Search Results - (( attack detection path algorithm ) OR ( storage optimization method algorithm ))

Refine Results
  1. 1
  2. 2

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics by Al-Araji, Zaid Jasim Mohammed

    Published 2023
    “…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Attack prediction to enhance attack path discovery using improved attack graph by Al-Araji, Zaid Jasim, Abdullah, Raihana Syahirah, Syed Ahmad, Sharifah Sakinah

    Published 2022
    “…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Implement edge pruning to enhance attack graph generation using the naïve approach algorithm by Al-Araji, Zaid J., Mutlag, Ammar Awad, Syed Ahmad, Sharifah Sakinah

    Published 2024
    “…The attack graph depicts the many paths an attacker may attempt to get around a security policy by leveraging interdependencies between disclosed vulnerabilities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack by Izaddoost, Alireza

    Published 2008
    “…Intention-driven model, a sampling traceback technique, provides information about the attack flow and able to reconstruct the attack path to the source of attack by the aid of Intrusion Detection system (IDS). …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Review of optimal methods and algorithms for sizing energy storage systems to achieve decarbonization in microgrid applications by Hannan M.A., Faisal M., Jern Ker P., Begum R.A., Dong Z.Y., Zhang C.

    Published 2023
    “…Carbon; Decarbonization; Electric energy storage; Fossil fuels; Global warming; Renewable energy resources; Carbon emissions; Decarbonisation; Energy storage system; Method; Microgrid; Optimal energy; Optimization algorithms; Sizing; Storage systems; System sizings; Cost effectiveness…”
    Review
  10. 10

    Optimal allocation of battery energy storage system using whale optimization algorithm by Wong L.A., Ramachandaramurthy V.K.

    Published 2023
    “…Battery storage; Electric batteries; Battery energy storage systems; Firefly algorithms; Loss reduction; Meta-heuristic methods; Optimal allocation; Optimization algorithms; Overall system loss reduction; Performance; System loss; Whale optimization algorithm; Particle swarm optimization (PSO)…”
    Conference Paper
  11. 11

    Optimization algorithms for energy storage integrated microgrid performance enhancement by Roslan M.F., Hannan M.A., Ker P.J., Muttaqi K.M., Mahlia T.M.I.

    Published 2023
    “…Controllers; Electric power transmission; Electric power utilization; Energy management systems; Energy resources; Energy storage; Iterative methods; Learning algorithms; Microgrids; Operating costs; Particle swarm optimization (PSO); Scheduling; Scheduling algorithms; Stochastic systems; Storage management; Two term control systems; Charge-discharge; Day-ahead; Distributed Energy Resources; Microgrid; Optimization algorithms; Optimized controllers; Optimized scheduling; Performance enhancements; Scheduling controllers; Storage systems; Energy management…”
    Article
  12. 12
  13. 13

    Development of multi-objective optimization methods for integrated scheduling of handling equipment (AGVs, QCs, SP-AS/RS) in automated container terminals by Homayouni, Seyed Mahdi

    Published 2012
    “…Therefore, two meta-heuristic algorithms, namely genetic algorithm (GA) and simulated annealing (SA) algorithm, were developed to optimize the integrated scheduling of handling equipment. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimal location and sizing of battery energy storage system using grasshopper optimization algorithm by Mat Yasin, Zuhaila, Razali, Nur Syifa Nasyrah, Dahlan, Nofri Yenita, Mohammad Noor, Siti Zaliha, Ahmad, Nurfadzilah, Hassan, Elia Erwani

    Published 2024
    “…The grasshopper optimization algorithm (GOA) and evolutionary programming (EP) were employed to address the optimization challenge on the IEEE 69-bus distribution test system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…The IEM algorithm uses the attraction-repulsion mechanism to change the positions of solutions towards the optimality. …”
    Get full text
    Get full text
    Thesis