Search Results - (( parameters optimization method algorithm ) OR ( attack detection utilizing algorithm ))
Search alternatives:
- parameters optimization »
- method algorithm »
-
1
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
2
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Published 2021“…The optimization method derives from the metaheuristic algorithm. …”
Get full text
Get full text
Article -
3
-
4
Detecting resource consumption attack over MANET using an artificial immune algorithm
Published 2011“…This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). …”
Get full text
Get full text
Get full text
Article -
5
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. The algorithms considered are the Naive Bays Algorithm, Decision Tree Algorithm and Hybrid Algorithm for different datasets. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
Get full text
Get full text
Thesis -
7
TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network
Published 2024“…Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol
Published 2018“…However, these IDS methods only detect specific attack but fails when the attacks are combined. …”
Get full text
Get full text
Article -
10
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
Published 2023“…Many security practitioners have adopted different approaches to detect malware. However, its attacks continuously evolve and spread, and the number of attacks is still increasing. …”
Get full text
Get full text
Get full text
Article -
13
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…However, detecting the attack is challenging due to the similarity of the permissions in malware with those seen in benign applications. …”
Get full text
Get full text
Get full text
Article -
14
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
Published 2017“…This paper proposes an energy trust system (ETS) for WSNs to effectively detect sybil attacks. It employs multi-level detection based on identity and position verification. …”
Get full text
Get full text
Get full text
Article -
15
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…However, detecting the attack is challenging due to the similarity of the permissions in malware with those seen in benign applications. …”
Get full text
Get full text
Article -
16
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
17
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…Furthermore, the detection rate of the algorithm is improved by utilizing the proposed clustering procedure. …”
Get full text
Get full text
Thesis -
18
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…In this research, Two-Phase Authentication of Attack Detection (TPAAD) scheme is proposed and investigated for detection and mitigation of DoS attacks in SDN to increase the performance of the above-mentioned issues. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Distributed denial of service attack in HTTP/2: review on security issues and future challenges
Published 2024“…This study examines the current state of the art in DDoS attacks tailored for HTTP/2 and their detection methods, proposing future research directions in the field of attack detection. …”
Get full text
Get full text
Get full text
Get full text
Article
