Search Results - (( based optimization system algorithm ) OR ( attack detection path algorithm ))*
Search alternatives:
- optimization system »
- system algorithm »
- detection path »
- path algorithm »
-
1
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
2
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
3
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…These metrics use network resources to determine the number of vulnerabilities and the network's weakest path. This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
Get full text
Get full text
Get full text
Thesis -
4
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
5
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…The attack graph depicts the many paths an attacker may attempt to get around a security policy by leveraging interdependencies between disclosed vulnerabilities. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…Intention-driven model, a sampling traceback technique, provides information about the attack flow and able to reconstruct the attack path to the source of attack by the aid of Intrusion Detection system (IDS). …”
Get full text
Get full text
Thesis -
7
-
8
-
9
-
10
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…This technique also applies the removing algorithm, which uses escaping method to remove the detected vulnerabilities. …”
Get full text
Get full text
Thesis -
11
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…This study presents the development of Dolphin Echolocation Algorithm (DEA)-based sizing algorithm for sizing optimization of large-scale GCPV systems. …”
Get full text
Get full text
Thesis -
12
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…Therefore, the SMA method is redesigned for optimal location and sizing based on the total active power loss of the systems. …”
Get full text
Get full text
Thesis -
13
Firefly algorithm for optimal sizing of Standalone Photovoltaic System / Nurizzati Abdul Aziz
Published 2016“…This study presents the development of Firefly Algorithm-based Sizing Algorithm, known as FASA for sizing optimization of SAPV systems. …”
Get full text
Get full text
Thesis -
14
Firefly algorithm for optimal sizing of stand-alone photovoltaic system / Nur Izzati Abdul Aziz
Published 2016“…This study presents the development of firefly algorithm-based sizing algorithm, known as FASA for sizing optimization of SAPV systems. …”
Get full text
Get full text
Thesis -
15
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
16
Optimization-based simulation algorithm for predictive-reactive job-shop scheduling of reconfigurable manufacturing systems
Published 2022“…This study is aimed to formulate an optimization-based algorithm with simulation tool to reduce the throughput time of complex RMS, which can comply with complex product allocations and flexible routings of the system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
-
18
Hybrid evolutionary-dolphin echolocation programming for sizing optimization of stand-alone photovoltaic systems / Zulkifli Othman
Published 2021“…Subsequently, the CI-based sizing algorithm, known as Evolutionary-Dolphin Echolocation Programming Sizing Algorithm (EDEPSA) is formulated to determine the optimal models of each system component such that either Performance Ratio (PR) or Levelized Cost of Electricity (LCOE) of the system is optimized. …”
Get full text
Get full text
Thesis -
19
Optimal operation of multi-reservoir systems for increasing power generation using a seagull optimization algorithm and heading policy
Published 2021“…The Seagull Optimization Algorithm was subsequently benchmarked against the Salp Swarm Algorithm (SSA), Bat Algorithm (BA) and the Shark Optimization Algorithm (SOA). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Hybrid Improved Bacterial Swarm Optimization Algorithm for Hand-Based Multimodal Biometric Authentication System
Published 2019“…This paper proposes a Hybrid Improved Bacterial Swarm (HIBS) optimization algorithm for the minimization of Equal Error Rate (EER) as a performance measure in a hand-based multimodal biometric authentication system. …”
Get full text
Get full text
Article
