Bio-inspired computation: Where we stand and what's next

J Del Ser, E Osaba, D Molina, XS Yang… - Swarm and Evolutionary …, 2019 - Elsevier
In recent years, the research community has witnessed an explosion of literature dealing
with the mimicking of behavioral patterns and social phenomena observed in nature towards …

A review of current machine learning approaches for anomaly detection in network traffic

WA Ali, KN Manasa, M Bendechache… - … and the Digital …, 2020 - search.informit.org
Due to the advance in network technologies, the number of network users is growing rapidly,
which leads to the generation of large network traffic data. This large network traffic data is …

Review of cybersecurity research topics, taxonomy and challenges: Interdisciplinary perspective

H Suryotrisongko, Y Musashi - 2019 IEEE 12th conference on …, 2019 - ieeexplore.ieee.org
As cybersecurity is a growing field of science, there is not complete agreement across the
scope of cybersecurity research topics. This paper proposes a grouping and classifications …

[HTML][HTML] Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory

S Vijayalakshmi, S Bose, G Logeswari… - Cyber security and …, 2023 - Elsevier
Ad hoc networks are a new perspective of wireless communication for versatile hosts.
Security is a colossal worry for ad hoc networks, especially for those security-touchy …

Anomaly detection in cybersecurity datasets via cooperative co-evolution-based feature selection

ANMB Rashid, M Ahmed, LF Sikos… - ACM Transactions on …, 2022 - dl.acm.org
Anomaly detection from Big Cybersecurity Datasets is very important; however, this is a very
challenging and computationally expensive task. Feature selection (FS) is an approach to …

Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection

S Dwivedi, M Vardhan, S Tripathi, AK Shukla - Evolutionary intelligence, 2020 - Springer
Intrusion detection has become important to network security because of the increasing
connectivity between computers and internet. Various Intrusion Detection Systems have …

Survey on quantum circuit compilation for noisy intermediate-scale quantum computers: Artificial intelligence to heuristics

J Kusyk, SM Saeed, MU Uyar - IEEE Transactions on Quantum …, 2021 - ieeexplore.ieee.org
Computationally expensive applications, including machine learning, chemical simulations,
and financial modeling, are promising candidates for noisy intermediate scale quantum …

A dynamic trust management model for vehicular ad hoc networks

M Aslan, S Sen - Vehicular Communications, 2023 - Elsevier
Trust management in vehicular ad hoc networks (VANETs) is a challenging dynamic
optimization problem due to their decentralized, infrastructureless, and dynamically …

XGBoost regression classifier (XRC) model for cyber attack detection and classification using inception v4

KMK Raghunath, VV Kumar… - Journal of Web …, 2022 - ieeexplore.ieee.org
Massive reliance on practical systems has resulted in several security concerns. The ability
to identify anomalies is a critical safety feature enabled by anomaly diagnostic techniques …

A hybrid evolutionary approach for identifying spam websites for search engine marketing

R Aswani, SP Ghrera, S Chandra, AK Kar - Evolutionary Intelligence, 2021 - Springer
With the increased digital usage, web visibility has become critically essential for
organizations when catering to a larger audience. This visibility on the web is directly related …