Search Results - (( flow detection algorithm ) OR ( flow encryption algorithm ))*
Search alternatives:
-
1
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy.…”
Get full text
Get full text
Thesis -
2
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
3
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…These comparative results demonstrated the TLSMalDetect’s ability to detect more malware flows out of total malicious flows than existing works. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
6
A review of wave-net identical learning & filling-in in a decomposition space of (JPG-JPEG) sampled images
Published 2010“…Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. …”
Get full text
Get full text
Article -
7
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…Continuous flow to send images via encrypted wireless channels may reduce the efficiency of transmission. …”
Get full text
Get full text
Thesis -
8
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
9
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…The proposed EFDT and hybrid DT-SVM algorithms show a high capability of SDN applications to offer fast detection and classification of conflict flows…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
-
12
Improved abnormal detection using self-adaptive social force model for visual surveillance
Published 2017“…For this point, Horn-Schunck optical flow is used to get the flow vector for each pixel in the image frames. …”
Get full text
Get full text
Thesis -
13
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Thesis -
14
Enhanced and effective parallel optical flow method for vehicle detection and tracking
Published 2016“…The foreground optical flow detector detects the object and a binary computation is done to define rectangular regions around every detected object. …”
Get full text
Get full text
Conference or Workshop Item -
15
A Study on Implementing Physiology-Based Approach and Optical Flow Algorithm to Thermal Screening System for Flu Detection
Published 2015“…To solve this issue, we have proposed a combination of physiology-based and optical flow algorithm to extract vascular network from the face. …”
Get full text
Get full text
Get full text
Article -
16
-
17
HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM
Published 2019“…A video sequence consists of sequences of frame, with the detection algorithm, these frames can be analyzed and detect any” “abnormal behavior such as crime.” …”
Get full text
Get full text
Final Year Project -
18
Flow-based approach on bro intrusion detection
Published 2017“…Then, the model made use the machine learning classification algorithms for attribute evaluation and Bro policy scripts for detecting malicious flows. …”
Get full text
Get full text
Get full text
Article -
19
-
20
An evaluation of optical flow algorithms for crowd analytics in surveillance system
Published 2017“…This paper presents an overview of the optical flow methods that used mainly for pedestrian and crowd motion detection. …”
Get full text
Get full text
Article
