Search Results - solution detection techniques
Search alternatives:
- detection techniques »
- solution detection »
-
1
Detection of dye molecules in solution using surface plasmon resonance technique
Published 2009“…Surface plasmon resonance technique has been utilized as a sensitive optical sensor for detection of dye molecule in water. …”
Get full text
Get full text
Get full text
Article -
2
-
3
An elapsed-time based scheme for detecting and mitigating DDOS attacks in the SDN environment
Published 2024“…DDoS detection solutions based on Machine learning techniques and entropy techniques in SDN suffer from either increase the CPU usage or increase false alarms. …”
thesis::doctoral thesis -
4
Immuno nanosensor for the ultrasensitive naked eye detection of tuberculosis
Published 2018“…With the use of this technique, the CFP-10 detection limit can be lowered to 0.01μg/mL by the naked eye. …”
Get full text
Get full text
Get full text
Article -
5
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
Published 2019“…The proposed technique aims to detect Botnet zero-day attack in real time. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Detection of heavy metal ions in solution using surface plasmon resonance optical sensor
Published 2012“…In this case, the gold/chitosan interface in SPR technique is sensitive with detection limit of 0.5 ppm. …”
Get full text
Get full text
Thesis -
7
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
Published 2022“…The current security solutions are deployed to detect APT signature and behaviour after APT bypasses the entire protections and accomplishes lateral movement technique, which makes the current solutions ineffective to resolve APT problem.…”
Get full text
Get full text
Thesis -
8
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
Published 2016“…This proposed technique is a lightweight solution which consumes less controller resources in detecting and mitigating the DoS attack. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
A Survey on Phishing Emails Detection Techniques
Published 2021“…In this survey paper, we present an overview of the state-of-the-art techniques to detect phishing emails. We perform a comprehensive study of these techniques and evaluate them. …”
Get full text
Get full text
Conference or Workshop Item -
13
IoT intrusion detection using auto-encoder and machine learning techniques
Published 2022“…Yet, the featureselection techniques used in the literature were based on feature selectionrather than a reduction in which individual solutions are being selected. …”
Get full text
Get full text
Article -
14
Fighting video analysis employing computer vision technique
Published 2022“…This project is about analysing and classifying the fighting video from the UCF_Crimes dataset to explore solutions to detect fighting events employing computer vision technique. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
Stepping-stone detection technique for recognizing legitimate and attack connections
Published 2015“…However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections.Stepping-stone connections are identified from raw network traffics using timing-based SSD approach.Then, they go through an anomaly detection technique to differentiate between legitimate and attack connections.This technique has a promising solution to accurately detecting intrusions from stepping-stone connections.It will prevent incorrect responses that punish legitimate users.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Malicious website detection
Published 2019“…With previous existing methods in consideration, the method to use for this project is by using heuristic-based detection with machine learning technique and the feature that will be used together with the technique is URL based feature. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
18
Polypyrrole-BaFe2O4 sensing layer for detection of strontium ion in aqueous solution using surface plasmon resonance curves fitting
Published 2021“…The prepared layers were used to detect and measure the low concentration of strontium, calcium, and barium ions in aqueous solution using surface plasmon resonance technique and the optical parameter, angle of resonance, resonance angle shift and affinity constant were achieved using curve fitting based on minimizing the sum of squared errors. …”
Get full text
Get full text
Article -
19
Enhancement of handoff latency reduction mechanism of Mobile Internet Protocol Version 6 (MIPv6)
Published 2012“…The first solution is the fuzzy logic technique based network awareness to reduce movement detection delay especially the scanning time in layer 2 in heterogeneous networks. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Embedded mini-analyzer device for in situ wide range heavy metal identification and concentration detection
Published 2018“…Voltammetry as electrochemical technique is used in this project for the heavy metals detection. …”
Get full text
Get full text
Thesis
