Binary chimp optimization algorithm with ML based intrusion detection for secure IoT-assisted wireless sensor networks

M Aljebreen, MA Alohali, MK Saeed, H Mohsen… - Sensors, 2023 - mdpi.com
binary chimp optimization algorithm (MOBChOA) for selecting the feature optimally. Then,
for … and robust optimization algorithm that is capable of finding the global optimal solution in …

Red kite optimization algorithm with average ensemble model for intrusion detection for secure IoT

FF Alruwaili, MM Asiri, FS Alrayes, SS Aljameel… - IEEE …, 2023 - ieeexplore.ieee.org
… methodology is to accomplish security solutions for IoT-assisted WSNs. To accomplish
this… Binary chimp optimization algorithm with ML based intrusion detection for secure IoT-assisted

Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection

M Karthikeyan, D Manimegalai, K RajaGopal - Scientific Reports, 2024 - nature.com
… (CNN) with the Binary Chimp Optimization Algorithm (BCOA) for optimal feature classification.
The … evaluator functions involve constructing feature subsets from fireflies' binary solutions, …

[HTML][HTML] Hybrid Sine-Cosine Chimp optimization based feature selection with deep learning model for threat detection in IoT sensor networks

MA Alkhonaini, A Al Mazroa, M Aljebreen… - Alexandria Engineering …, 2024 - Elsevier
… Classical cyber-security systems defend consumers and devices over Intrusion Detection
Next, the SAE was integrated with the binary SCCOA technique to create a binary hybrid …

[HTML][HTML] Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review

S Sharma, V Kumar, K Dutta - Internet of Things and Cyber-Physical …, 2024 - Elsevier
intrusion detection model based on multi-objective feature selection using a binary whale
optimization algorithm… This paper discusses the existing security procedure and multiple …

Effective ensemble based intrusion detection and energy efficient load balancing using sunflower optimization in distributed wireless sensor network

VS Prasanth, A Mary Posonia, A Parveen Akhther - Multimedia Systems, 2024 - Springer
… Network security’s primary line of defence is intrusion detection [3]. In addition to protecting
… Energy efficiency is a key design consideration for IoT-assisted WSN nodes since they …

Mayfly Optimization Algorithm with Bidirectional Long-Short Term Memory for Intrusion Detection System in Internet of Things

SE Vadakkethil, K Polimetla, Z Alsalami… - 2024 Third …, 2024 - ieeexplore.ieee.org
… a DL- IDS for detect security threats in IoT networks. The Spider Monkey Optimization (SMO) …
Every dataset has various symbolic and binary input feature which are changed using label …

Optimising barrier placement for intrusion detection and prevention in WSNs

CKK Reddy, VS Kaza, PR Anisha, MM Khubrani… - Plos one, 2024 - journals.plos.org
security in WSNs, combining optimisation algorithms and regression modelling for barrier
placement optimisation [2… protecting IoT-assisted WSNs, opening the door for efficient intrusion

Insights into Modern Intrusion Detection Strategies for Internet of Things Ecosystems

B Isong, O Kgote, A Abu-Mahfouz - Electronics, 2024 - mdpi.com
… , ML-based IDS methods, attacks, DL-based IDS, security … The algorithms were applied
to binary classification, … selection algorithm based on random sampling to identify optimal

Recent Advances of Chimp Optimization Algorithm: Variants and Applications

MS Daoud, M Shehab, L Abualigah… - Journal of Bionic …, 2023 - Springer
algorithm called BCOA-MLID that combined Binary Chimp Optimization and Machine
Learning techniques for intrusion … to improve the accuracy of intrusion detection. A class-specific …