Recent advances of bat-inspired algorithm, its versions and applications

ZAA Alyasseri, OA Alomari, MA Al-Betar… - Neural Computing and …, 2022 - Springer
Bat-inspired algorithm (BA) is a robust swarm intelligence algorithm that finds success in
many problem domains. The ecosystem of bat animals inspires the main idea of BA. This …

Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms

S Pamarthi, R Narmadha - International Journal of Intelligent …, 2022 - emerald.com
Purpose Nowadays, more interest is found among the researchers in MANETs in practical
and theoretical areas and their performance under various environments. WSNs have …

Machine learning methods for intrusive detection of wormhole attack in mobile ad hoc network (MANET)

M Abdan, SAH Seno - Wireless Communications and Mobile …, 2022 - Wiley Online Library
A wormhole attack is a type of attack on the network layer that reflects routing protocols. The
classification is performed with several methods of machine learning consisting of K‐nearest …

Trustworthy intrusion detection in e-healthcare systems

F Akram, D Liu, P Zhao, N Kryvinska, S Abbas… - Frontiers in public …, 2021 - frontiersin.org
In Internet of Things (IoT)-based network systems (IoT-net), intrusion detection systems (IDS)
play a significant role to maintain patient health records (PHR) in e-healthcare. IoT-net is a …

A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANET

R Saravanan, K Suresh, SS Arumugam - The Journal of Supercomputing, 2023 - Springer
Decentralized mobile ad hoc networks (MANET) is a self-organizing and adaptive method
comprised of multiple mobile nodes. Due to the dynamic and flexible nature of network …

Network intrusion detection using machine learning, deep learning-a review

VR Varanasi, S Razia - 2022 4th International Conference on …, 2022 - ieeexplore.ieee.org
An Intrusion Detection System (IDS) is an essential feature, aims to defend the integrity,
availability, the confidentiality of the data utilized in the networks against attacks. An IDS …

Join queries optimization in the distributed databases using a hybrid multi-objective algorithm

E Azhir, NJ Navimipour, M Hosseinzadeh, A Sharifi… - Cluster …, 2022 - Springer
In the distributed database systems, the relations needed by a query can be kept in several
locations. This process significantly increases potential corresponding Query Execution …

[PDF][PDF] Identification of Leaf Disease Using Machine Learning Algorithm for Improving the Agricultural System [J]

K Kethineni, G Pradeepini - Journal of Advances in Information …, 2023 - academia.edu
Diagnosing plant disease is the foundation for effective and accurate plant disease
prevention in a complicated environment. Smart farming is one of the fastgrowing processes …

Cnn implementation for ids

VR Varanasi, S Razia - 2021 3rd International Conference on …, 2021 - ieeexplore.ieee.org
Real world data is more complex in nature and requires proper handling to use with
machine learning techniques. Handling large volumes of data is the key aspect in deep …

Application of Active Learning Algorithm in Mobile Ad Hoc Network Intrusion Detection

M Yin - 2023 World Conference on Communication & …, 2023 - ieeexplore.ieee.org
Network intrusion detection system is widely used in the security protection of network
systems. It monitors network traffic, finds suspicious traffic, and actively responds. In recent …