Search Results - (( structures attack detection algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Detection of Denial of Service Attacks against Domain Name System Using Neural Networks by Rastegari, Samaneh

    Published 2009
    “…The results indicated that the three layered back propagation neural network with a 3-7-3 structure provides a detection rate of 99.55% for direct DoS attacks and 97.82% for amplification DoS attacks. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An efficient detection model of selective forwarding attacks in wireless mesh networks by Khanam, Shapla, Saleem, Habibullah Yusuf, Pathan, Al-Sakib Khan

    Published 2012
    “…In our approach, we also propose a multi-hop acknowledgement based algorithm to analyze and detect the malicious behavior to defend against selective forwarding attacks in WMNs. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…In this research, Two-Phase Authentication of Attack Detection (TPAAD) scheme is proposed and investigated for detection and mitigation of DoS attacks in SDN to increase the performance of the above-mentioned issues. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Detecting cyber-security attacks is still a challenging task. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
    Get full text
    Get full text
    Thesis
  13. 13

    RFID-enabled supply chain detection using clustering algorithms by Azahar, T.F., Mahinderjit-Singh, M., Hassan, R.

    Published 2015
    “…We propose to use clustering algorithms in order to detect counterfeit in supply chain management. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A stylometry approach for blind linguistic steganalysis model against translation-based steganography by Mohd Lokman, Syiham

    Published 2023
    “…While targeted steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted or selection from the medium to detect any anomalies that indicate a possibility that a secret data has been embedded within the medium. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Energy-efficient intrusion detection in wireless sensor network by Salehian, Solmaz, Masoumiyan, Farzaneh, Udzir, Nur Izura

    Published 2012
    “…There are several algorithms for building Intrusion Detection Systems (IDS) based on different WSN routing protocol classifications with respect to energy-efficient manner. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  17. 17

    A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework by Udzir, Nur Izura, Hajamydeen, Asif Iqbal

    Published 2019
    “…Ultimately, the framework is able to detect a broad range of intrusions exist in the logs without using either the attack knowledge or the traffic behavioural models. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An enhance embedding method using edge and textures detection for image steganography by Al-Maliki, Alaa Jabbar Qasim

    Published 2024
    “…The findings reveal that the proposed method significantly enhances the robustness and security of image steganography, achieving an average Peak Signal-to-Noise Ratio of 18.839 dB and a Structural Similarity Index of 0.647. By embedding in noisy zones using edge and texture detection which complicates feature extraction, making hidden information more secure and statistically less detectable than basic LSB matching techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Malware detection using Gini, Simpson diversity, and Shannon-Wiener indexes by Yeong Tyng, Ling, Kang Leng, Chiew, Piau, Phang, Xiaowei, Zhang

    Published 2025
    “…The increasing number of malware attacks poses a significant challenge to cyber security. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Characterizing Current Features of Malicious Threats on Websites by Wan Nurulsafawati, Wan Manan, Ahmed, Abdulghani Ali, M. N. M., Kahar

    Published 2019
    “…They compromised computer system, targeting especially to government sector, ecommerce and banking networks rigorously and made it difficult to detect the perpetrators. Attackers used a powerful technique, by embedding a malicious code in a normal webpage that resulted harder detection. …”
    Get full text
    Get full text
    Conference or Workshop Item