A hybrid intelligently initialized particle swarm optimizer with weight factored binary gray wolf optimizer for mitigation of security issues in Internet of Things and sensor nodes
暂无分享,去创建一个
[1] Khushal Singh,et al. Multilevel authentication protocol for enabling secure communication in Internet of Things , 2021, Concurr. Comput. Pract. Exp..
[2] Bhoopesh Singh Bhati,et al. An enhanced intelligent model: To protect marine IoT sensor environment using ensemble machine learning approach , 2021, Ocean Engineering.
[3] Prabhat Kumar,et al. Toward Design of an Intelligent Cyber Attack Detection System using Hybrid Feature Reduced Approach for IoT Networks , 2021, Arabian Journal for Science and Engineering.
[4] Laith Abualigah,et al. Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks , 2020, Journal of Ambient Intelligence and Humanized Computing.
[5] Jawad Ahmad,et al. A Hybrid Deep Random Neural Network for Cyberattack Detection in the Industrial Internet of Things , 2021, IEEE Access.
[6] Jie Gu,et al. An effective intrusion detection approach using SVM with naïve Bayes feature embedding , 2021, Comput. Secur..
[7] Prabhat Kumar,et al. A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks , 2020, Journal of Ambient Intelligence and Humanized Computing.
[8] Qiuzhen Lin,et al. A multi-objective immune algorithm for intrusion feature selection , 2020, Appl. Soft Comput..
[9] Yunhao Liu,et al. Making Sense of Spatio-Temporal Preserving Representations for EEG-Based Human Intention Recognition , 2020, IEEE Transactions on Cybernetics.
[10] Ahmad Sharieh,et al. A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer , 2020 .
[11] Xiaojiang Du,et al. Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city , 2020, Future Gener. Comput. Syst..
[12] Ritu Tiwari,et al. Particle swarm optimization and feature selection for intrusion detection system , 2020, Sādhanā.
[13] Kuan-Ching Li,et al. An intrusion detection approach based on improved deep belief network , 2020, Applied Intelligence.
[14] Lina Yao,et al. A Semisupervised Recurrent Convolutional Attention Model for Human Activity Recognition , 2020, IEEE Transactions on Neural Networks and Learning Systems.
[15] Yang Xin,et al. Robust detection for network intrusion of industrial IoT based on multi-CNN fusion , 2020 .
[16] Giancarlo Fortino,et al. A hybrid deep learning model for efficient intrusion detection in big data environment , 2020, Inf. Sci..
[17] S. El-Rabaie,et al. Feature Selection Ranking and Subset-Based Techniques with Different Classifiers for Intrusion Detection , 2020, Wirel. Pers. Commun..
[18] Paulus Insap Santosa,et al. Towards a Lightweight Detection System for Cyber Attacks in the IoT Environment Using Corresponding Features , 2020, Electronics.
[19] Pooja Chaudhary,et al. DDoS Detection Framework in Resource Constrained Internet of Things Domain , 2019, 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE).
[20] Feng Liu,et al. A Deep Learning Approach for Network Intrusion Detection Based on NSL-KDD Dataset , 2019, 2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID).
[21] Sanyam Shukla,et al. An analysis of "A feature reduced intrusion detection system using ANN classifier" by Akashdeep et al. expert systems with applications (2017) , 2019, Expert Syst. Appl..
[22] Jie Gu,et al. A novel approach to intrusion detection using SVM ensemble with feature augmentation , 2019, Comput. Secur..
[23] M. M. A. Hashem,et al. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches , 2019, Internet Things.
[24] Bayu Adhi Tama,et al. TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System , 2019, IEEE Access.
[25] Mengjie Zhang,et al. Variable-Length Particle Swarm Optimization for Feature Selection on High-Dimensional Classification , 2019, IEEE Transactions on Evolutionary Computation.
[26] Ali Dehghantanha,et al. A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.
[27] Adnan Shaout,et al. An intelligent intrusion detection system , 2019, Applied Intelligence.
[28] Tim Watson,et al. Hybrid feature selection technique for intrusion detection system , 2019, Int. J. High Perform. Comput. Netw..
[29] Yixian Yang,et al. Building an Effective Intrusion Detection System Using the Modified Density Peak Clustering Algorithm and Deep Belief Networks , 2019, Applied Sciences.
[30] Ü. Çavusoglu,et al. A new hybrid approach for intrusion detection using machine learning methods , 2019, Applied Intelligence.
