Adopting deep learning for detection of DDOS attack on IOT
Not available
| Main Author: | Fakhriyah Salih Mohammed Abouzaekouk |
|---|---|
| Other Authors: | Maheyzah Sirat@Md. Siraj, supervisor |
| Format: | Master's thesis |
| Language: | English |
| Published: |
Universiti Teknologi Malaysia
2025
|
| Subjects: | |
| Online Access: | https://utmik.utm.my/handle/123456789/40422 |
| Abstract | Abstract here |
Similar Items
An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
An elapsed-time based scheme for detecting and mitigating DDOS attacks in the SDN environment
by: Wisam H A.Muragaa
Published: (2024)
by: Wisam H A.Muragaa
Published: (2024)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
Statistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021)
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021)
Assessment of IoT immunity against attacks using IoT honeypots
by: Mohammed Yunusa Jeddah
Published: (2024)
by: Mohammed Yunusa Jeddah
Published: (2024)
A trust model anomaly detection of RPL attacks in WSN-based IOT / Zainab Ebrahim Qamber Ghuloom Abdulla Alansari
by: Zainab Ebrahim Qamber Ghuloom , Abdulla Alansari
Published: (2023)
by: Zainab Ebrahim Qamber Ghuloom , Abdulla Alansari
Published: (2023)
DDOS avoidance strategy for service avalibilty
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
A DNA Based Lightweight Cryptography Framework Integrating ECC and RNN Based Deep Learning for IoT Security
by: Sehrish, Aqeel
Published: (2025)
by: Sehrish, Aqeel
Published: (2025)
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018)
by: Khan, Samia
Published: (2018)
DDoS detection and defense mechanism based on packet analysis and machine learning / Mohd Azahari Mohd Yusof
by: Mohd Yusof, Mohd Azahari
Published: (2019)
by: Mohd Yusof, Mohd Azahari
Published: (2019)
Development of Deep Learning Classification Model for Diabetic Retinopathy Detection and Grading
by: Nurul Mirza Afiqah, Tajudin
Published: (2023)
by: Nurul Mirza Afiqah, Tajudin
Published: (2023)
Deep learning algorithm and IoT based system for Photovoltaic (PV) defect images classification
by: Mazlan, Nurul Atikah
Published: (2025)
by: Mazlan, Nurul Atikah
Published: (2025)
Cybersecurity vulnerabilities detection using Named Entity Recognition (NER) and deep learning
by: Nurul Abidah Hydrus
Published: (2025)
by: Nurul Abidah Hydrus
Published: (2025)
Design and development of skin detection model based deep learning on different skin tones
by: Al-Qaysi, Mohammed Ahmed Chyad
Published: (2021)
by: Al-Qaysi, Mohammed Ahmed Chyad
Published: (2021)
Detection of wormhole attack in mobile ad-hoc networks
by: Mojtaba Ghanaatpisheh Sanaei
Published: (2025)
by: Mojtaba Ghanaatpisheh Sanaei
Published: (2025)
Replay attack on Bluetooth communication with software defined radio in the IoT based smart home
by: Mohd Zainudin, Ahmad Fudhail Iyad
Published: (2025)
by: Mohd Zainudin, Ahmad Fudhail Iyad
Published: (2025)
A secure method to detect wormhole attack in mobile adhoc network
by: Parichehr Manouchehri Ardestani
Published: (2025)
by: Parichehr Manouchehri Ardestani
Published: (2025)
A deep learning approach for facial detection in targeted billboard advertising / Lau Sian En
by: Lau , Sian En
Published: (2025)
by: Lau , Sian En
Published: (2025)
Deep learning-based breast cancer detection and classification using histopathology images / Ghulam Murtaza
by: Ghulam , Murtaza
Published: (2021)
by: Ghulam , Murtaza
Published: (2021)
Intrusion detection system using machine learning and deep learning algorithms for NACOTS system
by: Ahmed, Faisal
Published: (2024)
by: Ahmed, Faisal
Published: (2024)
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
by: Najmun, Najmun
Published: (2024)
by: Najmun, Najmun
Published: (2024)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Ransomware Detection and Response Model for Windows-Based Internet of Things (IoT)
by: Tamara Nusairat
Published: (2026)
by: Tamara Nusairat
Published: (2026)
SmiDCA: Smishing attack detection for mobile computing on smishing dataset
by: Hasan, Dahah Ahmed Haidarah
Published: (2019)
by: Hasan, Dahah Ahmed Haidarah
Published: (2019)
Molecular similarity searching based on deep learning for feature reduction
by: Maged Mohammed Saeed Nasser
Published: (2025)
by: Maged Mohammed Saeed Nasser
Published: (2025)
Deep plant: A deep learning approach for plant classification / Lee Sue Han
by: Lee , Sue Han
Published: (2018)
by: Lee , Sue Han
Published: (2018)
A detection technique against malicious SQL attacks on web applications
by: Arif, Sarajaldeen Akram Bahjat
Published: (2026)
by: Arif, Sarajaldeen Akram Bahjat
Published: (2026)
Object classification using deep learning
by: Fong, Soon Fei
Published: (2025)
by: Fong, Soon Fei
Published: (2025)
Anomaly-Based Detection Approach To Detect The Flash Crowd Attack During The Flash Event
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017)
by: Al-Saleem, Samer Abdulsada Mutlag
Published: (2017)
An investigation on factors of the IoT-based healthcare adoption in Pakistan
by: Solangi, Zulfiqar Ali
Published: (2024)
by: Solangi, Zulfiqar Ali
Published: (2024)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
Tomato ripeness detection using deep learning
by: Yap, Yoon Heng
Published: (2025)
by: Yap, Yoon Heng
Published: (2025)
Deep learning for face detection using matlab
by: Slim, Salim Adnan
Published: (2020)
by: Slim, Salim Adnan
Published: (2020)
Image manipulations analysis and detection methods for reflection-based attacks / Nor Bakiah Abd. Warif
by: Nor Bakiah, Abd. Warif
Published: (2018)
by: Nor Bakiah, Abd. Warif
Published: (2018)
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
by: Noor Syahirah, Nordin
Published: (2022)
by: Noor Syahirah, Nordin
Published: (2022)
Stock market prediction model based on deep learning and news
by: Mu'tasem Mohammad Falah Jarrah
Published: (2025)
by: Mu'tasem Mohammad Falah Jarrah
Published: (2025)
Similar Items
-
An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
by: Ahmed Marwan, Idrees Aleesa
Published: (2021) -
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020) -
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018) -
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018) -
An elapsed-time based scheme for detecting and mitigating DDOS attacks in the SDN environment
by: Wisam H A.Muragaa
Published: (2024)
