[HTML][HTML] Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges

EM Campos, PF Saura, A González-Vidal… - Computer Networks, 2022 - Elsevier
Abstract The application of Machine Learning (ML) techniques to the well-known intrusion
detection systems (IDS) is key to cope with increasingly sophisticated cybersecurity attacks …

Evolutionary computation for feature selection in classification: A comprehensive survey of solutions, applications and challenges

X Song, Y Zhang, W Zhang, C He, Y Hu, J Wang… - Swarm and Evolutionary …, 2024 - Elsevier
Feature selection (FS), as one of the most significant preprocessing techniques in the fields
of machine learning and pattern recognition, has received great attention. In recent years …

Advanced feature extraction and selection approach using deep learning and Aquila optimizer for IoT intrusion detection system

A Fatani, A Dahou, MAA Al-Qaness, S Lu, MA Elaziz - Sensors, 2021 - mdpi.com
Developing cyber security is very necessary and has attracted considerable attention from
academy and industry organizations worldwide. It is also very necessary to provide …

Intrusion detection approach for cloud and IoT environments using deep learning and Capuchin Search Algorithm

M Abd Elaziz, MAA Al-qaness, A Dahou… - … in Engineering Software, 2023 - Elsevier
Abstract The Internet of Things (IoT) enabled technology will be adopted to develop smart
cities, electronic commerce, electronic learning, electronic health, and other aspects of …

Classification framework for faulty-software using enhanced exploratory whale optimizer-based feature selection scheme and random forest ensemble learning

M Mafarja, T Thaher, MA Al-Betar, J Too… - Applied …, 2023 - Springer
Abstract Software Fault Prediction (SFP) is an important process to detect the faulty
components of the software to detect faulty classes or faulty modules early in the software …

Boolean Particle Swarm Optimization with various Evolutionary Population Dynamics approaches for feature selection problems

T Thaher, H Chantar, J Too, M Mafarja… - Expert Systems with …, 2022 - Elsevier
In the feature selection process, reaching the best subset of features is considered a difficult
task. To deal with the complexity associated with this problem, a sophisticated and robust …

Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm

H Asgharzadeh, A Ghaffari, M Masdari… - Journal of Parallel and …, 2023 - Elsevier
Nowadays, the growth and pervasiveness of Internet of Things (IoT) devices have led to
increased attacks by hackers and attackers. On the other hand, using IoT infrastructure in …

Energy-aware metaheuristic algorithm for industrial-Internet-of-Things task scheduling problems in fog computing applications

M Abdel-Basset, D El-Shahat… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
In Industrial-Internet-of-Things (IIoT) applications, fog computing (FC) has soared as a
means to improve the Quality of Services (QoSs) provided to users through cloud computing …

Comparative analysis of intrusion detection systems and machine learning based model analysis through decision tree

Z Azam, MM Islam, MN Huda - IEEE Access, 2023 - ieeexplore.ieee.org
Cyber-attacks pose increasing challenges in precisely detecting intrusions, risking data
confidentiality, integrity, and availability. This review paper presents recent IDS taxonomy, a …

Binary improved white shark algorithm for intrusion detection systems

NA Alawad, BH Abed-alguni, MA Al-Betar… - Neural Computing and …, 2023 - Springer
Intrusion Detection (ID) is an essential task in the cyberattacks domain built to secure
Internet applications and networks from malicious actors. The main shortcoming of the …