Search Results - (( model implication drops algorithm ) OR ( _ prevention based algorithm ))
Search alternatives:
- model implication »
- implication drops »
- prevention based »
- _ prevention »
-
1
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
Get full text
Get full text
Thesis -
2
Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier
Published 2011“…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
Get full text
Get full text
Thesis -
3
Implementation of machine learning algorithm in preventing network congestion
Published 2023text::Final Year Project -
4
Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks
Published 2011“…The first model is based on original HMAC-SHA1 algorithm and the second one is based on a proposed modified HMAC-SHA1 (M-hmac) algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Rollover Prevention System for Passenger Vehicle
Published 2010“…An active roll control using roll moment rejection algorithm based on 14 DOF full vehicle model is proposed in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
6
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
7
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…Secondly, specification language, system design, mathematical and computational models for IPS and SH system are established, which are based upon nonlinear classification, prevention predictability trust, analysis, self-adaptation and self-healing algorithms. …”
Get full text
Get full text
Thesis -
8
Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition
Published 2021“…The fuzzified dataset was applied in FID3 algorithm, which is the fuzzy version of the ID3 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Network tool for preventing DDOS attacks on cloud computing
Published 2015“…The algorithm is implemented in a simulated network environment and results obtained is analyze based on packet delivery ratio.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
11
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…A modified version of the SKF algorithm, named Opposition-Based SKF (OBSKF), introduced by K. …”
Get full text
Get full text
Thesis -
12
QoS based fair load-balancing: paradigm to IANRA routing algorithm for wireless networks (WNs)
Published 2008“…In this paper, a new algorithm, Intelligent agent AntNet based Routing Algorithm (IANRA) is proposed to enhance load balancing strategy in Wireless Networks (WNs). …”
Get full text
Get full text
Conference or Workshop Item -
13
Dengue classification system using clonal selection algorithm / Karimah Mohd
Published 2012“…As the number of dengue cases is increasing faster in Malaysia, more work need to be done in order to prevent it. Dengue classification and detectionsystem will classify if a person have dengue or not based on symptoms. …”
Get full text
Get full text
Thesis -
14
A Fusion-Based Framework For Explainable Suicide Attempt Prediction
Published 2024“…The proposed work aims to analyse an explainable learning algorithms for predicting suicide attempts, propose an ontology model for semantically representing the classification risk of suicide attempts and propose an explanation generation algorithm by combining predictions from explainable machine learning and ontology models. …”
Get full text
Get full text
Thesis -
15
Quality of service management algorithms in WiMAX networks
Published 2015“…This scheme determines an admission criteria based on scheduling service classes. In the admission criteria, a bandwidth-degradation policy is used to admit more users in order to prevent starvation. …”
Get full text
Get full text
Thesis -
16
Review of the machine learning methods in the classification of phishing attack
Published 2019“…There are several algorithms that can be used in the machine learning method to prevent these attacks. …”
Get full text
Get full text
Get full text
Article -
17
Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali
Published 2020“…Artificial Bee Colony algorithm has been selected as the algorithm used in segmenting the brain tumor from MRI image. …”
Get full text
Get full text
Thesis -
18
-
19
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…Moreover, a DNA-based MixColumns function was proposed to enhance the linear transformation executed in a finite field by employing fixed polynomials and preventing vulnerability to linear and differential attacks. …”
Get full text
Get full text
Thesis -
20
