Search Results - (( model evaluation method algorithm ) OR ( attack detection method algorithm ))
Search alternatives:
-
1
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
Get full text
Get full text
Article -
2
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…It involves development of Max-Min Rule-Based Classification Algorithm. The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
3
-
4
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
5
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
Get full text
Get full text
Student Project -
6
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
text::Thesis -
7
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…In addition, four types of intrusion detection evaluation datasets were applied to evaluate the proposed model in comparison to the others. …”
Get full text
Get full text
Get full text
Article -
8
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The main aim of this work is focusing on solving the IT-related challenge lack-of-adequate knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
9
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…To secure these critical infrastructures, security measures should be examined and implemented. These methods could be hardware-based, such as Intrusion Detection Systems (IDS), software-based, or managerial-based. …”
Get full text
Get full text
Get full text
Article -
10
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…However, these algorithms often fall short in consistently detecting and classifying network intrusions, particularly when distinctions between classes are subtle or when facing evolving attack patterns. …”
Get full text
Get full text
Get full text
Thesis -
11
Modelling of intelligent intrusion detection system: making a case for snort
Published 2018“…Hence, this study proposes a method for early detection of an intrusion by using Snort software. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…A proposed model has been practically used to the problem of intrusion detection as well as been validated using the NSL-KDD dataset. …”
Get full text
Get full text
Get full text
Article -
13
Adaptive feature selection for denial of services (DoS) attack
Published 2017“…In this paper, we propose combining two techniques in feature selection algorithm, namely consistency subset evaluation (CSE) and DDoS characteristic features (DCF) to identify and select the most important and relevant features related DDoS attacks. …”
Get full text
Get full text
Conference or Workshop Item -
14
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Spear- phishing attack detection using artificial intelligence
Published 2024“…The Spear Phishing Attack Detection system employs models such as Logistic Regression, Random Forest, and ensemble methods to identify and block phishing URLs. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…To ensure the reliability of our proposed method, we simulate two well-known attacks, called Sybil and sinkhole attacks. …”
Get full text
Get full text
Article -
17
-
18
-
19
-
20
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
Published 2023“…This approach can be deployed as an autonomous detection system without the need for any offline retraining process of the model to detect the evolved XSS attack.…”
Get full text
Get full text
Get full text
Article
