Search Results - (( parameter evaluation sensor algorithm ) OR ( attack detection path algorithm ))
Search alternatives:
- parameter evaluation »
- evaluation sensor »
- sensor algorithm »
- detection path »
- path algorithm »
-
1
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
2
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
Get full text
Get full text
Get full text
Thesis -
3
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
4
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…The attack graph depicts the many paths an attacker may attempt to get around a security policy by leveraging interdependencies between disclosed vulnerabilities. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…Intention-driven model, a sampling traceback technique, provides information about the attack flow and able to reconstruct the attack path to the source of attack by the aid of Intrusion Detection system (IDS). …”
Get full text
Get full text
Thesis -
6
-
7
-
8
-
9
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
10
Calibration of optical based silicone tactile sensor based on image deformation technique / Abdul Halim Esa
Published 2016“…To evaluate the performance of the algorithm, this proposed optical tactile sensor compares the results of these three parameters that give a better accuracy with respect to sensitivity value, low hysteresis and high repeatability. …”
Get full text
Get full text
Thesis -
11
A multi-objective parametric algorithm for sensor-based navigation in uncharted terrains
Published 2023“…Sensor-based motion planning is one the most challenging tasks in robotics where various approaches and algorithms have been proposed to achieve different planning goals. …”
Article -
12
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
Get full text
Get full text
Thesis -
13
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…Both Bat Algorithm parameters and AFW parameters are adaptively tuned to balance exploration and exploitation throughout the optimization process. …”
Get full text
Get full text
Get full text
Thesis -
15
Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din
Published 2016“…These have resulted ineffective of energy usage of sensor node which causes restrict on a lifetime of the sensor network. …”
Get full text
Get full text
Thesis -
16
Spectrum aware clustering algorithm based on fuzzy logic for sensor based monitoring application / Noorhayati Mohamed Noor …[et al.]
Published 2020“…The cluster formation is based on the relative channel availability between the cluster member (CM) and CH to ensure stable cluster connectivity from link failure. To evaluate the proposed clustering algorithm, the performance of sensor networks is compared with CogLEACH, LEACH and CHEF routing protocols. …”
Get full text
Get full text
Get full text
Article -
17
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…The performance evaluation of the proposed data gathering algorithms has been done through a detailed and extensive discrete-event-simulation analysis. …”
Get full text
Get full text
Thesis -
18
Performance Evaluation of Maximum Power Point Tracking Approaches and Photovoltaic Systems
Published 2018“…In the performance evaluation section, the appropriate PV module technologies, atmospheric effects on PV panels, design complexity, and number of sensors and internal parameters of the PV system are outlined. …”
Get full text
Get full text
Article -
19
Machine Learning Based Detection for Compromised Accounts on Social Media Networks
Published 2025“…Compromised accounts can be used to spread misinformation, launch phishing attacks, and steal personal information. This paper presents a novel approach to detecting compromised accounts on social networks. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item
