A comprehensive review of bat inspired algorithm: Variants, applications, and hybridization

M Shehab, MA Abu-Hashem, MKY Shambour… - … Methods in Engineering, 2023 - Springer
Bat algorithm (BA) is one of the promising metaheuristic algorithms. It proved its efficiency in
dealing with various optimization problems in diverse fields, such as power and energy …

Gradient-based optimizer (gbo): a review, theory, variants, and applications

MS Daoud, M Shehab, HM Al-Mimi, L Abualigah… - … Methods in Engineering, 2023 - Springer
This paper introduces a comprehensive survey of a new population-based algorithm so-
called gradient-based optimizer (GBO) and analyzes its major features. GBO considers as …

[HTML][HTML] TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks

S Ullah, J Ahmad, MA Khan, MS Alshehri, W Boulila… - Computer Networks, 2023 - Elsevier
Abstract The Internet of Things (IoT) is a global network that connects a large number of
smart devices. MQTT is a de facto standard, lightweight, and reliable protocol for machine-to …

[HTML][HTML] An optimized and efficient android malware detection framework for future sustainable computing

SK Smmarwar, GP Gupta, S Kumar, P Kumar - … Energy Technologies and …, 2022 - Elsevier
Android-based smart devices cater to services in almost every aspect of our lives like
personal, professional, social, banking, business, etc. However, people with increasingly …

Memory-based sand cat swarm optimization for feature selection in medical diagnosis

A Qtaish, D Albashish, M Braik, MT Alshammari… - Electronics, 2023 - mdpi.com
The rapid expansion of medical data poses numerous challenges for Machine Learning
(ML) tasks due to their potential to include excessive noisy, irrelevant, and redundant …

TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization

S Sivamohan, SS Sridhar, S Krishnaveni - Peer-to-Peer Networking and …, 2023 - Springer
Industrial cyber-physical systems (CPS) are vulnerable to cyberattacks that can compromise
their operations, safety, and security. Traditional intrusion detection systems are ineffective …

A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions

W Fei, H Ohno, S Sampalli - ACM Computing Surveys, 2023 - dl.acm.org
The Internet of Things (IoT) encompasses a network of physical objects embedded with
sensors, software, and data processing technologies that can establish connections and …

Optimal cluster based feature selection for intrusion detection system in web and cloud computing environment using hybrid teacher learning optimization enables …

KG Maheswari, C Siva, G Nalinipriya - Computer Communications, 2023 - Elsevier
Abstract Information technology organizations have experienced rapid growth in recent
years, resulting in scalability, mobility, and flexibility challenges. Those organizations move …

Optimizing airport slot scheduling problem using optimization algorithms

MK Shambour, MA Abu-Hashem - Soft Computing, 2023 - Springer
The primary objective of airport management worldwide is always to make it easier to
provide transportation services and minimize latency. This could be accomplished by …

Intrusion detection using chaotic poor and rich optimization with deep learning model for smart city environment

FS Alrayes, MM Asiri, M Maashi, AS Salama… - Sustainability, 2023 - mdpi.com
Artificial intelligence (AI) techniques play a vital role in the evolving growth and rapid
development of smart cities. To develop a smart environment, enhancements to the …