Search Results - (( variable attack detection algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- java adaptation »
- variable »
-
1
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Published 2009“…With the prior knowledge of DoS attacks against DNS, we used a network simulator to model DNS traffic with high variability. …”
Get full text
Get full text
Thesis -
2
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
3
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
4
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
5
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Although the statistical-based anomaly detection (SAD) method fascinates researchers, the low attack detection rates (also known as the detection of true positive) that reflect the effectiveness of the detection system generally persist. …”
Get full text
Get full text
Thesis -
7
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Detecting cyber-security attacks is still a challenging task. …”
Get full text
Get full text
Thesis -
8
Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest
Published 2026“…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Detection of energy theft and defective smart meters in smart grids using linear regression
Published 2017“…Categorical variables and detection coefficients are also introduced in the model to identify the periods and locations of energy frauds as well as faulty smart meters. …”
Get full text
Get full text
Article -
10
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis
