Search Results - (( attack selection based algorithm ) OR ( variable optimization based algorithm ))
Search alternatives:
- variable optimization »
- attack selection »
- selection based »
-
1
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
2
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…The aim of this work is to develop an improved optimization method for IDS that can be efficient and effective in subset feature selection and parameters optimization. To achieve this goal, an improved Teaching Learning-Based Optimization (ITLBO) algorithm was proposed in dealing with subset feature selection. …”
Get full text
Get full text
Thesis -
3
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…It calculates the appropriate adjustments for the control parameters such as selection and crossover rate. Possible attack paths are then identified and evaluated based on an attack graph representing the network under study. …”
Get full text
Get full text
Article -
4
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…It calculates the appropriate adjustments for the control parameters such as selection and crossover rate. Possible attack paths are then identified and evaluated based on an attack graph representing the network under study. …”
Get full text
Get full text
Article -
5
Randomized pixel selection for enhancing LSB algorithm security against brute-force attack
Published 2017“…In this study, we propose a random selection of pixels that hold a secret message based on an integer solution of the elliptic curve equation. …”
Get full text
Get full text
Article -
6
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…ETERS also incorporates an irregular attenuation factor during the evaluation of communication trust to reflect the effect of various external factors such as natural calamity (earthquake), network congestion, etc., based on the trust values. However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
7
A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models
Published 2017“…The results show that the neural network optimized with genetic algorithm and trained with an optimally and intelligently selected input vector containing historical load and meteorological variables produced the best prediction accuracy. …”
Get full text
Get full text
Article -
8
Study of nature inspired computing (NIC) technique for optimal reactive power dispatch problems
Published 2017“…In this research, new nature-inspired meta-heuristic optimization algorithms namely moth-flame optimizer (MFO) and Ant Lion Optimizer (ALO) were implemented to address the optimal reactive power dispatch (ORPD) problems. …”
Get full text
Get full text
Research Report -
9
Variable Global Optimization min-sum (VGOMS) algorithm of decode-and forward-protocol for the relay node in the cooperative channel
Published 2020“…A low complexity min-sum (MS) based algorithm called the Variable Global Optimization min-sum (VGOMS) algorithm has been developed to minimise the error corrective performance. …”
Get full text
Get full text
Get full text
Article -
10
Message based random variable length key encryption algorithm.
Published 2009“…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. …”
Get full text
Get full text
Article -
11
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…Analyses on linear, differential and short attack will be performed against the DDBC algorithm to estimate the possible success of all three attacks. …”
Get full text
Get full text
Thesis -
12
-
13
Variable Global Optimization min-sum (VGOMS) algorithm of decodeand-forward protocol for the relay node in the cooperative channel
Published 2019“…A low complexity min-sum (MS) based algorithm called the Variable Global Optimization min-sum (VGOMS) algorithm has been developed to minimise the error corrective performance. …”
Get full text
Get full text
Get full text
Article -
14
Adaptive feature selection for denial of services (DoS) attack
Published 2017“…In this paper, we propose combining two techniques in feature selection algorithm, namely consistency subset evaluation (CSE) and DDoS characteristic features (DCF) to identify and select the most important and relevant features related DDoS attacks. …”
Get full text
Get full text
Conference or Workshop Item -
15
Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data
Published 2023“…For this purpose, we implemented four types of variable length meta-heuristic searching algorithms, namely VLBHO-Fitness, VLBHO-Position, variable length particle swarm optimization (VLPSO) and genetic variable length (GAVL), and we compared them in terms of classification metrics. …”
Get full text
Get full text
Get full text
Article -
16
Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data
Published 2023“…For this purpose, we implemented four types of variable length meta-heuristic searching algorithms, namely VLBHO-Fitness, VLBHO-Position, variable length particle swarm optimization (VLPSO) and genetic variable length (GAVL), and we compared them in terms of classification metrics. …”
Get full text
Get full text
Get full text
Article -
17
Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data
Published 2023“…For this purpose, we implemented four types of variable length meta-heuristic searching algorithms, namely VLBHO-Fitness, VLBHO-Position, variable length particle swarm optimization (VLPSO) and genetic variable length (GAVL), and we compared them in terms of classification metrics. …”
Get full text
Get full text
Get full text
Article -
18
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
Get full text
Get full text
Article -
19
Optimization of hydropower reservoir operation based on hedging policy using Jaya algorithm
Published 2023Article -
20
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
Published 2015“…As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. …”
Get full text
Get full text
Article
