Search Results - (( model implication from algorithm ) OR ( _ prevention based algorithm ))
Search alternatives:
- model implication »
- implication from »
- prevention based »
- from algorithm »
- _ prevention »
-
1
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
Get full text
Get full text
Thesis -
2
Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier
Published 2011“…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
Get full text
Get full text
Thesis -
3
Agreement options for negotiation on material location decision of housing development
Published 2020“…Social implications: The satisficing algorithm of the coalition will satisfy all stakeholders. …”
Get full text
Get full text
Article -
4
Implementation of machine learning algorithm in preventing network congestion
Published 2023text::Final Year Project -
5
Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks
Published 2011“…The first model is based on original HMAC-SHA1 algorithm and the second one is based on a proposed modified HMAC-SHA1 (M-hmac) algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Rollover Prevention System for Passenger Vehicle
Published 2010“…An active roll control using roll moment rejection algorithm based on 14 DOF full vehicle model is proposed in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
7
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. …”
Get full text
Get full text
Get full text
Article -
8
Prediction of payment method in convenience stores using machine learning
Published 2023“…The findings of this research have practical implications for businesses and financial institutions operating in Indonesia. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
10
-
11
An investigation of structural breaks on spot and futures crude palm oil returns
Published 2011“…The implications of omitting structural break in volatility clustering modelling process are largely discussed in various developed macroeconomic and finance variables. …”
Get full text
Get full text
Article -
12
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…Secondly, specification language, system design, mathematical and computational models for IPS and SH system are established, which are based upon nonlinear classification, prevention predictability trust, analysis, self-adaptation and self-healing algorithms. …”
Get full text
Get full text
Thesis -
13
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…Practical implications In terms of managerial implications, the findings in this research help to frame the adoption of a more advanced analytical approach to forecasting, using a Machine Learning algorithm, in solving a newsvendor problem. …”
Get full text
Get full text
Book Section -
14
Predicting the classification of heart failure patients using optimized machine learning algorithms
Published 2025“…The optimized hyperparameters for the GBM model were identified using the AIW-PSO algorithm, which effectively balanced exploration and exploitation by adaptively adjusting inertia weights. …”
Get full text
Get full text
Get full text
Article -
15
Not seeing the forest for the trees: Generalised linear model out-performs random forest in species distribution modelling for Southeast Asian felids
Published 2023“…Two of the most frequently applied algorithms to model species-habitat relationships are Generalised Linear Models (GLM) and Random Forest (RF). …”
Get full text
Get full text
Article -
16
Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition
Published 2021“…The fuzzified dataset was applied in FID3 algorithm, which is the fuzzy version of the ID3 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Network tool for preventing DDOS attacks on cloud computing
Published 2015“…The algorithm is implemented in a simulated network environment and results obtained is analyze based on packet delivery ratio.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
19
Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows
Published 2026“…Preprocessing removes noise from text data, normalizes sentiment word lists and undertakes temporal transformation. …”
Get full text
Get full text
Article -
20
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…A modified version of the SKF algorithm, named Opposition-Based SKF (OBSKF), introduced by K. …”
Get full text
Get full text
Thesis
