Search Results - (( based application method algorithm ) OR ( attack detection based algorithm ))
Search alternatives:
- based application »
- method algorithm »
- detection based »
-
1
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
2
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
3
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
5
-
6
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
7
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…To secure these critical infrastructures, security measures should be examined and implemented. These methods could be hardware-based, such as Intrusion Detection Systems (IDS), software-based, or managerial-based. …”
Get full text
Get full text
Get full text
Article -
8
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
9
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
Get full text
Get full text
Thesis -
10
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…A new non classification algorithm was developed based on the danger theory model of human immune system (HIS).The abstract model of system algorithm is inspired from HIS cell mechanism mainly, the Dendritic cell behavior and T-cell mechanisms. …”
Get full text
Get full text
Get full text
Citation Index Journal -
11
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…Unfortunately, the traditional mechanisms designed for protecting networks are not directly applicable to MANETs without modifications. In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
Get full text
Get full text
Get full text
Thesis -
12
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…Fresh algorithms’ for cloud data protection do exist however, they are still prone to attack especially in real-time data transmissions due to employed mechanism. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
Get full text
Get full text
Get full text
Article -
14
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
15
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
Published 2013“…Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification
Published 2013“…Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intrusive activities on a computer system, and their enhancement is emerging at an unexpected rate.Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Intrusion detection on the in-vehicle network using machine learning
Published 2021“…This paper presents an intrusion detection method based on the Isolation Forest (iForest) algorithm that detects message insertion attacks using message timing information. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
19
SMART: a subspace based malicious peers detection algorithm for P2P systems
Published 2013“…Firstly, we define malicious peers and show their influence on the system performance. Secondly, based on Multiscale Principal Component Analysis (MSPCA) and control chart, a Subspace based MAlicious peeRs deTecting algorithm (SMART) is brought forward. …”
Get full text
Get full text
Get full text
Article -
20
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The experimental results show that combining the advantages of the geometric based validation and contrast based filtering as well as avoiding large quantization errors, lead to significant enhancement in the performance of the seed point detection algorithm in terms of balancing between the precision and recall. …”
Get full text
Get full text
Thesis
