[HTML][HTML] Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review

S Sharma, V Kumar, K Dutta - Internet of Things and Cyber-Physical …, 2024 - Elsevier
The significance of intrusion detection systems in networks has grown because of the digital
revolution and increased operations. The intrusion detection method classifies the network …

Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature

R Saadouni, C Gherbi, Z Aliouat, Y Harbi, A Khacha - Cluster Computing, 2024 - Springer
Recent technological advancements have significantly expanded both networks and data,
thereby introducing new forms of attacks that pose considerable challenges to intrusion …

IGWO-SoE: Improved grey wolf optimization based stack of ensemble learning algorithm for anomaly detection in internet of things edge computing

J Manokaran, G Vairavel - IEEE Access, 2023 - ieeexplore.ieee.org
With the tremendous growth and popularization of the Internet of Things (IoT), the number of
attacks targeting such devices has also increased. Therefore, enhancing the anomaly …

IBJA: An improved binary DJaya algorithm for feature selection

BH Abed-alguni, SH Al-Jarah - Journal of Computational Science, 2024 - Elsevier
Feature Selection (FS) is a special preprocessing step in Machine Learning (ML) that
reduces the number of unwanted features in datasets to increase the accuracy of ML …

Improved Fault Classification and Localization in Power Transmission Networks Using VAE-Generated Synthetic Data and Machine Learning Algorithms

MA Khan, B Asad, T Vaimann, A Kallaste… - Machines, 2023 - mdpi.com
The reliable operation of power transmission networks depends on the timely detection and
localization of faults. Fault classification and localization in electricity transmission networks …

Hierarchical-based binary moth flame optimization for feature extraction in biomedical application

S Jayachitra, A Prasanth, SM Rafi… - … Conference on Machine …, 2022 - Springer
Feature extraction is a key challenging task to find the optimal features by alleviating
irrelevant features to improve the classification accuracy. The brute force methods yield …

Feature selection by multiobjective optimization: Application to spam detection system by neural networks and grasshopper optimization algorithm

SAA Ghaleb, M Mohamad, WAHM Ghanem… - IEEE …, 2022 - ieeexplore.ieee.org
Networks are strained by spam, which also overloads email servers and blocks mailboxes
with unwanted messages and files. Setting the protective level for spam filtering might …

Blockchain Solution For SMEs Cybersecurity Threats In E-Commerce

FH Zawaideh, W Abu-Ulbeh, SA Mjlae… - 2023 International …, 2023 - ieeexplore.ieee.org
The rapid growth of electronic commerce (e-commerce) has revolutionized the way Small
and Medium-sized Enterprises (SMEs) conduct business, enabling them to reach global …

The Role of Electronic Commerce in Supporting the Strategic Management Decision-Making

A Liban, KT Amayreh, Y Al Moaiad… - Journal of Survey …, 2023 - sifisheriessciences.com
With the increasing use of sophisticated technology within the 21st century, plus with the
pandemic that has hit the world over the past two years has made the recognition of online …

A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques …

W Hu, Q Cao, M Darbandi, N Jafari Navimipour - Cluster Computing, 2024 - Springer
The number of cloud-, edge-, and Internet of Things (IoT)-based applications that produce
sensitive and personal data has rapidly increased in recent years. The IoT is a new model …