Search Results - (( wave optimization methods algorithm ) OR ( attack detection modified algorithm ))

Refine Results
  1. 1

    An Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique by Al Ogaili, Riyadh Rahef Nuiaa

    Published 2023
    “…Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).…”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System by Ahmad, A, Zainuddin, WS, Kama, MN, Idris, NB, Saudi, MM

    Published 2024
    “…This research aims to provide a hybrid intrusion detection model for Cloud computing environment. For this purpose, a modified DCA is proposed in this research as the main detection algorithm in the new hybrid intrusion detection mechanism which works on Cloud Co-Residency Threat Detection (CCTD) that combines anomaly and misuse detection mechanism. …”
    Proceedings Paper
  4. 4

    Cloud co-residency denial of service threat detection inspired by artificial immune system by Ahmad, Azuan, Zainudin, Wan Shafiuddin, Kama, Mohd Nazri, Idris, Norbik Bashah, Mohd Saudi, Madihah

    Published 2018
    “…This research aims to provide a hybrid intrusion detection model for Cloud computing environment. For this purpose, a modified DCA is proposed in this research as the main detection algorithm in the new hybrid intrusion detection mechanism which works on Cloud CoResidency Threat Detection (CCTD) that combines anomaly and misuse detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Attacks detection in 6G wireless networks using machine learning by Saeed, Mamoon M., Saeed, Rashid A., Gaid, Abdulguddoos S. A., Mokhtar, Rania A., Khalifa, Othman Omran, Ahmed, Zeinab E.

    Published 2023
    “…Unlike the fifth generation (5G), which is well recognized for network cloudification with micro-service-oriented design, the sixth generation (6G) of networks is directly tied to intelligent network orchestration and management. The Attacks Detection in 6G (AD6Gs) wireless networks created by this research uses a Machine Learning (ML) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector by Abdulkader, Zaid A.

    Published 2018
    “…In instances when Blackhole and wormhole attacks take place in IAVSA and PDDA, a high detection rate that is close to 99% is observed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Inversion Of Surface Wave Phase Velocity Using New Genetic Algorithm Technique For Geotechnical Site Investigation by Hamimu, La

    Published 2011
    “…Therefore the use of genetic algorithm (GA) optimization technique which is one of nonlinear optimization methods is an appropriate choice to solve surface wave inversion problem having high nonlinearity and multimodality. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Optimizing the efficiency of Oscillating Water Column (OWC) wave energy converter using genetic algorithm by Nallagownden, P., Alhaj, H.M.M., Sarwar, M.B.

    Published 2015
    “…This paper, describes a method to maximize the pneumatic system efficiency using optimization technique based on Genetic algorithm. …”
    Get full text
    Get full text
    Article
  9. 9

    Low computational complexity for optimizing energy efficiency in mm-wave hybrid precoding system for 5G by Salh, Adeb, Audah, Lukman, Abdullah, Qazwan, Aydoğdu, Ömer, A. Alhartomi, Mohammed, Alsamhi, Saeed Hamood, A. Almalki, Faris, M. Shah, Nor Shahida

    Published 2021
    “…We propose effective alternating minimization algorithms based on the zero gradient method to establish fully-connected structures (FCSs) and partially-connected structures (PCSs). …”
    Get full text
    Get full text
    Article
  10. 10

    Low computational complexity for optimizing energy efficiency in mm-wave hybrid precoding system for 5G by Salh, Adeb, Audah, Lukman, Abdullah, Qazwan, Aydoğdu, Ömer, A. Alhartomi, Mohammed, Alsamhi, Saeed Hamood, A. Almalki, Faris, M. Shah, Nor Shahida

    Published 2021
    “…We propose effective alternating minimization algorithms based on the zero gradient method to establish fully-connected structures (FCSs) and partially-connected structures (PCSs). …”
    Get full text
    Get full text
    Article
  11. 11

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval by Naffouti, S.E., Fougerolle, Y., Aouissaoui, I., Sakly, A., Mériaudeau, F.

    Published 2018
    “…This paper presents an optimized wave kernel signature (OWKS) using a modified particle swarm optimization (MPSO) algorithm. …”
    Get full text
    Get full text
    Article
  13. 13

    Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval by Naffouti, S.E., Fougerolle, Y., Aouissaoui, I., Sakly, A., Mériaudeau, F.

    Published 2018
    “…This paper presents an optimized wave kernel signature (OWKS) using a modified particle swarm optimization (MPSO) algorithm. …”
    Get full text
    Get full text
    Article
  14. 14

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling by Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi

    Published 2011
    “…The result has shown that this algorithm has increased the detection rate and reduced the false alarm rate compared with Fuzzy-ART.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks by Malekzadeh, Mina

    Published 2011
    “…The proposed models prevent DoS and replay attacks by detecting and discarding forgery control frames belong to the attackers and thereby guarantee availability of the IEEE 802.11 wireless networks. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A lightweight cryptographic mutual authentication protocol which is resistant to tracking, denial of service (DoS) and replay attacks is proposed as a prevention mechanism. The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  18. 18

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The results demonstrated that the proposed method could generate an optimal collision-free path. …”
    Get full text
    Thesis
  19. 19

    Interferometric array planning using division algorithm for radio astronomy applications by Kiehbadroudinezhad, Shahideh

    Published 2017
    “…In the second scheme, a genetic algorithm is developed, in order to optimize a correlator array of antennas by using Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Thesis
  20. 20

    File integrity monitor scheduling based on file security level classification by Abdullah, Zul Hilmi, Udzir, Nur Izura, Mahmod, Ramlan, Samsudin, Khairulmizam

    Published 2011
    “…System files are common targets by the attackers. File integrity monitoring tools are widely used to detect any malicious modification to these critical files. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item