Search Results - (( based optimization method algorithm ) OR ( attack detection clustering algorithm ))

Refine Results
  1. 1

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An improved hybrid learning approach for better anomaly detection by Mohamed Yassin, Warusia

    Published 2011
    “…Nonetheless, current anomaly detection techniques are unable to detect all types of attacks accurately and correctly. …”
    Get full text
    Get full text
    Thesis
  3. 3

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
    Get full text
    Get full text
    Article
  4. 4

    Anomaly-based intrusion detection through K-means clustering and naives Bayes classification by Mohamed Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md. Nasir

    Published 2013
    “…Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification by Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md Nasir

    Published 2013
    “…Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intrusive activities on a computer system, and their enhancement is emerging at an unexpected rate.Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    KM-NEU: an efficient hybrid approach for intrusion detection system by Lisehroodi, Mazyar Mohammadi, Muda, Zaiton, Yassin, Warusia, Udzir, Nur Izura

    Published 2014
    “…The anomaly-based Intrusion Detection Systems (IDS) are able to detect unknown attacks. …”
    Get full text
    Get full text
    Article
  8. 8

    Global and local clustering soft assignment for intrusion detection system: a comparative study by Mohd Rizal Kadis, Azizi Abdullah

    Published 2017
    “…The ability of IDS to detect new sophisticated attacks compared to traditional method such as firewall is important to secure the network. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Anomaly-based intrusion detection using fuzzy rough clustering by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, M. N. M, Srinoy, Surat, Chimphlee, Siriporn

    Published 2006
    “…It is an important issue for the security of network to detect new intrusion attack and also to increase the detection rates and reduce false positive rates in Intrusion Detection System (IDS). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi by Somayeh, Sadeghi

    Published 2015
    “…Furthermore, the detection rate of the algorithm is improved by utilizing the proposed clustering procedure. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A clustering-based method for outlier detection under concept drift by Tahir, Mahjabeen, Abdullah, Azizol, Udzir, Nur Izura, Kasmiran, Khairul Azhar

    Published 2024
    “…The proposed approach CADSD (Cluster-based Anomaly Detection with Streaming Data), operates in real-time without pre-training. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system by Ahmad Zainaddin, Dahlia Asyiqin, Mohd Hanapi, Zurina

    Published 2013
    “…In recent years, data mining approach for intrusion detection have been advised and used. The approach such as Genetic Algorithms , Support Vector Machines, Neural Networks as well as clustering has resulted in high accuracy and good detection rates but with moderate false alarm on novel attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A hybrid framework based on neural network MLP and means clustering for intrusion detection system by Lisehroodi, Mazyar Mohammadi, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…Concerning the robustness of K-means method and MLP algorithms benefits, this research is the part of an effort to develop a hybrid information detection system (IDS) which is able to detect high percentage of novel attacks while keep the false alarm at low rate.This paper provides the conceptual view and a general framework of the proposed system.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    RFID-enabled supply chain detection using clustering algorithms by Azahar, T.F., Mahinderjit-Singh, M., Hassan, R.

    Published 2015
    “…We will apply various clustering algorithms to analyzed and determine every attribute in the dataset structure pattern. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A hybrid framework based on neural network MLP and K-means clustering for intrusion detection system by Lisehroodi, Mazyar Mohammadi, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…Concerning the robustness of K-means method and MLP algorithms benefits, this research is the part of an effort to develop a hybrid information detection system (IDS) which is able to detect high percentage of novel attacks while keep the false alarm at low rate. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works by Gorment N.Z., Selamat A., Krejcar O.

    Published 2023
    “…Barium compounds; Cybersecurity; Data mining; Decision trees; Evolutionary algorithms; K-means clustering; Learning algorithms; Malware; Network security; Sodium compounds; Support vector machines; 'current; Comparatives studies; Cyber security; K-means; Machine learning algorithms; Malware attacks; Malware detection; Metaheuristic; Recent researches; Systematic literature review; Nearest neighbor search…”
    Conference Paper
  19. 19

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Detecting cyber-security attacks is still a challenging task. …”
    Get full text
    Get full text
    Thesis
  20. 20