Search Results

Results (10)

Search Parameters:

Keyword: False positive
Order results
Results per page
Open AccessArticle
10 Pages, 805 KB Download PDF

Optimized Component based Selection using LSTM Model by Integrating Hybrid MVO-PSO Soft Computing Technique

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 62–71, 2021; DOI: 10.25046/aj060408
Abstract:

Research focused on training and testing of dataset after Optimizing Software Component with the help of deep neural network mechanism. Optimized components are selected for training and testing to improve the accuracy at the time of software selection. Selected components are required to be attuned and accommodating as per requirement. Soft computing mechanism such as…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Multidisciplinary Materials Science (MMU))
Open AccessArticle
6 Pages, 1,023 KB Download PDF

Homology Modeling of CYP6Z3 Protein of Anopheles Mosquito

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 580–585, 2021; DOI: 10.25046/aj060266
Abstract:

The Anopheles gambiae’s CYP6Z3 protein belongs to the Cytochrome P450 family and functions in oxidation-reduction processes, many studies including our previous work on elucidating insecticide resistance genes of the Anopheles also implicated her in pyrethroid insecticide resistance. Model prediction, functional analysis, and enrichment of the target gene with triplex binding sites may become a useful…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Mathematical & Computational Biology (MCB))
Open AccessArticle
8 Pages, 591 KB Download PDF

Improved Detection of Advanced Persistent Threats Using an Anomaly Detection Ensemble Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 295–302, 2021; DOI: 10.25046/aj060234
Abstract:

Rated a high-risk cyber-attack type, Advanced Persistent Threat (APT) has become a cause for concern to cyber security experts. Detecting the presence of APT in order to mitigate this attack has been a major challenge as successful attacks to large organizations still abound. Our approach combines static rule anomaly detection through pattern recognition and machine…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
9 Pages, 858 KB Download PDF

An Evaluation of some Machine Learning Algorithms for the detection of Android Applications Malware

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1741–1749, 2020; DOI: 10.25046/aj0506208
Abstract:

Android Operating system (OS) has been used much more than all other mobile phone’s OS turning android OS to a major point of attack. Android Application installation serves as a major avenue through which attacks can be perpetrated. Permissions must be first granted by the users seeking to install these third-party applications. Some permissions can…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 3,910 KB Download PDF

Nonlinear \(\ell_{2,p}\)-norm based PCA for Anomaly Network Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 234–243, 2020; DOI: 10.25046/aj050429
Abstract:

Intrusion detection systems are well known for their ability to detect internal and external intrusions, it usually recognizes intrusions through learning the normal behaviour of users or the normal traffic of activities in the network. So, if any suspicious activity or behaviour is detected, it informs the users of the network. Nonetheless, intrusion detection system…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 1,578 KB Download PDF

Improved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 249–258, 2020; DOI: 10.25046/aj050332
Abstract:

Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
18 Pages, 2,130 KB Download PDF

A Support Vector Machine Cost Function in Simulated Annealing for Network Intrusion Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 260–277, 2019; DOI: 10.25046/aj040334
Abstract:

This paper proposes a computationally intelligent algorithm for extracting relevant features from a training set. An optimal subset of features is extracted from training examples of network intrusion datasets. The Support Vector Machine (SVM) algorithm is used as the cost function within the thermal equilibrium loop of the Simulated Annealing (SA) algorithm. The proposed fusion…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
9 Pages, 1,043 KB Download PDF

A Novel Rule Based Technique to Detect Electricity Theft in India

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 413–421, 2019; DOI: 10.25046/aj040251
Abstract:

It is high time to control and prevent power theft by manipulating the meter reading and tampering of the meter. It is possible to deal power theft by developing Advanced Metering Infrastructure (AMI) and smart grids. For most of the distribution companies, utility smart meters’ data is serving as wealthy source of information beyond billing.…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
7 Pages, 975 KB Download PDF

Building an Efficient Alert Management Model for Intrusion Detection Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 18–24, 2018; DOI: 10.25046/aj030103
Abstract:

This paper is an extension of work originally presented in WITS-2017 CONF. We extend our previous works by improving the Risk calculation formula, and risk assessment of an alert cluster instead of every single alert. Also, we presented the initial results of the implementation of our model based on risk assessment and alerts prioritization. The…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
19 Pages, 1,686 KB Download PDF

A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 302–320, 2017; DOI: 10.25046/aj020340
Abstract:

A wormhole attack is one of the most critical and challenging security threats for wireless sensor networks because of its nature and ability to perform concealed malicious activities. This paper proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). Most wormhole detection schemes reported in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026