Search Results - (( attack detection process algorithm ) OR ( evolution optimization based algorithm ))

Refine Results
  1. 1

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…In addition, the proposed methods have proven the robustness against powerful modern SPAM feature based steganalysis detection attacks at low embedding rate.…”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Reliably optimal PMU placement using disparity evolution-based genetic algorithm by Matsukawa, Yoshiaki, Othman, Mohammad Lutfi, Watanabe, Masayuki, Mitani, Yasunori

    Published 2017
    “…In this paper, Disparity Evolution-type Genetic Algorithm (DEGA) based on disparity theory of evolution is applied. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A refined differential evolution algorithm for improving the performance of optimization process by A. R., Yusoff, Nafrizuan, Mat Yahya

    Published 2011
    “…DE is developed based on an improved Genetic Algorithm and come with different strategies for faster optimization. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising by Al-Dabbagh, Mohanad Dawood, Al-Dabbagh, Rawaa Dawoud, Raja Abdullah, Raja Syamsul Azmir, Hashim, Fazirulhisyam

    Published 2015
    “…The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. …”
    Get full text
    Get full text
    Article
  8. 8

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Owing to the distributed nature of modern attacks (e.g. denial-of-service), it is extremely challenging to detect such malicious behaviour using traditional intrusion detection systems. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Application of swarm intelligence optimization on bio-process problems / Mohamad Zihin Mohd Zain by Mohamad Zihin , Mohd Zain

    Published 2018
    “…BSA gave the best overall performance by showing improved solutions and more robust convergence in comparison with various metaheuristics used in this work. Multi-objective optimization problems are also addressed by proposing a modified multi-criterion optimization algorithm based on a Pareto-based Particle Swarm Optimization (PSO) algorithm called Multi-Objective Particle Swarm Optimization (MOPSO). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Broadening selection competitive constraint handling algorithm for faster convergence by Shaikh, T.A., Hussain, S.S., Tanweer, M.R., Hashmani, M.A.

    Published 2020
    “…In this study, the BSCCH algorithm has been coupled with Differential Evolution algorithm as a proof of concept because it is found to be an efficient algorithm in the literature for constrained optimization problems. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. The present study proposes an efficient DDoS attack detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Tole, Sutikno, Shahreen, Kasim, Rohayanti, Hassan, Zalmiyah, Zakaria, Mohd Saberi, Mohamad

    Published 2021
    “…The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. …”
    Get full text
    Get full text
    Article
  20. 20

    Crossover-first differential evolution for improved global optimization in non-uniform search landscapes by Teo, Jason Tze Wi, Mohd Hanafi Ahmad Hijazi, Hui, Keng Lau, Salmah Fattah, Aslina Baharum

    Published 2015
    “…The differential evolution (DE) algorithm is currently one of the most widely used evolutionary-based optimizers for global optimization due to its simplicity, robustness and efficiency. …”
    Get full text
    Get full text
    Get full text
    Article