Search Results - (( attack detection method algorithm ) OR ( time extraction method algorithm ))
Search alternatives:
-
1
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
Get full text
Get full text
Thesis -
2
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
Get full text
Get full text
Thesis -
3
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Thus, IADS is a better solution for anomaly detection methods in detecting untrustworthy behaviour and to define attack and normal behaviours more accurately.…”
Get full text
Get full text
Thesis -
4
Snort-based smart and swift intrusion detection system
Published 2018“…Methods/Statistical Analysis: The features are extracted using back-propagation algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform
Published 2007“…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
Get full text
Get full text
Thesis -
6
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
Get full text
Get full text
Article -
7
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Published 2021“…This means that Multilayer Perceptron algorithm can detect APT attack more accurately. …”
Get full text
Get full text
Get full text
Other -
8
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
9
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
10
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
11
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
12
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Published 2021“…This means that Multilayer Perceptron algorithm can detect APT attack more accurately. …”
Get full text
Get full text
Get full text
Other -
13
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
14
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
Published 2023“…Simulation experiments exhibit the effectiveness of the proposed trust evaluation method in terms of change in trust values, malicious nodes detection (94), FNR (0.9), F1-Score (0.6), and accuracy (92) in the presence of 50 malicious nodes. …”
Get full text
Get full text
Article -
15
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…While the effectiveness of some machine learning algorithms in detecting certain types of network intrusion has been ascertained, the situation remains that no single method currently exists that can achieve consistent results when employed for the detection of multiple attack types. …”
Get full text
Get full text
Thesis -
16
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
17
Development of an automated detector and counter for bagworm census
Published 2020“…There are several recommendations from this study that have been suggested including the use of hyperspectral imaging to detect bagworms, application of radio frequency to detect live bagworms, open system detection of the bagworms, application of pseudo colour concept and method to detect early stage of bagworm attack.…”
Get full text
Get full text
Thesis -
18
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Published 2021“…The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. …”
Get full text
Get full text
Article -
19
-
20
Machine learning algorithms in context of intrusion detection
Published 2016“…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
Get full text
Get full text
Conference or Workshop Item
