A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things

SVN Santhosh Kumar, M Selvi… - Computational …, 2023 - Wiley Online Library
The Internet of Things (IoT) is a distributed system which is made up of the connections of
smart objects (things) that can continuously sense the events in their sensing domain and …

[HTML][HTML] Intelligent feature selection and classification techniques for intrusion detection in networks: a survey

S Ganapathy, K Kulothungan, S Muthurajkumar… - EURASIP Journal on …, 2013 - Springer
Rapid growth in the Internet usage and diverse military applications have led researchers to
think of intelligent systems that can assist the users and applications in getting the services …

Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN

K Thangaramya, K Kulothungan, S Indira Gandhi… - Soft Computing, 2020 - Springer
In wireless sensor networks (WSNs), energy optimization and the provision of security are
the major design challenges. Since the wireless sensor devices are energy constrained, the …

[HTML][HTML] A review on type-2 fuzzy neural networks for system identification

J Tavoosi, A Mohammadzadeh, K Jermsittiparsert - Soft computing, 2021 - Springer
In many engineering problems, the systems dynamics are uncertain, and then, the accurate
dynamic modeling is required. Type-2 fuzzy neural networks (T2F-NNs) are extensively …

A novel machine learning framework for diagnosing the type 2 diabetics using temporal fuzzy ant miner decision tree classifier with temporal weighted genetic …

G Bhuvaneswari, G Manikandan - Computing, 2018 - Springer
Diabetic is becoming a very serious disease today for the most of people all over the world
due to the unhealthy food habits. For predicting the diabetes, we introduce a new diabetic …

Multi-valued picture fuzzy soft sets and their applications in group decision-making problems

N Jan, T Mahmood, L Zedam, Z Ali - Soft Computing, 2020 - Springer
Soft set theory initiated by Molodtsov in 1999 has been emerging as a generic mathematical
tool for dealing with uncertainty. A noticeable progress is found concerning the practical use …

A hybrid nested genetic-fuzzy algorithm framework for intrusion detection and attacks

R Elhefnawy, H Abounaser, A Badr - IEEE Access, 2020 - ieeexplore.ieee.org
Intrusion Detection System (IDS) plays a very important role in security systems. Among its
different types, Network Intrusion Detection System (NIDS) has an effective role in …

LOMA: A local outlier mining algorithm based on attribute relevance analysis

X Zhao, J Zhang, X Qin - Expert Systems with Applications, 2017 - Elsevier
In this study, we propose a novel local outlier detection approach-called LOMA-to mining
local outliers in high-dimensional data sets. To improve the efficiency of outlier detection …

An adapting soft computing model for intrusion detection system

HIH Alsaadi, RM ALmuttari, ON Ucan… - Computational …, 2022 - Wiley Online Library
Network security in smart cities has become a key problem in the rapid development of
computer networks over the past few years. Intrusion detection systems play a fundamental …

An intelligent fuzzy rule based feature selection for effective intrusion detection

B Riyaz, S Ganapathy - … conference on recent trends in advance …, 2018 - ieeexplore.ieee.org
A challenging issue today in the field of data confidentiality is attack detection. This is
because of ever increasing number of devices which are associated with the system. From …