Advances in sparrow search algorithm: a comprehensive survey

FS Gharehchopogh, M Namazi, L Ebrahimi… - … Methods in Engineering, 2023 - Springer
Mathematical programming and meta-heuristics are two types of optimization methods. Meta-
heuristic algorithms can identify optimal/near-optimal solutions by mimicking natural …

A review of recent approaches on wrapper feature selection for intrusion detection

J Maldonado, MC Riff, B Neveu - Expert Systems with Applications, 2022 - Elsevier
In this paper, we present a review of recent advances in wrapper feature selection
techniques for attack detection and classification, applied in intrusion detection area. Due to …

A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT

FS Gharehchopogh, B Abdollahzadeh, S Barshandeh… - Internet of Things, 2023 - Elsevier
The increasing trend toward using the Internet of Things (IoT) increased the number of
intrusions and intruders annually. Hence, the integration, confidentiality, and access to …

Coronavirus mask protection algorithm: A new bio-inspired optimization algorithm and its applications

Y Yuan, Q Shen, S Wang, J Ren, D Yang… - Journal of Bionic …, 2023 - Springer
Nowadays, meta-heuristic algorithms are attracting widespread interest in solving high-
dimensional nonlinear optimization problems. In this paper, a COVID-19 prevention-inspired …

A feature selection based on the farmland fertility algorithm for improved intrusion detection systems

TS Naseri, FS Gharehchopogh - Journal of Network and Systems …, 2022 - Springer
The development and expansion of the Internet and cyberspace have increased computer
systems attacks; therefore, Intrusion Detection Systems (IDSs) are needed more than ever …

Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm

H Asgharzadeh, A Ghaffari, M Masdari… - Journal of Parallel and …, 2023 - Elsevier
Nowadays, the growth and pervasiveness of Internet of Things (IoT) devices have led to
increased attacks by hackers and attackers. On the other hand, using IoT infrastructure in …

Binary approaches of quantum-based avian navigation optimizer to select effective features from high-dimensional medical data

MH Nadimi-Shahraki, A Fatahi, H Zamani, S Mirjalili - Mathematics, 2022 - mdpi.com
Many metaheuristic approaches have been developed to select effective features from
different medical datasets in a feasible time. However, most of them cannot scale well to …

A new intrusion detection system based on Moth–Flame Optimizer algorithm

M Alazab, RA Khurma, A Awajan… - Expert Systems with …, 2022 - Elsevier
This study relies on using a Moth–Flame Optimization (MFO) method as a search algorithm
and a Decision Tree (DT) as an evaluation algorithm to generate an efficient feature subset …

Enhancing intrusion detection systems for IoT and cloud environments using a growth optimizer algorithm and conventional neural networks

A Fatani, A Dahou, M Abd Elaziz, MAA Al-Qaness, S Lu… - Sensors, 2023 - mdpi.com
Intrusion detection systems (IDS) play a crucial role in securing networks and identifying
malicious activity. This is a critical problem in cyber security. In recent years, metaheuristic …

A novel hybrid whale optimization algorithm with flower pollination algorithm for feature selection: Case study Email spam detection

H Mohammadzadeh… - Computational …, 2021 - Wiley Online Library
Feature selection (FS) in data mining is one of the most challenging and most important
activities in pattern recognition. In this article, a new hybrid model of whale optimization …