Swarm intelligence inspired intrusion detection systems—a systematic literature review

MH Nasir, SA Khan, MM Khan, M Fatima - Computer Networks, 2022 - Elsevier
Abstract An Intrusion Detection System (IDS) is one of the fundamental building blocks in
securing a network. A huge number of techniques have been proposed and implemented to …

Metamorphic malware and obfuscation: a survey of techniques, variants, and generation kits

K Brezinski, K Ferens - Security and Communication Networks, 2023 - Wiley Online Library
The competing landscape between malware authors and security analysts is an ever‐
changing battlefield over who can innovate over the other. While security analysts are …

[PDF][PDF] Anomaly classification using genetic algorithm-based random forest model for network attack detection.

A Assiri - Computers, Materials & Continua, 2021 - cdn.techscience.cn
Anomaly classification based on network traffic features is an important task to monitor and
detect network intrusion attacks. Network-based intrusion detection systems (NIDSs) using …

An evolutionary-based approach for low-complexity intrusion detection in wireless sensor networks

T Zhang, D Han, MD Marino, L Wang, KC Li - Wireless Personal …, 2022 - Springer
As security threats are increasingly diversified, a critical problem in Wireless Sensor Network
environments (WSNs) is detecting anomalies. WSNs are affected by several limitations, such …

HFFPNN classifier: a hybrid approach for intrusion detection based OPSO and hybridization of feed forward neural network (FFNN) and probabilistic neural network …

T Sree Kala, A Christy - Multimedia Tools and Applications, 2021 - Springer
Quick increase in web and system advancements has prompted significant increase in
number of attacks and intrusions. Identification and prevention of these attacks has turned …

Optimization Accuracy of Intrusion Detection of Imbalanced Network using PCA and Conv1D-LSTM Technique

A Singh, V Bhandari… - 2022 3rd International …, 2022 - ieeexplore.ieee.org
Intrusion detection is the process of analyzing the network packets to identify if the packet is
legitimate or anomalous. The major challenges involved in this domain includes the huge …

High accuracy of hybrid ids system using evidence theory and svm ml technique

S Raj, KN Singh, NK Gupta, R Nigam… - … and Smart Systems …, 2021 - ieeexplore.ieee.org
These days, intrusion detection system (IDS) is the most arising pattern in our general
public. This basically screen network traffic and will alarm the organization chairman of any …

[HTML][HTML] SLSL-QPSO: Quantum-behaved particle swarm optimization with short-lived swarm layers

K Liang, Z Xiukai, O Krakhmalev - SoftwareX, 2023 - Elsevier
SLSL-QPSO is a software that can find the optimal value of a function. It improves over the
Quantum-behaved Particle Swarm Optimization (QPSO) algorithms by leveraging the …

A Review of Machine Learning-based Intrusion Detection System

N Mishra, S Mishra - EAI Endorsed Transactions on Internet of …, 2024 - publications.eai.eu
Intrusion detection systems are mainly prevalent proclivity within our culture today.
Interference exposure systems function as countermeasures to identify web-based …

From Nature to Networks: Harnessing Funnel Dynamics for Effective Intrusion Detection in IoT Environments

N KUMAR, S Sharma - 2023 - researchsquare.com
The rapid evolution of technology and the proliferation of interconnected systems have given
rise to an alarming increase in cyber threats. In this context, Intrusion Detection Systems …