, Amiza, Khan, Asad I.

    Published 2012
    “…Both algorithms show comparable detection results. Thus, the lightweight, low computation DHGN based detection scheme offers an effective security solution in MANETs.…”
    Get full text
    Book Section
  14. 14

    Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming by Saman, Abu Bakar Sayuti, Sebastian , Patrick, Malek, Nadhira, Hasidin, Nurul Zahidah

    Published 2012
    “…The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Implementation of autonomous vehicle navigation algorithms using event-driven programming by Saman, Abu Bakar Sayuti, Sebastian , Patrick, Malek, Nadhira, Hasidin, Nurul Zahidah

    Published 2012
    “…The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…After embedding the presented solution, a new protocol is created and applied. Thus, the new protocol is available to the communicating packets across all computer networks. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad by Muhamad, Kamarul Arifin

    Published 2002
    “…The method has been implemented as a C programming language. In this study, Wagner and Fischer algorithm, Hadith test collection that consists of Malay Hadith translation documents, query words and relevant judgements are used. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Biologically Inspired Network on Chip Fault Tolerant Algorithm Using Time Division Multiplexing by Sethi, Muhammad Athar Javed, Hussin, Fawnizu Azmadi, Hamid, Nor Hisham

    Published 2016
    “…Biologically inspired solutions are a novel way of solving the complex and real world problems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Industrial datasets with ICS testbed and attack detection using machine learning techniques by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Balla, Asaad, Tahir, Mohammad, Elsheikh, Elfatih A A, Suliman, F M

    Published 2021
    “…Cybersecurity solutions for Information technology (IT) secured with firewalls, intrusion detection/protection systems do nothing much for Operational technology (OT) ICS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article