Research trends in network-based intrusion detection systems: A review

S Kumar, S Gupta, S Arora - Ieee Access, 2021 - ieeexplore.ieee.org
Network threats and hazards are evolving at a high-speed rate in recent years. Many
mechanisms (such as firewalls, anti-virus, anti-malware, and spam filters) are being used as …

Parallel and distributed architecture of genetic algorithm on Apache Hadoop and Spark

HC Lu, FJ Hwang, YH Huang - Applied Soft Computing, 2020 - Elsevier
The genetic algorithm (GA), one of the best-known metaheuristic algorithms, has been
extensively utilized in various fields of management science, operational research, and …

Parallel social spider clustering algorithm for high dimensional datasets

UP Shukla, SJ Nanda - Engineering Applications of Artificial Intelligence, 2016 - Elsevier
Abstract The Social-Spider Optimization (SSO) is one of the recently developed swarm
intelligence. It is inspired from the social behavior of spiders living in huge colonies. In this …

Designing of a risk assessment model for issuing credit card using parallel social spider algorithm

UP Shukla, SJ Nanda - Applied Artificial Intelligence, 2019 - Taylor & Francis
The financial creditability of the customer needs to be verified by the lender/bank before
issuing a credit card. This involves assessment of factors like the economic, social or social …

生物启发计算研究现状与发展趋势

朱云龙, 申海, 陈瀚宁, 吕赐兴, 张丁一 - 信息与控制, 2016 - xk.sia.cn
生物启发计算的宗旨是研究自然界生物个体, 群体, 群落乃至生态系统不同层面的功能,
特点和作用机制, 建立相应的模型与计算方法, 从而服务于人类社会的科学研究与工程应用 …

[PDF][PDF] Bat-cluster: a bat algorithm-based automated graph clustering approach

Z Boulouard, A El Haddadi… - International …, 2018 - download.garuda.kemdikbud.go.id
Defining the correct number of clusters is one of the most fundamental tasks in graph
clustering. When it comes to large graphs, this task becomes more challenging because of …

[PDF][PDF] Genetic algorithm using MapReduce-A critical review

P Sachar, V Khullar - i-manager‟ s Journal on Cloud Computing, 2016 - researchgate.net
Now a days, to get an optimize solution of hard problems is a biggest challenge. Scientists
are putting their best efforts to introduce best algorithm to optimize the problem to a great …

Intrusion Detection Using Bloom and XOR Filters Check for updates

R Manimegalai, B Rawat… - Data Intelligence and …, 2024 - books.google.com
Network security is essential to protect the network and the data flowing in the network. The
goal of intrusion detection system is to prevent data breaches, intrusions, and cyber threats …

Intrusion Detection Using Bloom and XOR Filters

R Manimegalai, B Rawat, S Naveenkumar… - … Conference on Data …, 2023 - Springer
Abstract Network-based Intrusion Detection System (NIDS) is one of the popular intrusion
detection systems which is used to identify hostile activity on a network. NIDS can be …

Analysis of Computer Network Information Security in the Era of Big Data

Z Bian - Big Data Analytics for Cyber-Physical System in Smart …, 2020 - Springer
In the era of big data, computer network has brought great convenience to people's work
and life, but also brought security risks in information. Therefore, the analysis of network …