Showing 1 - 20 results of 53 for search 'server detection algorithm', query time: 0.13s Refine Results
  1. 1
  2. 2

    Comparison with existing work. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  3. 3

    Registration phase. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  4. 4

    Performance comparison of different ML models. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  5. 5

    Classification Report for the proposed model. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  6. 6

    ROC curve of the proposed model. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  7. 7

    Fog-IoT architecture. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  8. 8

    Computational cost of the proposed approach. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  9. 9

    Confusion Matrix of different ML models. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  10. 10

    Performance metrics of applied ML models. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  11. 11

    Archive containing manufacturing files. by Julian Bigge (22331861)

    Published 2025
    “…<div><p>In this paper we propose the Hatching-Box, a novel in situ imaging and analysis system to automatically monitor and quantify the developmental behavior of <i>Drosophila melanogaster</i> in standard rearing vials and during regular rearing routines, reducing the need for explicit experiments.This is achieved by combining custom tailored imaging hardware with dedicated detection and tracking algorithms, enabling the quantification of larvae, filled/empty pupae and flies over multiple days. …”
  12. 12

    Landscape Change Monitoring System (LCMS) Puerto Rico USVI Annual QA Bits by U.S. Forest Service (17476914)

    Published 2025
    “…</p><p>Predictor layers for the LCMS model include outputs from the LandTrendr and CCDC change detection algorithms and terrain information. These components are all accessed and processed using Google Earth Engine (Gorelick et al., 2017). …”
  13. 13

    Landscape Change Monitoring System (LCMS) Hawaii Annual Landcover by U.S. Forest Service (17476914)

    Published 2025
    “…</p><p>Predictor layers for the LCMS model include outputs from the LandTrendr and CCDC change detection algorithms and terrain information. These components are all accessed and processed using Google Earth Engine (Gorelick et al., 2017). …”
  14. 14

    Landscape Change Monitoring System (LCMS) Alaska Most Recent Year of Gain (Image Service) by U.S. Forest Service (17476914)

    Published 2025
    “…</p><p>Predictor layers for the LCMS model include outputs from the LandTrendr and CCDC change detection algorithms and terrain information. These components are all accessed and processed using Google Earth Engine (Gorelick et al., 2017). …”
  15. 15

    Landscape Change Monitoring System (LCMS) Hawaii Annual Landuse by U.S. Forest Service (17476914)

    Published 2025
    “…</p><p>Predictor layers for the LCMS model include outputs from the LandTrendr and CCDC change detection algorithms and terrain information. These components are all accessed and processed using Google Earth Engine (Gorelick et al., 2017). …”
  16. 16

    Landscape Change Monitoring System (LCMS) Alaska Annual QA Bits by U.S. Forest Service (17476914)

    Published 2025
    “…</p><p>Predictor layers for the LCMS model include outputs from the LandTrendr and CCDC change detection algorithms and terrain information. These components are all accessed and processed using Google Earth Engine (Gorelick et al., 2017). …”
  17. 17

    Landscape Change Monitoring System (LCMS) Hawaii Most Recent Year of Gain (Image Service) by U.S. Forest Service (17476914)

    Published 2025
    “…</p><p>Predictor layers for the LCMS model include outputs from the LandTrendr and CCDC change detection algorithms and terrain information. These components are all accessed and processed using Google Earth Engine (Gorelick et al., 2017). …”
  18. 18

    Landscape Change Monitoring System (LCMS) Conterminous United States Year of Highest Probability of Gain (Image Service) by U.S. Forest Service (17476914)

    Published 2025
    “…</p><p>Predictor layers for the LCMS model include outputs from the LandTrendr and CCDC change detection algorithms and terrain information. These components are all accessed and processed using Google Earth Engine (Gorelick et al., 2017). …”
  19. 19

    Landscape Change Monitoring System (LCMS) Puerto Rico USVI Annual Landcover by U.S. Forest Service (17476914)

    Published 2025
    “…</p><p>Predictor layers for the LCMS model include outputs from the LandTrendr and CCDC change detection algorithms and terrain information. These components are all accessed and processed using Google Earth Engine (Gorelick et al., 2017). …”
  20. 20

    Landscape Change Monitoring System (LCMS) Hawaii Annual Change by U.S. Forest Service (17476914)

    Published 2025
    “…</p><p>Predictor layers for the LCMS model include outputs from the LandTrendr and CCDC change detection algorithms and terrain information. These components are all accessed and processed using Google Earth Engine (Gorelick et al., 2017). …”