Search Results - (( variable intrusion detection algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- variable »
- intrusion »
-
1
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
2
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Monograph -
3
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Therefore, the core classifier in the hyper-heuristic approach of Intrusion Detection System (IDS) is developed to the parallel structure NN. …”
Get full text
Get full text
Thesis -
4
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…The proposed scheme integrates an ADS and signature-based detection system (SDS) approach for better and rapid intrusion detection. …”
Get full text
Get full text
Thesis -
5
Detection of energy theft and defective smart meters in smart grids using linear regression
Published 2017“…Categorical variables and detection coefficients are also introduced in the model to identify the periods and locations of energy frauds as well as faulty smart meters. …”
Get full text
Get full text
Article -
6
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Published 2009“…The first step in our work was to generate the DNS traffic in normal and attack situations for using as the input of our intrusion detection system (IDS). With the prior knowledge of DoS attacks against DNS, we used a network simulator to model DNS traffic with high variability. …”
Get full text
Get full text
Thesis -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
