Search Results - (( java application customization algorithm ) OR ( pattern detection service algorithm ))
Search alternatives:
- customization algorithm »
- pattern detection »
- detection service »
- service algorithm »
- java application »
-
1
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. …”
Get full text
Get full text
Thesis -
2
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
3
Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest
Published 2026“…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. …”
Get full text
Get full text
Get full text
Article -
4
DeepIoT.IDS: Hybrid deep learning for enhancing IoT network intrusion detection
Published 2021“…Recently, researchers have suggested deep learning (DL) algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks. …”
Get full text
Get full text
Get full text
Article -
5
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Face detection in image sequence / Noor Diana Abdullah
Published 2007Get full text
Get full text
Thesis -
7
Adaptive feature selection for denial of services (DoS) attack
Published 2017Get full text
Get full text
Conference or Workshop Item -
8
An enhanced android botnet detection approach using feature refinement
Published 2019“…The obtained results show that by using the additional features the detection accuracy improved. The experimental evaluation based on real-world benchmark datasets shows that the selected unique patterns can achieve high detection accuracy with low false positive rate. …”
Get full text
Get full text
Thesis -
9
-
10
ios Mobile Malware Deep Analysis And Classification For Social Media And Online Banking Exploitation
Published 2024thesis::master thesis -
11
SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan
Published 2018“…Recently, one the most popular attack is denial of service (DoS) that attempt to be malicious pattern to compromise a server or a network resource. …”
Get full text
Get full text
Student Project -
12
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
13
Bibliometric analysis of AI-driven FinTech revolution: mapping global trends, thematic evolution, and future directions
Published 2026“…Using the PRISMA methodology, 978 articles from the Web of Science (WoS) database were analysed to identify research trends, collaboration patterns, and citation networks. Results show an immersive publication growth rate of 26.84, indicating rising academic interest in AI-driven FinTech, with global collaboration accounting for 38.4, as supported by an increase in international co-authorship in areas such as robo-advisory services and fraud detection. …”
Get full text
Get full text
Get full text
Article -
14
Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing
Published 2022“…The proposed approach, Energy-Aware Multi-Dimensional Online Bin Packing (EAMDOBP), was tested against Power-aware best fit decreasing algorithm (PABFD), Modified Worst Fit decreasing algorithm (MWFD) and Hybrid Local Regression Host Overload Detection (HLRHOD). …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Q-Learning-based detection of IPv6 intrusions: a behavioral and performance study
Published 2025“…This problem can significantly affect local network performance or completely deny service to targeted servers. While numerous studies have proposed intrusion detection systems based on supervised learning models, a critical limitation persists. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
An early warning system for students at risk using supervised machine learning
Published 2024“…Besides, this study also focuses on the Decision Tree, Random Forest, and XGBoost models in the system. The system will detect or forecast symptoms of dropout or potential dangers ahead of time, allowing educational institutions to anticipate problems and provide adequate educational services through appropriate intervention and response. …”
Get full text
Get full text
Get full text
Article
