Search Results - (( parameter optimization path algorithm ) OR ( attack detection system algorithm ))
Search alternatives:
- parameter optimization »
- optimization path »
- system algorithm »
- path algorithm »
-
1
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…However, AODV suffers severely from the black hole attacks where the attacker node advertise itself as having the optimum path leading to the destination node by varying some essential parameters. …”
Get full text
Get full text
Get full text
Thesis -
2
Cognitive map approach for mobility path optimization using multiple objectives genetic algorithm
Published 2023Subjects:Conference Paper -
3
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
Get full text
Get full text
Article -
4
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…The deep learning approach plays a pertinent role in tracing new attacks in cybersecurity. Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff
Published 2011“…The objective is to verify and compare the effectiveness of both algorithms in finding the optimal robot path in different types of global map environments. …”
Get full text
Get full text
Thesis -
6
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Owing to the distributed nature of modern attacks (e.g. denial-of-service), it is extremely challenging to detect such malicious behaviour using traditional intrusion detection systems. …”
Get full text
Get full text
Thesis -
7
A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments
Published 2013“…Afterward, a genetic algorithm-based optimization framework was designed to improve the interpretability and accuracy of the proposed fuzzy-tabu controller by optimizing the parameters of the FLC and also some of the planner’s parameters in order to improve the quality of the generated paths and runtimes of the planner and also to decrease the variation of the results in different runs of the planner. …”
Get full text
Get full text
Thesis -
8
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…As a result of implementing this system: misused detection module uses the signature of attacks to detection the known attacks; anomaly detection module can detect the unknown attacks; signature generation module extracts the signature of attacks that are detected by Anomaly Detection System module, and maps the signatures into snort rules.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Published 2021“…This means that Multilayer Perceptron algorithm can detect APT attack more accurately. …”
Get full text
Get full text
Get full text
Other -
10
Modelling of multi-robot system for search and rescue
Published 2023“…This report focusses on developing a novel multi-robot path planning algorithm based on the Modified Particles Swarm Optimization (MPSO) algorithm for dynamic environments. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
12
A comparative study between deep learning algorithm and bayesian network on Advanced Persistent Threat (APT) attack detection
Published 2021“…This means that Multilayer Perceptron algorithm can detect APT attack more accurately. …”
Get full text
Get full text
Get full text
Other -
13
The Implementation of Genetic Algorithm in Path Optimization
Published 2005“…Therefore, the implementation ofGA in path optimization can be ascertained offering a compelling result.…”
Get full text
Get full text
Final Year Project -
14
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
15
Evaluation of robot path planning algorithms in global static environments: genetic algorithm vs ant colony optimization algorithm / Nohaidda Sariff and Norlida Buniyamin
Published 2010“…This paper presents the application of Genetic Algorithm and Ant Colony Optimization (ACO) Algorithm for robot path planning (RPP) in global static environment. …”
Get full text
Get full text
Get full text
Article -
16
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024Subjects:journal::journal article -
17
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The "Remote to Local (R2L) Intrusion Detection System Using Decision Tree" project aims to address the escalating threat of network intrusions by developing an effective intrusion detection system. …”
Get full text
Get full text
Thesis -
18
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
19
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
20
