[HTML][HTML] Optimizing Machine Learning Models with Data-level Approximate Computing: The Role of Diverse Sampling, Precision Scaling, Quantization and Feature …

AM Dalloo, AJ Humaidi - Results in Engineering, 2024 - Elsevier
Efficiency, low-power consumption, and real-time processing in embedded machine
learning implementations are critical, particularly for models deployed in environments with …

Enhancing network intrusion detection systems with combined network and host traffic features using deep learning: deep learning and IoT perspective

ESA Alars, S Kurnaz - Discover Computing, 2024 - Springer
Network security is a key concern in today's linked world as cyber threats grow more
sophisticated and ubiquitous. Traditional Network Intrusion Detection Systems (NIDS) …

[PDF][PDF] DYNAMIC PARAMETER ADJUSTMENT IN ANT COLONY OPTIMIZATION FOR ENERGY EFFICIENCY IN WIRELESS SENSOR NETWORK

EK HAMZA, LA MOHAMMED… - Journal of Engineering …, 2024 - jestec.taylors.edu.my
Abstract The Internet of Things (IoT) is an innovative technology. It revolutionized the world
of technology today, IoT connects numerous sensors and devices to the Internet to perform …

Di-Strategy Based Beluga Whale Optimization Algorithm for Feature Selection in Cloud Network Traffic Prediction.

M Kariyappa, HS Annapurna - International Journal of …, 2025 - search.ebscohost.com
Through the rapid advancement of network technology, Network Intrusion Detection
Systems (IDS) have become a vital constituent of network security. However, many existing …

Функціональна модель системи виявлення та прогнозування кіберзагроз для корпоративних комп'ютерних мереж з використанням експертних оцінок

М Міщенко - Технічні науки та технології, 2024 - tst.stu.cn.ua
Анотація У роботі представлено функціональне моделювання системи виявлення та
прогнозування кіберзагроз для кор-поративних комп'ютерних мереж із використанням …

[PDF][PDF] Machine Learning Based IDS for WSNs: A Review

M Devi, P Nandal, H Senrawat - drafts.icpids.com
(WSNs) in modern applications, ranging from environmental monitoring to healthcare and
industrial automation. Nevertheless, WSNs are susceptible to various security threats, such …