Search Results - (( host detection based algorithm ) OR ( text classification learning algorithm ))
Search alternatives:
- classification learning »
- text classification »
- learning algorithm »
- detection based »
- host detection »
-
1
TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network
Published 2024“…Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Coordinated Malware Eradication And Remediation Project (CMERP)
Published 2019“…The rate of malware spreading via the internet keep increasing and lead to a serious threat particularly to the host nowadays. A number of researchers keep on proposing various alternative framework consisting detection methods day by days in combating activities such as single classification and rule based approach. …”
Get full text
Get full text
Get full text
Technical Report -
3
-
4
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
Using KNN algorithm for classification of textual documents
Published 2023“…Classification (of information); Information retrieval systems; Learning systems; Nearest neighbor search; Tellurium compounds; Text processing; Automated classification; Exponential growth; K nearest neighbor (KNN); k-NN algorithm; Text classification; Textual documents; Two sources; Learning algorithms…”
Conference Paper -
8
Phylogenetic tree classification system using machine learning algorithm
Published 2015Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…The algorithm is based on PTCOT (Parametric Theorem and Circle Overlapping Test) between two UAVs. …”
Get full text
Get full text
Thesis -
10
-
11
Improving The Algorithm To Detect Internet Worms
Published 2008“…The aim of this project is to improved algorithm to detect internet worm by two sub algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
-
14
-
15
-
16
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…One of the security challenges in Software Defined networking (SON) is Distributed denial of service (DDoS) attacks that overwhelm the controller and consume its resources making it unreachable effecting the connectivity throughout the entire network. To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
Multi-Class Multi-Level Classification of Mental Health Disorders Based on Textual Data from Social Media
Published 2024“…The Multi-Class Multi-Level (MCML) classification algorithm was applied to perform detailed classification and address the limitations of the research scope using several approaches, including machine learning, deep learning, and transfer learning approaches. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
Published 2018“…The main focus of the present research is the design of a model that prevents distributed denial-of-service attacks based on host-based intrusion detection protection systems over hypervisor environments. …”
Get full text
Get full text
Get full text
Book Chapter
