Search Results - Flow detection algorithm

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…For this point, Horn-Schunck optical flow is used to get the flow vector for each pixel in the image frames. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…These comparative results demonstrated the TLSMalDetect’s ability to detect more malware flows out of total malicious flows than existing works. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Enhanced and effective parallel optical flow method for vehicle detection and tracking by Bhaskar, P.K., Yong, S.-P., Jung, L.T.

    Published 2016
    “…The foreground optical flow detector detects the object and a binary computation is done to define rectangular regions around every detected object. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A Study on Implementing Physiology-Based Approach and Optical Flow Algorithm to Thermal Screening System for Flu Detection by Kamarul Hawari, Ghazali, Norulzahrah, M. Zainudin, Suzaimah, Ramli, M. Lazim, Talib, Nor Asiakin, Hasbullah

    Published 2015
    “…To solve this issue, we have proposed a combination of physiology-based and optical flow algorithm to extract vascular network from the face. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    HUMAN MOTION ANALYSIS IN VIDEO SURVEILLANCE SYSTEM by LO , TIMOTHY YIN HONG

    Published 2019
    “…A video sequence consists of sequences of frame, with the detection algorithm, these frames can be analyzed and detect any” “abnormal behavior such as crime.” …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Flow-based approach on bro intrusion detection by Alaidaros, Hashem, Mahmuddin, Massudi

    Published 2017
    “…Then, the model made use the machine learning classification algorithms for attribute evaluation and Bro policy scripts for detecting malicious flows. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    An evaluation of optical flow algorithms for crowd analytics in surveillance system by Kajo, I., Malik, A.S., Kamel, N.

    Published 2017
    “…This paper presents an overview of the optical flow methods that used mainly for pedestrian and crowd motion detection. …”
    Get full text
    Get full text
    Article
  14. 14

    CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets by Alaidaros, Hashem Mohammed

    Published 2017
    “…Input Framework approach was employed for triggering packet flows between the packetbased and flow-based detections. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Motion detection using Horn-Schunck optical flow by Wan Nur Azhani, W. Samsudin, Kamarul Hawari, Ghazali

    Published 2012
    “…This system is design to detect motion in a crowd using one of the optical flow algorithms, Horn-Schunck method. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Anomaly detection in ICS datasets with machine learning algorithms by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Abdul Rahman, Farah Diyana, Tahir, Mohammad

    Published 2021
    “…The ICS cyber threats are growing at an alarming rate on industrial automation applications. Detection techniques with machine learning algorithms on public datasets, suitable for intrusion detection of cyber-attacks in SCADA systems, as the first line of defense, have been detailed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Execution time optimization analysis on multiple algorithms performance of moving object edge detection by Islam S.Z., Islam S.Z., Jidin R., Mohd. Ali Mohd.A.

    Published 2023
    “…Sobel and Canny edge detection algorithms have been described with pseudo code and detailed flow chart and implemented in C and MATLAB respectively on different platforms to evaluate performance and execution time for moving cars. …”
    Conference paper
  19. 19

    Optimizing Ram Testing Method For Test Time Saving Using Automatic Test Equipment by Kesavan Prabagaran, Premkumar

    Published 2017
    “…A memory Build-in Self-test (BIST) design with capability of algorithm failing sequence capture have been developed to implement in the Automate Test Equipment (ATE) flow for production screen. 3 selected algorithm have been tested on the 8 detect units in ATE flow to prove the concept of this method. …”
    Get full text
    Get full text
    Thesis
  20. 20