Search Results - (( intrusion prevention mechanism algorithm ) OR ( panel optimization path algorithm ))
Search alternatives:
- intrusion prevention »
- prevention mechanism »
- mechanism algorithm »
- panel optimization »
- optimization path »
- path algorithm »
-
1
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…This autonomous system improves the performance of the current intrusion prevention system and carries on system continuity by using self-healing mechanism.…”
Get full text
Get full text
Thesis -
2
Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
Published 2010“…This autonomous system improves the performance of the current Intrusion Prevention System (IPS) and carries on system continuity by using the Self–Healing (SH) mechanism.…”
Get full text
Get full text
Conference or Workshop Item -
3
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Firstly, we review the state of the art of intelligent intrusion detection and prevention system (IIDPS), and highlight the security requirement of cooperative based-IIDPS. …”
Get full text
Get full text
Thesis -
4
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Therefore, it is of utmost importance to prevent such intrusions. The prevention of such intrusions is entirely dependent on their detection that is a main part of any security tool such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Adaptive Security Alliance (ASA), checkpoints and firewalls. …”
Get full text
Get full text
Thesis -
5
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Therefore, it is of utmost importance to prevent such intrusions. The prevention of such intrusions is entirely dependent on their detection that is a main part of any security tool such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Adaptive Security Alliance (ASA), checkpoints and firewalls. …”
Get full text
Get full text
Thesis -
6
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
Published 2018“…The mechanism’s design is based on the hybrid Antlion Optimization Algorithm (ALO) with Multilayer Perceptron (MLP) to protect against DDoS attacks. …”
Get full text
Get full text
Thesis -
7
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…This work proposes an improved framework for FDA system to ensure a robust, intelligent network of FDA control panels in real-time. Methods/Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Network-based real-time integrated Fire Detection and Alarm (FDA) system with building automation
Published 2017“…This work proposes an improved framework for FDA system to ensure a robust intelligent network of FDA control panels in real-time. A shortest path algorithmic was chosen for series of buildings connected by fiber optic network. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…Moreover, at present, the control plane has no built-in security mechanism that prevents malicious SDN agents from sending authorized but forged flows to corrupt the controller state or bring the entire network down, in the worst case, even if the OpenFlow is Transport Layer Security (TLS) enabled. …”
Get full text
Get full text
Thesis -
12
Development of a systematic method in lean tool selection for automotive industry
Published 2012“…Based on the systematic features of this algorithm, the efficiency and effectiveness of the model in presenting optimizing techniques for lean tool selection with the automotive industry seems reasonable and useful. …”
Get full text
Get full text
Thesis -
13
The duality of technological innovation and dynamic capabilities: the micro-foundation of China's construction machinery industry's rise up the global value chain
Published 2024“…Future research can further explore the long-term evolution path of technological innovation duality and its differences in cross-cultural contexts.…”
Get full text
Get full text
Get full text
Article
