2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf) 2019
DOI: 10.1109/nigeriacomputconf45974.2019.8949671
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Method for Discriminating Flash Event from DoS Attack during Internet Protocol Traceback using Shark Smell Optimization Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Shark Smell Optimization (SSO) has relied on the Shark's ability because it has superiority in catching prey by using a strong smell sense in a short time [18]- [20]. SSO algorithm consists of four basic steps as follows:…”
Section: Feature Extraction By Using Sso Algorithmmentioning
confidence: 99%
“…Shark Smell Optimization (SSO) has relied on the Shark's ability because it has superiority in catching prey by using a strong smell sense in a short time [18]- [20]. SSO algorithm consists of four basic steps as follows:…”
Section: Feature Extraction By Using Sso Algorithmmentioning
confidence: 99%
“…The key factor that guides the shark toward its prey is concentration. Moreover, if the concentration is strong, the shark's movement will be increased [17], [18]. The pseudo code of the SSO Algorithm is described in the algorithm (1) below.…”
Section: Sso Algorithmmentioning
confidence: 99%
“…The idea of combining a uniform random number in the range of [1, 0] with a distributed speed-updating procedure has been derived from the gravitational search method. Accordingly, we can present the speed in any dimension by the following format (Salami et al, 2019):…”
Section: Shark Movement Toward Bait: the Evolution Of Algorithmsmentioning
confidence: 99%