Cyber intrusion detection system based on a multiobjective binary bat algorithm for feature selection and enhanced bat algorithm for parameter optimization in neural …

WAHM Ghanem, SAA Ghaleb, A Jantan… - IEEE …, 2022 - ieeexplore.ieee.org
The staggering development of cyber threats has propelled experts, professionals and
specialists in the field of security into the development of more dependable protection …

Determinants of customer purchase intention using Zalora mobile commerce application

YAB El-Ebiary, PR Pathmanathan… - … on Smart Computing …, 2021 - ieeexplore.ieee.org
In the era of modern technologies and with the development of marketing, nowadays the
customer can save time buying things without having to visit the store. They just need to …

E-government and E-commerce issues in Malaysia

YAB El-Ebiary, AG Kanaan… - … on Smart Computing …, 2021 - ieeexplore.ieee.org
In Malaysia, an e-commerce company is still considered a new middleman. As well as the
development of information and communication technology strongly affects business …

Track Home Maintenance Business Centers with GPS Technology in the IR 4.0 Era

YAB El-Ebiary, SIA Saany, LS Aledinat… - … on Smart Computing …, 2021 - ieeexplore.ieee.org
A home helper is in high demand these days because it relieves the stress of doing
household chores. Home helpers are usually self-employed and work part-time in their …

[HTML][HTML] Multiresolution dendritic cell algorithm for network anomaly detection

D Limon-Cantu, V Alarcon-Aquino - PeerJ Computer Science, 2021 - peerj.com
Anomaly detection in computer networks is a complex task that requires the distinction of
normality and anomaly. Network attack detection in information systems is a constant …

Leveraging metaheuristics for feature selection with machine learning classification for malicious packet detection in computer networks

A Shanbhag, S Vincent, SBB Gowda, OP Kumar… - IEEE …, 2024 - ieeexplore.ieee.org
Robust Intrusion Detection Systems (IDS) are increasingly necessary in the age of big data
due to the growing volume, velocity, and variety of data generated by modern networks …

Detect & reject for transferability of black-box adversarial attacks against network intrusion detection systems

I Debicha, T Debatty, JM Dricot, W Mees… - … Conference on Advances …, 2021 - Springer
In the last decade, the use of Machine Learning techniques in anomaly-based intrusion
detection systems has seen much success. However, recent studies have shown that …

A survey on intrusion detection system in ad hoc networks based on machine learning

ZA Abbood, DÇ Atilla, Ç Aydin… - … Conference of Modern …, 2021 - ieeexplore.ieee.org
This advanced research survey aims to perform intrusion detection and routing in ad hoc
networks in wireless MANET networks using machine learning techniques. The MANETs are …

[PDF][PDF] E-mail spam classification using grasshopper optimization algorithm and neural networks

SAA Ghaleb, M Mohamad, SA Fadzli… - Comput., Mater …, 2022 - cdn.techscience.cn
Spam has turned into a big predicament these days, due to the increase in the number of
spam emails, as the recipient regularly receives piles of emails. Not only is spam wasting …