Search Results - ((detection algorithm) OR ((((selection OR electron) algorithm) OR (optimization algorithm))))
Search alternatives:
- selection »
- electron »
-
1
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…To achieve this goal, an improved Teaching Learning-Based Optimization (ITLBO) algorithm was proposed in dealing with subset feature selection. …”
Get full text
Get full text
Thesis -
2
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
3
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…In addition, ISSA was compared with four well-known optimization algorithms such as Genetic Algorithm, Particle Swarm Optimization, Grasshopper Optimization Algorithm, and Ant Lion Optimizer. …”
Get full text
Get full text
Article -
5
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…This article presents the development of an improved intrusion detection method for binary classification. In the proposed IDS, Rao Optimization Algorithm, Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) were combined with NTLBO algorithm with supervised ML techniques (for feature subset selection (FSS). …”
Get full text
Get full text
Get full text
Article -
6
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…The main intention of this study is to find the significant peak features in time domain approach and this can be done using feature selection methods such as gravitational search algorithm (GSA) and particle swarm optimization (PSO). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
Get full text
Get full text
Get full text
Article -
8
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…This research proposed automated feature selection using Boruta algorithm to detect the malware. …”
Get full text
Get full text
Get full text
Article -
9
Solving time gap problems through the optimization of detecting stepping stone algorithm
Published 2004“…It is found that current algorithm of detecting stepping stone is not optimized. …”
Get full text
Get full text
Book Section -
10
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
11
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…The study compares the bio-inspired algorithm [particle swarm optimization (PSO)] and the evolutionary computation with information gain to find the best features optimization in selecting features. …”
Get full text
Get full text
Get full text
Article -
12
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…Using a number of candidate detectors from an improved Apriori Algorithm with Particle Swarm Optimization, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
Get full text
Get full text
Get full text
Article -
13
Bio-inspired for Features Optimization and Malware Detection
Published 2018“…The study compares the bio-inspired algorithm [particle swarm optimization (PSO)] and the evolutionary computation with information gain to find the best features optimization in selecting features. …”
Get full text
Get full text
Article -
14
Optimizing Ram Testing Method For Test Time Saving Using Automatic Test Equipment
Published 2017“…A memory Build-in Self-test (BIST) design with capability of algorithm failing sequence capture have been developed to implement in the Automate Test Equipment (ATE) flow for production screen. 3 selected algorithm have been tested on the 8 detect units in ATE flow to prove the concept of this method. …”
Get full text
Get full text
Thesis -
15
Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan
Published 2005“…The results from both the optimized approach and existing algorithm are compared. …”
Get full text
Get full text
Thesis -
16
Neural network algorithm-based fall detection modelling
Published 2020“…Related algorithm for the fall detection has been discussed in depth by researcher from the previous research. …”
Get full text
Get full text
Get full text
Article -
17
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006“…The development of Clonal Selection Algorithm (CSA) is inspired by elements from clonal selection theories. …”
Get full text
Get full text
Conference or Workshop Item -
18
Particle Swarm Optimization algorithm for facial emotion detection
Published 2010Get full text
Working Paper -
19
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
20
Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa
Published 2017Subjects: Get full text
Get full text
Thesis
