Search Results - (( using attack problems algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- learning algorithm »
- java application »
- using attack »
- problems »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…We have also carried out a comparative study on the performance of the adaptive GA used in this problem against the conventional GA. …”
Get full text
Get full text
Article -
5
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…We have also carried out a comparative study on the performance of the adaptive GA used in this problem against the conventional GA. …”
Get full text
Get full text
Article -
6
-
7
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Additionally, the results of the deep learning algorithms will be evaluated using five confusion matrices, namely, accuracy, precision, recall, F1Score, and false-positive rate). …”
Get full text
Get full text
Article -
8
The Construction Of Quantum Block Cipher For Grover Algorithm
Published 2018“…Asymmetric cryptographic algorithms which are based on integer factorization or discrete logarithms problems are rendered unsecured against quantum attacks. …”
Get full text
Get full text
Thesis -
9
Detecting resource consumption attack over MANET using an artificial immune algorithm
Published 2011“…This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). …”
Get full text
Get full text
Get full text
Article -
10
Improving intrusion detection using genetic algorithm
Published 2013“…To overcome this problem, a genetic algorithm approach is proposed. …”
Get full text
Get full text
Get full text
Article -
11
Review of the machine learning methods in the classification of phishing attack
Published 2019“…Based on the literature, the machine learning method is widely used to prevent phishing attacks. There are several algorithms that can be used in the machine learning method to prevent these attacks. …”
Get full text
Get full text
Get full text
Article -
12
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
Get full text
Get full text
Thesis -
13
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019“…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
Get full text
Get full text
Get full text
Book Chapter -
14
Cryptography: A New Approach of Classical Hill Cipher
Published 2013“…Nevertheless, these enhanced Hill cipher algorithms still face the non invertible key matrix problem. …”
Get full text
Get full text
Article -
15
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The background study emphasizes the increasing significance of network security and the prevalence of various types of network intrusion attacks, particularly Remote to Local (R2L) attacks. …”
Get full text
Get full text
Thesis -
16
-
17
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
18
Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain
Published 2018“…To understand how the attacks can threaten the rightful ownership and how to avoid these attacks, the three potential attacks of false positive problem has been demonstrated using recent proposed watermarking schemes. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
A genetic-algorithm-based approach for audio steganography
Published 2009“…Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. …”
Get full text
Get full text
Get full text
Article -
20
Message based random variable length key encryption algorithm.
Published 2009“…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. …”
Get full text
Get full text
Article
