Search Results - (( attack detection path algorithm ) OR ( parallel evaluation method algorithm ))
Search alternatives:
- method algorithm »
- detection path »
- path algorithm »
-
1
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
2
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
Get full text
Get full text
Get full text
Thesis -
3
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
4
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…The attack graph depicts the many paths an attacker may attempt to get around a security policy by leveraging interdependencies between disclosed vulnerabilities. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…Intention-driven model, a sampling traceback technique, provides information about the attack flow and able to reconstruct the attack path to the source of attack by the aid of Intrusion Detection system (IDS). …”
Get full text
Get full text
Thesis -
6
-
7
-
8
-
9
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
10
Parallel Execution of Runge-Kutta Methods for Solving Ordinary Differential Equations
Published 2004“…The method used here is actually have been tailored made for the purpose of parallel machine where the subsequent functions evaluations do not depend on the previous function evaluations. …”
Get full text
Get full text
Thesis -
11
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
Get full text
Get full text
Thesis -
12
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. …”
Get full text
Get full text
Thesis -
13
Parallel execution of diagonally implicit Runge-Kutta methods for solving IVPs.
Published 2009“…Diagonally Implicit Runge-Kutta (DIRK) methods are amongst the most useful and cost-effective methods for solving initial value problems but the dependency of the functions evaluations on the previous functions evaluations makes DIRK method not so favourable for parallel computers. …”
Get full text
Get full text
Article -
14
Communication and computational cost on parallel algorithm of PDE elliptic type
Published 2009“…Due to this needs, this paper presents the parallel performance evaluations of algorithms that will be discussed in term of communication and computational cost.…”
Get full text
Get full text
Book Section -
15
-
16
Analysis of evolutionary computing performance via mapreduce parallel processing architecture / Ahmad Firdaus Ahmad Fadzil
Published 2014“…MR is an emerging parallel processing framework that hides the complex parallelization processes by employing the functional abstraction of "map and reduce" The Performance of the parallelized GA via MR and PSO via MR are evaluated using an analogous case study to find out the speedup and efficiency in order to measure the scalability of both proposed algorithms. …”
Get full text
Get full text
Thesis -
17
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
Get full text
Get full text
Thesis -
18
Simulating Electrohydrodynamic Ion-Drag Pumping on Distributed Parallel Computing Systems
Published 2017“…For that reason, a Data Parallel Algorithm for EHD model (DPA-EHD) is designed. …”
Get full text
Get full text
Get full text
Article -
19
The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data
Published 2024“…Therefore, we develop a Parallel Fuzzy C-Median Clustering Algorithm Using Spark for Big Data that can handle large datasets while maintaining high accuracy and scalability. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…Additionally, the MTS algorithm is also implemented in parallel computing to produce parallel MTS for generating comparable solutions in shorter computational times. …”
Get full text
Get full text
Thesis
