Enhancement of network security by use machine learning
This research is about the design and simulation on enhancement network security using machine learning. The design use MATLAB coding to show the simulation. The coding is designed in a way that there is an attack of malicious to destroy the data. Because there is a machine-learning scheme in the se...
| Main Author: | Hasan, Ahmed Raheem |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/442/ http://eprints.uthm.edu.my/442/1/24p%20AHMED%20RAHEEM%20HASAN.pdf http://eprints.uthm.edu.my/442/2/AHMED%20RAHEEM%20HASAN%20COPYRIGHT%20DECLARATION.pdf http://eprints.uthm.edu.my/442/3/AHMED%20RAHEEM%20HASAN%20WATERMARK.pdf |
Similar Items
Learning Environment For PDA Security
by: Velu , Vengadeshwaran
Published: (2002)
by: Velu , Vengadeshwaran
Published: (2002)
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999)
by: Chong, Chee Way
Published: (1999)
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999)
by: Chong, Chee Way
Published: (1999)
Performance evaluation for different intrusion detection system algorithms using machine learning
by: Zarir, Mustafa Nadhim
Published: (2018)
by: Zarir, Mustafa Nadhim
Published: (2018)
AES encryption of resource allocation for ultra-reliable and enhanced mobile broadband IoT applications in fog network
by: Ahmed Alqourabah, Eissa Abdulsalam
Published: (2022)
by: Ahmed Alqourabah, Eissa Abdulsalam
Published: (2022)
Enhancement And Implementation Of GSM Networks In Malaysia: An Erricson Study
by: Mahboubi, Omid
Published: (2009)
by: Mahboubi, Omid
Published: (2009)
An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
Machine learning techniques to detect bleeding frame and area in wireless capsule endoscopy video
by: Vajravelua, Ashok, et al.
Published: (2023)
by: Vajravelua, Ashok, et al.
Published: (2023)
Internet Security In China
by: Jia, Xu
Published: (2005)
by: Jia, Xu
Published: (2005)
Key Management For Multicast Security
by: Daw, Win Aye
Published: (2005)
by: Daw, Win Aye
Published: (2005)
Solving security staff scheduling by using genetic algorithm
by: Ang, Shin Yin
Published: (2021)
by: Ang, Shin Yin
Published: (2021)
Smart security system for home (IOT)
by: Abd Oun, Muhamed Obed
Published: (2020)
by: Abd Oun, Muhamed Obed
Published: (2020)
Internet of things security implementation using blockchain for wireless technology
by: Karim, Karim Jabur
Published: (2019)
by: Karim, Karim Jabur
Published: (2019)
Web transcript verification using check digit as secure number
by: Abd Halim, Muhamad Rais, et al.
Published: (2017)
by: Abd Halim, Muhamad Rais, et al.
Published: (2017)
Speech enhancement using deep neural network based on mask estimation and harmonic regeneration noise reduction for single channel microphone
by: Md Jamal, Norezmi
Published: (2022)
by: Md Jamal, Norezmi
Published: (2022)
Smart home security access system using field programmable gate arrays
by: Saleh, Shukur, et al.
Published: (2018)
by: Saleh, Shukur, et al.
Published: (2018)
E-store management using bell-lapadula access control security model
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
Propose a new Firefly-Fast Learning Network
model based Intrusion-Detection System
by: Badran, Mohammed Falih, et al.
Published: (2019)
by: Badran, Mohammed Falih, et al.
