Search Results - (( intrusion prevention model algorithm ) OR ( whale optimization path algorithm ))

Refine Results
  1. 1

    Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm by Machmudah, Affiani, Parman, Setyamartana, Abbasi, Aijaz, Solihin, Mahmud Iwan, Abd Manan, Teh Sabariah, Beddu, Salmia, Ahmad, Amiruddin, Wan Rasdi, Nadiah

    Published 2021
    “…To solve the redundancy resolution, meta-heuristic optimizations, namely Genetic Algorithm (GA) and Whale Optimization Algorithm (WOA), are applied to search optimal trajectories inside local orientation angle boundaries. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Optimization of multi-holes drilling path using particle swarm optimization by Najwa Wahida, Zainal Abidin, M. F. F., Ab Rashid, N. M. Zuki, N. M.

    Published 2018
    “…PSO is also compared with another algorithm like Whale Optimization Algorithm, Ant Lion Optimizer, Dragonfly Algorithm, Grasshopper Optimization Algorithm, Moth-flame Optimization and Sine Cosine Algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  6. 6
  7. 7
  8. 8

    The Hybrid of WOABAT-IFDO Optimization Algorithm and Its Application in Crowd Evacuation Simulation by Hamizan, Sharbini, Roselina, Sallehuddin, Habibollah, Haron

    Published 2023
    “…This paper proposes a new hybrid of nature inspired optimization algorithm (IFDO-WOABAT) based on the latest optimization algorithm namely Improved Fitness Dependent Optimization (IFDO) with Whale-Bat Optimization algorithm (WOABAT). …”
    Get full text
    Get full text
    Get full text
    Proceeding
  9. 9

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory by Muna, Elsadig, Azween, Abdullah

    Published 2010
    “…The abnormal activities are prevented and healed by the presented algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Hybrid Optimization with Enhanced QoS-based Path Selection in VANETs by F. Al-dolaimy, F. Al-dolaimy, Rabei Raad Ali, Rabei Raad Ali, Noor Nabeel, Noor Nabeel

    Published 2023
    “…This hybrid optimization combines the Improved ant colony optimization (ACO) and Effective Whale Optimization Algorithm (EWOA). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing by Jaber, Aws Naser, Mohamad Fadli, Zolkipli, Shakir, Hasan Awni

    Published 2018
    “…The main focus of the present research is the design of a model that prevents distributed denial-of-service attacks based on host-based intrusion detection protection systems over hypervisor environments. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  18. 18

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…Focus will be given to research that have produced new intrusion detection algorithms, framework and model as well as their gaps in the research. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    DeepIoT.IDS: Hybrid deep learning for enhancing IoT network intrusion detection by A. Mostafa, Salama, Al-Azzawi, Ziadoon Kamil Maseer, Bahaman, Nazrulazhar, Yusof, Robiah, Musa, Omar, Al-rimy, Bander Ali Saleh

    Published 2021
    “…Therefore, it is important to design a self-adaptive model for an intrusion detection system (IDS) to improve the detection of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20