The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review

B Naik, A Mehta, H Yagnik, M Shah - Complex & Intelligent Systems, 2022 - Springer
Given the prevailing state of cybersecurity, it is reasonable to understand why cybersecurity
experts are seriously considering artificial intelligence as a potential field that can aid …

Recent trends in computational intelligence for educational big data analysis

AC Ikegwu, HF Nweke, CV Anikwe - Iran Journal of Computer Science, 2024 - Springer
Educational big data analytics and computational intelligence have transformed our
understanding of learning ability and computing power, catalyzing the emergence of …

An intrusion detection system based on normalized mutual information antibodies feature selection and adaptive quantum artificial immune system

Z Ling, ZJ Hao - International Journal on Semantic Web and …, 2022 - igi-global.com
The intrusion detection system (IDS) has lower speed, less adaptability and lower detection
accuracy especially for small samples sets. This paper presents a detection model based on …

An artificial immunity based intrusion detection system for unknown cyberattacks

H Huang, T Li, Y Ding, B Li, A Liu - Applied Soft Computing, 2023 - Elsevier
The evolving unknown cyberattacks have rapidly expanded the cyber threat landscape.
Identifying unknown cyberattacks, therefore, remains a challenging issue, compounded by …

Novel harris hawks optimization and deep neural network approach for intrusion detection

M Zivkovic, N Bacanin, J Arandjelovic, A Rakic… - … of International Joint …, 2022 - Springer
Intrusion detection systems attempt to identify assaults while they occur or after they have
occurred and they detect abnormal behavior in a network of computer systems in order to …

Negative selection algorithm research and applications in the last decade: A review

KD Gupta, D Dasgupta - IEEE Transactions on Artificial …, 2021 - ieeexplore.ieee.org
The negative selection algorithm (NSA) is one of the important methods in the field of
immunological computation (or artificial immune systems). Over the years, some progress …

Negative selection in anomaly detection—A survey

P Saurabh, B Verma - Computer Science Review, 2023 - Elsevier
The remarkable ability to separate and identify self and non-self in a given problem space,
makes negative selection a fascinating concept of artificial immune system. Therefore …

Spam message detection using Danger theory and Krill herd optimization

A Sharaff, C Kamal, S Porwal, S Bhatia, K Kaur… - Computer Networks, 2021 - Elsevier
Due to proliferation of online posts and rise in the active social media users, fraudulent
activities related with spam messages have taken a spike drift. Spam is an activity by which …

A genetic algorithm-based dendritic cell algorithm for input signal generation

D Zhang, Y Zhang, Y Liang - Applied Intelligence, 2023 - Springer
The dendritic cell algorithm (DCA) is a classification algorithm based on the biological
antigen presentation process. Its classification efficiently depends on a data preprocessing …

Service coverage optimization for facility location: considering line-of-sight coverage in continuous demand space

X Ma, X Zhang, X Zhao - International Journal of Geographical …, 2023 - Taylor & Francis
The reliable service coverage of many facilities or sensors used in smart city infrastructure is
highly susceptible to obstructions in urban environments. Optimizing the line-of-sight (LOS) …