Search Results - (( evolution optimization based algorithm ) OR ( attack detection sensor algorithm ))
Search alternatives:
- evolution optimization »
- detection sensor »
- sensor algorithm »
-
1
-
2
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
Published 2017“…Then, a trust algorithm is applied based on the energy of each sensor node. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Presentation attack detection for face recognition on smartphones: a comprehensive review
Published 2017“…Face Presentation Attack Detection through the sensor level technique involved in using additional hardware or sensor to protect recognition system from spoofing while feature level techniques are purely software-based algorithms and analysis. …”
Get full text
Get full text
Article -
5
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…This thesis evaluates the proposed solution using flooding attacks in wireless sensor networks (i.e. a type of DDoS attack). …”
Get full text
Get full text
Thesis -
6
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
7
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph -
8
Reliably optimal PMU placement using disparity evolution-based genetic algorithm
Published 2017“…In this paper, Disparity Evolution-type Genetic Algorithm (DEGA) based on disparity theory of evolution is applied. …”
Get full text
Get full text
Get full text
Article -
9
A refined differential evolution algorithm for improving the performance of optimization process
Published 2011“…DE is developed based on an improved Genetic Algorithm and come with different strategies for faster optimization. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
Published 2015“…The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. …”
Get full text
Get full text
Article -
11
Application of swarm intelligence optimization on bio-process problems / Mohamad Zihin Mohd Zain
Published 2018“…BSA gave the best overall performance by showing improved solutions and more robust convergence in comparison with various metaheuristics used in this work. Multi-objective optimization problems are also addressed by proposing a modified multi-criterion optimization algorithm based on a Pareto-based Particle Swarm Optimization (PSO) algorithm called Multi-Objective Particle Swarm Optimization (MOPSO). …”
Get full text
Get full text
Thesis -
12
Broadening selection competitive constraint handling algorithm for faster convergence
Published 2020“…In this study, the BSCCH algorithm has been coupled with Differential Evolution algorithm as a proof of concept because it is found to be an efficient algorithm in the literature for constrained optimization problems. …”
Get full text
Get full text
Article -
13
Differential evolution optimization algorithm based on generation systems reliability assessment integrated with wind energy
Published 2019Get full text
Get full text
Conference or Workshop Item -
14
Energy-efficient intrusion detection in wireless sensor network
Published 2012“…Attacks can occur from any direction and any node in WSNs, so one crucial security challenge is to detect networks' intrusion. …”
Get full text
Get full text
Conference or Workshop Item -
15
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
16
Crossover-first differential evolution for improved global optimization in non-uniform search landscapes
Published 2015“…The differential evolution (DE) algorithm is currently one of the most widely used evolutionary-based optimizers for global optimization due to its simplicity, robustness and efficiency. …”
Get full text
Get full text
Get full text
Article -
17
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
Published 2019“…Mitigation techniques such as honeypot simulation which helps in vulnerability assessment, along with machine learning algorithms, suitable for intrusion detection and prevention of cyber-attacks in SCADA systems has been detailed.…”
Get full text
Get full text
Get full text
Article -
18
-
19
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…The secure node authentication algorithm prevents attacks from accessing the network. …”
Get full text
Get full text
Article -
20
