Search Results - (( attack detection method algorithm ) OR ( sequence optimization based algorithm ))
Search alternatives:
- method algorithm »
-
1
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
Get full text
Get full text
Article -
2
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Published 2021“…This means that Multilayer Perceptron algorithm can detect APT attack more accurately. …”
Get full text
Get full text
Get full text
Other -
3
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
5
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
6
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
7
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Published 2021“…This means that Multilayer Perceptron algorithm can detect APT attack more accurately. …”
Get full text
Get full text
Get full text
Other -
8
An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP
Published 2021“…To improve the performance of the swap sequence based PSO, this paper introduces an Enhanced Swap Sequence based PSO (Enhanced SSPSO) algorithm by integrating the strategies of the Expanded PSO (XPSO) in the swap sequence based PSO. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
10
Comparative Analysis of Low Discrepancy Sequence-Based Initialization Approaches Using Population-Based Algorithms for Solving the Global Optimization Problems
Published 2021“…These algorithms can influence the convergence to find an efficient optimal solution. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…While the effectiveness of some machine learning algorithms in detecting certain types of network intrusion has been ascertained, the situation remains that no single method currently exists that can achieve consistent results when employed for the detection of multiple attack types. …”
Get full text
Get full text
Thesis -
12
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
13
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Published 2021“…The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. …”
Get full text
Get full text
Article -
14
-
15
Machine learning algorithms in context of intrusion detection
Published 2016“…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
Get full text
Get full text
Conference or Workshop Item -
16
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
17
Product assembly and disassembly sequence optimization based on genetic algorithm and design for assembly methodologies
Published 2009“…In this paper, an Artificial Intelligence (AI) technique, namely Genetic Algorithm (GA) is proposed to optimize product components assembly and disassembly sequences.The proposed methodology is developed and tested on an industrial product made of plastics with no integrated assembly and permanent joint parts.GA method is applied to determine the accuracy and optimum results based on 20 assembly and disassembly sequence solutions that was generated by the Design for Assembly methodology.The results indicated that GA based approach is able to obtain a near optimal solution for assembly and disassembly sequences.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
19
Attacks detection in 6G wireless networks using machine learning
Published 2023“…Unlike the fifth generation (5G), which is well recognized for network cloudification with micro-service-oriented design, the sixth generation (6G) of networks is directly tied to intelligent network orchestration and management. The Attacks Detection in 6G (AD6Gs) wireless networks created by this research uses a Machine Learning (ML) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…The algorithm filtered the expected irrelevant DNA sequences in database from being computed for dynamic programming based optimal alignment process. …”
Get full text
Get full text
Get full text
Article
