Search Results - (( using selection method algorithm ) OR ( security classifications using algorithm ))
Search alternatives:
- security classifications »
- classifications using »
- selection method »
- method algorithm »
- using selection »
- using algorithm »
-
1
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
2
Metaheuristic based ids using multi-objective wrapper feature selection and neural network classification
Published 2021“…This article proposes a cyber-intrusion detecting system classification with MLP trained by a hybrid metaheuristic algorithm and feature selection based on multi-objective wrapper method. …”
Get full text
Get full text
Conference or Workshop Item -
3
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
4
A novel framework for identifying twitter spam data using machine learning algorithms
Published 2020“…The research results contribute significantly to the field of cyber-security by forming a real-time system using machine learning algorithms.…”
Get full text
Get full text
Get full text
Article -
5
Enhancement Of Cover Selection – Based Audio Steganography (CAS) Using Block-Based Chaotic Multi – Level Lsb (BCM– LSB) For Balanced Performance
Published 2024thesis::doctoral thesis -
6
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…Boruta algorithm is used to select features automatically for assisting the machine learning. …”
Get full text
Get full text
Get full text
Article -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
8
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…One of the main steps after the data collection stage of any method is selecting a subset of the features to be used for the feature selection process. …”
Get full text
Get full text
Thesis -
9
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
10
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Hybrid intelligent approach for network intrusion detection
Published 2015“…Clustering is the last step of processing before classification has been performed, using k-means algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The Support Vector Machine (SVM) and Multilayer Perceptron (MLP) are used for classification purpose due to their proven ability in classification. …”
Get full text
Get full text
Thesis -
14
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
Published 2018“…This system has many usages in security system and also can be used for authentication, person verification, video surveillance, preventing crime, and security activities. …”
Get full text
Get full text
Get full text
Thesis -
15
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The Support Vector Machine (SVM) and Multilayer Perceptron (MLP) are used for classification purpose due to their proven ability in classification. …”
Get full text
Get full text
Thesis -
16
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
Get full text
Get full text
Get full text
Article -
17
An efficient anomaly intrusion detection method with evolutionary neural network
Published 2020“…The first anomaly detection method is designed using a new feature selection technique called Mutation Cuckoo Fuzzy (MCF) and evolutionary neural network classification called MultiVerse Optimizer- Artificial Neural Network (MVO-ANN) to improve the performance and execution time. …”
Get full text
Get full text
Thesis -
18
Optimized intrusion detection mechanism using soft computing techniques
Published 2011“…So, Genetic Algorithm (GA) is used in the optimum selection of principal components instead of using traditional method. …”
Get full text
Get full text
Get full text
Article -
19
An ensemble deep learning classifier stacked with fuzzy ARTMAP for malware detection
Published 2023“…The stacked ensemble method uses several heterogeneous deep neural networks as the base learners. …”
Get full text
Get full text
Get full text
Article -
20
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Neural Networks (NNs) are one of the most popular techniques to perform non-linear classification, and have been extensively used in the literature to perform intrusion detection. …”
Get full text
Get full text
Thesis
