Search Results - (( variable attack detection algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Detection of Denial of Service Attacks against Domain Name System Using Neural Networks by Rastegari, Samaneh

    Published 2009
    “…With the prior knowledge of DoS attacks against DNS, we used a network simulator to model DNS traffic with high variability. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Although the statistical-based anomaly detection (SAD) method fascinates researchers, the low attack detection rates (also known as the detection of true positive) that reflect the effectiveness of the detection system generally persist. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Detecting cyber-security attacks is still a challenging task. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest by Ghulam Hussain, Muhammad Thaqif, Shafeeq Lone, Aman, Maspo, Nur-Adib, Attarbashi, Zainab

    Published 2026
    “…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Detection of energy theft and defective smart meters in smart grids using linear regression by Yip, S.C., Wong, K., Hew, W.P., Gan, M.T., Phan, R.C.W., Tan, S.W.

    Published 2017
    “…Categorical variables and detection coefficients are also introduced in the model to identify the periods and locations of energy frauds as well as faulty smart meters. …”
    Get full text
    Get full text
    Article
  10. 10

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis