Multi-objective Particle Swarm Optimization for Botnet Detection in Internet of Things
暂无分享,去创建一个
Hossam Faris | Ibrahim Aljarah | Seyedali Mirjalili | Maria Habib | S. Mirjalili | Hossam Faris | Ibrahim Aljarah | Maria Habib
[1] Ferat Sahin,et al. A survey on feature selection methods , 2014, Comput. Electr. Eng..
[2] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[3] José M. Molina López,et al. Applying VorEAl for IoT Intrusion Detection , 2018, HAIS.
[4] Ibrahim Aljarah,et al. MapReduce intrusion detection system based on a particle swarm optimization clustering algorithm , 2013, 2013 IEEE Congress on Evolutionary Computation.
[5] Andrew Lewis,et al. S-shaped versus V-shaped transfer functions for binary Particle Swarm Optimization , 2013, Swarm Evol. Comput..
[6] Hossam Faris,et al. Asynchronous accelerating multi-leader salp chains for feature selection , 2018, Appl. Soft Comput..
[7] Jalal A. Nasiri,et al. KNN-based least squares twin support vector machine for pattern classification , 2018, Applied Intelligence.
[8] Xin-She Yang,et al. A New Metaheuristic Bat-Inspired Algorithm , 2010, NICSO.
[9] Hossam Faris,et al. Feature Selection Using Salp Swarm Algorithm with Chaos , 2018, ISMSI '18.
[10] Jack Whitter-Jones. Security review on the Internet of Things , 2018, 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC).
[11] Jong Hyuk Park,et al. Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..
[12] Mengjie Zhang,et al. Particle Swarm Optimization for Feature Selection in Classification: A Multi-Objective Approach , 2013, IEEE Transactions on Cybernetics.
[13] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[14] Mustafa Zuhaer Nayef Al-Dabagh,et al. Face Recognition System Based on Kernel Discriminant Analysis, K-Nearest Neighbor and Support Vector Machine , 2018 .
[15] Meena Kowshalya,et al. Detection of Sybil's across communities over Social Internet of Things , 2016 .
[16] C. R. Rene Robin,et al. An exponent based error detection mechanism against DXDOS attack for improving the security in cloud , 2018, Cluster Computing.
[17] Hongbin Zhang,et al. Feature selection using tabu search method , 2002, Pattern Recognit..
[18] Liang Xiao,et al. IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.
[19] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[20] Kishore Angrishi,et al. Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets , 2017, ArXiv.
[21] Hossam Faris,et al. A Hybrid Approach Based on Particle Swarm Optimization and Random Forests for E-Mail Spam Filtering , 2016, ICCCI.
[22] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[23] Graham Kendall,et al. A multi-objective particle swarm optimization algorithm based on dynamic boundary search for constrained optimization , 2018, Appl. Soft Comput..
[24] Bing Xu,et al. An intrusion detection method for internet of things based on suppressed fuzzy clustering , 2018, EURASIP Journal on Wireless Communications and Networking.
[25] Ítalo S. Cunha,et al. The Evolution of Bashlite and Mirai IoT Botnets , 2018, 2018 IEEE Symposium on Computers and Communications (ISCC).
[26] Hossam Faris,et al. An efficient binary Salp Swarm Algorithm with crossover scheme for feature selection problems , 2018, Knowl. Based Syst..
[27] Hesham F. A. Hamed,et al. Intrusion detection systems for IoT-based smart environments: a survey , 2018, Journal of Cloud Computing.
[28] R. Butler,et al. Challenges and opportunities , 2018, Worldwide Hospitality and Tourism Themes.
[29] Russell C. Eberhart,et al. A new optimizer using particle swarm theory , 1995, MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science.
[30] Hossam Faris,et al. A multi-verse optimizer approach for feature selection and optimizing SVM parameters based on a robust system architecture , 2017, Neural Computing and Applications.
[31] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[32] Hossam Faris,et al. An intelligent system for spam detection and identification of the most relevant features based on evolutionary Random Weight Networks , 2019, Inf. Fusion.
[33] Hossam Faris,et al. Optimizing Feedforward neural networks using Krill Herd algorithm for E-mail spam detection , 2015, 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT).
[34] Kim-Kwang Raymond Choo,et al. An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.
[35] M. A. Kashem,et al. An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices , 2018 .
[36] N. Malarvizhi,et al. Secure and optimal authentication framework for cloud management using HGAPSO algorithm , 2018, Cluster Computing.
[37] Hossam Faris,et al. Evolutionary Population Dynamics and Grasshopper Optimization approaches for feature selection problems , 2017, Knowl. Based Syst..
[38] Hossam Faris,et al. Dragonfly Algorithm: Theory, Literature Review, and Application in Feature Selection , 2019, Nature-Inspired Optimizers.
[39] Ibrahim Aljarah,et al. Towards a scalable intrusion detection system based on parallel PSO clustering using mapreduce , 2013, GECCO.
[40] Hossam Faris,et al. Binary grasshopper optimisation algorithm approaches for feature selection problems , 2019, Expert Syst. Appl..
[41] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[42] Marin Emilov Pamukov,et al. Negative Selection and Neural Network Based Algorithm for Intrusion Detection in IoT , 2018, 2018 41st International Conference on Telecommunications and Signal Processing (TSP).
[43] Hossam Faris,et al. Simultaneous Feature Selection and Support Vector Machine Optimization Using the Grasshopper Optimization Algorithm , 2018, Cognitive Computation.
[44] Majdi M. Mafarja,et al. Hybrid binary ant lion optimizer with rough set and approximate entropy reducts for feature selection , 2018, Soft Comput..
[45] R. Kesavamoorthy,et al. Swarm intelligence based autonomous DDoS attack detection and defense using multi agent system , 2018, Cluster Computing.
[46] Hossam Faris,et al. Binary dragonfly optimization for feature selection using time-varying transfer functions , 2018, Knowl. Based Syst..
[47] Ezz El-Din Hemdan,et al. Cybercrimes Investigation and Intrusion Detection in Internet of Things Based on Data Science Methods , 2018 .
[48] Syed Hassan Ahmed,et al. NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks , 2018, The Journal of Supercomputing.
[49] Nasir Ghani,et al. A Machine Learning Model for Classifying Unsolicited IoT Devices by Observing Network Telescopes , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).
[50] Zhifeng Zhao,et al. AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks , 2018, IEEE Internet of Things Journal.
[51] Mengjie Zhang,et al. Evaluation of particle swarm optimization based centroid classifier with different distance metrics , 2008, 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence).
[52] Carlos A. Coello Coello,et al. Handling multiple objectives with particle swarm optimization , 2004, IEEE Transactions on Evolutionary Computation.
[53] Yuval Elovici,et al. N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.
[54] Ayman El-Sayed,et al. Predicting kidney transplantation outcome based on hybrid feature selection and KNN classifier , 2019, Multimedia Tools and Applications.
[55] FreundYoav,et al. Large Margin Classification Using the Perceptron Algorithm , 1999 .