Search Results - (( based optimization based algorithm ) OR ( security classification based algorithm ))

Search alternatives:

Refine Results
  1. 1

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. The algorithm is improved with Particle Swarm Optimization that trains three different supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    File integrity monitor scheduling based on file security level classification by Abdullah, Zul Hilmi, Udzir, Nur Izura, Mahmod, Ramlan, Samsudin, Khairulmizam

    Published 2011
    “…Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection by Ghanem, Waheed Ali Hussein Mohammed

    Published 2019
    “…Those problems lend themselves to the realm of optimization. Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An integrated model to email spam classification using an enhanced grasshopper optimization algorithm to train a multilayer perceptron neural network by Mohamad, M., Abdullah, E.F.H.S., Ghaleb, S.A.A., Ghanem, W.A.H.M.

    Published 2021
    “…This study introduces an email detection model that is designed based on use of an improved version of the grasshopper optimization algorithm to train a Multilayer Perceptron in classifying emails as ham and spam. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean by Lorpunmanee, Siriluck, Abdullah, Abdul Razak

    Published 2007
    “…This paper presents the need for such a prediction and optimization engine that discusses the approach for history-based prediction and optimization. …”
    Get full text
    Article
  8. 8

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…But irrelevant and redundant features are the obstacle for classification algorithm to build an efficient detection model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection by Shing, Chiang Tan, Mohammed Al-Andoli, Mohammed Nasser, Kok, Swee Lim, Pey, Yun Goh, Chee, Peng Lim

    Published 2023
    “…The stacked ensemble method uses several heterogeneous deep neural networks as the base learners. During the training and optimization process, these base learners adopt a hybrid BP and Particle Swarm Optimization algorithm to combine both local and global optimization capabilities for identifying optimal features and improving the classification performance. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…The second anomaly detection method is the Evolutionary Kernel Neural Network Random Weights (EKNNRW) in order to increase the accuracy of classification. The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by AHMAD, IFTIKHAR

    Published 2011
    “…Based on the selected features, the classification is performed. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    Article
  13. 13
  14. 14

    Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques by Iftikhar , Ahmad, Azween, Abdullah

    Published 2011
    “…Based on the selected features, the classification is performed. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management by Khan, Fazeel Ahmed, Abubakar, Adamu

    Published 2024
    “…In modern networking, the efficient prioritization and classification of network traffic is paramount to ensure optimal network performance and optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…Considering that using a combination of ANN and EA can produce an advanced technique to develop an efficient anomaly detection approach for IDS, several types of research have used ENN algorithms to detect the attacks. To enhance the efficiency of anomaly-based detection in terms of accuracy of classification, in this paper, the evolutionary kernel neural network random weight is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios by MUHAMMAD, SHOAIB, ASAD, ULLAH, Irshad, Ahmed Abbasi, Fahad, Algarni, Adnan Shahid, Khan

    Published 2022
    “…EvoKeyNet utilizes an evolutionary algorithm to select optimal feature attributes, while KFCRNet employs an ensemble of LSTM, Bi-LSTM, and GRU models with a voting scheme. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment by Ahmed Hamza, Manar, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, S. Alotaibi, Saud, Mahgoub, Hany, S. Mehanna, Amal, Motwakel, Abdelwahed

    Published 2022
    “…In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Edge assisted crime prediction and evaluation framework for machine learning algorithms by Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong

    Published 2022
    “…A maximum accuracy of 81% is obtained for Decision Tree algorithm during the prediction of crime. The findings demonstrate that employing Machine Learning techniques aids in the prediction of criminal events, which has aided in the enhancement of public security.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Smart phone sensor data: Comparative analysis of various classification methods for task of human activity recognition by Tanveer Abbas Gadehi, Faheem Yar Khuhawar, Ahmed Memon, Kashif Nisar

    Published 2018
    “…Our work has chosen sensor data of six activities such as standing, walking, laying from pre-recorded dataset gathered via smartphone to evaluate the performance of various supervised machine learning algorithms. The results suggest that logistic regression has been an optimal choice based on experiments. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings