Search Results - (( attack detection force algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- detection force »
- force algorithm »
- java adaptation »
-
1
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
4
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
CAGDEEP : Mobile malware analysis using force atlas 2 with strong gravity call graph and deep learning
Published 2023“…Afterwards, this study adopts Convolutional Neural Network (CNN) for malware detection and classification algorithm. We compare CAGDeep with a state-of-the-art Android malware detection approach. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Secure IIoT-enabled industry 4.0
Published 2021“…IIoT-enabled botnets are highly scalable, technologically diverse, and highly resilient to classical and conventional detection mechanisms. Subsequently, we propose a deep learning (DL)-enabled novel hybrid architecture that can efficiently and timely tackle distributed, multivariant, lethal botnet attacks in industrial IoT. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
7
Multistage quality control in manufacturing process using blockchain with machine learning technique
Published 2023“…BCT allows collecting sensor user access data, whereas ML classifiers distinguish between normal and malicious behavior to detect attacks. DoS, DDoS, intrusion, a man in the middle (MitM), brute force, cross-site scripting (XSS), and searching are the attacks detected by BCT. …”
Get full text
Get full text
Article -
8
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…The result indicated that the Mean Downtime Time for the proposed solution was only 3.88 minutes compared to the existing solution, which was 38.56 minutes. During a security attack, the MTTD for the existing solution was very high because the existing scheme could not detect the attack. …”
Get full text
Get full text
Thesis
