Search Results - (( evolution optimization method algorithm ) OR ( attack detection techniques algorithm ))

Refine Results
  1. 1

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…Finally, this research proposed hybrid embedding methods by integrating the above RMDR and PBPVD techniques to achieve the optimal steganography objectives. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique by Al Ogaili, Riyadh Rahef Nuiaa

    Published 2023
    “…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…This paper compares different supervised algorithms for the anomaly-based detection technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques by Farhan, Farhan Abdel-Fattah Ahmad

    Published 2011
    “…Traditional intrusion detection techniques have had trouble dealing with dynamic environments. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Remote to Local Attack Detection Using Supervised Neural Network by Iftikhar, Ahmad, Azween, Abdullah, Abdullah , S. Alghamdi

    Published 2010
    “…This technique uses sampled dataset from Kddcup99 that is standard for benchmarking of attack detection tools. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19
  20. 20

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
    Get full text
    Get full text
    Thesis