Search Results - (( using evaluation method algorithm ) OR ( software mitigation method algorithm ))
Search alternatives:
- software mitigation »
- evaluation method »
- mitigation method »
- using evaluation »
- method algorithm »
-
1
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Electricity distribution network for low and medium voltages based on evolutionary approach optimization
Published 2015“…This thesis proposes an algorithm to find the optimum distribution substation placement and sizing by utilizing the PSO algorithm and optimum feeder routing using modified Minimum Spanning Tree (MST). …”
Get full text
Get full text
Get full text
Thesis -
3
Hybrid metaheuristic method for clustering in wireless sensor networks / Bryan Raj Peter Jabaraj
Published 2023“…As such, this thesis proposes a hybrid metaheuristic method that consists of Sperm Swarm Optimization (SSO) algorithm and Genetic Algorithm (GA), which is termed HSSOGA. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019Get full text
Get full text
Get full text
Book Chapter -
6
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…It allows one single instance of software to serve various clients. Password-based authentication is considered the cheapest and most popular and commonly used methods of computer authentication. …”
text::Thesis -
7
Machine Learning Applications in Offense Type and Incidence Prediction
Published 2024“…Artificial Intelligence (AI) techniques encompass variouscomputational methods and algorithms designed to enable machines to perform tasks that typically require human intelligence. …”
Get full text
Get full text
Get full text
Article -
8
Effect of mesh coarseness on slope stability analysis using 2D and 3D finite element method
Published 2024“…However, the stability analyses using Finite Element Method (FEM) have gained significant attention in geotechnical engineering due to their ability to simulate slope behaviour and predict stability accurately by employing mathematical models and computational algorithms. …”
Get full text
Get full text
Get full text
Article -
9
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
10
A Study on Performance Comparisons between KNN, Random Forest and XGBoost in Prediction of Landslide Susceptibility in Kota Kinabalu, Malaysia
Published 2022“…Over time, researchers have used various methods to forecast the vulnerability to landslides. …”
Get full text
Get full text
Get full text
Proceeding -
11
Optimized Decision Forest for Website Phishing Detection
Published 2021“…In this study, an optimized decision forest (ODF) method for detecting website phishing is proposed ODF involves the use of a genetic algorithm (GA) for the selection of optimal diverse individual trees in a forest to generate an efficient sub-forest. …”
Get full text
Get full text
Article -
12
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…To improve SDN's resilience and performance, early detection, mitigation strategies, and structured approaches are necessary. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
Get full text
Get full text
Thesis -
14
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…In order to validate the proposed method, a set of measured electromagnetic fields are applied on proposed algorithm and the evaluated currents are compared to the corresponding measured current as well as the results are discussed accordingly. …”
Get full text
Get full text
Article -
15
IoT-based botnet attacks systematic mapping study of literature
Published 2024journal::journal article -
16
Evaluation of dynamic programming among the existing stereo matching algorithms
Published 2015“…The dynamic programming algorithm used on this research is the current method as its disparity estimates at a particular pixel and all the other pixels unlike the old methods which with scanline based of dynamic programming. …”
Get full text
Get full text
Get full text
Article -
17
Unifying the evaluation criteria of many objectives optimization using fuzzy Delphi method
Published 2021“…Thus, unify a set of most suitable evaluation criteria of the MaOO is needed. This study proposed a distinct unifying model for the MaOO evaluation criteria using the fuzzy Delphi method. …”
Get full text
Get full text
Article -
18
Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images
Published 2012“…The tone mapping algorithm was first compressed using global tone mapping method. …”
Get full text
Get full text
Thesis -
19
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
Published 2024thesis::master thesis -
20
Evaluating the effectiveness of integrated benders decomposition algorithm and epsilon constraint method for multi-objective facility location problem under demand uncertainty
Published 2017“…To do this, Monte Carlo method with uniform function is used, then the stability of the proposed method towards demand uncertainty is shown. …”
Get full text
Get full text
Get full text
Article