[31] Marc-Oliver Pahl,et al. All Eyes on You: Distributed Multi-Dimensional IoT Microservice Anomaly Detection , 2018, 2018 14th International Conference on Network and Service Management (CNSM).
[32] Jong Hyuk Park,et al. Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..
[33] Laurence T. Yang,et al. Defending ON–OFF Attacks Using Light Probing Messages in Smart Sensors for Industrial Communication Systems , 2018, IEEE Transactions on Industrial Informatics.
[34] Erol Gelenbe,et al. Deep Learning with Dense Random Neural Networks for Detecting Attacks Against IoT-Connected Home Environments , 2018, Euro-CYBERSEC.
[35] Qinghua Zheng,et al. An Adaptive Semisupervised Feature Analysis for Video Semantic Recognition , 2018, IEEE Transactions on Cybernetics.
[36] Qi Shi,et al. A Deep Learning Approach to Network Intrusion Detection , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[37] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..
[38] Naiqi Wu,et al. SVM-DT-based adaptive and collaborative intrusion detection , 2018, IEEE/CAA Journal of Automatica Sinica.
[39] Anthony K. H. Tung,et al. LDSScanner: Exploratory Analysis of Low-Dimensional Structures in High-Dimensional Datasets , 2018, IEEE Transactions on Visualization and Computer Graphics.
[40] Neeraj Kumar,et al. A feature reduced intrusion detection system using ANN classifier , 2017, Expert Syst. Appl..
[41] S. B. Singh,et al. Hybrid Algorithm of Particle Swarm Optimization and Grey Wolf Optimizer for Improving Convergence Performance , 2017, J. Appl. Math..
[42] Narinder Singh,et al. A Modified Mean Gray Wolf Optimization Approach for Benchmark and Biomedical Problems , 2017, Evolutionary bioinformatics online.
[43] Urvinder Singh,et al. Modified Grey Wolf Optimizer for Global Engineering Optimization , 2016, Appl. Comput. Intell. Soft Comput..
[44] Aboul Ella Hassanien,et al. Binary grey wolf optimization approaches for feature selection , 2016, Neurocomputing.
[45] Shivani Mehta,et al. Hybrid GWO-PSO Algorithm for Solving Convex Economi c Load Dispatch Problem , 2016 .
[46] Vikram Kumar Kamboj. A novel hybrid PSO–GWO approach for unit commitment problem , 2016, Neural Computing and Applications.
[47] Manel Guerrero Zapata,et al. A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks , 2015, Neurocomputing.
[48] Yaochu Jin,et al. A Competitive Swarm Optimizer for Large Scale Optimization , 2015, IEEE Transactions on Cybernetics.
[49] Kandasamy Muniasamy,et al. Improving the Accuracy of Intrusion Detection Using GAR-Forest with Feature Selection , 2015, FICTA.
[50] Antonio Martínez-Álvarez,et al. Feature selection by multi-objective optimisation: Application to network anomaly detection by hierarchical self-organising maps , 2014, Knowl. Based Syst..
[51] Mengjie Zhang,et al. Particle swarm optimisation for feature selection in classification: Novel initialisation and updating mechanisms , 2014, Appl. Soft Comput..
[52] Andrew Lewis,et al. Grey Wolf Optimizer , 2014, Adv. Eng. Softw..
[53] Julio Ortega Lopera,et al. Network Anomaly Classification by Support Vector Classifiers Ensemble and Non-linear Projection Techniques , 2013, HAIS.
[54] Wei Cong,et al. Anomaly intrusion detection based on PLS feature extraction and core vector machine , 2013, Knowl. Based Syst..
[55] Phurivit Sangkatsanee,et al. Practical real-time intrusion detection using machine learning approaches , 2011, Comput. Commun..
[56] Manas Ranjan Patra,et al. Discriminative multinomial Naïve Bayes for network intrusion detection , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[57] Xiaobo Zhou,et al. An Adaptive Growing Hierarchical Self Organizing Map for Network Intrusion Detection , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.
[58] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[59] Thomas Weigert,et al. An adaptive automatically tuning intrusion detection system , 2008, TAAS.
[60] Malcolm I. Heywood,et al. A Hierarchical SOM based Intrusion Detection System , 2008 .
[61] Jing J. Liang,et al. Comprehensive learning particle swarm optimizer for global optimization of multimodal functions , 2006, IEEE Transactions on Evolutionary Computation.
[62] Russell C. Eberhart,et al. A discrete binary version of the particle swarm algorithm , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.
[63] James Kennedy,et al. Particle swarm optimization , 2002, Proceedings of ICNN'95 - International Conference on Neural Networks.