Search Results - (( using optimization method algorithm ) OR ( security classification _ algorithm ))
Search alternatives:
- security classification »
- method algorithm »
-
1
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…The algorithm is improved with Particle Swarm Optimization that trains three different supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
3
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…In fact a data clustering method is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on our proposed algorithm; which is Enhanced Binary Particle swarm Optimization (EBPSO), (ii) To mine data using various data chunks (windows) and overcome a failure of single clustering. …”
Get full text
Get full text
Thesis -
4
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. The proposed method adopts machine learning prediction and optimizes the selecting features in order to reduce the model of machine learning complexity. …”
Get full text
Get full text
Get full text
Article -
5
An efficient anomaly intrusion detection method with evolutionary kernel neural network random weights
Published 2020“…This model is applied to the NSLKDD dataset, an improvement of the KDD Cup'99. The proposed method achieved 99.24% accuracy which shows that the novel algorithm suggested is more superior to existing ones as it provides the optimal overall efficiency.…”
Get full text
Get full text
Get full text
Article -
6
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
7
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…During the training and optimization process, these base learners adopt a hybrid BP and Particle Swarm Optimization algorithm to combine both local and global optimization capabilities for identifying optimal features and improving the classification performance. …”
Get full text
Get full text
Get full text
Article -
8
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Those problems lend themselves to the realm of optimization. Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
9
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
Published 2018“…This system has many usages in security system and also can be used for authentication, person verification, video surveillance, preventing crime, and security activities. …”
Get full text
Get full text
Get full text
Thesis -
10
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The third proposed method is a new Evolutionary Neural Network (ENN) algorithm with a combination of Genetic Algorithm and Multiverse Optimizer (GAMVO) as a training part of ANN to create efficient anomaly-based detection with low false alarm rate. …”
Get full text
Get full text
Thesis -
11
File integrity monitor scheduling based on file security level classification
Published 2011“…This paper proposes an enhancement to the scheduling algorithm of the current file integrity monitoring approach by combining the off-line and on-line monitoring approach with dynamic inspection scheduling by performing file classification technique. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
13
Optimized intrusion detection mechanism using soft computing techniques
Published 2011“…The selecting of an appropriate number of principal components is a critical problem. So, Genetic Algorithm (GA) is used in the optimum selection of principal components instead of using traditional method. …”
Get full text
Get full text
Get full text
Article -
14
-
15
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. …”
Get full text
Get full text
Thesis -
16
-
17
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…Criminal risk is predicted using classification models for a particular time interval and place. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Symmetric Key Size for Different Level of Information Classification
Published 2006“…Therefore confidential information is normally protected by using cryptographic algorithms. In these algorithms, key is an important element since it is one of the parameters that determine the level of security that the algorithms can provide. …”
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Aerial imagery paddy seedlings inspection using deep learning
Published 2022“…The emergence of artificial intelligence due to the capability of recent advances in computing architectures could become a new alternative to existing solutions. Deep learning algorithms in computer vision for image classification and object detection can facilitate the agriculture industry, especially in paddy cultivation, to alleviate human efforts in laborious, burdensome, and repetitive tasks. …”
Get full text
Get full text
Article
