Solving time gap problems through the optimization of detecting stepping stone algorithm
This paper describes an analysis of detecting stepping stone algorithm to defeat the time gap problem. It is found that current algorithm of detecting stepping stone is not optimized. Several weaknesses are identified and suggestions are proposed to overcome this problem. The suggestions are applied...
| Main Authors: | Omar, Mohd. Nizam, Maarof, Mohd. Aizaini, Zainal, Anazida |
|---|---|
| Format: | Book Section |
| Published: |
IEEE Engineering in Medicine and Biology Society
2004
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/7366/ |
Similar Items
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
The optimization of stepping stone detection: packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
The optimization of stepping stone detection: Packet capturing steps
by: Omar, Mohd Nizam, et al.
Published: (2006)
by: Omar, Mohd Nizam, et al.
Published: (2006)
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Ensemble based categorization and adaptive model for malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005)
by: Zainal, Anazida, et al.
Published: (2005)
Finding granular features using rough-PSO in IDS
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Solving ump examination timetabling problem using dynamic exploration step counting hill climbing algorithm
by: Chang, Ling Shing
Published: (2022)
by: Chang, Ling Shing
Published: (2022)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Agent-based extraction algorithm for computational problem solving
by: Rajabi, Maryam
Published: (2015)
by: Rajabi, Maryam
Published: (2015)
An improved genetic algorithm for solving the multiprocessor scheduling problem
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Accelerated mine blast algorithm for ANFIS training for solving classification problems
by: Mohd Salleh, Mohd Najib, et al.
Published: (2016)
by: Mohd Salleh, Mohd Najib, et al.
Published: (2016)
A genetic algorithm for solving single level lotsizing problems
by: Zenon, Nasaruddin, et al.
Published: (2003)
by: Zenon, Nasaruddin, et al.
Published: (2003)
Guided genetic algorithm for solving unrelated parallel machine scheduling problem with additional resources
by: Abed, Munther Hameed, et al.
Published: (2022)
by: Abed, Munther Hameed, et al.
Published: (2022)
Solving 0/1 Knapsack Problem using Opposition-based Whale Optimization Algorithm (OWOA)
by: Alamri, Hammoudeh S., et al.
Published: (2019)
by: Alamri, Hammoudeh S., et al.
Published: (2019)
Problem solving steps in online PBL
by: Shahbodin, Faaizah, et al.
Published: (2010)
by: Shahbodin, Faaizah, et al.
Published: (2010)
Problem solving steps in online PBL
by: Mohd Bakri, Nurhazirah, et al.
Published: (2010)
by: Mohd Bakri, Nurhazirah, et al.
Published: (2010)
A review of the parallel algorithms for solving multidimensional PDE problems
by: Alias, Norma, et al.
Published: (2010)
by: Alias, Norma, et al.
Published: (2010)
Hybridizing guided genetic algorithm and single-based metaheuristics to solve unrelated parallel machine scheduling problem with scarce resources
by: Abed, Munther H., et al.
Published: (2023)
by: Abed, Munther H., et al.
Published: (2023)
Detecting backdoor using stepping stone detection approach
by: Alminshid, Khalid, et al.
Published: (2013)
by: Alminshid, Khalid, et al.
Published: (2013)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
Challenges in high accuracy of malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
Solving multi-task optimization problems using the sine cosine algorithm
by: Kamal Z., Zamli, et al.
Published: (2022)
by: Kamal Z., Zamli, et al.
Published: (2022)
Evolution of stepping stone detection and emerging applications
by: Omar, Mohd Nizam, et al.
Published: (2012)
by: Omar, Mohd Nizam, et al.
Published: (2012)
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
Stone detection in MRCP images using controlled region growing
by: LOGESWARAN, R, et al.
Published: (2007)
by: LOGESWARAN, R, et al.
Published: (2007)
A stepping stone perspective to detection of network threats
by: Omar, Mohd Nizam, et al.
Published: (2013)
by: Omar, Mohd Nizam, et al.
Published: (2013)
A carnivorous plant algorithm for solving global optimization
problems
by: Ong, Kok Meng, et al.
Published: (2021)
by: Ong, Kok Meng, et al.
Published: (2021)
Solving Two Deadlock Cycles through Neighbor Replication on Grid Deadlock Detection Model
by: Noriyani, Mohd Zin, et al.
Published: (2012)
by: Noriyani, Mohd Zin, et al.
Published: (2012)
Solving 0/1 Knapsack Problem Using Hybrid HS and Jaya Algorithms
by: Alomoush, Alaa A., et al.
Published: (2018)
by: Alomoush, Alaa A., et al.
Published: (2018)
Principles and applications of algorithmic problem solving
by: Ferreira, Joao Fernando Peixoto
Published: (2011)
by: Ferreira, Joao Fernando Peixoto
Published: (2011)
A Genetic Algorithm Based Approach for Solving
the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)
by: Alharbi, Saad, et al.
Published: (2017)
A Genetic Algorithm Based Approach for Solving the Minimum Dominating Set of Queens Problem
by: Alharbi, Saad, et al.
Published: (2017)
by: Alharbi, Saad, et al.
Published: (2017)
Similar Items
-
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006) -
The optimization of stepping stone detection: packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006) -
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011) -
The optimization of stepping stone detection: Packet capturing steps
by: Omar, Mohd Nizam, et al.
Published: (2006) -
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.