Search Results - (( data classification using algorithm ) OR ( attack detection path algorithm ))
Search alternatives:
- classification using »
- data classification »
- using algorithm »
- detection path »
- path algorithm »
-
1
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
2
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
Get full text
Get full text
Get full text
Thesis -
3
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
4
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…The attack graph depicts the many paths an attacker may attempt to get around a security policy by leveraging interdependencies between disclosed vulnerabilities. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…Intention-driven model, a sampling traceback technique, provides information about the attack flow and able to reconstruct the attack path to the source of attack by the aid of Intrusion Detection system (IDS). …”
Get full text
Get full text
Thesis -
6
-
7
-
8
-
9
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
10
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
Get full text
Get full text
Thesis -
11
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
Get full text
Get full text
Thesis -
12
Case Slicing Technique for Feature Selection
Published 2004“…Since the 1960s, many algorithms for data classification have been proposed. …”
Get full text
Get full text
Thesis -
13
Dengue classification system using clonal selection algorithm / Karimah Mohd
Published 2012“…Some of the dengue data are used to test the dengue classification system to produce the classification accuracy. …”
Get full text
Get full text
Thesis -
14
Enhancing Classification Algorithms with Metaheuristic Technique
Published 2024“…Implementing this process uses classification algorithms such asNaïve Bayes, Support Vector Machine,and Random Forest. …”
Get full text
Get full text
Get full text
Article -
15
Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd
Published 2022“…Classification is a data mining technique used to classify varied data types according to a specific criterion. …”
Get full text
Get full text
Thesis -
16
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…Nevertheless, there are some limitations in ID3 algorithm that can affect the performance in the classification of data. …”
Get full text
Get full text
Get full text
Article -
17
Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition
Published 2017“…Phase 1 is mainly to evaluate the performance of clustering algorithm (K-Means and FCM). Phase 2 is to study the performance of proposed integration system which using the data clustered to be used as train data for Naïve Bayes classifier. …”
Get full text
Get full text
Thesis -
18
Comparison of expectation maximization and K-means clustering algorithms with ensemble classifier model
Published 2018“…Expectation maximization (EM) is one of the representatives clustering algorithms which have broadly applied in solving classification problems by improving the density of data using the probability density function. …”
Get full text
Get full text
Get full text
Article -
19
Development of classification algorithms of human gait
Published 2022“…Thus, this study aims to develop a classification algorithm that can effectively classify subjects with relatively simplified input data. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Text Extraction Algorithm for Web Text Classification
Published 2010“…In this study, the experiment was conducted on five English educational websites. The created data sets are then classified using Naive-Bayes and C4.5 algorithms provided in WEKA application. …”
Get full text
Get full text
Get full text
Thesis
