Search Results - (( using attack problem algorithm ) OR ( java applications mining algorithm ))
Search alternatives:
- applications mining »
- problem algorithm »
- java applications »
- mining algorithm »
- attack problem »
- using attack »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…We have also carried out a comparative study on the performance of the adaptive GA used in this problem against the conventional GA. …”
Get full text
Get full text
Article -
8
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…We have also carried out a comparative study on the performance of the adaptive GA used in this problem against the conventional GA. …”
Get full text
Get full text
Article -
9
-
10
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
11
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Additionally, the results of the deep learning algorithms will be evaluated using five confusion matrices, namely, accuracy, precision, recall, F1Score, and false-positive rate). …”
Get full text
Get full text
Article -
12
The Construction Of Quantum Block Cipher For Grover Algorithm
Published 2018“…Asymmetric cryptographic algorithms which are based on integer factorization or discrete logarithms problems are rendered unsecured against quantum attacks. …”
Get full text
Get full text
Thesis -
13
Detecting resource consumption attack over MANET using an artificial immune algorithm
Published 2011“…This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). …”
Get full text
Get full text
Get full text
Article -
14
Improving intrusion detection using genetic algorithm
Published 2013“…To overcome this problem, a genetic algorithm approach is proposed. …”
Get full text
Get full text
Get full text
Article -
15
Review of the machine learning methods in the classification of phishing attack
Published 2019“…Based on the literature, the machine learning method is widely used to prevent phishing attacks. There are several algorithms that can be used in the machine learning method to prevent these attacks. …”
Get full text
Get full text
Get full text
Article -
16
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
Get full text
Get full text
Thesis -
17
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019“…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
Get full text
Get full text
Get full text
Book Chapter -
18
Cryptography: A New Approach of Classical Hill Cipher
Published 2013“…Nevertheless, these enhanced Hill cipher algorithms still face the non invertible key matrix problem. …”
Get full text
Get full text
Article -
19
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The background study emphasizes the increasing significance of network security and the prevalence of various types of network intrusion attacks, particularly Remote to Local (R2L) attacks. …”
Get full text
Get full text
Thesis -
20
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis
