Internet of Things intrusion detection systems: a comprehensive review and future directions

A Heidari, MA Jabraeil Jamali - Cluster Computing, 2023 - Springer
Abstract The Internet of Things (IoT) is a paradigm that connects objects to the Internet as a
whole and enables them to work together to achieve common objectives, such as innovative …

A systematic literature review of intrusion detection system for network security: Research trends, datasets and methods

R Ferdiana - … 4th International Conference on Informatics and …, 2020 - ieeexplore.ieee.org
Study on intrusion detection system (IDS) mostly allow network administrators to focus on
development activities in terms of network security and making better use of resource. Many …

Image segmentation of Leaf Spot Diseases on Maize using multi-stage Cauchy-enabled grey wolf algorithm

H Yu, J Song, C Chen, AA Heidari, J Liu, H Chen… - … Applications of Artificial …, 2022 - Elsevier
Grey wolf optimizer (GWO) is a widespread metaphor-based algorithm based on the
enhanced variants of velocity-free particle swarm optimizer with proven defects and …

[PDF][PDF] Hybrid Grey Wolf and Dipper Throated Optimization inNetwork Intrusion Detection Systems

R Alkanhel, DS Khafaga, ESM El-kenawy… - CMC-COMPUTERS …, 2023 - researchgate.net
The Internet of Things (IoT) is a modern approach that enables connection with a wide
variety of devices remotely. Due to the resource constraints and open nature of IoT nodes …

Recent advances in Grey Wolf Optimizer, its versions and applications

SN Makhadmeh, MA Al-Betar, IA Doush… - IEEE …, 2023 - ieeexplore.ieee.org
The Grey Wolf Optimizer (GWO) has emerged as one of the most captivating swarm
intelligence methods, drawing inspiration from the hunting behavior of wolf packs. GWO's …

An improved task allocation scheme in serverless computing using gray wolf Optimization (GWO) based reinforcement learning (RIL) approach

N Yuvaraj, T Karthikeyan, K Praghash - Wireless Personal …, 2021 - Springer
Serverless computing offers a wide variety of event-driven integrations and cloud services,
easy development and implementation frameworks, and complex balancing and control of …

IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques

S Balogh, O Gallo, R Ploszek, P Špaček, P Zajac - Electronics, 2021 - mdpi.com
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …

A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks

M Jeyaselvi, RK Dhanaraj, M Sathya, FH Memon… - Cluster …, 2023 - Springer
Abstract The Internet of Things (IoT) is a modern age technology, designed with the vision to
connect and also interconnect all the objects everywhere. Technological progressions …

An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks

R Kumar, A Malik, V Ranga - Knowledge-Based Systems, 2022 - Elsevier
Smart devices are connected to the internet, called the Internet of Things (IoT); it is a
wireless network that plays a vital role in modernizing people's interaction by improving …

Bio-inspired feature selection algorithms with their applications: a systematic literature review

TH Pham, B Raahemi - IEEE Access, 2023 - ieeexplore.ieee.org
Based on the principles of the biological evolution of nature, bio-inspired algorithms are
gaining popularity in developing robust techniques for optimization. Unlike gradient descent …