Search Results - (( based detection packet algorithm ) OR ( evolution optimization using algorithm ))

Refine Results
  1. 1

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier by Syurahbil, A

    Published 2011
    “…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Anomaly behavior detection using flexible packet filtering and support vector machine algorithms by Abdul Wahid, Mohammed N.

    Published 2016
    “…FPF of SVM have merged the analyzed results of flexible packet filtering with support vector machine algorithm to get better classification of the captured network traffics and to detect anomalies. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets by Alaidaros, Hashem Mohammed

    Published 2017
    “…This study proposed a Conditional Hybrid Intrusion Detection (CHID) by combining the flow-based with packet-based detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
    Get full text
    Get full text
    Thesis
  7. 7

    A refined differential evolution algorithm for improving the performance of optimization process by A. R., Yusoff, Nafrizuan, Mat Yahya

    Published 2011
    “…Various Artificial Intelligent (AI) algorithms can be applied in solving optimization problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Comparison between Lamarckian Evolution and Baldwin Evolution of neural network by Taha, Imad, Inazy, Qabas

    Published 2006
    “…We presented hybrid genetic algorithm for optimizing weights as well as the topology of artificial neural networks, by introducing the concepts of Lamarckian and Baldwin evolution effects. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Smart and energy aware routing for the internet of mobile things by Beh, Zi Xuan

    Published 2021
    “…This can also be concluded that the SEA routing algorithm is smart and energy aware based on the results obtained.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Two level Differential Evolution algorithms for ARMA parameters estimatio by Salami, Momoh Jimoh Emiyoka, Tijani, Ismaila, Aibinu, Abiodun Musa

    Published 2013
    “…The first level searches for the appropriate model order while the second level computes the optimal/sub-optimal corresponding parameters. The performance of the algorithm is evaluated using both simulated ARMA models and practical rotary motion system. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Void avoidance opportunistic routing density rank based for underwater sensor networks by Ismail, Nasarudin

    Published 2021
    “…Secondly, the algorithm Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with redundant packet forwarding by introducing a new method to reduce the redundant packet forwarding while in dense or sparse conditions to improve the energy consumption effectively. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Hybrid algorithm for NARX network parameters' determination using differential evolution and genetic algorithm by Salami, Momoh Jimoh Eyiomika, Tijani, Ismaila, Isqeel , Abdullateef Ayodele, Aibinu, Abiodun Musa

    Published 2013
    “…A hybrid optimization algorithm using Differential Evolution (DE) and Genetic Algorithm (GA) is proposed in this study to address the problem of network parameters determination associated with the Nonlinear Autoregressive with eXogenous inputs Network (NARX-network). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Crossover-first differential evolution for improved global optimization in non-uniform search landscapes by Teo, Jason Tze Wi, Mohd Hanafi Ahmad Hijazi, Hui, Keng Lau, Salmah Fattah, Aslina Baharum

    Published 2015
    “…The differential evolution (DE) algorithm is currently one of the most widely used evolutionary-based optimizers for global optimization due to its simplicity, robustness and efficiency. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Differential evolution optimization algorithm based on generation systems reliability assessment integrated with wind energy by Kadhem, Athraa Ali, Abdul Wahab, Noor Izzri, Abdalla, Ahmed N.

    Published 2019
    “…This stuffy proposed a novel optimization method labeled the "Differential Evolution Optimization Algorithm" (DEOA) to assess the reliability of power generation systems (PGS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Non-invasive pathological voice classifications using linear and non-linear classifiers by Hariharan, Muthusamy

    Published 2010
    “…In the case of detection of specific disorders, wavelet packet and entropy features perform well compared to time-domain energy variations based features and MFCCs and SVD based features. …”
    Get full text
    Thesis
  18. 18

    Embedded Ethernet System For Real-Time Communication by Thiagarajan, Durgesh

    Published 2018
    “…The Ethernet network model is used to analyze the performance of the backoff algorithm in a different number of nodes. The end delay of each packet, the number of packet collision and number of packet delivered are determined based on the analysis. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Performance comparison of differential evolution and particle swarm optimization in constrained optimization by Iwan, Mahmud, Akmeliawati, Rini, Faisal, Tarig, Al-Assadi, Hayder M.A.A.

    Published 2012
    “…Particle swarm optimization (PSO) and differential evolution (DE) are among the well-known modern optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20