Enhancing Cyber Security Attack Prediction: A Weighted Optimized Ensemble Approach Using DTO+DE Algorithm. Zaki, A. M., Abdelhamid, A. A., Ibrahim, A., Eid, M. M., & El-Kenawy, E. M. International Journal of Wireless and Ad Hoc Communication, Volume 7(Issue 2):64–73, 2023. Publisher: American Scientific Publishing Group (ASPG)
Paper doi abstract bibtex american scientific publishing group
@article{zaki_enhancing_2023-1,
title = {Enhancing {Cyber} {Security} {Attack} {Prediction}: {A} {Weighted} {Optimized} {Ensemble} {Approach} {Using} {DTO}+{DE} {Algorithm}},
volume = {Volume 7},
copyright = {All rights reserved},
shorttitle = {Enhancing {Cyber} {Security} {Attack} {Prediction}},
url = {https://www.americaspg.com/articleinfo/20/show/2385},
doi = {10.54216/IJWAC.070205},
abstract = {american scientific publishing group},
language = {en},
number = {Issue 2},
urldate = {2024-01-06},
journal = {International Journal of Wireless and Ad Hoc Communication},
author = {Zaki, Ahmed Mohamed and Abdelhamid, Abdelaziz A. and Ibrahim, Abdelhameed and Eid, Marwa M. and El-Kenawy, El-Sayed M.},
year = {2023},
note = {Publisher: American Scientific Publishing Group (ASPG)},
pages = {64--73},
}
Downloads: 0
{"_id":"aPvmjvJqtqx8eTadr","bibbaseid":"zaki-abdelhamid-ibrahim-eid-elkenawy-enhancingcybersecurityattackpredictionaweightedoptimizedensembleapproachusingdtodealgorithm-2023","author_short":["Zaki, A. M.","Abdelhamid, A. A.","Ibrahim, A.","Eid, M. M.","El-Kenawy, E. M."],"bibdata":{"bibtype":"article","type":"article","title":"Enhancing Cyber Security Attack Prediction: A Weighted Optimized Ensemble Approach Using DTO+DE Algorithm","volume":"Volume 7","copyright":"All rights reserved","shorttitle":"Enhancing Cyber Security Attack Prediction","url":"https://www.americaspg.com/articleinfo/20/show/2385","doi":"10.54216/IJWAC.070205","abstract":"american scientific publishing group","language":"en","number":"Issue 2","urldate":"2024-01-06","journal":"International Journal of Wireless and Ad Hoc Communication","author":[{"propositions":[],"lastnames":["Zaki"],"firstnames":["Ahmed","Mohamed"],"suffixes":[]},{"propositions":[],"lastnames":["Abdelhamid"],"firstnames":["Abdelaziz","A."],"suffixes":[]},{"propositions":[],"lastnames":["Ibrahim"],"firstnames":["Abdelhameed"],"suffixes":[]},{"propositions":[],"lastnames":["Eid"],"firstnames":["Marwa","M."],"suffixes":[]},{"propositions":[],"lastnames":["El-Kenawy"],"firstnames":["El-Sayed","M."],"suffixes":[]}],"year":"2023","note":"Publisher: American Scientific Publishing Group (ASPG)","pages":"64–73","bibtex":"@article{zaki_enhancing_2023-1,\n\ttitle = {Enhancing {Cyber} {Security} {Attack} {Prediction}: {A} {Weighted} {Optimized} {Ensemble} {Approach} {Using} {DTO}+{DE} {Algorithm}},\n\tvolume = {Volume 7},\n\tcopyright = {All rights reserved},\n\tshorttitle = {Enhancing {Cyber} {Security} {Attack} {Prediction}},\n\turl = {https://www.americaspg.com/articleinfo/20/show/2385},\n\tdoi = {10.54216/IJWAC.070205},\n\tabstract = {american scientific publishing group},\n\tlanguage = {en},\n\tnumber = {Issue 2},\n\turldate = {2024-01-06},\n\tjournal = {International Journal of Wireless and Ad Hoc Communication},\n\tauthor = {Zaki, Ahmed Mohamed and Abdelhamid, Abdelaziz A. and Ibrahim, Abdelhameed and Eid, Marwa M. and El-Kenawy, El-Sayed M.},\n\tyear = {2023},\n\tnote = {Publisher: American Scientific Publishing Group (ASPG)},\n\tpages = {64--73},\n}\n\n","author_short":["Zaki, A. M.","Abdelhamid, A. A.","Ibrahim, A.","Eid, M. M.","El-Kenawy, E. M."],"key":"zaki_enhancing_2023-1","id":"zaki_enhancing_2023-1","bibbaseid":"zaki-abdelhamid-ibrahim-eid-elkenawy-enhancingcybersecurityattackpredictionaweightedoptimizedensembleapproachusingdtodealgorithm-2023","role":"author","urls":{"Paper":"https://www.americaspg.com/articleinfo/20/show/2385"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://bibbase.org/network/files/hJygNjxaDmfvtehHX","dataSources":["Gr4oTE3gHGLJxgDAy"],"keywords":[],"search_terms":["enhancing","cyber","security","attack","prediction","weighted","optimized","ensemble","approach","using","dto","algorithm","zaki","abdelhamid","ibrahim","eid","el-kenawy"],"title":"Enhancing Cyber Security Attack Prediction: A Weighted Optimized Ensemble Approach Using DTO+DE Algorithm","year":2023}