Search Results - (( using detection packet algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- detection packet »
- packet algorithm »
- using detection »
- java simulation »
-
1
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
Get full text
Get full text
Thesis -
2
The optimization of stepping stone detection: packet capturing steps
Published 2006“…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
Get full text
Get full text
Get full text
Article -
3
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…The main method is related to processing and filtering data packets using different types of packet filtering on network system and, more specifically, capturing and filtering data packets transmitted on high speed communications links for errors and attackers’ detection and signal integrity analysis. …”
Get full text
Get full text
Get full text
Thesis -
4
The optimization of stepping stone detection : packet capturing steps
Published 2006“…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. …”
Get full text
Get full text
Get full text
Article -
5
The optimization of stepping stone detection: Packet capturing steps
Published 2006“…This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism.The aim of the research is to improve the packet capturing step in stepping stone algorithm, thus, improve the response from overall detection and response system.The proposed method is to use small size of user buffer and kernel buffer.Experiments were conducted with two types of packet stream; i) 10 kbps and ii) 10 000 kbps data generated by Tfgen (packet generator) tools and nine combinations of different buffer sizes for each network packet stream were tested.Results from the experiment were analyzed. …”
Get full text
Get full text
Get full text
Article -
6
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
Published 2017“…In addition, it is also aimed to improve the resource consumption of the packet-based detection approach. CHID applied attribute wrapper features evaluation algorithms that marked malicious flows for further analysis by the packet-based detection. …”
Get full text
Get full text
Get full text
Thesis -
7
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
Published 2010“…Hence, this thesis defines a new algorithm called the Distributed Packet Header Matching algorithm (DPHM), and a New Network Intrusion Detection Systems (NNIDS) platform using hybrid technology in order to increase the overall performance of SNORT-NIDS.…”
Get full text
Get full text
Thesis -
8
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Subsequently, NB+RF, a hybrid classification algorithm is used to distinguish similar and dissimilar content behaviours of a packet. …”
Get full text
Get full text
Thesis -
9
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
10
QoS evaluation of different TCPs congestion control algorithm using NS2
Published 2006“…The second is RED (Random Early Detection), which drops incoming packets at a certain probability.…”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Effect Of The Addition Of Wastepaper To Concrete Mix
Published 2009“…Hence, this thesis defines a new algorithm called the Distributed Packet Header Matching algorithm (DPHM), and a New Network Intrusion Detection Systems (NNIDS) platform using hybrid technology in order to increase the overall performance of SNORT-NIDS.…”
Get full text
Get full text
Thesis -
12
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
13
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
14
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…There are three new proposed algorithms introduced to address all three issues which resulted from using the OR approach in UWSNs. …”
Get full text
Get full text
Thesis -
15
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…There are two major phases of the protocol - route discovery and route maintenance Route discovery uses route request and route reply packets. Route maintenance uses route error packets and acknowledgments. …”
Get full text
Get full text
Thesis -
16
Embedded Ethernet System For Real-Time Communication
Published 2018“…The Ethernet network model is used to analyze the performance of the backoff algorithm in a different number of nodes. …”
Get full text
Get full text
Monograph -
17
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
Published 2008“…It can receive and transmit data packets without the use of any existing network infrastructure or centralized administration. …”
Get full text
Get full text
Thesis -
18
Non-invasive pathological voice classifications using linear and non-linear classifiers
Published 2010“…Two types of experiments are conducted using the proposed feature extraction and classification algorithms. …”
Get full text
Thesis -
19
Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET
Published 2022“…The malicious nodes are available in routing path making the packet loss, in packet transmission for time instance. …”
Get full text
Get full text
Article -
20
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Therefore, the first problem to be tackled is the privacy optimization of Modbus/TCP packet fields. In scientific literatures, packet anonymization is performed according to attribute types (numerical, categorical and hierarchical), not taking into consideration the singular characteristics of the Modbus packet fields, using Euclidean distance algorithms that are not capable to deal with binary data and may result in information loss. …”
Get full text
Get full text
Thesis