Published: (2019)
Optimization of coded signals based on wavelet neural network
by: Ahmed, Mustafa Sami
Published: (2015)
by: Ahmed, Mustafa Sami
Published: (2015)
Dynamic channel selection for meshed wireless personal area network
by: Abdul Lateef, Ahmed
Published: (2015)
by: Abdul Lateef, Ahmed
Published: (2015)
Optimization of supply chain management by simulation based RFID with XBEE Network
by: Soomro, Aftab Ahmed
Published: (2015)
by: Soomro, Aftab Ahmed
Published: (2015)
Study On Signature-Based Network Intrusion Detection System For High-Speed Network Using Network Processing Unit (NPU)
by: Salim, Robin
Published: (2007)
by: Salim, Robin
Published: (2007)
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
by: Ahmed Al-Doori, Ahmed Jamal
Published: (2018)
by: Ahmed Al-Doori, Ahmed Jamal
Published: (2018)
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
JXME Security: Encryption Overhead In End-To-End J2ME-JXTA Systems
by: Mazlan, Rima
Published: (2008)
by: Mazlan, Rima
Published: (2008)
Design Of An E-Learning Environment Using VSAT Technology For ComputerMan University (CMU - Sudan)
by: Ahmed Hassan, Faris Izzeldin
Published: (2007)
by: Ahmed Hassan, Faris Izzeldin
Published: (2007)
Optimization of RFID network planning using MDB-FA method
by: Elewe, Adel Muhsin, et al.
Published: (2017)
by: Elewe, Adel Muhsin, et al.
Published: (2017)
Fully automatic model-based segmentation and classification
approach for MRI brain tumor using artificial neural networks
by: Arunkumar, N., et al.
Published: (2018)
by: Arunkumar, N., et al.
Published: (2018)
Integration of cellular network and wireless LAN
by: Indran, Taruna Kugan, et al.
Published: (2021)
by: Indran, Taruna Kugan, et al.
Published: (2021)
Reinforcement learning-based target tracking for unmanned aerial vehicle with achievement rewarding and multistage traning
by: Ahmed Abo Mosali, Najm Addin Mohammed
Published: (2022)
by: Ahmed Abo Mosali, Najm Addin Mohammed
Published: (2022)
Designing communication network topologies using steady-state genetic algorithms
by: Sayoud, H., et al.
Published: (2001)
by: Sayoud, H., et al.
Published: (2001)
Frequency hopping using CDMA to avoid malicious attack in han networks
by: Ridha, Hussein Ali
Published: (2020)
by: Ridha, Hussein Ali
Published: (2020)
Self-Routing For Optical Burst Switched Networks
by: Mellah, H., et al.
Published: (2005)
by: Mellah, H., et al.
Published: (2005)
On the congestion control in Optical Burst Switching networks
by: Abid, A., et al.
Published: (2007)
by: Abid, A., et al.
Published: (2007)
Wavelength Converters Placement In All Optical Networks Using Particle Swarm Optimization
by: Teo , Choon Fang
Published: (2005)
by: Teo , Choon Fang
Published: (2005)
Receiver bandwidth enhancement design for high speed optical system
by: Mohammad, Intan Shafinaz
Published: (2013)
by: Mohammad, Intan Shafinaz
Published: (2013)
Staged reservation scheme for optical burst switching networks
by: Abid, A., et al.
Published: (2005)
by: Abid, A., et al.
Published: (2005)
Case Study On Astro All Asia Networks PLC
by: Hong, Ng Wai
Published: (2007)
by: Hong, Ng Wai
Published: (2007)
Performance Analysis And Design Of A WDM Ring Network
by: Dambul, Katrina D.
Published: (2007)
by: Dambul, Katrina D.
Published: (2007)
Energy-Efficient Routing Algorithms For Wireless Sensor Network
by: Goh, Hock Guan
Published: (2006)
by: Goh, Hock Guan
Published: (2006)
Similar Items
-
Learning Environment For PDA Security
by: Velu , Vengadeshwaran
Published: (2002) -
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999) -
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999) -
Performance evaluation for different intrusion detection system algorithms using machine learning
by: Zarir, Mustafa Nadhim
Published: (2018) -
AES encryption of resource allocation for ultra-reliable and enhanced mobile broadband IoT applications in fog network
by: Ahmed Alqourabah, Eissa Abdulsalam
Published: (2022)