Search Results - (( attack detection using algorithm ) OR ( simulation optimization sensor algorithm ))
Search alternatives:
- optimization sensor »
- sensor algorithm »
- using algorithm »
-
1
-
2
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
Get full text
Get full text
Thesis -
3
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…Although there are many methods of ensuring network security in IoT, such as using encryption, firewalls, and intrusion detection systems, the issue of security is still not been fully solved. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Simulated Kalman Filter optimization algorithm for maximization of wireless sensor networks coverage
Published 2019“…Simulated Kalman Filter (SKF) is a population based optimization algorithm inspired by the Kalman filtering method. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
IWDSA: a hybrid Intelligent Water Drops with a Simulated Annealing for the localization improvement in wireless sensor networks
Published 2024“…Additionally, simulation results confirm that the proposed algorithm IWDSA exhibits outstanding performance compared to other algorithms utilizing optimization techniques, including genetic algorithms, bat algorithms, ant colony optimization, and swarm optimization. …”
Get full text
Get full text
Get full text
Article -
6
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
7
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
8
Mobile robot path optimization algorithm using vector calculus and mapping of 2 dimensional space
Published 2015“…The simulated robot is equipped with a sonar sensor and several infrared sensors on its chassis. …”
Get full text
Get full text
Get full text
Article -
9
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
10
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
Get full text
Get full text
Article -
11
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. …”
Get full text
Get full text
Get full text
Article -
12
Hybridization of enhanced ant colony system and Tabu search algorithm for packet routing in wireless sensor network
Published 2020“…Better performances were also achieved for success rate, throughput, and latency when compared to other hybrid routing algorithms such as Fish Swarm Ant Colony Optimization (FSACO), Cuckoo Search-based Clustering Algorithm (ICSCA), and BeeSensor-C. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Deterministic static sensor node placement in wireless sensor network based on territorial predator scent marking behavior
Published 2023“…This paper proposes a sensor node placement algorithm that utilizes a new biologically inspired optimization algorithm that imitates the behaviour of territorial predators in marking their territories with their odours known as Territorial Predator Scent Marking Algorithm (TPSMA). …”
Article -
14
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…Proposed real-time training dataset for SVM algorithm achieved highest detection rate of 99.13% while decision tree and Naïve Bayes has 93.28% & 86.41% of attack detection rate, respectively. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique
Published 2023“…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
Get full text
Get full text
Thesis -
16
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
17
Provisioning an energy efficient with maximum coverage WSN through biological inspired sensor node placement
Published 2023Conference Paper -
18
Cluster head selection optimization in wireless sensor network via genetic-based evolutionary algorithm
Published 2020“…Genetic-based evolutionary algorithms such as Genetic Algorithm (GA) and Differential Evolution (DE) have been popularly used to optimize cluster head selection in WSN to improve energy efficiency for the extension of network lifetime. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…The basis of misused detection module is snort, and anomaly detection module is constructed by using Algorithm C4.5 detectors. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article
