Search Results - (( flow ((generation algorithm) OR (detection algorithm)) ) OR ( flow encryption algorithm ))
Search alternatives:
- generation algorithm »
-
1
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
2
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…This paper introduces TLSMalDetect, a TLS-based malware detection approach that integrates periodicity-independent entropy-based flow set (EFS) features generated by a flow feature transformation technique to solve flow feature utilization issues in related research. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy.…”
Get full text
Get full text
Thesis -
4
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
6
A review of wave-net identical learning & filling-in in a decomposition space of (JPG-JPEG) sampled images
Published 2010“…Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. …”
Get full text
Get full text
Article -
7
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…The Diffie-Hellman key exchange and Rivest Shamir Adleman (RSA) key generation algorithms have been used to authenticate the receiver, and key generation for encrypting and decrypting processes, respectively. …”
Get full text
Get full text
Get full text
Thesis -
8
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. …”
Get full text
Get full text
Thesis -
9
An improved diagnostic algorithm based on deep learning for ischemic stroke detection in posterior fossa
Published 2020“…Therefore, a new diagnostic algorithm based on DL is proposed for ischemic stroke detection in PF. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Flow-based approach on bro intrusion detection
Published 2017“…Then, the model made use the machine learning classification algorithms for attribute evaluation and Bro policy scripts for detecting malicious flows. …”
Get full text
Get full text
Get full text
Article -
11
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
12
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…According to the results obtained from the developed algorithm and implementation tools, a high number of users can be physically possible and provided with support. …”
Get full text
Get full text
Article -
13
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
14
Motion detection using Horn-Schunck optical flow
Published 2012“…This system is design to detect motion in a crowd using one of the optical flow algorithms, Horn-Schunck method. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
Published 2017“…However, flow-based detection still suffers from the generation of the false positive alerts due to incomplete data input. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Fault detection and diagnosis for gas density monitoring using multivariate statistical process control
Published 2011“…Therefore, an efficient fault detection and diagnosis algorithm needs to be developed to detect faults that are present in a process and pinpoint the cause of these detected faults. …”
Get full text
Get full text
Get full text
Article -
18
Instrumentation Monitoring For Heavy Metal Detection In Batik Industry
Published 2019“…For field work application, the effect of viscosity, pressure drop and condition of pipe for steady flow. The flow changes affect the measurement sensor reading due to the turbulent flow. …”
Get full text
Get full text
Monograph -
19
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…As a consequence of filtering of normal flow, the percentage of packets belonging to the attack flow will be expanded and the chance of generating ICMP traceback messages which contain attack flow information will be increased. …”
Get full text
Get full text
Thesis -
20
Simultaneous fault diagnosis based on multiple kernel support vector machine in nonlinear dynamic distillation column
Published 2022“…In the classification of simultaneous faults, a combination of two, three, and four faults is introduced for the performance evaluation of the proposed MK-SVM algorithm. The result showed that the proposed MK-SVM has a high fault detection rate (FDR) of 99.51 and a very low misclassification rate (MR) of 0.49. …”
Get full text
Get full text
Article
