Search Results - (( java simulation optimization algorithm ) OR ( security classification problem algorithm ))
Search alternatives:
- security classification »
- classification problem »
- problem algorithm »
- java simulation »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
3
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
4
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
Get full text
Get full text
Thesis -
5
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
6
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph -
7
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…The research investigates malware and machine learning in the context of cybersecurity, including malware detection taxonomy and machine learning algorithm classification into numerous categories. …”
Article -
8
Maldroid- attribute selection analysis for malware classification
Published 2019“…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
Get full text
Get full text
Get full text
Article -
9
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…Regardless of the methods implemented by this system, eliminating false alerts is still a huge problem. To describe data traffic passing through the network, a database of the network security layer (NSL) knowledge discovery in database (KDD) dataset is used. …”
Get full text
Get full text
Get full text
Article -
10
A novel framework for identifying twitter spam data using machine learning algorithms
Published 2020“…Previous studies have approached spam detection as a classification problem, high dimension, time-consuming problem, which requires new methods to address the problems. …”
Get full text
Get full text
Get full text
Article -
11
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
12
Diagnosis security problems in cloud computing for business cloud
Published 2023“…This paper aims to examine the security problems and to identify the characteristics of such security problems, in addition this study will examine the important issues in security cloud computing and will determine the frames to improve security systems for cloud computing. …”
Article -
13
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Those problems lend themselves to the realm of optimization. …”
Get full text
Get full text
Thesis -
14
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…However, the problem of improving the accuracy and efficiency of classification models remains open and yet to be resolved. …”
Get full text
Get full text
Get full text
Article -
15
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
16
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
17
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Based on the selected features, the classification is performed. The Support Vector Machine (SVM) and Multilayer Perceptron (MLP) are used for classification purpose due to their proven ability in classification. …”
Get full text
Get full text
Thesis -
18
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval
Published 2022“…Regardless of the methods implemented by this system, eliminating false alerts is still a huge problem. To describe data traffic passing through the network, a database of the network security layer (NSL) knowledge discovery in database (KDD) dataset is used. …”
Get full text
Get full text
Get full text
Article -
19
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
20
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…Several directions can be taken to extend this work such as a combination of an IDS with the IPS system to be capable of dropping or blocking network connections that are determined too risky, extend the model for multi-class classification problems and using hybrid IDS (combining anomaly and signature-based detection systems) to respond to wider ranges of intrusions and increase the level of security of a network.…”
Get full text
Get full text
Thesis
