Search Results - solution ((computing techniques) OR (detection techniques))

Search alternatives:

Refine Results
  1. 1

    Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network by Ahmed, Abdulghani Ali

    Published 2019
    “…The proposed technique aims to detect Botnet zero-day attack in real time. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Stepping-stone detection technique for recognizing legitimate and attack connections by Daud, Ali Yusny, Ghazali, Osman, Omar, Mohd Nizam

    Published 2015
    “…However, not all stepping-stone connections are malicious.This paper proposes an enhanced stepping-stone detection (SSD) technique which is capable to identify legitimate connections from stepping-stone connections.Stepping-stone connections are identified from raw network traffics using timing-based SSD approach.Then, they go through an anomaly detection technique to differentiate between legitimate and attack connections.This technique has a promising solution to accurately detecting intrusions from stepping-stone connections.It will prevent incorrect responses that punish legitimate users.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique by Ali Mohamed, Nachaat Abdelatif

    Published 2022
    “…The current security solutions are deployed to detect APT signature and behaviour after APT bypasses the entire protections and accomplishes lateral movement technique, which makes the current solutions ineffective to resolve APT problem.…”
    Get full text
    Get full text
    Thesis
  4. 4

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An elapsed-time based scheme for detecting and mitigating DDOS attacks in the SDN environment by Wisam H A.Muragaa

    Published 2024
    “…DDoS detection solutions based on Machine learning techniques and entropy techniques in SDN suffer from either increase the CPU usage or increase false alarms. …”
    thesis::doctoral thesis
  6. 6

    Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq by Bilal , Ishfaq

    Published 2016
    “…This proposed technique is a lightweight solution which consumes less controller resources in detecting and mitigating the DoS attack. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Fighting video analysis employing computer vision technique by Foo, Wen Shun

    Published 2022
    “…This project is about analysing and classifying the fighting video from the UCF_Crimes dataset to explore solutions to detect fighting events employing computer vision technique. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Malicious website detection by Ong, Vienna Lee

    Published 2019
    “…With previous existing methods in consideration, the method to use for this project is by using heuristic-based detection with machine learning technique and the feature that will be used together with the technique is URL based feature. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection by Yong, Guang

    Published 2019
    “…Therefore, the microwave imaging technique is proposed to detect the wood defects. In this thesis, Forward-Backward Time-Stepping (FBTS) method is applied to microwave imaging wood defect detection application. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Distance approximation using pivot point in narrow phase collision detection by Sulaiman, Hamzah Asyrani, Bade, Abdullah, Abdullah, Mohd Harun

    Published 2013
    “…Each technique increase speed and accuracy of the simulation itself but depending on application, we need to have specific solution of collision detection technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Systematic review of intrusion detection system based on machine learning techniques for internet of things by Idris, Muhammad, Md Yasin, Sharifah, Audi, Giade Hamza

    Published 2023
    “…We highlighted the most efficient machine learning algorithms and feature selection techniques, along with strategies to address issues related to dataset imbalance in benchmarked datasets, with the goal of fostering the development of robust IDS solutions for IoT security.…”
    Get full text
    Get full text
    Article
  12. 12

    Malware detection through machine learning techniques by Amer, Ahmed, Abdul Aziz, Normaziah

    Published 2019
    “…We conclude that Machine Learning techniques are practical to be applied as anti-malware solutions including for Zero-day attacks.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Automated density and growth estimation in precision aquaculture systems for prawn cultivation using computer vision techniques by Chong, Xiao Wei

    Published 2024
    “…To address these challenges, this project proposes an innovative solution that leverages computer vision and machine learning techniques. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Distributed denial of service attack Detection in IoT networks using deep learning and feature fusion : A review by Nuhu Ahmad, Abdul hafiz, Anis Farihan, Mat Raffei, Mohd Faizal, Ab Razak, Ahmad Syafadhli, Abu Bakar

    Published 2024
    “…This paper aims to provide a comprehensive literature review focused specifically on deep learning techniques and feature fusion for DDoS attack detection in IoT networks. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review by Nuhu Ahmad, Abdulhafiz, Anis Farihan, Mat Raffei, Mohd Faizal, Ab Razak, Ahmad, Abubakar

    Published 2024
    “…This paper aims to provide a comprehensive literature review focused specifically on deep learning techniques and feature fusion for DDoS attack detection in IoT networks. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Generative adversarial networks in object detection: A systematic literature review by Anis Farihan, Mat Raffei, Sinung, Suakanto, Faqih, Hamami, Mohd Arfian, Ismail, Ernawan, Ferda

    Published 2025
    “…Analysis reveals significant performance improvements resulting from these GAN applications: data augmentation methods consistently boost detection metrics such as mAP and F1-score on scarce datasets, occlusion handling techniques successfully reconstruct hidden features with high PSNR and SSIM values, and small object detection techniques increase detection accuracy by up to 10% Average Precision in some studies. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    IoT intrusion detection using auto-encoder and machine learning techniques by Khudhu, Ahmed Ridha, Samsudin, Khairulmizam

    Published 2022
    “…Yet, the featureselection techniques used in the literature were based on feature selectionrather than a reduction in which individual solutions are being selected. …”
    Get full text
    Get full text
    Article
  20. 20

    Real-time inter-row tree detection and tracking techniques for unmanned vehicle-based on simultaneous localization and mapping approach / Norashikin M. Thamrin by M. Thamrin, Norashikin

    Published 2017
    “…In this method, the tree detection and diameter estimation techniques implement the modified tree-triangle diameter technique by using innovative technique based on infrared sensors.…”
    Get full text
    Get full text
    Book Section