An ensemble framework with improved hybrid breeding optimization-based feature selection for intrusion detection

Z Ye, J Luo, W Zhou, M Wang, Q He - Future Generation Computer Systems, 2023 - Elsevier
Intrusion detection is a proactive means to detect network attacks and has been a hot point
in network security. To address the curse of dimensionality and improve the Intrusion …

Bio-inspired feature selection algorithms with their applications: a systematic literature review

TH Pham, B Raahemi - IEEE Access, 2023 - ieeexplore.ieee.org
Based on the principles of the biological evolution of nature, bio-inspired algorithms are
gaining popularity in developing robust techniques for optimization. Unlike gradient descent …

Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm

M Abd Elaziz, MAA Al-qaness, A Dahou… - … in Engineering Software, 2023 - Elsevier
Abstract The Internet of Things (IoT) enabled technology will be adopted to develop smart
cities, electronic commerce, electronic learning, electronic health, and other aspects of …

Energy-efficient cluster head selection in wireless sensor networks using an improved grey wolf optimization algorithm

M Rami Reddy, ML Ravi Chandra, P Venkatramana… - Computers, 2023 - mdpi.com
The internet of things (IoT) and industrial IoT (IIoT) play a major role in today's world of
intelligent networks, and they essentially use a wireless sensor network (WSN) as a …

Marine vessel classification and multivariate trajectories forecasting using metaheuristics-optimized extreme gradient boosting and recurrent neural networks

A Petrovic, R Damaševičius, L Jovanovic, A Toskovic… - Applied Sciences, 2023 - mdpi.com
Maritime vessels provide a wealth of data concerning location, trajectories, and speed.
However, while these data are meticulously monitored and logged to maintain course, they …

Anomaly detection in Internet of medical Things with Blockchain from the perspective of deep neural network

J Wang, H Jin, J Chen, J Tan, K Zhong - Information Sciences, 2022 - Elsevier
IoMT technology has many advantages in healthcare system, such as optimizing the
medical service model, improving the efficiency of hospital operation and management, and …

A cloud based optimization method for zero-day threats detection using genetic algorithm and ensemble learning

M Nkongolo, JP Van Deventer, SM Kasongo, SR Zahra… - Electronics, 2022 - mdpi.com
This article presents a cloud-based method to classify 0-day attacks from a novel dataset
called UGRansome1819. The primary objective of the research is to classify potential …

A hierarchical intrusion detection system based on extreme learning machine and nature-inspired optimization

A Alzaqebah, I Aljarah, O Al-Kadi - Computers & Security, 2023 - Elsevier
The surge in cyber-attacks has driven demand for robust Intrusion detection systems (IDSs)
to protect underlying data and sustain availability of network services. Detecting and …

Novel memetic of beluga whale optimization with self-adaptive exploration–exploitation balance for global optimization and engineering problems

AG Hussien, RA Khurma, A Alzaqebah, M Amin… - Soft Computing, 2023 - Springer
A population-based optimizer called beluga whale optimization (BWO) depicts behavioral
patterns of water aerobics, foraging, and diving whales. BWO runs effectively, nevertheless it …

Routing attacks detection in 6lowpan-based internet of things

A Alazab, A Khraisat, S Singh, S Bevinakoppa… - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) has become increasingly popular, and opened new possibilities
for applications in various domains. However, the IoT also poses security challenges due to …