Search Results - (( attack detection method algorithm ) OR ( data classification using algorithm ))
Search alternatives:
- classification using »
- data classification »
- method algorithm »
- using algorithm »
-
1
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
2
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. …”
Get full text
Get full text
Get full text
Citation Index Journal -
3
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The experiment was executed by using k-fold cross validation techniques for predicting the classification algorithm performance. …”
Get full text
Get full text
Thesis -
4
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
Get full text
Get full text
Get full text
Article -
5
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
6
Hybrid intelligent approach for network intrusion detection
Published 2015“…Clustering is the last step of processing before classification has been performed, using k-means algorithm. …”
Get full text
Get full text
Get full text
Thesis -
7
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
8
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval
Published 2022“…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
Get full text
Get full text
Get full text
Article -
9
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…Both methods used DARPA 98- 99 dataset and Lincoln Labs data. …”
Get full text
Get full text
Get full text
Thesis -
10
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…This paper seeks to conduct a thorough systematic literature review (SLR) and offer a taxonomy of machine learning methods for malware detection that considers these problems by analyzing 77 chosen research works related to malware detection using machine learning algorithm. …”
Article -
11
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…In the past decades, machine learning methods have been successfully used in several intrusion detection methods because of their ability to discover and detect novel attacks. …”
Get full text
Get full text
Get full text
Thesis -
12
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol
Published 2018“…However, these IDS methods only detect specific attack but fails when the attacks are combined. …”
Get full text
Get full text
Article -
13
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Article -
15
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Global and local clustering soft assignment for intrusion detection system: a comparative study
Published 2017“…Clustering is unsupervised learning method that can be used for organizing data by grouping similar features into same group. …”
Get full text
Get full text
Get full text
Article -
18
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…There are two methods in dealing with imbalanced classification problem, which are based on data or algorithmic level. …”
Get full text
Get full text
Get full text
Thesis -
19
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…The effectiveness of the IADS has been evaluated under different detection capabilities (i.e., false positive, false negative, true positive, true negative, false alarm, accuracy,detection rate, attack data detection rate, normal data detection rate) and detection times using the DARPA 1999 and ISCX 2012 intrusion detection benchmark datasets as well as with Live-data. …”
Get full text
Get full text
Thesis -
20
Spear- phishing attack detection using artificial intelligence
Published 2024“…The goal is to mitigate phishing and spam threats by using advanced algorithms to detect malicious URLs and classify messages effectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
