z-logo
open-access-imgOpen Access
Intrusion Detection Network Attacks Based on Whale Optimization Algorithm
Author(s) -
Sundus Abdulmuttalib Mohamed,
Omar Ibrahim Alsaif,
Ibrahim A. Saleh
Publication year - 2022
Publication title -
ingénierie des systèmes d'information/ingénierie des systèmes d'information
Language(s) - Uncategorized
Resource type - Journals
SCImago Journal Rank - 0.161
H-Index - 8
eISSN - 2116-7125
pISSN - 1633-1311
DOI - 10.18280/isi.270310
Subject(s) - computer science , network packet , intrusion detection system , data mining , network security , heuristic , algorithm , optimization algorithm , process (computing) , artificial intelligence , computer network , mathematical optimization , mathematics , operating system

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here