Search alternatives:
selection » detection (Expand Search)
Showing 21 - 40 results of 1,084 for search 'selection attacks', query time: 0.12s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24

    RF-SFAD: A RANDOM FOREST MODEL FOR SELECTIVE FORWARDING ATTACK DETECTION IN MOBILE WIRELESS SENSOR NETWORKS by N Usha Bhanu, Soubhagya Ranjan Mallick, Sreenivasa Rao Chappidi, K Sangeethalakshmi

    Published 2025-06-01
    Subjects: “…mobile wireless sensor networks, random forest algorithm, selective forwarding attack detection, clustering, feature selection.…”
    Get full text
    Article
  5. 25

    Enhanced Deep Autoencoder-Based Reinforcement Learning Model with Improved Flamingo Search Policy Selection for Attack Classification by Dharani Kanta Roy, Hemanta Kumar Kalita

    Published 2025-01-01
    “…The enhancement of deep reinforcement learning is made by associating a deep autoencoder (AE) and an improved flamingo search algorithm (IFSA) to approximate the Q-function and optimal policy selection. After feature representations, a support vector machine (SVM) classifier, which discriminates the input into normal and attack instances, is employed for classification. …”
    Get full text
    Article
  6. 26

    Optimizing feature selection and deep learning techniques for precise detection of low-rate distributed denial of service (LDDoS) attack by Naeem Ali Al-Shukaili, Miss Laiha M. Kiah, Ismail Ahmedy

    Published 2025-07-01
    “…Low-rate DDoS refers to the small number of requests to overcome the sudden spikes that disrupt the server.This work aims to improve the detection of two common LDDoS attack types, slowloris and slowhttptest simulated attacks, by optimizing feature selection and utilizing deep learning techniques. …”
    Get full text
    Article
  7. 27
  8. 28

    An Immunology Inspired Flow Control Attack Detection Using Negative Selection with -Contiguous Bit Matching for Wireless Sensor Networks by Muhammad Zeeshan, Huma Javed, Amna Haider, Aumbareen Khan

    Published 2015-11-01
    “…An Anomaly Detection System (ADS) framework inspired from the Human Immune System is implemented in this paper for detecting Sybil attacks in WSNs. This paper implemented an improved, decentralized, and customized version of the Negative Selection Algorithm (NSA) for data flow anomaly detection with learning capability. …”
    Get full text
    Article
  9. 29
  10. 30
  11. 31

    Adversarial Threats to Cloud IDS: Robust Defense With Adversarial Training and Feature Selection by Hariprasad Holla, Shashidhar Reddy Polepalli, Arun Ambika Sasikumar

    Published 2025-01-01
    “…To mitigate these vulnerabilities, we explicitly propose a dual-layered defense strategy: (i) adversarial training, explicitly incorporating adversarial examples into model training to improve robustness, and (ii) SHAP-based robust feature selection, explicitly enhancing interpretability and resilience by identifying stable, attack-resistant features. …”
    Get full text
    Article
  12. 32
  13. 33
  14. 34

    Enhancing Cybersecurity Through Fusion of Optimization With Deep Wavelet Neural Networks on Denial of Wallet Attack Detection in Serverless Computing by P. Renukadevi, Sibi Amaran, A. Vikram, T. Prabhakara Rao, Mohamad Khairi Ishak

    Published 2025-01-01
    “…Besides, the pair barracuda swarm optimization (PBSO) method is employed to select features optimally. To recognize a DoW attack, the FODWNN-DoWAD method utilizes a deep wavelet neural network (DWNN) model. …”
    Get full text
    Article
  15. 35

    Improving IoT Network Longevity with Attack Repellent Energy (SARE) Algorithm for Energy-Efficient and Secure Routing by Indra Pandian, Shanthi Thirugnasambantham, Karthikeyan Balasubramaniam, Kirubaburi Ravichandran

    Published 2025-01-01
    “…The proposed Secure Attack Repellent Energy (SARE) algorithm selects CHs based on the K-Nearest Neighbor (KNN) algorithm, which evaluates residual energy by considering the battery voltage attached to each node. …”
    Get full text
    Article
  16. 36
  17. 37

    DDoSNet: Detection and prediction of DDoS attacks from realistic multidimensional dataset in IoT network environment by Goda Srinivasa Rao, P. Santosh Kumar Patra, V.A. Narayana, Avala Raji Reddy, G.N.V. Vibhav Reddy, D. Eshwar

    Published 2024-09-01
    “…By integrating ABO with the decision tree, a subset of features is selected that maximizes the discrimination between regular network traffic and DDoS attacks. …”
    Get full text
    Article
  18. 38
  19. 39
  20. 40

    Comparison of selected physical fitness components among male football players of different playing positions by Amandeep Sıngh, Sukhdev Sıngh, Vishaw Gaurav

    Published 2015-11-01
    “…The purpose of this study was to examine the level of physical fitness among male football players in relation to their different playing positions i.e. goalkeepers, defenders, midfielders and attackers. A sample of forty (N = 40) male football players (mean ± SD: age 20.45 ± 1.70 years, height 1.84 ± 4.07 m, weight 81.62 ± 5.45 kg, BMI 23.99 ± 1.66m), which includes ten each goalkeepers, defenders, midfielders and attackers, who participated in inter-college competitions of Guru Nanak Dev University, Amritsar, India, was selected. …”
    Get full text
    Article