Search Results - (( attack detection method algorithm ) OR ( time evaluation method algorithm ))
Search alternatives:
-
1
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
2
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
3
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…While the effectiveness of some machine learning algorithms in detecting certain types of network intrusion has been ascertained, the situation remains that no single method currently exists that can achieve consistent results when employed for the detection of multiple attack types. …”
Get full text
Get full text
Thesis -
4
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
text::Thesis -
5
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019Get full text
Get full text
Get full text
Book Chapter -
6
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The main aim of this work is focusing on solving the IT-related challenge lack-of-adequate knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
8
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…In this study, the most significant features for enhancing the IDS efficiency and creating a smaller dataset in order to reduce the execution time for detecting attacks are selected from the sizeable network dataset. …”
Get full text
Get full text
Get full text
Article -
9
A clustering-based method for outlier detection under concept drift
Published 2024“…Anomaly-based strategies, diverging from traditional signature-based methods, gain popularity for their effectiveness in detecting new attacks. …”
Get full text
Get full text
Get full text
Article -
10
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…Fresh algorithms’ for cloud data protection do exist however, they are still prone to attack especially in real-time data transmissions due to employed mechanism. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Adaptive feature selection for denial of services (DoS) attack
Published 2017“…In this paper, we propose combining two techniques in feature selection algorithm, namely consistency subset evaluation (CSE) and DDoS characteristic features (DCF) to identify and select the most important and relevant features related DDoS attacks. …”
Get full text
Get full text
Conference or Workshop Item -
13
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…To ensure the reliability of our proposed method, we simulate two well-known attacks, called Sybil and sinkhole attacks. …”
Get full text
Get full text
Article -
14
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Thus, IADS is a better solution for anomaly detection methods in detecting untrustworthy behaviour and to define attack and normal behaviours more accurately.…”
Get full text
Get full text
Thesis -
15
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
Published 2025“…Distributed Denial of Service (DDoS) attacks pose a significant threat to cloud computing environments, necessitating advanced detection methods. …”
Get full text
Get full text
Get full text
Article -
16
Spear- phishing attack detection using artificial intelligence
Published 2024“…The Spear Phishing Attack Detection system employs models such as Logistic Regression, Random Forest, and ensemble methods to identify and block phishing URLs. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
Published 2023“…It causes grievous harm to victims. Existing security methods against XSS fail due to the evolving nature of XSS attacks. …”
Get full text
Get full text
Get full text
Article -
18
Industrial datasets with ICS testbed and attack detection using machine learning techniques
Published 2021“…The decision tree (DT) ML technique is optimized with pruning method which provides an attack detection accuracy of 96.5%. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
20
Multistage quality control in manufacturing process using blockchain with machine learning technique
Published 2023“…The experimental result shows that the proposed method outperforms empirical metrics such as accuracy, precision, recall, and response time. …”
Get full text
Get full text
Article
