Search Results - solution detection techniques

Search alternatives:

Refine Results
  1. 1

    Detection of dye molecules in solution using surface plasmon resonance technique by Ikhsan, Nurul Izrini, Mat Yunus, W. Mahmood, Talib, Zainal Abidin, Abdul Wahab, Zaidan

    Published 2009
    “…Surface plasmon resonance technique has been utilized as a sensitive optical sensor for detection of dye molecule in water. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    An elapsed-time based scheme for detecting and mitigating DDOS attacks in the SDN environment by Wisam H A.Muragaa

    Published 2024
    “…DDoS detection solutions based on Machine learning techniques and entropy techniques in SDN suffer from either increase the CPU usage or increase false alarms. …”
    thesis::doctoral thesis
  4. 4
  5. 5

    Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network by Ahmed, Abdulghani Ali

    Published 2019
    “…The proposed technique aims to detect Botnet zero-day attack in real time. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Detection of heavy metal ions in solution using surface plasmon resonance optical sensor by Yap, Wing Fen

    Published 2012
    “…In this case, the gold/chitosan interface in SPR technique is sensitive with detection limit of 0.5 ppm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique by Ali Mohamed, Nachaat Abdelatif

    Published 2022
    “…The current security solutions are deployed to detect APT signature and behaviour after APT bypasses the entire protections and accomplishes lateral movement technique, which makes the current solutions ineffective to resolve APT problem.…”
    Get full text
    Get full text
    Thesis
  8. 8

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq by Bilal , Ishfaq

    Published 2016
    “…This proposed technique is a lightweight solution which consumes less controller resources in detecting and mitigating the DoS attack. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A Survey on Phishing Emails Detection Techniques by Muneer, A., Ali, R.F., Al-Sharai, A.A., Fati, S.M.

    Published 2021
    “…In this survey paper, we present an overview of the state-of-the-art techniques to detect phishing emails. We perform a comprehensive study of these techniques and evaluate them. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    IoT intrusion detection using auto-encoder and machine learning techniques by Khudhu, Ahmed Ridha, Samsudin, Khairulmizam

    Published 2022
    “…Yet, the featureselection techniques used in the literature were based on feature selectionrather than a reduction in which individual solutions are being selected. …”
    Get full text
    Get full text
    Article
  14. 14

    Fighting video analysis employing computer vision technique by Foo, Wen Shun

    Published 2022
    “…This project is about analysing and classifying the fighting video from the UCF_Crimes dataset to explore solutions to detect fighting events employing computer vision technique. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15
  16. 16

    Stepping-stone detection technique for recognizing legitimate and attack connections by Daud, Ali Yusny, Ghazali, Osman, Omar, Mohd Nizam

    Published 2015
    “…However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections.Stepping-stone connections are identified from raw network traffics using timing-based SSD approach.Then, they go through an anomaly detection technique to differentiate between legitimate and attack connections.This technique has a promising solution to accurately detecting intrusions from stepping-stone connections.It will prevent incorrect responses that punish legitimate users.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Malicious website detection by Ong, Vienna Lee

    Published 2019
    “…With previous existing methods in consideration, the method to use for this project is by using heuristic-based detection with machine learning technique and the feature that will be used together with the technique is URL based feature. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Polypyrrole-BaFe2O4 sensing layer for detection of strontium ion in aqueous solution using surface plasmon resonance curves fitting by Sadrolhosseini, A.R., Shafie, S., Soleimani, H., Mahdi, M.A.

    Published 2021
    “…The prepared layers were used to detect and measure the low concentration of strontium, calcium, and barium ions in aqueous solution using surface plasmon resonance technique and the optical parameter, angle of resonance, resonance angle shift and affinity constant were achieved using curve fitting based on minimizing the sum of squared errors. …”
    Get full text
    Get full text
    Article
  19. 19

    Enhancement of handoff latency reduction mechanism of Mobile Internet Protocol Version 6 (MIPv6) by Masud, M. H., Anwar, Farhat, Bari, S.M. Sadakatul, Mahmoud, Omer M.

    Published 2012
    “…The first solution is the fuzzy logic technique based network awareness to reduce movement detection delay especially the scanning time in layer 2 in heterogeneous networks. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Embedded mini-analyzer device for in situ wide range heavy metal identification and concentration detection by Mazaheri, Amin

    Published 2018
    “…Voltammetry as electrochemical technique is used in this project for the heavy metals detection. …”
    Get full text
    Get full text
    Thesis