Search Results - (( based optimization sensor algorithm ) OR ( attack detection means algorithm ))
Search alternatives:
- optimization sensor »
- sensor algorithm »
- detection means »
- means algorithm »
-
1
Machine learning-based anomaly detection in NFV: a comprehensive survey
Published 2023“…The research evaluates the strengths and weaknesses of various machine learningbased algorithms for detecting network-based anomalies in NFV networks. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Published 2021“…This means that Multilayer Perceptron algorithm can detect APT attack more accurately. …”
Get full text
Get full text
Get full text
Other -
3
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Published 2021“…This means that Multilayer Perceptron algorithm can detect APT attack more accurately. …”
Get full text
Get full text
Get full text
Other -
4
Metaheuristic multi-hop clustering optimization for energy-efficient wireless sensor network
Published 2020“…Based on the performance evaluation, GACS outperforms both Genetic Algorithm (GA)-based cluster optimization algorithm and Cuckoo Search (CS)-based multi-hop optimization algorithm.…”
Get full text
Get full text
Article -
5
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023“…Barium compounds; Cybersecurity; Data mining; Decision trees; Evolutionary algorithms; K-means clustering; Learning algorithms; Malware; Network security; Sodium compounds; Support vector machines; 'current; Comparatives studies; Cyber security; K-means; Machine learning algorithms; Malware attacks; Malware detection; Metaheuristic; Recent researches; Systematic literature review; Nearest neighbor search…”
Conference Paper -
6
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
Published 2013“…Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification
Published 2013“…Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intrusive activities on a computer system, and their enhancement is emerging at an unexpected rate.Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Cluster head selection optimization in wireless sensor network via genetic-based evolutionary algorithm
Published 2020“…Genetic-based evolutionary algorithms such as Genetic Algorithm (GA) and Differential Evolution (DE) have been popularly used to optimize cluster head selection in WSN to improve energy efficiency for the extension of network lifetime. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
An improved hybrid learning approach for better anomaly detection
Published 2011“…Nonetheless, current anomaly detection techniques are unable to detect all types of attacks accurately and correctly. …”
Get full text
Get full text
Thesis -
10
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…This study employs use Random Forest algorithm to identify and forecast attacks to dynamically locate the attack location in the network for attack graph analysis. …”
Get full text
Get full text
Get full text
Thesis -
11
Chaotic Mapping Lion Optimization Algorithm-Based Node Localization Approach for Wireless Sensor Networks
Published 2023“…Keywords: anchor nodes; metaheuristic optimization algorithm; node localization; tent chaotic mapping; wireless sensor networks…”
Get full text
Get full text
Get full text
Get full text
Article -
12
KM-NEU: an efficient hybrid approach for intrusion detection system
Published 2014“…The anomaly-based Intrusion Detection Systems (IDS) are able to detect unknown attacks. …”
Get full text
Get full text
Article -
13
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
A hybrid framework based on neural network MLP and means clustering for intrusion detection system
Published 2013“…Concerning the robustness of K-means method and MLP algorithms benefits, this research is the part of an effort to develop a hybrid information detection system (IDS) which is able to detect high percentage of novel attacks while keep the false alarm at low rate.This paper provides the conceptual view and a general framework of the proposed system.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An energy-efficient spectrum-aware reinforcement learning-based clustering algorithm for cognitive radio sensor networks
Published 2015“…In this paper, we propose a reinforcement learning-based spectrum-aware clustering algorithm that allows a member node to learn the energy and cooperative sensing costs for neighboring clusters to achieve an optimal solution. …”
Get full text
Get full text
Get full text
Article -
16
Hybridization of enhanced ant colony system and Tabu search algorithm for packet routing in wireless sensor network
Published 2020“…Better performances were also achieved for success rate, throughput, and latency when compared to other hybrid routing algorithms such as Fish Swarm Ant Colony Optimization (FSACO), Cuckoo Search-based Clustering Algorithm (ICSCA), and BeeSensor-C. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…This paper presents our work to improve the performance of anomaly intrusion detection using Fuzzy-ART based on the K-means algorithm. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review
Published 2025“…The primary objective of this paper isto review localization algorithms based on metaheuristic optimization techniques to improve localization accuracy. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
A Novel Polytope Algorithm based on Nelder-mead method for localization in wireless sensor network
Published 2024“…Results: Simulation results perfectly showed that the suggested localization algorithm based on NMM can carry out a better performance than that of other localization algorithms utilizing other op- timization approaches, including a particle swarm optimization, ant colony (ACO) and bat algorithm (BA). …”
Get full text
Get full text
Get full text
Get full text
Article
