Search Results - (( based optimization based algorithm ) OR ( security classifications using algorithm ))
Search alternatives:
- security classifications »
- classifications using »
- using algorithm »
-
1
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. The algorithm is improved with Particle Swarm Optimization that trains three different supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
2
Spam classification based on supervised learning using grasshopper optimization algorithm and artificial neural network
Published 2021Get full text
Get full text
Conference or Workshop Item -
3
An integrated model to email spam classification using an enhanced grasshopper optimization algorithm to train a multilayer perceptron neural network
Published 2021“…This study introduces an email detection model that is designed based on use of an improved version of the grasshopper optimization algorithm to train a Multilayer Perceptron in classifying emails as ham and spam. …”
Get full text
Get full text
Conference or Workshop Item -
4
Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean
Published 2007“…Simulation runs demonstrate that our algorithm leads to better results than the traditional algorithms for scheduling policies used in Grid environment.…”
Get full text
Article -
5
File integrity monitor scheduling based on file security level classification
Published 2011“…Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
Get full text
Get full text
Thesis -
7
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Those problems lend themselves to the realm of optimization. Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
8
SVM for network anomaly detection using ACO feature subset
Published 2016“…This paper proposes a detection model, ant system with support vector machine, which uses ant system, a variation of ant colony optimization, to filter out the redundant and irrelevant features for support vector machine classification algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
9
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
10
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Based on the selected features, the classification is performed. …”
Get full text
Get full text
Thesis -
11
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…During the training and optimization process, these base learners adopt a hybrid BP and Particle Swarm Optimization algorithm to combine both local and global optimization capabilities for identifying optimal features and improving the classification performance. …”
Get full text
Get full text
Get full text
Article -
12
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Based on the selected features, the classification is performed. …”
Get full text
Get full text
Thesis -
13
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The second anomaly detection method is the Evolutionary Kernel Neural Network Random Weights (EKNNRW) in order to increase the accuracy of classification. The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
14
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
Published 2020“…Considering that using a combination of ANN and EA can produce an advanced technique to develop an efficient anomaly detection approach for IDS, several types of research have used ENN algorithms to detect the attacks. …”
Get full text
Get full text
Get full text
Article -
15
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…At first, data pre-processing is performed to convert the actual data into useful format. In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
Get full text
Get full text
Get full text
Article -
16
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…In modern networking, the efficient prioritization and classification of network traffic is paramount to ensure optimal network performance and optimization. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…Criminal risk is predicted using classification models for a particular time interval and place. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Malicious URL classification using artificial fish swarm optimization and deep learning
Published 2023“…With this motivation, the current article develops an Artificial Fish Swarm Algorithm (AFSA) with Deep Learning Enabled Malicious URL Detection and Classification (AFSADL-MURLC) model. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. …”
Get full text
Get full text
Thesis
