Search Results - (( intrusion detection mechanism algorithm ) OR ( based optimization bat algorithm ))
Search alternatives:
- mechanism algorithm »
- optimization bat »
- bat algorithm »
- intrusion »
-
1
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…Firstly, a new strategy based on a combined method (i.e. single-objective Gravitational Search (GSA) with Bat Algorithm (BAT) (SOGS-BAT)) algorithm is proposed in which relies on the closed interval between 0 and 1 to avoid falling into local search. …”
Get full text
Get full text
Thesis -
2
Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin
Published 2014“…As a conclusion, the MAPE obtained for the Bat Algorithm based Multi-Layer Feedforward Neural Network is 4.79 in %.…”
Get full text
Get full text
Article -
3
Hybrid bat algorithm hybrid-artificial neural network for modeling operating photovoltaic module temperature / Noor Rasyidah Hussin
Published 2014“…As a conclusion, the MAPE obtained for the Bat Algorithm based Multi-Layer Feedforward Neural Network is 4.79 in %.…”
Get full text
Get full text
Thesis -
4
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
5
Optimized intrusion detection mechanism using soft computing techniques
Published 2011“…Consequently, this method provides optimal intrusion detection mechanism which is capable to minimize amount of features and maximize the detection rates. …”
Get full text
Get full text
Get full text
Article -
6
-
7
-
8
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article -
9
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
10
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
11
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. …”
Get full text
Get full text
Get full text
Citation Index Journal -
12
New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems
Published 2024“…The Modified Adaptive Bats Sonar Algorithm (MABSA), initially designed for single objective optimization and inspired by colony bats' echolocation, has demonstrated efficiency with its simple structure and reduced computation time. …”
Get full text
Get full text
Thesis -
13
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
14
A Preliminary Study on Camera Auto Calibration Problem Using Bat Algorithm
Published 2013“…This paper attempts to implement a stochastic optimization algorithm called Bat Algorithm in order to find optimal values of the intrinsic parameters. …”
Get full text
Get full text
Conference or Workshop Item -
15
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The "Remote to Local (R2L) Intrusion Detection System Using Decision Tree" project aims to address the escalating threat of network intrusions by developing an effective intrusion detection system. …”
Get full text
Get full text
Thesis -
16
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…A series of experimental results demonstrate that the proposed intrusion detection model can effectively detect anomalies with low false positive rate, high detection rate and achieve high detection accuracy.…”
Get full text
Get full text
Get full text
Thesis -
17
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024“…For this purpose, a modified DCA is proposed in this research as the main detection algorithm in the new hybrid intrusion detection mechanism which works on Cloud Co-Residency Threat Detection (CCTD) that combines anomaly and misuse detection mechanism. …”
Proceedings Paper -
18
-
19
HEURISTIC OPTIMIZATION OF BAT ALGORITHM FOR HETEROGENEOUS SWARMS USING PERCEPTION
Published 2023“…Swarm Intelligence is inspired by naturally occurring swarm systems suchas Ant Colony, Bees Hive, or Bats. The Bat Algorithm is a population-based meta-heuristic algorithm for solving continuous optimization problems. …”
Get full text
Get full text
Article -
20
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…This autonomous system improves the performance of the current intrusion prevention system and carries on system continuity by using self-healing mechanism.…”
Get full text
Get full text
Thesis
