Search Results - (( model implication drops algorithm ) OR ( _ prevention based algorithm ))

Refine Results
  1. 1

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks by Malekzadeh, Mina, Abdul Ghani, Abdul Azim, K. Subramaniam, Shamala

    Published 2011
    “…The first model is based on original HMAC-SHA1 algorithm and the second one is based on a proposed modified HMAC-SHA1 (M-hmac) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Rollover Prevention System for Passenger Vehicle by Phuman Singh, A.S., Safarudin, Mochamad, Sihombing, Haeryip

    Published 2010
    “…An active roll control using roll moment rejection algorithm based on 14 DOF full vehicle model is proposed in this paper. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…Secondly, specification language, system design, mathematical and computational models for IPS and SH system are established, which are based upon nonlinear classification, prevention predictability trust, analysis, self-adaptation and self-healing algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Network tool for preventing DDOS attacks on cloud computing by Yo, Kee Seng

    Published 2015
    “…The algorithm is implemented in a simulated network environment and results obtained is analyze based on packet delivery ratio.…”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Adaptive beamforming algorithm based on Simulated Kalman Filter by Kelvin Lazarus, Lazarus

    Published 2017
    “…A modified version of the SKF algorithm, named Opposition-Based SKF (OBSKF), introduced by K. …”
    Get full text
    Get full text
    Thesis
  12. 12

    QoS based fair load-balancing: paradigm to IANRA routing algorithm for wireless networks (WNs) by Moghanjoughi, Ayyoub Akbari, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir

    Published 2008
    “…In this paper, a new algorithm, Intelligent agent AntNet based Routing Algorithm (IANRA) is proposed to enhance load balancing strategy in Wireless Networks (WNs). …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Dengue classification system using clonal selection algorithm / Karimah Mohd by Mohd, Karimah

    Published 2012
    “…As the number of dengue cases is increasing faster in Malaysia, more work need to be done in order to prevent it. Dengue classification and detectionsystem will classify if a person have dengue or not based on symptoms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A Fusion-Based Framework For Explainable Suicide Attempt Prediction by Nordin, Noratikah

    Published 2024
    “…The proposed work aims to analyse an explainable learning algorithms for predicting suicide attempts, propose an ontology model for semantically representing the classification risk of suicide attempts and propose an explanation generation algorithm by combining predictions from explainable machine learning and ontology models. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…This scheme determines an admission criteria based on scheduling service classes. In the admission criteria, a bandwidth-degradation policy is used to admit more users in order to prevent starvation. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali by Mohd Ali, Nurul Amira

    Published 2020
    “…Artificial Bee Colony algorithm has been selected as the algorithm used in segmenting the brain tumor from MRI image. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…Moreover, a DNA-based MixColumns function was proposed to enhance the linear transformation executed in a finite field by employing fixed polynomials and preventing vulnerability to linear and differential attacks. …”
    Get full text
    Get full text
    Thesis
  20. 20