Search Results - (( attack detection mining algorithm ) OR ( parameter optimization method algorithm ))
Search alternatives:
- parameter optimization »
- detection mining »
- mining algorithm »
- method algorithm »
-
1
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…Additionally, the proposed framework also can detect the attack simultaneously using text mining approaches.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…An Intrusion Detection System (IDS) is capable to detect unauthorized intrusions into computer systems and networks by looking for signatures of known attacks or deviations of normal activity. …”
Get full text
Get full text
Thesis -
3
Improving intrusion detection using genetic algorithm
Published 2013“…A great deal of attention has been recently paid to anomaly detection to accomplish intrusion detection. However, a major problem with this approach is maximizing detection rate and accuracy, as well as minimizing false alarm i.e., inability to correctly discover particular types of attacks. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. …”
Get full text
Get full text
Get full text
Article -
6
An improved hybrid learning approach for better anomaly detection
Published 2011“…Nonetheless, current anomaly detection techniques are unable to detect all types of attacks accurately and correctly. …”
Get full text
Get full text
Thesis -
7
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023“…Barium compounds; Cybersecurity; Data mining; Decision trees; Evolutionary algorithms; K-means clustering; Learning algorithms; Malware; Network security; Sodium compounds; Support vector machines; 'current; Comparatives studies; Cyber security; K-means; Machine learning algorithms; Malware attacks; Malware detection; Metaheuristic; Recent researches; Systematic literature review; Nearest neighbor search…”
Conference Paper -
8
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…The results show that the proposed intelligent exoplanet atmospheric retrieval (INARA) algorithm has improved accuracy and is able to detect new attack types efficiently.…”
Get full text
Get full text
Get full text
Article -
9
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Article -
10
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
12
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis -
13
Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system
Published 2013“…In recent years, data mining approach for intrusion detection have been advised and used. …”
Get full text
Get full text
Get full text
Article -
14
-
15
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval
Published 2022“…The results show that the proposed intelligent exoplanet atmospheric retrieval (INARA) algorithm has improved accuracy and is able to detect new attack types efficiently.…”
Get full text
Get full text
Get full text
Article -
16
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023“…This study aims to develop a cryptojacking detection system based to the random forest algorithm.…”
Get full text
Get full text
Undergraduates Project Papers -
17
An enhanced android botnet detection approach using feature refinement
Published 2019“…In order to detect botnet attacks which causes immense chaos and problems to smartphones, first the Android botnet need to be analysed. …”
Get full text
Get full text
Thesis -
18
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
Published 2020“…The results demonstrate the efficiency of deep learning algorithms when detecting attacks from the transport layer. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
Published 2013“…It combines the following algorithms: the first algorithm is New Alert Reduction (NAR) algorithm to remove the redundancy from the alert’s file and reduce the false positives.…”
Get full text
Get full text
Thesis -
20
Optimization of turning parameters using genetic algorithm method
Published 2008“…This study about development of optimization for turning parameters based on the Genetic Algorithm (GA). …”
Get full text
Get full text
Undergraduates Project Papers
