Search Results - (( parameter optimization method algorithm ) OR ( attack detection new algorithm ))
Search alternatives:
- parameter optimization »
- method algorithm »
- detection new »
- new algorithm »
-
1
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
2
A fast learning network with improved particle swarm optimization for intrusion detection system
Published 2019“…The focus of this research is on the development of a model that can optimize the initial parameters of FLN based on MRPSO to obtain an optimal set of initial parameters for FLN, thus, creating an optimal FLN classifier named as MRPSO-FLN which can improve the efficacy of network intrusion on data sets that contain instances of multiple classes of attacks. …”
Get full text
Get full text
Thesis -
3
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…Unfortunately,watermark resistance to geometric attacks is the most challenge work in traditional digital image watermarking techniques which causes incorrect watermark detection and extraction. …”
Get full text
Get full text
Thesis -
4
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
5
Spatial Signature Algorithm (SSA): A New Approach In Countermeasuring XML Signature Wrapping Attack
Published 2024journal::journal article -
6
-
7
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
9
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024“…Cloud implementations also introduce a new term, "co-residency" attack and lack of research focusing on detecting this type of attack. …”
Proceedings Paper -
10
Designing a new model for Trojan horse detection using sequential minimal optimization
Published 2024Conference Paper -
11
Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization
Published 2024“…Therefore, in this research paper, a new model called Efficient Trojan Detection Model (ETDMo) is built to detect trojan horse attacks more efficiently. …”
Proceedings Paper -
12
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
Published 2021“…GEADDDC generalizes the Renyi Joint Entropy algorithm and uses a dynamic threshold to detect DDoS attacks on the SDN controller.…”
Get full text
Get full text
Thesis -
13
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018“…Cloud implementations also introduce a new term, "co-residency" attack and lack of research focusing on detecting this type of attack. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…Therefore, the researcher is motivated to design a new intrusion detection architecture which involves new detection technique to efficiently detect the abnormalities in the ad hoc networks. …”
Get full text
Get full text
Get full text
Thesis -
15
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
16
Secure address resolution protocol proxy in software defined network
Published 2018“…In addition, ARP based attack detection technique combines ARP storm and ARP spoofing detection algorithms. …”
Get full text
Get full text
Get full text
Thesis -
17
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
Published 2017“…Most of the current intrusion detection systems implemented nowadays depend on expert systems where new attacks are not detectable. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
An intelligence technique for denial of service (DoS) attack detection
Published 2018“…Most of the current intrusion detection systems implemented nowadays depend on expert systems where new attacks are not detectable. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis
