A survey of CNN-based network intrusion detection

L Mohammadpour, TC Ling, CS Liew, A Aryanfar - Applied Sciences, 2022 - mdpi.com
Over the past few years, Internet applications have become more advanced and widely
used. This has increased the need for Internet networks to be secured. Intrusion detection …

A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT

FS Gharehchopogh, B Abdollahzadeh, S Barshandeh… - Internet of Things, 2023 - Elsevier
The increasing trend toward using the Internet of Things (IoT) increased the number of
intrusions and intruders annually. Hence, the integration, confidentiality, and access to …

Soft computing in business: exploring current research and outlining future research directions

S Singh, S Singh, A Koohang, A Sharma… - … Management & Data …, 2023 - emerald.com
Purpose The primary aim of this study is to detail the use of soft computing techniques in
business and management research. Its objectives are as follows: to conduct a …

Intelligent fog computing surveillance system for crime and vulnerability identification and tracing

R Rawat, RK Chakrawarti, P Vyas… - International Journal of …, 2023 - igi-global.com
IoT devices generate enormous amounts of data, which deep learning algorithms can learn
from more effectively than shallow learning algorithms. The approach for threat detection …

Illicit Events Evaluation Using NSGA-2 Algorithms Based on Energy Consumption

R Rawat, A Rajavat - Informatica, 2024 - informatica.si
The proposed work objective is to adopt the non-dominated sorting genetic algorithm II
(NSGA-II), a type of MOEA (multi-objective evolutionary algorithms), to reduce the …

Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems

JC Huang, GQ Zeng, GG Geng, J Weng, KD Lu… - Computers & …, 2023 - Elsevier
Industrial control systems (ICSs) are facing serious and evolving security threats because of
a variety of malicious attacks. Deep learning-based intrusion detection systems (IDSs) have …

Hyperparameter optimization for 1D-CNN-based network intrusion detection using GA and PSO

D Kilichev, W Kim - Mathematics, 2023 - mdpi.com
This study presents a comprehensive exploration of the hyperparameter optimization in one-
dimensional (1D) convolutional neural networks (CNNs) for network intrusion detection. The …

Rooted learning model at fog computing analysis for crime incident surveillance

R Rawat, V Mahor, J Díaz-Álvarez… - … Conference on Smart …, 2022 - ieeexplore.ieee.org
Cyber Loopholes in smart devices' applications invited intruders to conduct malicious
activities. The growing quantity and diversity of smart devices has posed significant cyber …

[HTML][HTML] MEEDNets: Medical image classification via ensemble bio-inspired evolutionary DenseNets

H Zhu, W Wang, I Ulidowski, Q Zhou, S Wang… - Knowledge-Based …, 2023 - Elsevier
Inspired by the biological evolution, this paper proposes an evolutionary synthesis
mechanism to automatically evolve DenseNet towards high sparsity and efficiency for …

Dynamically evolving deep neural networks with continuous online learning

Y Zhong, J Zhou, P Li, J Gong - Information Sciences, 2023 - Elsevier
In a big data environment, data streams are sequences of dynamically changing data with
unlimited length; they are often associated with concept drift, caused by data distribution …