Search Results - (( attack detection path algorithm ) OR ( evolution classification using algorithm ))
Search alternatives:
- evolution classification »
- classification using »
- using algorithm »
- detection path »
- path algorithm »
-
1
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
2
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
Get full text
Get full text
Get full text
Thesis -
3
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
4
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…The attack graph depicts the many paths an attacker may attempt to get around a security policy by leveraging interdependencies between disclosed vulnerabilities. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…Intention-driven model, a sampling traceback technique, provides information about the attack flow and able to reconstruct the attack path to the source of attack by the aid of Intrusion Detection system (IDS). …”
Get full text
Get full text
Thesis -
6
-
7
-
8
-
9
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
10
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
Get full text
Get full text
Thesis -
11
Differential evolution for neural networks learning enhancement
Published 2008“…These algorithms can be used successfully in many applications requiring the optimization of a certain multi-dimensional function. …”
Get full text
Get full text
Get full text
Thesis -
12
Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals
Published 2020“…In this regard, this thesis proposes five FS methods for efficient EMG signals classification. The first method is the Binary Tree Growth Algorithm (BTGA), which implements a hyperbolic tangent function to convert the Tree Growth Algorithm into the binary version. …”
Get full text
Get full text
Get full text
Thesis -
13
Algorithmic design issues in adaptive differential evolution schemes: Review and taxonomy
Published 2018“…DE is very sensitive to its parameter settings and mutation strategy; thus, this study aims to investigate these settings with the diverse versions of adaptive DE algorithms. This study has two main objectives: (1) to present an extension for the original taxonomy of evolutionary algorithms (EAs) parameter settings that has been overlooked by prior research and therefore minimize any confusion that might arise from the former taxonomy and (2) to investigate the various algorithmic design schemes that have been used in the different variants of adaptive DE and convey them in a new classification style. …”
Get full text
Get full text
Article -
14
Effective EEG channels for emotion identification over the brain regions using differential evolution algorithm
Published 2019“…Furthermore, the right and left occipital channels may help in identifying happiness, sadness, surprise and neutral emotional states. The DEFS_Ch algorithm raised the linear discriminant analysis (LDA) classification accuracy from 80% to 86.85%, indicating that DEFS_Ch may offer a useful way for reliable enhancement of the detection of different emotional states of the brain regions.…”
Get full text
Get full text
Conference or Workshop Item -
15
Intersection Features For Android Botnet Classification
Published 2019“…The Chi Square was used to select the most significant permissions, then the classification algorithms like Naïve Bayes and Decision Tree were used to classify the Android apps as botnet or benign apps. …”
Get full text
Get full text
Get full text
Article -
16
Feature selection optimization using hybrid relief-f with self-adaptive differential evolution
Published 2017“…Hence, feature selection is embedded to select the most meaningful features based on their rank. Differential evolution (DE) is one of the evolutionary algorithms that are widely used in various classification domains. …”
Get full text
Get full text
Get full text
Article -
17
EMG Feature Selection And Classification Using A Pbest-Guide Binary Particle Swarm Optimization
Published 2019“…In order to measure the effectiveness of PBPSO, binary particle swarm optimization (BPSO), genetic algorithm (GA), modified binary tree growth algorithm (MBTGA), and binary differential evolution (BDE) were used for performance comparison. …”
Get full text
Get full text
Get full text
Article -
18
A New Quadratic Binary Harris Hawk Optimization For Feature Selection
Published 2019“…A comparative study is conducted to compare the effectiveness of QBHHO with other feature selection algorithms such as binary differential evolution (BDE), genetic algorithm (GA), binary multi-verse optimizer (BMVO), binary flower pollination algorithm (BFPA), and binary salp swarm algorithm (BSSA). …”
Get full text
Get full text
Get full text
Article -
19
Machine Learning Based Detection for Compromised Accounts on Social Media Networks
Published 2025“…Compromised accounts can be used to spread misinformation, launch phishing attacks, and steal personal information. This paper presents a novel approach to detecting compromised accounts on social networks. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Genetic ensemble biased ARTMAP method of ECG-Based emotion classification
Published 2012“…The optimal combination of λ and training sequence can be computed efficiently using a genetic permutation algorithm. The best combinations were selected to train individual ARTMAPs as voting members, and the final class predictions were determined using probabilistic ensemble voting strategy. …”
Get full text
Get full text
Conference or Workshop Item
