… methodology is to accomplish security solutions for IoT-assisted WSNs. To accomplish this… Binarychimp optimization algorithm with MLbasedintrusiondetection for secureIoT-assisted …
… (CNN) with the BinaryChimpOptimizationAlgorithm (BCOA) for optimal feature classification. The … evaluator functions involve constructing feature subsets from fireflies' binary solutions, …
MA Alkhonaini, A Al Mazroa, M Aljebreen… - Alexandria Engineering …, 2024 - Elsevier
… Classical cyber-security systems defend consumers and devices over IntrusionDetection … Next, the SAE was integrated with the binary SCCOA technique to create a binary hybrid …
S Sharma, V Kumar, K Dutta - Internet of Things and Cyber-Physical …, 2024 - Elsevier
… intrusiondetection model based on multi-objective feature selection using a binary whale optimizationalgorithm… This paper discusses the existing security procedure and multiple …
VS Prasanth, A Mary Posonia, A Parveen Akhther - Multimedia Systems, 2024 - Springer
… Network security’s primary line of defence is intrusiondetection [3]. In addition to protecting … Energy efficiency is a key design consideration for IoT-assisted WSN nodes since they …
… a DL- IDS for detectsecurity threats in IoT networks. The Spider MonkeyOptimization (SMO) … Every dataset has various symbolic and binary input feature which are changed using label …
CKK Reddy, VS Kaza, PR Anisha, MM Khubrani… - Plos one, 2024 - journals.plos.org
… security in WSNs, combining optimisationalgorithms and regression modelling for barrier placement optimisation [2… protecting IoT-assisted WSNs, opening the door for efficient intrusion …
… , ML-based IDS methods, attacks, DL-based IDS, security … The algorithms were applied to binary classification, … selection algorithmbased on random sampling to identify optimal …
… algorithm called BCOA-MLID that combined BinaryChimpOptimization and Machine Learning techniques for intrusion … to improve the accuracy of intrusiondetection. A class-specific …