Intelligent Secure Ecosystem Based on Metaheuristic and Functional Link Neural Network for Edge of Things
暂无分享,去创建一个
Mohammad S. Obaidat | Sk Hafizul Islam | Janmenjoy Nayak | Danilo Pelusi | Pandi Vijayakumar | Bighnaraj Naik | P. Vijayakumar | M. Obaidat | S. H. Islam | Janmenjoy Nayak | D. Pelusi | B. Naik
[1] Hesham F. A. Hamed,et al. Intrusion detection systems for IoT-based smart environments: a survey , 2018, Journal of Cloud Computing.
[2] Y. Takefuji,et al. Functional-link net computing: theory, system architecture, and functionalities , 1992, Computer.
[3] Taekyoung Kwon,et al. An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks , 2010, IEEE Transactions on Industrial Informatics.
[4] Itzhak Levin,et al. KDD-99 classifier learning contest LLSoft's results overview , 2000, SKDD.
[5] Patrick Siarry,et al. A survey on optimization metaheuristics , 2013, Inf. Sci..
[6] Halina Kwasnicka,et al. Nature Inspired Methods and Their Industry Applications—Swarm Intelligence Algorithms , 2018, IEEE Transactions on Industrial Informatics.
[7] Igor Nai Fovino,et al. A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems , 2011, IEEE Transactions on Industrial Informatics.
[8] R. Venkata Rao,et al. Teaching-learning-based optimization: A novel method for constrained mechanical design optimization problems , 2011, Comput. Aided Des..
[9] Suleyman Tosun,et al. Evolutionary task allocation in Internet of Things-based application domains , 2018, Future Gener. Comput. Syst..
[10] Rachid Beghdad,et al. Critical study of neural networks in detecting intrusions , 2008, Comput. Secur..
[11] Janmenjoy Nayak,et al. A TLBO based gradient descent learning-functional link higher order ANN: An efficient model for learning from non-linear data , 2018, J. King Saud Univ. Comput. Inf. Sci..
[12] John Y. Hung,et al. Denial of service attacks on network-based control systems: impact and mitigation , 2005, IEEE Transactions on Industrial Informatics.
[13] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[14] Vivek Patel,et al. An elitist teaching-learning-based optimization algorithm for solving complex constrained optimization problems , 2012 .
[15] Bing Chen,et al. Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.
[16] Adel Nadjaran Toosi,et al. A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers , 2007, Comput. Commun..
[17] Mohammad S. Obaidat,et al. Security of e-Systems and Computer Networks , 2007 .
[18] Chih-Fong Tsai,et al. CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..
[19] Bo Yang,et al. Hybrid flexible neural‐tree‐based intrusion detection systems , 2007, Int. J. Intell. Syst..
[20] Alyani Ismail,et al. A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization , 2018, IEEE Access.
[21] Gilberto Herrera-Ruiz,et al. Hybrid Approach Based on GA and PSO for Parameter Estimation of a Full Power Quality Disturbance Parameterized Model , 2018, IEEE Transactions on Industrial Informatics.
[22] Bernhard Pfahringer,et al. Winning the KDD99 classification cup: bagged boosting , 2000, SKDD.
[23] Tirtharaj Dash,et al. A study on intrusion detection using neural networks trained with evolutionary algorithms , 2017, Soft Comput..
[24] S. Geetha,et al. A neuro-genetic based short-term forecasting framework for network intrusion prediction system , 2009, Int. J. Autom. Comput..
[25] Ingoo Han,et al. The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors , 2003, Expert Syst. Appl..
[26] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[27] Alka Singh,et al. Chebyshev Functional Expansion Based Artificial Neural Network Controller for Shunt Compensation , 2018, IEEE Transactions on Industrial Informatics.
[28] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.