Search Results - (( based optimization method algorithm ) OR ( attack detection clustering algorithm ))
Search alternatives:
- detection clustering »
- method algorithm »
-
1
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
2
An improved hybrid learning approach for better anomaly detection
Published 2011“…Nonetheless, current anomaly detection techniques are unable to detect all types of attacks accurately and correctly. …”
Get full text
Get full text
Thesis -
3
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…However, a trust-based attack detection algorithm (TADA) assesses the reliability of SNs to detect internal attacks. …”
Get full text
Get full text
Article -
4
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
Published 2013“…Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification
Published 2013“…Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intrusive activities on a computer system, and their enhancement is emerging at an unexpected rate.Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
KM-NEU: an efficient hybrid approach for intrusion detection system
Published 2014“…The anomaly-based Intrusion Detection Systems (IDS) are able to detect unknown attacks. …”
Get full text
Get full text
Article -
8
Global and local clustering soft assignment for intrusion detection system: a comparative study
Published 2017“…The ability of IDS to detect new sophisticated attacks compared to traditional method such as firewall is important to secure the network. …”
Get full text
Get full text
Get full text
Article -
9
Anomaly-based intrusion detection using fuzzy rough clustering
Published 2006“…It is an important issue for the security of network to detect new intrusion attack and also to increase the detection rates and reduce false positive rates in Intrusion Detection System (IDS). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…Furthermore, the detection rate of the algorithm is improved by utilizing the proposed clustering procedure. …”
Get full text
Get full text
Thesis -
11
A clustering-based method for outlier detection under concept drift
Published 2024“…The proposed approach CADSD (Cluster-based Anomaly Detection with Streaming Data), operates in real-time without pre-training. …”
Get full text
Get full text
Get full text
Article -
12
Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system
Published 2013“…In recent years, data mining approach for intrusion detection have been advised and used. The approach such as Genetic Algorithms , Support Vector Machines, Neural Networks as well as clustering has resulted in high accuracy and good detection rates but with moderate false alarm on novel attacks. …”
Get full text
Get full text
Get full text
Article -
13
A hybrid framework based on neural network MLP and means clustering for intrusion detection system
Published 2013“…Concerning the robustness of K-means method and MLP algorithms benefits, this research is the part of an effort to develop a hybrid information detection system (IDS) which is able to detect high percentage of novel attacks while keep the false alarm at low rate.This paper provides the conceptual view and a general framework of the proposed system.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
15
RFID-enabled supply chain detection using clustering algorithms
Published 2015“…We will apply various clustering algorithms to analyzed and determine every attribute in the dataset structure pattern. …”
Get full text
Get full text
Conference or Workshop Item -
16
A hybrid framework based on neural network MLP and K-means clustering for intrusion detection system
Published 2013“…Concerning the robustness of K-means method and MLP algorithms benefits, this research is the part of an effort to develop a hybrid information detection system (IDS) which is able to detect high percentage of novel attacks while keep the false alarm at low rate. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
18
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023“…Barium compounds; Cybersecurity; Data mining; Decision trees; Evolutionary algorithms; K-means clustering; Learning algorithms; Malware; Network security; Sodium compounds; Support vector machines; 'current; Comparatives studies; Cyber security; K-means; Machine learning algorithms; Malware attacks; Malware detection; Metaheuristic; Recent researches; Systematic literature review; Nearest neighbor search…”
Conference Paper -
19
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Detecting cyber-security attacks is still a challenging task. …”
Get full text
Get full text
Thesis -
20
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis
