Search Results - (( data detection method algorithm ) OR ( network implementation using algorithm ))

Refine Results
  1. 1

    Feature selection in intrusion detection, state of the art: A review by Rais, H.M., Mehmood, T.

    Published 2016
    “…These input features give information to the learning algorithms which used in intrusion detection system in the form of the detection method. …”
    Get full text
    Get full text
    Article
  2. 2

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm by Slamet, ., Izzeldin Ibrahim, Mohamed Abdelaziz

    Published 2022
    “…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An efficient algorithm for cardiac arrhythmia classification using ensemble of depthwise Separable convolutional neural networks by Ihsanto, Eko, Ramli, Kalamullah, Sudiana, Dodi, Gunawan, Teddy Surya

    Published 2020
    “…Using only these 22% labeled training data, our proposed algorithm was able to classify the remaining 78% of the database into 16 classes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS by AZMAN, MOHAMAD AFIQ

    Published 2014
    “…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS by AZMAN, MOHAMAD AFIQ

    Published 2014
    “…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The ability of detecting P2P host by this algorithm was compared to the detection rate of operational DPI appliances in the network. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis by Siti Nur Hidayah, Mazelan

    Published 2022
    “…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval by Slamet, Slamet, Izzeldin, Ibrahim Mohamed Abdelaziz

    Published 2022
    “…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system by Balla, Asaad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Mubarak, Sinil

    Published 2022
    “…In this paper, we have examined and presented the most recent research on developing robust IDSs using Deep Learning (DL) algorithms, including Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), Stacked Autoencoders (SAE), and Deep Belief Networks (DBN). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. …”
    Get full text
    Get full text
    Student Project
  15. 15

    A fast learning network with improved particle swarm optimization for intrusion detection system by Ali, Mohammed Hasan

    Published 2019
    “…In these experiments, it was demonstrated that the FLN optimization method achieved 0.9964 which is a higher accuracy than most of the existing paradigms for classifying network intrusion detection data.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
    Get full text
    Get full text
    Article
  20. 20

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article