Search Results - (( attack detection method algorithm ) OR ( evolution optimization based algorithm ))

Refine Results
  1. 1

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…In addition, the proposed methods have proven the robustness against powerful modern SPAM feature based steganalysis detection attacks at low embedding rate.…”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Reliably optimal PMU placement using disparity evolution-based genetic algorithm by Matsukawa, Yoshiaki, Othman, Mohammad Lutfi, Watanabe, Masayuki, Mitani, Yasunori

    Published 2017
    “…In this paper, Disparity Evolution-type Genetic Algorithm (DEGA) based on disparity theory of evolution is applied. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A refined differential evolution algorithm for improving the performance of optimization process by A. R., Yusoff, Nafrizuan, Mat Yahya

    Published 2011
    “…DE is developed based on an improved Genetic Algorithm and come with different strategies for faster optimization. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising by Al-Dabbagh, Mohanad Dawood, Al-Dabbagh, Rawaa Dawoud, Raja Abdullah, Raja Syamsul Azmir, Hashim, Fazirulhisyam

    Published 2015
    “…The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. …”
    Get full text
    Get full text
    Article
  13. 13

    An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique by Al Ogaili, Riyadh Rahef Nuiaa

    Published 2023
    “…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
    Get full text
    Get full text
    Thesis
  14. 14

    Application of swarm intelligence optimization on bio-process problems / Mohamad Zihin Mohd Zain by Mohamad Zihin , Mohd Zain

    Published 2018
    “…BSA gave the best overall performance by showing improved solutions and more robust convergence in comparison with various metaheuristics used in this work. Multi-objective optimization problems are also addressed by proposing a modified multi-criterion optimization algorithm based on a Pareto-based Particle Swarm Optimization (PSO) algorithm called Multi-Objective Particle Swarm Optimization (MOPSO). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…While the effectiveness of some machine learning algorithms in detecting certain types of network intrusion has been ascertained, the situation remains that no single method currently exists that can achieve consistent results when employed for the detection of multiple attack types. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Broadening selection competitive constraint handling algorithm for faster convergence by Shaikh, T.A., Hussain, S.S., Tanweer, M.R., Hashmani, M.A.

    Published 2020
    “…In this study, the BSCCH algorithm has been coupled with Differential Evolution algorithm as a proof of concept because it is found to be an efficient algorithm in the literature for constrained optimization problems. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Tole, Sutikno, Shahreen, Kasim, Rohayanti, Hassan, Zalmiyah, Zakaria, Mohd Saberi, Mohamad

    Published 2021
    “…The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. …”
    Get full text
    Get full text
    Article
  20. 20

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
    Get full text
    Get full text
    Conference or Workshop Item