A new approach to data analysis using machine learning for cybersecurity

S Hiremath, E Shetty, AJ Prakash, SP Sahoo… - Big Data and Cognitive …, 2023 - mdpi.com
The internet has become an indispensable tool for organizations, permeating every facet of
their operations. Virtually all companies leverage Internet services for diverse purposes …

Selection of contributing factors for predicting landslide susceptibility using machine learning and deep learning models

C Chen, L Fan - Stochastic Environmental Research and Risk …, 2023 - Springer
Landslides are a common natural disaster that can cause casualties, property safety threats
and economic losses. Therefore, it is important to understand or predict the probability of …

A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization

I Benmessahel, K Xie, M Chellal, T Semong - Evolutionary Intelligence, 2019 - Springer
The need to avoid computer system breaches is increasing. Many researchers have
adopted different approaches, such as intrusion detection systems (IDSs), to handle various …

An interactive filter-wrapper multi-objective evolutionary algorithm for feature selection

Z Liu, B Chang, F Cheng - Swarm and Evolutionary Computation, 2021 - Elsevier
As an important task in data mining, feature selection can improve the performance of
classification by eliminating the redundant or irrelevant features in original data. It is mainly …

Feature selection algorithms in intrusion detection system: A survey

S Maza, M Touahria - KSII Transactions on Internet and Information …, 2018 - koreascience.kr
Regarding to the huge number of connections and the large flow of data on the Internet,
Intrusion Detection System (IDS) has a difficulty to detect attacks. Moreover, irrelevant and …

An efficient centralized DDoS attack detection approach for Software Defined Internet of Things

P Chauhan, M Atulkar - The Journal of Supercomputing, 2023 - Springer
Both software defined networks and the Internet of Things are new topics that are being
heavily employed in the information technology industry and academia. Due to their fame …

Adaptive intrusion detection via GA-GOGMM-based pattern learning with fuzzy rough set-based attribute selection

J Liu, W Zhang, Z Tang, Y Xie, T Ma, J Zhang… - Expert Systems with …, 2020 - Elsevier
In this paper, an adaptive network intrusion detection method using fuzzy rough set-based
feature selection and GA-GOGMM-based pattern learning is presented. Based on the fuzzy …

Anomaly detection in NetFlow network traffic using supervised machine learning algorithms

I Fosić, D Žagar, K Grgić, V Križanović - Journal of industrial information …, 2023 - Elsevier
Anomaly detection is an important method for monitoring network traffic where is important to
successfully distinguish normal traffic from abnormal traffic. For this purpose, one could use …

A feature selection approach hybrid grey wolf and heap-based optimizer applied in bearing fault diagnosis

CY Lee, TA Le, YT Lin - IEEE Access, 2022 - ieeexplore.ieee.org
An effective bearing fault diagnosis model based on machine learning is proposed in this
study. The model can separate into three stages: feature extraction, feature selection, and …

Designing accurate lightweight intrusion detection systems for IoT networks using fine-tuned linear SVM and feature selectors

J Azimjonov, T Kim - Computers & Security, 2024 - Elsevier
Intrusion detection systems (IDSs) play a crucial role in ensuring the security and integrity of
Internet of Things (IoT) networks by blocking unwanted packets and facilitating secure traffic …