A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things

SVN Santhosh Kumar, M Selvi… - Computational …, 2023 - Wiley Online Library
The Internet of Things (IoT) is a distributed system which is made up of the connections of
smart objects (things) that can continuously sense the events in their sensing domain and …

Feature selection techniques for intrusion detection using non-bio-inspired and bio-inspired optimization algorithms

VR Balasaraswathi, M Sugumaran, Y Hamid - Journal of Communications …, 2017 - Springer
As Internet access widens, IDS (Intrusion Detection System) is becoming a very important
component of network security to prevent unauthorized use and misuse of data. An IDS …

A deep learning approach for effective intrusion detection in wireless networks using CNN

B Riyaz, S Ganapathy - Soft Computing, 2020 - Springer
Security is playing a major role in this Internet world due to the rapid growth of Internet users.
The various intrusion detection systems were developed by many researchers in the past to …

[HTML][HTML] Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory

S Vijayalakshmi, S Bose, G Logeswari… - Cyber security and …, 2023 - Elsevier
Ad hoc networks are a new perspective of wireless communication for versatile hosts.
Security is a colossal worry for ad hoc networks, especially for those security-touchy …

Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection

FE Ayo, SO Folorunso, AA Abayomi-Alli… - … Security Journal: A …, 2020 - Taylor & Francis
ABSTRACT Network Intrusion Detection System (NIDS) is often used to classify network
traffic in an attempt to protect computer systems from various network attacks. A major …

A wrapper‐based feature selection for improving performance of intrusion detection systems

M Samadi Bonab, A Ghaffari… - International Journal …, 2020 - Wiley Online Library
Along with expansion in using of Internet and computer networks, the privacy, integrity, and
access to digital resources have been faced with permanent risks. Due to the unpredictable …

Temporal weighted averaging for asynchronous federated intrusion detection systems

S Agrawal, A Chowdhuri, S Sarkar… - Computational …, 2021 - Wiley Online Library
Federated learning (FL) is an emerging subdomain of machine learning (ML) in a distributed
and heterogeneous setup. It provides efficient training architecture, sufficient data, and …

A content recommendation system for effective e-learning using embedded feature selection and fuzzy DT based CNN

L Antony Rosewelt… - Journal of Intelligent & …, 2020 - content.iospress.com
This paper proposes a new content recommendation system which combines the newly
proposed embedded feature selection method and the new Fuzzy Temporal Logic based …

A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks

AR Rajeswari, K Kulothungan, S Ganapathy… - Peer-to-Peer Networking …, 2019 - Springer
Abstract Mobile Ad-hoc Networks have distinct characteristics namely lack of centralized
control and management, severe resource constraints in terms of energy level of nodes …

RETRACTED ARTICLE: Prediction model for optimized self-compacting concrete with fly ash using response surface method based on fuzzy classification

S Selvaraj, S Sivaraman - Neural Computing & Applications, 2019 - search.proquest.com
This paper elucidates a data predicting model using an intelligent rule-based enhanced
multiclass support vector machine and fuzzy rules (IREMSVM-FR) while optimizing the test …