Search Results - (( evolution optimization method algorithm ) OR ( attack detection techniques algorithm ))
Search alternatives:
- evolution optimization »
- detection techniques »
- method algorithm »
-
1
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
2
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…Finally, this research proposed hybrid embedding methods by integrating the above RMDR and PBPVD techniques to achieve the optimal steganography objectives. …”
Get full text
Get full text
Get full text
Thesis -
3
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
4
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
5
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…The detection of unknown attacks is one of the main challenges in intrusion detection system (IDS). …”
Get full text
Get full text
Article -
6
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
7
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
8
Machine learning algorithms in context of intrusion detection
Published 2016“…This paper compares different supervised algorithms for the anomaly-based detection technique. …”
Get full text
Get full text
Conference or Workshop Item -
9
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…Traditional intrusion detection techniques have had trouble dealing with dynamic environments. …”
Get full text
Get full text
Get full text
Thesis -
10
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
11
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
12
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
13
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
14
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
Get full text
Get full text
Get full text
Article -
15
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
16
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. …”
Get full text
Get full text
Get full text
Article -
17
Remote to Local Attack Detection Using Supervised Neural Network
Published 2010“…This technique uses sampled dataset from Kddcup99 that is standard for benchmarking of attack detection tools. …”
Get full text
Get full text
Conference or Workshop Item -
18
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
Get full text
Get full text
Thesis
