Search Results - (( using detection method algorithm ) OR ( mining classification problems algorithm ))
Search alternatives:
- mining classification »
- method algorithm »
- using detection »
- problems »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
2
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
Get full text
Get full text
Get full text
Article -
3
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Moreover, shortage of reliable methods on a new dataset for the intrusion detection system and anomaly detection in terms of classification is an issue. …”
Get full text
Get full text
Thesis -
4
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…This paper seeks to conduct a thorough systematic literature review (SLR) and offer a taxonomy of machine learning methods for malware detection that considers these problems by analyzing 77 chosen research works related to malware detection using machine learning algorithm. …”
Article -
5
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
6
Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2017“…Discretization of real value attributes is a vital task in data mining, particularly in the classification problem. …”
Get full text
Get full text
Get full text
Article -
7
Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system
Published 2016“…Discretization of real value attributes is a vital task in data mining, particularly in the classification problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System
Published 2016“…Discretization of real value attributes is a vital task in data mining, particularly in the classification problem. …”
Get full text
Get full text
Book Chapter -
9
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval
Published 2022“…Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). …”
Get full text
Get full text
Get full text
Article -
10
A new model for iris data set classification based on linear support vector machine parameter's optimization
Published 2020“…One of the outstanding classifications methods in data mining is support vector machine classification (SVM). …”
Get full text
Get full text
Get full text
Article -
11
Network problems detection and classification by analyzing syslog data
Published 2016“…The method used data mining tool to classify the syslog messages while the description part of the syslog message was used for classification process. …”
Get full text
Get full text
Get full text
Thesis -
12
Evaluating integrated weight linear method to class imbalanced learning in video data
Published 2011“…In the second phase, the reduces instances are refined using the weight linear algorithm. The experiment results using 9 soccer video demonstrate that the integration of PCA and WL is capable to alleviates the imbalanced problem and able to improve classification performance in video data.…”
Get full text
Get full text
Conference or Workshop Item -
13
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
Get full text
Get full text
Thesis -
14
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…This research work uses the Knowledge Discovery and Data mining (KDD) cup dataset, which is considered benchmark for evaluating security detection mechanisms. …”
Get full text
Get full text
Thesis -
15
Comparison Performance of Qualitative Bankruptcy Classification based on Data Mining Algorithms
Published 2018“…Knowledge discovery using data mining techniques are commonly applied in bankruptcy classification and prediction. …”
Get full text
Get full text
Get full text
Article -
16
Evaluation and optimization of frequent association rule based classification
Published 2014“…Works on sustaining the interestingness of rules generated by data mining algorithms are actively and constantly being examined and developed. …”
Get full text
Get full text
Get full text
Article -
17
-
18
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis -
19
Hybrid ant colony optimization and genetic algorithm for rule induction
Published 2020“…The AntMiner classifier is efficient, useful and commonly used for solving rulebased classification problems in data mining. Ant-Miner, which is an ACO variant, suffers from local optimization problem which affects its performance. …”
Get full text
Get full text
Get full text
Article -
20
Case Slicing Technique for Feature Selection
Published 2004“…Finding a good classification algorithm is an important component of many data mining projects. …”
Get full text
Get full text
Thesis
