Search Results - (( data classification using algorithm ) OR ( attack detection based algorithm ))
Search alternatives:
- classification using »
- data classification »
- using algorithm »
- detection based »
-
1
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
2
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…The algorithm tested use KDD Cup dataset and the result shows a significant improvement in detection accuracy and reducing the false alerts …”
Get full text
Get full text
Get full text
Citation Index Journal -
3
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
4
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
5
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
6
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
7
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
Get full text
Get full text
Get full text
Article -
8
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
9
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The experiment was executed by using k-fold cross validation techniques for predicting the classification algorithm performance. …”
Get full text
Get full text
Thesis -
10
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
11
Hybrid intelligent approach for network intrusion detection
Published 2015“…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
13
SVM for network anomaly detection using ACO feature subset
Published 2016“…Classification approach has been widely adopted for the development of the anomaly detection model to classify the data into normal class and attack class. …”
Get full text
Get full text
Conference or Workshop Item -
14
Anomaly detection in ICS datasets with machine learning algorithms
Published 2021“…The activity traffic between ICS components is analyzed and packet inspection of the dataset is performed for the ICS network. The features of flow-based network traffic are extracted for behavior analysis with port-wise profiling based on the data baseline, and anomaly detection classification and prediction using machine learning algorithms are performed.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Subjects:Conference Paper -
16
Anomaly behavior detection using flexible packet filtering and support vector machine algorithms
Published 2016“…The main method is related to processing and filtering data packets using different types of packet filtering on network system and, more specifically, capturing and filtering data packets transmitted on high speed communications links for errors and attackers’ detection and signal integrity analysis. …”
Get full text
Get full text
Get full text
Thesis -
17
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
Get full text
Get full text
Get full text
Article -
19
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. …”
Get full text
Get full text
Article -
20
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis
