Approach for solving active perturbation attack problem in stepping stone detection.
Batu loncatan merupakan salah satu daripada teknik menyembunyikan jejak yang digunakan oleh penceroboh untuk menyembunyikan jejaknya. Untuk lebih daripada satu dekad, para penyelidik menumpukan usaha mereka untuk mempertingkatkan pendekatan Pengesanan Batu Loncatan (PBL) untuk mengidentifikasi seca...
| Main Author: | Omar, Mohd Nizam |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/43113/ http://eprints.usm.my/43113/1/Pages_from_APPROACH_FOR_SOLVING_ACTIVE_PERTURBATION.pdf |
Similar Items
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
Solving time gap problems through the optimization of detecting stepping stone algorithm
by: Omar, Mohd. Nizam, et al.
Published: (2004)
by: Omar, Mohd. Nizam, et al.
Published: (2004)
A Genetic Algorithm Based Approach for Solving
the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)
by: Alharbi, Saad, et al.
Published: (2017)
A Genetic Algorithm Based Approach for Solving the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)
by: Alharbi, Saad, et al.
Published: (2017)
Stone detection in MRCP images using controlled region growing
by: LOGESWARAN, R, et al.
Published: (2007)
by: LOGESWARAN, R, et al.
Published: (2007)
Design Of Perturbative Hyper-Heuristics For Combinatorial Optimisation
by: Choong, Shin Siang
Published: (2019)
by: Choong, Shin Siang
Published: (2019)
CSI 502 - PROBLEM SOLVING AND PROGRAMMING SEPT 1997.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1997)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1997)
CSI502 – PROBLEM SOLVING AND PROGRAMMING - SEPT. 2001
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
CSI502 – PROBLEM SOLVING & PROGRAMMING - OKT. 2000
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2000)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2000)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
Solving Unit Commitment Problem Using Hybrid Particle Swarm Optimization
by: Ting, Tiew-On, et al.
Published: (2003)
by: Ting, Tiew-On, et al.
Published: (2003)
Effects Of Problem-Solving Strategies On Achievement And Motivation In Learning Chemistry In A Social Network Environment
by: Tan, Hong Looi
Published: (2016)
by: Tan, Hong Looi
Published: (2016)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
The optimization of stepping stone detection: packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
Solving shortest path problem using particle swarm optimization
by: Mohemmed, Ammar W., et al.
Published: (2008)
by: Mohemmed, Ammar W., et al.
Published: (2008)
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012)
by: Yadav, Rinki
Published: (2012)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
Particle swarm optimization with noising metaheuristics for solving network shortest path problem
by: Mohemmed, Ammar W., et al.
Published: (2007)
by: Mohemmed, Ammar W., et al.
Published: (2007)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
Solving variational problems by homotopy–perturbation method
by: Abdulaziz, O., et al.
Published: (2008)
by: Abdulaziz, O., et al.
Published: (2008)
An ant colony optimization approach to the degree-constrained minimum spanning tree problem
by: Ewe, HT, et al.
Published: (2005)
by: Ewe, HT, et al.
Published: (2005)
A new particle swarm optimization based algorithm for solving shortest-paths tree problem
by: Mohemmed, Ammar W., et al.
Published: (2007)
by: Mohemmed, Ammar W., et al.
Published: (2007)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
An Enhanced Artificial Immune System
Approach For Assembly Line Balancing
Problem Through Shifting Bottleneck
Identification
by: Khalid, Mohd Nor Akmal
Published: (2018)
by: Khalid, Mohd Nor Akmal
Published: (2018)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Synchronization Controller To Solve
The Mismatched Sampling Rates For
Acoustic Echo Cancellation
by: Naeem, Adel Nadhem
Published: (2015)
by: Naeem, Adel Nadhem
Published: (2015)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Similarity Segmentation Approach For Sensor-Based Human Activity Recognition
by: Baraka, Abdulrahman M. A.
Published: (2024)
by: Baraka, Abdulrahman M. A.
Published: (2024)
A Multi-objective Evolutionary Algorithm Based On Decomposition For Continuous Optimization Using A Step-function Technique
by: Chuah, How Siang
Published: (2022)
by: Chuah, How Siang
Published: (2022)
Attacks on a robust watermarking scheme based on self-reference image
by: TING, G, et al.
Published: (2008)
by: TING, G, et al.
Published: (2008)
A New Class Of Operations To Accelerate Particle Swarm Optimization Algorithm And A Novel Hybrid Approach For Unit Commitment Problem.
by: Ting, Tiew On
Published: (2004)
by: Ting, Tiew On
Published: (2004)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
by: Ling, Huo-Chong, et al.
Published: (2007)
by: Ling, Huo-Chong, et al.
Published: (2007)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Cellular Harmony Search for Optimization Problems
by: Al-Betar, Mohammed Azmi, et al.
Published: (2013)
by: Al-Betar, Mohammed Azmi, et al.
Published: (2013)
Similar Items
-
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al. -
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018) -
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012) -
Solving time gap problems through the optimization of detecting stepping stone algorithm
by: Omar, Mohd. Nizam, et al.
Published: (2004) -
A Genetic Algorithm Based Approach for Solving
the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)