Search Results - (( data extraction method algorithm ) OR ( attack detection method algorithm ))

Refine Results
  1. 1

    An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs by Sadiq, Ali Safaa, Alkazemi, Basem, Mirjalili, Seyedali, Ahmed, Noraziah, Khan, Suleman, Ali, Ihsan, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
    Get full text
    Get full text
    Article
  2. 2

    An efficient IDS using hybrid Magnetic swarm optimization in WANETs by Sadiq, Ali Safa, Alkazemi, Basem Y., Mirjalili, Seyedali, Noraziah, Ahmad, Khan, Suleman, Ihsan, Ali, Pathan, Al-Sakib Khan, Ghafoor, Kayhan Zrar

    Published 2018
    “…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Automated System for Detecting Cyber Bot Attacks in 5G Networks using Machine Learning by Thrupthi, C.P., Chitra, K., Harilakshmi, V.M.

    Published 2024
    “…Botnets are compromised computer networks controlled by attackers that are visible for this reason. Machine learning algorithms have been proposed to identify bot networks with a focus on extracting features from high-dimensional datasets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
    Get full text
    Get full text
    Thesis
  8. 8

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    An enhance embedding method using edge and textures detection for image steganography by Al-Maliki, Alaa Jabbar Qasim

    Published 2024
    “…The study aims to enhance image steganography techniques by using reversible color transformations and optimal area selection within image mosaics to resist statistical attacks. This method seeks to ensure secure and effective data concealment by identifying and utilizing noisy zones in images, making it more difficult for steganalysis tools to detect the embedded information. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…Video watermarking technology enables us to hide an imperceptible, robust, and secure data in digital or analog video. This data can be used for tracking, fingerprinting, copyright infringement detection or any other application that requires some hidden data. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique by Al Ogaili, Riyadh Rahef Nuiaa

    Published 2023
    “…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
    Get full text
    Get full text
    Thesis