Showing 1 - 20 results of 3,092 for search '(selection OR detection) attacks', query time: 0.18s Refine Results
  1. 1

    Accurate detection of selective forwarding attack in wireless sensor networks by Qiong Zhang, Wenzheng Zhang

    Published 2019-01-01
    “…Moreover, to prevent collaborative selective forwarding attack, E-watchdog uses reports from more than one detection agents. …”
    Get full text
    Article
  2. 2

    Improving Attack Detection in IoV with Class Balancing and Feature Selection by Thierry Widyatama, Ifan Rizqa, Fauzi Adi Rafrastara

    Published 2025-03-01
    “…This study investigates the enhancement of detection efficiency for DoS and spoofing attacks in IoV by employing Ensemble Learning methods combined with feature selection techniques. …”
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    Intelligent Cyber-Attack Detection in IoT Networks Using IDAOA-Based Wrapper Feature Selection by Mohammed Abdullah, Ryna Svyd

    Published 2025-06-01
    “… ABSTRACT: In the realm of cybersecurity, the increasing sophistication of cyber-attacks demands the creation of sophisticated intrusion detection systems (IDS) designed to accurately detect and counteract threats in real-time. …”
    Get full text
    Article
  7. 7

    RF-RFE-SMOTE: A DoS And DDoS Attack Detection Framework by Nora Rashid Najam, Razan Abdulhammed Abduljawad

    Published 2023-10-01
    “…For this reason, this thesis utilized one of the most recent datasets (CSE-CICIDS2018 and CIC-DDoS2019) containing most Dos/DDoS attacks. This study proposed a framework based on Machine Learning for detecting denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks. …”
    Get full text
    Article
  8. 8
  9. 9

    Intelligent intrusion detection system based on crowd search optimization for attack classification in network security by Chetan Gupta, Amit Kumar, Neelesh Kumar Jain

    Published 2025-07-01
    “…In comparison to the various state-of-the-art classifiers, the CSO method was applied to the NSL-KDD dataset and the ROSPaCe dataset for the detection of the attacks. In the proposed work, we have used a random forest technique to perform feature selection (FS) to improve the effectiveness and efficiency of intrusion detection. …”
    Get full text
    Article
  10. 10
  11. 11

    RF-SFAD: A RANDOM FOREST MODEL FOR SELECTIVE FORWARDING ATTACK DETECTION IN MOBILE WIRELESS SENSOR NETWORKS by N Usha Bhanu, Soubhagya Ranjan Mallick, Sreenivasa Rao Chappidi, K Sangeethalakshmi

    Published 2025-06-01
    Subjects: “…mobile wireless sensor networks, random forest algorithm, selective forwarding attack detection, clustering, feature selection.…”
    Get full text
    Article
  12. 12

    Text Select-Backdoor: Selective Backdoor Attack for Text Recognition Systems by Hyun Kwon, Jang-Woon Baek

    Published 2024-01-01
    “…In a backdoor attack, an attacker employs a specific trigger to initiate the attack. …”
    Get full text
    Article
  13. 13
  14. 14

    Network Attack Detection for Business Safety by Fadia Abduljabbar Saeed, Ghalia Nassreddine, Joumana Younis

    Published 2024-03-01
    “…In this paper, a machine learning-based approach was developed to detect network attacks. Two Machine learning models were used: Support vector machine and Artificial neural network. …”
    Get full text
    Article
  15. 15

    About Detection of Code Reuse Attacks by Yury V. Kosolapov

    Published 2019-06-01
    “…At the heart of these attacks lies the detection, in the vulnerable program of suitable areas, of executable code — gadgets — and chaining these gadgets into chains. …”
    Get full text
    Article
  16. 16

    Android collusion attack detection model by Hongyu YANG, Zaiming WANG

    Published 2018-06-01
    “…In order to solve the problem of poor efficiency and low accuracy of Android collusion detection,an Android collusion attack model based on component communication was proposed.Firstly,the feature vector set was extracted from the known applications and the feature vector set was generated.Secondly,the security policy rule set was generated through training and classifying the privilege feature set.Then,the component communication finite state machine according to the component and communication mode feature vector set was generated,and security policy rule set was optimized.Finally,a new state machine was generated by extracting the unknown application’s feature vector set,and the optimized security policy rule set was matched to detect privilege collusion attacks.The experimental results show that the proposed model has better detective efficiency and higher accuracy.…”
    Get full text
    Article
  17. 17
  18. 18

    Detecting LDoS attack based on ASPQ by Jing ZHANG, Hua-ping HU, Bo LIU, Feng-tao XIAO

    Published 2012-05-01
    “…Based on the analysis of the effects on average size of packet in the queue which LDoS attack makes,the change of this value was got by simulation on NS2.So detection algorithm was proposed,and was applied on Droptail and RED,which were typical queue management algorithm.The result of simulation shows that the algorithm can effectively detect the LDoS attack.…”
    Get full text
    Article
  19. 19
  20. 20

    Optimizing feature selection and deep learning techniques for precise detection of low-rate distributed denial of service (LDDoS) attack by Naeem Ali Al-Shukaili, Miss Laiha M. Kiah, Ismail Ahmedy

    Published 2025-07-01
    “…Low-rate DDoS refers to the small number of requests to overcome the sudden spikes that disrupt the server.This work aims to improve the detection of two common LDDoS attack types, slowloris and slowhttptest simulated attacks, by optimizing feature selection and utilizing deep learning techniques. …”
    Get full text
    Article