Search Results - (( intrusion prevention model algorithm ) OR ( whale optimization path algorithm ))
Search alternatives:
- intrusion prevention »
- whale optimization »
- optimization path »
- prevention model »
- model algorithm »
- path algorithm »
-
1
Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm
Published 2021“…To solve the redundancy resolution, meta-heuristic optimizations, namely Genetic Algorithm (GA) and Whale Optimization Algorithm (WOA), are applied to search optimal trajectories inside local orientation angle boundaries. …”
Get full text
Get full text
Get full text
Article -
2
Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm
Published 2023Article -
3
Revolutionizing crowd safety: A breakthrough hybrid whale-bat chaotic algorithm (WOABCM) for optimized evacuation simulations
Published 2024“…The Whale-Bat Chaotic Algorithm (WOABCM) is a revolutionary tool for optimizing pathfinding navigation in crowd evacuation scenarios. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
Optimization of multi-holes drilling path using particle swarm optimization
Published 2018“…PSO is also compared with another algorithm like Whale Optimization Algorithm, Ant Lion Optimizer, Dragonfly Algorithm, Grasshopper Optimization Algorithm, Moth-flame Optimization and Sine Cosine Algorithm. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
6
-
7
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
8
The Hybrid of WOABAT-IFDO Optimization Algorithm and Its Application in Crowd Evacuation Simulation
Published 2023“…This paper proposes a new hybrid of nature inspired optimization algorithm (IFDO-WOABAT) based on the latest optimization algorithm namely Improved Fitness Dependent Optimization (IFDO) with Whale-Bat Optimization algorithm (WOABAT). …”
Get full text
Get full text
Get full text
Proceeding -
9
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. …”
Get full text
Get full text
Thesis -
10
Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
Published 2010“…The abnormal activities are prevented and healed by the presented algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
11
Hybrid Optimization with Enhanced QoS-based Path Selection in VANETs
Published 2023“…This hybrid optimization combines the Improved ant colony optimization (ACO) and Effective Whale Optimization Algorithm (EWOA). …”
Get full text
Get full text
Get full text
Article -
12
Hybrid Optimization with Enhanced QoS-based Path Selection in VANETs
Published 2023“…This hybrid optimization combines the Improved ant colony optimization (ACO) and Effective Whale Optimization Algorithm (EWOA). …”
Get full text
Get full text
Get full text
Article -
13
Hybrid Optimization with Enhanced QoS-based Path Selection in VANETs
Published 2023“…This hybrid optimization combines the Improved ant colony optimization (ACO) and Effective Whale Optimization Algorithm (EWOA). …”
Get full text
Get full text
Get full text
Article -
14
Hybrid Optimization with Enhanced QoS-based Path Selection in VANETs
Published 2023“…This hybrid optimization combines the Improved ant colony optimization (ACO) and Effective Whale Optimization Algorithm (EWOA). …”
Get full text
Get full text
Get full text
Article -
15
Hybrid Optimization with Enhanced QoS-based Path Selection in VANETs
Published 2023“…This hybrid optimization combines the Improved ant colony optimization (ACO) and Effective Whale Optimization Algorithm (EWOA). …”
Get full text
Get full text
Get full text
Article -
16
Hybrid Optimization with Enhanced QoS-based Path Selection in VANETs
Published 2023“…This hybrid optimization combines the Improved ant colony optimization (ACO) and Effective Whale Optimization Algorithm (EWOA). …”
Get full text
Get full text
Get full text
Article -
17
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
Published 2018“…The main focus of the present research is the design of a model that prevents distributed denial-of-service attacks based on host-based intrusion detection protection systems over hypervisor environments. …”
Get full text
Get full text
Get full text
Book Chapter -
18
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…Focus will be given to research that have produced new intrusion detection algorithms, framework and model as well as their gaps in the research. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
DeepIoT.IDS: Hybrid deep learning for enhancing IoT network intrusion detection
Published 2021“…Therefore, it is important to design a self-adaptive model for an intrusion detection system (IDS) to improve the detection of attacks. …”
Get full text
Get full text
Get full text
Article -
20
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022Get full text
Get full text
Student Project
