Search Results - (( evolution optimization model algorithm ) OR ( attack detection utilizing algorithm ))
Search alternatives:
- evolution optimization »
- optimization model »
- model algorithm »
-
1
Detecting resource consumption attack over MANET using an artificial immune algorithm
Published 2011“…This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). …”
Get full text
Get full text
Get full text
Article -
2
Two level Differential Evolution algorithms for ARMA parameters estimatio
Published 2013“…An Evolutionary Algorithm (EA) comprising two-level Differential Evolution (DE) optimization scheme is proposed. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. The algorithms considered are the Naive Bays Algorithm, Decision Tree Algorithm and Hybrid Algorithm for different datasets. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
Get full text
Get full text
Thesis -
5
Reliably optimal PMU placement using disparity evolution-based genetic algorithm
Published 2017“…The optimization model is solved for IEEE 118 standard bus system. …”
Get full text
Get full text
Get full text
Article -
6
Parameter Estimation Using Improved Differential Evolution And Bacterial Foraging Algorithms To Model Tyrosine Production In Mus Musculus(Mouse)
Published 2015“…Global optimisation method includes differential evolution algorithm, which will be used in this research. …”
Get full text
Get full text
Get full text
Article -
7
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Published 2021“…The increasing and never-ending case of phishing attack has led to more automated approaches in detecting phishing attack. …”
Get full text
Get full text
Article -
8
Nonlinear identification of a small scale unmanned helicopter using optimized NARX network with multiobjective differential evolution
Published 2014“…This study proposes a hybrid of conventional back propagation training algorithm for the NARX network and multiobjective differential evolution (MODE) algorithm for identification of a nonlinear model of an unmanned small scale helicopter from experimental flight data.The proposed hybrid algorithm was able to produce models with Pareto-optimal compromise between the design objectives. …”
Get full text
Get full text
Get full text
Article -
9
TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network
Published 2024“…Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Optimization Of Fractional-Slot Permanent Magnet Synchronous Machine Using Analytical Sub-Domain Model And Differential Evolution
Published 2019“…From the results obtained, the Analytical Sub-Domain Differential Evolution Algorithm (ASDEA) has better optimization technique capability compared with Analytical Sub-Domain Particle Swarm Optimization (ASPSO). …”
Get full text
Get full text
Thesis -
11
Hybrid algorithm for NARX network parameters' determination using differential evolution and genetic algorithm
Published 2013“…The proposed algorithm involves a two level optimization scheme to search for both optimal network architecture and weights. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
-
15
-
16
Application of swarm intelligence optimization on bio-process problems / Mohamad Zihin Mohd Zain
Published 2018“…BSA gave the best overall performance by showing improved solutions and more robust convergence in comparison with various metaheuristics used in this work. Multi-objective optimization problems are also addressed by proposing a modified multi-criterion optimization algorithm based on a Pareto-based Particle Swarm Optimization (PSO) algorithm called Multi-Objective Particle Swarm Optimization (MOPSO). …”
Get full text
Get full text
Thesis -
17
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol
Published 2018“…However, these IDS methods only detect specific attack but fails when the attacks are combined. …”
Get full text
Get full text
Article -
18
A holistic review on artificial intelligence techniques for well placement optimization problem
Published 2020“…Nature-inspired gradient-free optimization algorithms like particle swarm optimization, genetic algorithm, covariance matrix adaptation evolution strategy and differential evolution have been utilized in this area. …”
Get full text
Get full text
Article -
19
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
20
Optimization of handover algorithms in 3GPP long term evolution system
Published 2011Get full text
Get full text
Get full text
Proceeding Paper
