Search Results - (( based optimization method algorithm ) OR ( security classification technique algorithm ))
Search alternatives:
- classification technique »
- security classification »
- method algorithm »
-
1
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. The algorithm is improved with Particle Swarm Optimization that trains three different supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
2
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
Get full text
Get full text
Thesis -
3
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Those problems lend themselves to the realm of optimization. Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
4
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
5
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Based on the selected features, the classification is performed. …”
Get full text
Get full text
Thesis -
6
File integrity monitor scheduling based on file security level classification
Published 2011“…Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Based on the selected features, the classification is performed. …”
Get full text
Get full text
Thesis -
8
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…During the training and optimization process, these base learners adopt a hybrid BP and Particle Swarm Optimization algorithm to combine both local and global optimization capabilities for identifying optimal features and improving the classification performance. …”
Get full text
Get full text
Get full text
Article -
9
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
Published 2020“…This model is applied to the NSLKDD dataset, an improvement of the KDD Cup'99. The proposed method achieved 99.24% accuracy which shows that the novel algorithm suggested is more superior to existing ones as it provides the optimal overall efficiency.…”
Get full text
Get full text
Get full text
Article -
10
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…In addition, the hyperparameter tuning problem is considered in this research to improve the developed hybrid model by using the AOA algorithm. Lastly, a new hybrid technique suggests tackling the current image encryption application problem by using the estimated parameters of chaotic systems with an optimization algorithm, the SKF algorithm. …”
Get full text
Get full text
Thesis -
11
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…A maximum accuracy of 81% is obtained for Decision Tree algorithm during the prediction of crime. The findings demonstrate that employing Machine Learning techniques aids in the prediction of criminal events, which has aided in the enhancement of public security.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali
Published 2016“…Further aim of this research is the integration of cancelable biometrics feature in the proposed iris recognition technique via non-invertible transformation which determines the feature transformation-based template protection techniques security. …”
Get full text
Get full text
Thesis -
13
K-NN classifier for data confidentiality in cloud computing
Published 2014“…In cloud, many techniques are used to secure the data. Data encryption is a data security technique which is widely used for data security. …”
Get full text
Get full text
Conference or Workshop Item -
14
Power system security assessment using artificial neural network: article / Mohd Fathi Zakaria
Published 2010“…A multi layer feed forward ANN with Back Propagation Network algorithm is proposed in determining the steady state stability classifications. …”
Get full text
Get full text
Article -
15
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
16
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…The best phishing classification features and machine learning technique are identified in order to produce and generate a classification model. …”
Get full text
Get full text
Thesis -
17
Hybrid ensemble learning techniques for intrusion detection systems in Internet of Things security
Published 2025“…The first technique employed the XGBoost and LightGBM algorithms to solve a binary classification problem across seven different datasets. …”
Get full text
Get full text
UMK Etheses -
18
-
19
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
20
PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm
Published 2024“…This paper introduces a Solar PV Smart Fault Diagnosis and Classification (SFDC) model that harnesses the Random Forest (RF) algorithm in conjunction with Cross-Validation (CV) and an optimized feature extraction (FE) set. …”
Get full text
Get full text
Get full text
Article
