Search Results - (( security classification system algorithm ) OR ( using optimization based algorithm ))
Search alternatives:
- security classification »
- classification system »
- system algorithm »
-
1
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
2
Spam classification based on supervised learning using grasshopper optimization algorithm and artificial neural network
Published 2021Get full text
Get full text
Conference or Workshop Item -
3
SVM for network anomaly detection using ACO feature subset
Published 2016“…This paper proposes a detection model, ant system with support vector machine, which uses ant system, a variation of ant colony optimization, to filter out the redundant and irrelevant features for support vector machine classification algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
4
File integrity monitor scheduling based on file security level classification
Published 2011“…Integrity of operating system components must be carefully handled in order to optimize the system security. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Based on the selected features, the classification is performed. …”
Get full text
Get full text
Thesis -
6
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
Get full text
Get full text
Thesis -
7
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Based on the selected features, the classification is performed. …”
Get full text
Get full text
Thesis -
8
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Intrusion Detection (ID) in the context of computer networks is an essential technique in modern defense-in-depth security strategies. As such, Intrusion Detection Systems (IDSs) have received tremendous attention from security researchers and professionals. …”
Get full text
Get full text
Thesis -
9
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…During the training and optimization process, these base learners adopt a hybrid BP and Particle Swarm Optimization algorithm to combine both local and global optimization capabilities for identifying optimal features and improving the classification performance. …”
Get full text
Get full text
Get full text
Article -
10
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The second anomaly detection method is the Evolutionary Kernel Neural Network Random Weights (EKNNRW) in order to increase the accuracy of classification. The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
11
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. …”
Get full text
Get full text
Thesis -
12
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
Published 2020“…One of the most efficient approaches used to secure the usage of the internet from internal and external intruders is Intrusion Detection System (IDS). …”
Get full text
Get full text
Get full text
Article -
13
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…At first, data pre-processing is performed to convert the actual data into useful format. In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Malicious URL classification using artificial fish swarm optimization and deep learning
Published 2023“…Malicious Uniform Resource Locators (URLs) can be embedded in email or Twitter and used to lure vulnerable internet users to implement malicious data in their systems. This may result in compromised security of the systems, scams, and other such cyberattacks. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Development of biosignals-based multimodal biometric system
Published 2014“…The success of any biometric system is dependent on the pre-processing, features and classification algorithms exploits. …”
Get full text
Get full text
Get full text
Thesis -
17
A new integrated approach for evaluating sustainable development in the electric vehicle sector
Published 2025“…This study identifies the relative importance of the classification attribute variables based on the classification rules of the target attributes by conducting further analysis with the CART decision model and constructs an optimal prediction model.…”
Get full text
Get full text
Get full text
Get full text
Article -
18
Power system security assessment using artificial neural network: article / Mohd Fathi Zakaria
Published 2010“…Modern interconnected power systems often consist of thousands of pieces of equipment each of which may have an effect on the security of the system. …”
Get full text
Get full text
Article -
19
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
20
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…From the past few years, Intrusion Detection Systems (IDS) are employed as a second line of defence and have shown to be a useful tool for enhancing security by detecting suspicious activity. …”
Get full text
Get full text
Get full text
Article
