Search Results - (( based optimization method algorithm ) OR ( attack detection search algorithm ))
Search alternatives:
-
1
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
2
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…In conclusion, this work has presented an improved optimization algorithm that can improve the accuracy of IDSs in the detection of various types of network attack.…”
Get full text
Get full text
Thesis -
3
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…This situation makes the detection of cyber-based attacks on computer networks a relevant and challenging area of research. …”
Get full text
Get full text
Thesis -
4
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Our developed algorithm works in extracting the most relevant features that can assist in accurately detecting the network attacks. …”
Get full text
Get full text
Article -
6
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
Get full text
Get full text
Thesis -
7
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
Get full text
Get full text
Thesis -
8
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019“…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
Get full text
Get full text
Get full text
Book Chapter -
9
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
10
-
11
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…The proposed search algorithm uses mutation to more accurately examine the search space, to allow candidates to escape local minima. …”
Get full text
Get full text
Get full text
Article -
12
Improving intrusion detection using genetic algorithm
Published 2013“…GAs are search algorithms which are based on the principles of natural selection and genetics. …”
Get full text
Get full text
Get full text
Article -
13
-
14
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023“…Barium compounds; Cybersecurity; Data mining; Decision trees; Evolutionary algorithms; K-means clustering; Learning algorithms; Malware; Network security; Sodium compounds; Support vector machines; 'current; Comparatives studies; Cyber security; K-means; Machine learning algorithms; Malware attacks; Malware detection; Metaheuristic; Recent researches; Systematic literature review; Nearest neighbor search…”
Conference Paper -
15
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…The true and false positive rates achieved by the proposed algorithm outperform several current detection algorithms.…”
Get full text
Get full text
Thesis -
16
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Detecting cyber-security attacks is still a challenging task. …”
Get full text
Get full text
Thesis -
17
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…Therefore, the SMA method is redesigned for optimal location and sizing based on the total active power loss of the systems. …”
Get full text
Get full text
Thesis -
18
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
19
Opposition-based Whale Optimization Algorithm
Published 2018“…The OWOA use the Opposition-based method to enhance Whale Optimization Algorithm (WOA) performance. …”
Get full text
Get full text
Get full text
Article -
20
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…In this paper, a firefly algorithm based hybrid algorithm through retaining global convergence of firefly algorithm and ability to generate connected topologies of optimality criteria (OC) method is proposed as an alternative method to solve stress-based topology optimization problems. …”
Get full text
Get full text
Article
