Search Results - (( using optimization based algorithm ) OR ( security classification model algorithm ))
Search alternatives:
- security classification »
- classification model »
- model algorithm »
-
1
An integrated model to email spam classification using an enhanced grasshopper optimization algorithm to train a multilayer perceptron neural network
Published 2021“…This study introduces an email detection model that is designed based on use of an improved version of the grasshopper optimization algorithm to train a Multilayer Perceptron in classifying emails as ham and spam. …”
Get full text
Get full text
Conference or Workshop Item -
2
Spam classification based on supervised learning using grasshopper optimization algorithm and artificial neural network
Published 2021Get full text
Get full text
Conference or Workshop Item -
3
Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean
Published 2007“…Simulation runs demonstrate that our algorithm leads to better results than the traditional algorithms for scheduling policies used in Grid environment.…”
Get full text
Article -
4
SVM for network anomaly detection using ACO feature subset
Published 2016“…This paper proposes a detection model, ant system with support vector machine, which uses ant system, a variation of ant colony optimization, to filter out the redundant and irrelevant features for support vector machine classification algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
5
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…DL models often use gradient descent optimization, i.e., the Back-Propagation (BP) algorithm; therefore, their training and optimization procedures suffer from local sub-optimal solutions. …”
Get full text
Get full text
Get full text
Article -
6
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
Get full text
Get full text
Thesis -
7
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…Finally, MVO algorithm is exploited with Bidirectional Gated Recurrent Unit (BiGRU) model for classification. …”
Get full text
Get full text
Get full text
Article -
8
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…Then, this study aims to optimize the hyperparameters of the developed DNN model using the Arithmetic Optimization Algorithm (AOA) and, lastly, to evaluate the performance of the newly proposed deep learning model with Simulated Kalman Filter (SKF) algorithm in solving image encryption application. …”
Get full text
Get full text
Thesis -
9
Malicious URL classification using artificial fish swarm optimization and deep learning
Published 2023“…With this motivation, the current article develops an Artificial Fish Swarm Algorithm (AFSA) with Deep Learning Enabled Malicious URL Detection and Classification (AFSADL-MURLC) model. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
Published 2020“…Considering that using a combination of ANN and EA can produce an advanced technique to develop an efficient anomaly detection approach for IDS, several types of research have used ENN algorithms to detect the attacks. …”
Get full text
Get full text
Get full text
Article -
11
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The second anomaly detection method is the Evolutionary Kernel Neural Network Random Weights (EKNNRW) in order to increase the accuracy of classification. The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
12
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…In this study, various machine learning models, namely Support Vector Machine (SVM), K-Nearest Neighbors (KNN), Decision Tree, Random Forest, Logistic Regression and ensemble models such as, XGBoost, AdaBoost were used to harness the capabilities of network packet classification based on DSCP. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…Criminal risk is predicted using classification models for a particular time interval and place. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Development of biosignals-based multimodal biometric system
Published 2014“…The success of any biometric system is dependent on the pre-processing, features and classification algorithms exploits. There is a need for increase in reliability and security motivated by the fact that there is no unique technology that can be applied for all possible scenarios. …”
Get full text
Get full text
Get full text
Thesis -
15
Symmetric Key Size for Different Level of Information Classification
Published 2006“…By using this model, we then propose key sizes for different levels of information classification.…”
Get full text
Get full text
Conference or Workshop Item -
16
A new integrated approach for evaluating sustainable development in the electric vehicle sector
Published 2025“…This study identifies the relative importance of the classification attribute variables based on the classification rules of the target attributes by conducting further analysis with the CART decision model and constructs an optimal prediction model.…”
Get full text
Get full text
Get full text
Get full text
Article -
17
A New Model for Trojan Detection using Machine Learning Inspired by Al-Furqan Verse
Published 2024“…Moreover, the knowledge discovery techniques (KDD) and the data mining algorithm were used to optimize the accuracy result. …”
Article -
18
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
Get full text
Get full text
Thesis -
19
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
20
SVM-based geospatial prediction of soil erosion under static and dynamic conditioning factors
Published 2018“…The study implements four kernel tricks of SVM with sequential minimal optimization algorithm as a classifier for soil erosion susceptibility modeling. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
