Search Results - (( parameter optimization based algorithm ) OR ( attack detection based algorithm ))
Search alternatives:
- parameter optimization »
- detection based »
-
1
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…In conclusion, this work has presented an improved optimization algorithm that can improve the accuracy of IDSs in the detection of various types of network attack.…”
Get full text
Get full text
Thesis -
2
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
3
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Published 2021“…The optimization method derives from the metaheuristic algorithm. …”
Get full text
Get full text
Article -
4
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019Get full text
Get full text
Conference or Workshop Item -
5
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…This situation makes the detection of cyber-based attacks on computer networks a relevant and challenging area of research. …”
Get full text
Get full text
Thesis -
6
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
Get full text
Get full text
Get full text
Article -
7
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Detecting cyber-security attacks is still a challenging task. …”
Get full text
Get full text
Thesis -
8
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
9
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…These schemes follow a uniform framework,which is based on the detection of feature points which are commonly invariant to Rotation,Scaling and Translation (RST),therefore they naturally accommodate the framework of geometrically robust image watermarking. …”
Get full text
Get full text
Thesis -
10
A hybrid particle swarm optimization - extreme learning machine approach for intrusion detection system
Published 2018“…Our propose model has been apple based as intrusion detection and validated based on NSL-KDD data set. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Published 2021“…This means that Multilayer Perceptron algorithm can detect APT attack more accurately. …”
Get full text
Get full text
Get full text
Other -
13
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
14
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Published 2021“…This means that Multilayer Perceptron algorithm can detect APT attack more accurately. …”
Get full text
Get full text
Get full text
Other -
15
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
16
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Adaptive optimization techniques such as fuzzy logic controller (FLC), reinforcement learning are discussed in this thesis in order to adopt Q-leaning algorithm to FLCs. We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
Get full text
Get full text
Thesis -
17
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
18
Detecting resource consumption attack over MANET using an artificial immune algorithm
Published 2011“…DCIIDA is introduced to detect the Resource Consumption Attack (RCA) over MANET. …”
Get full text
Get full text
Get full text
Article -
19
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
20
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article
