Search Results - (( java application using algorithm ) OR ( based intrusion efficient algorithm ))
Search alternatives:
- java application »
- using algorithm »
- based intrusion »
- efficient »
-
1
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
Get full text
Get full text
Get full text
Article -
2
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
3
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This issue highlights the need to tackle the network intrusion problem efficiently. This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
4
Machine learning algorithms in context of intrusion detection
Published 2016“…Intrusion detection method is a core of intrusion detection system and it can be either signature based or anomaly based. …”
Get full text
Get full text
Conference or Workshop Item -
5
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
6
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin
Published 2021“…This problem highlights the need to address network intrusion problems efficiently. By formulating a specific algorithm for this problem, the purpose of this study is to examine the performance of improvised Genetic Algorithms for network intrusion problems. …”
Get full text
Get full text
Get full text
Article -
8
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
Published 2020“…This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
Published 2020“…To enhance the efficiency of anomaly-based detection in terms of accuracy of classification, in this paper, the evolutionary kernel neural network random weight is proposed. …”
Get full text
Get full text
Get full text
Article -
10
Energy-efficient intrusion detection in wireless sensor network
Published 2012“…Attacks can occur from any direction and any node in WSNs, so one crucial security challenge is to detect networks' intrusion. There are several algorithms for building Intrusion Detection Systems (IDS) based on different WSN routing protocol classifications with respect to energy-efficient manner. …”
Get full text
Get full text
Conference or Workshop Item -
11
Development of intrusion detection system using residual feedforward neural network algorithm
Published 2022“…This paper introduces a novel, efficient, and accurate approach for real-time intrusion detection and classification based on the Residual Feedforward Neural Network (RFNN) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…Feature selection is undertaken to select the relevant subsets of features to build an efficient prediction model and improve intrusion detection performance by removing irrelevant features. …”
Get full text
Get full text
Get full text
Thesis -
13
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
14
A Review on feature selection and ensemble techniques for intrusion detection system
Published 2021“…We then analyze and discuss a variety of IDS-based machine learning techniques with various detection models (single classifier-based or ensemble-based), to illustrate their significance and success in the intrusion detection area. …”
Get full text
Get full text
Article -
15
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
Get full text
Get full text
Get full text
Article -
16
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
Get full text
Get full text
Thesis -
17
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
18
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…These methods could be hardware-based, such as Intrusion Detection Systems (IDS), software-based, or managerial-based. …”
Get full text
Get full text
Get full text
Article -
19
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…In this paper, we propose an efficient IDS based on hybrid heuristic optimization algorithm which is inspired by magnetic field theory in physics that deals with attraction between particles scattered in the search space. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud
Published 2021“…Methodology: To increase workflow reliability, we propose the Fault and Intrusion-tolerant Workflow Scheduling algorithm (FITSW). …”
Get full text
Get full text
Article
