Search Results - (( parameter optimization method algorithm ) OR ( attack detection means algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works by Gorment N.Z., Selamat A., Krejcar O.

    Published 2023
    “…Barium compounds; Cybersecurity; Data mining; Decision trees; Evolutionary algorithms; K-means clustering; Learning algorithms; Malware; Network security; Sodium compounds; Support vector machines; 'current; Comparatives studies; Cyber security; K-means; Machine learning algorithms; Malware attacks; Malware detection; Metaheuristic; Recent researches; Systematic literature review; Nearest neighbor search…”
    Conference Paper
  4. 4

    Anomaly-based intrusion detection through K-means clustering and naives Bayes classification by Mohamed Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md. Nasir

    Published 2013
    “…Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification by Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md Nasir

    Published 2013
    “…Intrusion detection systems (IDSs) effectively balance extra security appliance by identifying intrusive activities on a computer system, and their enhancement is emerging at an unexpected rate.Anomaly-based intrusion detection methods, which employ machine learning algorithms, are able to identify unforeseen attacks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    An improved hybrid learning approach for better anomaly detection by Mohamed Yassin, Warusia

    Published 2011
    “…Nonetheless, current anomaly detection techniques are unable to detect all types of attacks accurately and correctly. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics by Al-Araji, Zaid Jasim Mohammed

    Published 2023
    “…This study employs use Random Forest algorithm to identify and forecast attacks to dynamically locate the attack location in the network for attack graph analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    KM-NEU: an efficient hybrid approach for intrusion detection system by Lisehroodi, Mazyar Mohammadi, Muda, Zaiton, Yassin, Warusia, Udzir, Nur Izura

    Published 2014
    “…The anomaly-based Intrusion Detection Systems (IDS) are able to detect unknown attacks. …”
    Get full text
    Get full text
    Article
  9. 9

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Hence, there must be substantial improvement in network intrusion detection techniques and systems. Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A hybrid framework based on neural network MLP and means clustering for intrusion detection system by Lisehroodi, Mazyar Mohammadi, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…Concerning the robustness of K-means method and MLP algorithms benefits, this research is the part of an effort to develop a hybrid information detection system (IDS) which is able to detect high percentage of novel attacks while keep the false alarm at low rate.This paper provides the conceptual view and a general framework of the proposed system.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling by Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi

    Published 2011
    “…This paper presents our work to improve the performance of anomaly intrusion detection using Fuzzy-ART based on the K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    A hybrid framework based on neural network MLP and K-means clustering for intrusion detection system by Lisehroodi, Mazyar Mohammadi, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…Concerning the robustness of K-means method and MLP algorithms benefits, this research is the part of an effort to develop a hybrid information detection system (IDS) which is able to detect high percentage of novel attacks while keep the false alarm at low rate. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Optimization of turning parameters using genetic algorithm method by Shah Izwandi, Mohd Zawawi

    Published 2008
    “…This study about development of optimization for turning parameters based on the Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Parameters optimization of surface grinding process with particles swarm optimization, gravitational search, and sine cosine algorithms: a comparative analysis by Asrul, Adam

    Published 2018
    “…The efficiency of the three algorithms are evaluated and compared with previous results obtained by other optimization methods on similar studies. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Optimization of PID parameters for hydraulic positioning system utilizing variable weight Grey-Taguchi and particle swarm optimization by Nur Iffah, Mohamed Azmi

    Published 2014
    “…Particle swarm optimization algorithm (PSO) is one of the artificial intelligence methods. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Anomaly-based intrusion detection using fuzzy rough clustering by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, M. N. M, Srinoy, Surat, Chimphlee, Siriporn

    Published 2006
    “…It is an important issue for the security of network to detect new intrusion attack and also to increase the detection rates and reduce false positive rates in Intrusion Detection System (IDS). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Enhancement of most significant bit (MSB) algorithm using discrete cosine transform (DCT) in non-blind watermarking / Halimah Tun Abdullah by Abdullah, Halimah Tun

    Published 2014
    “…According to how watermark detected and extracted, this project use non-blind watermarking mean need an original image during extraction process. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimization of turning parameters using ant colony optimization by Mohamad Nazri, Semoin

    Published 2008
    “…The project objectives are to develop Ant Colony Optimization (ACO) algorithm for CNC turning process and to optimize turning parameters for minimized production cost per unit. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Parameter estimation in double exponential smoothing using genetic algorithm / Foo Fong Yeng, Lau Gee Choon and Zuhaimy Ismail by Foo, Fong Yeng, Lau, Gee Choon, Ismail, Zuhaimy

    Published 2014
    “…Trial and error often serves as the best method to determine the parameter. Therefore, a good optimization technique is required for identify the best parameter in minimizing the forecast errors. …”
    Get full text
    Get full text
    Research Reports