Multiclass feature selection with metaheuristic optimization algorithms: a review

OO Akinola, AE Ezugwu, JO Agushaka, RA Zitar… - Neural Computing and …, 2022 - Springer
Selecting relevant feature subsets is vital in machine learning, and multiclass feature
selection is harder to perform since most classifications are binary. The feature selection …

Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations

MA Umer, KN Junejo, MT Jilani, AP Mathur - International Journal of …, 2022 - Elsevier
Methods from machine learning are used in the design of secure Industrial Control Systems.
Such methods focus on two major areas: detection of intrusions at the network level using …

MQTTset, a new dataset for machine learning techniques on MQTT

I Vaccari, G Chiola, M Aiello, M Mongelli, E Cambiaso - Sensors, 2020 - mdpi.com
IoT networks are increasingly popular nowadays to monitor critical environments of different
nature, significantly increasing the amount of data exchanged. Due to the huge number of …

A systematic literature review of intrusion detection system for network security: Research trends, datasets and methods

R Ferdiana - … 4th International Conference on Informatics and …, 2020 - ieeexplore.ieee.org
Study on intrusion detection system (IDS) mostly allow network administrators to focus on
development activities in terms of network security and making better use of resource. Many …

A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities

EO Abiodun, A Alabdulatif, OI Abiodun… - Neural Computing and …, 2021 - Springer
Specialized data preparation techniques, ranging from data cleaning, outlier detection,
missing value imputation, feature selection (FS), amongst others, are procedures required to …

Cyber intrusion detection system based on a multiobjective binary bat algorithm for feature selection and enhanced bat algorithm for parameter optimization in neural …

WAHM Ghanem, SAA Ghaleb, A Jantan… - IEEE …, 2022 - ieeexplore.ieee.org
The staggering development of cyber threats has propelled experts, professionals and
specialists in the field of security into the development of more dependable protection …

Swarm intelligence inspired intrusion detection systems—a systematic literature review

MH Nasir, SA Khan, MM Khan, M Fatima - Computer Networks, 2022 - Elsevier
Abstract An Intrusion Detection System (IDS) is one of the fundamental building blocks in
securing a network. A huge number of techniques have been proposed and implemented to …

Switchtree: in-network computing and traffic analyses with random forests

JH Lee, K Singh - Neural Computing and Applications, 2020 - Springer
The success of machine learning in different domains is also finding applications in
networking. However, this may need real-time analyses of network data which is …

A systematic review on hybrid intrusion detection system

EM Maseno, Z Wang, H Xing - Security and Communication …, 2022 - Wiley Online Library
As computer networks keep growing at a high rate, achieving confidentiality, integrity, and
availability of the information system is essential. Intrusion detection systems (IDSs) have …

Recent advances of bat-inspired algorithm, its versions and applications

ZAA Alyasseri, OA Alomari, MA Al-Betar… - Neural Computing and …, 2022 - Springer
Bat-inspired algorithm (BA) is a robust swarm intelligence algorithm that finds success in
many problem domains. The ecosystem of bat animals inspires the main idea of BA. This …