An effect of chaos grasshopper optimization algorithm for protection of network infrastructure
暂无分享,去创建一个
[1] Mário A. T. Figueiredo,et al. Efficient feature selection filters for high-dimensional data , 2012, Pattern Recognit. Lett..
[2] Wei-Ning Yang,et al. Constructing gene regulatory networks from microarray data using GA/PSO with DTW , 2012, Appl. Soft Comput..
[3] Wenyong Wang,et al. A new feature selection method based on a validity index of feature subset , 2017, Pattern Recognit. Lett..
[4] Ying Chen,et al. Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes , 2007, IEEE Transactions on Dependable and Secure Computing.
[5] S. Ayyasamy,et al. Efficient pattern matching algorithm for security and Binary Search Tree (BST) based memory system in Wireless Intrusion Detection System (WIDS) , 2020, Comput. Commun..
[6] Hossam Faris,et al. Binary dragonfly optimization for feature selection using time-varying transfer functions , 2018, Knowl. Based Syst..
[7] Manu Vardhan,et al. Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection , 2019, Evolutionary Intelligence.
[8] Manu Vardhan,et al. Incorporating evolutionary computation for securing wireless network against cyberthreats , 2020, The Journal of Supercomputing.
[9] Li-Pei Wong,et al. An ensemble of intelligent water drop algorithm for feature selection optimization problem , 2018, Appl. Soft Comput..
[10] Xiangjian He,et al. Detection of Denial-of-Service Attacks Based on Computer Vision Techniques , 2015, IEEE Transactions on Computers.
[11] Manel Guerrero Zapata,et al. A hybrid multiobjective RBF-PSO method for mitigating DoS attacks in Named Data Networking , 2015, Neurocomputing.
[12] Amir Asif,et al. Distributed-Graph-Based Statistical Approach for Intrusion Detection in Cyber-Physical Systems , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[13] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[14] Mohamed M. Abd-Eldayem. A proposed HTTP service based IDS , 2014 .
[15] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[16] Ahmed A. Ewees,et al. Improved grasshopper optimization algorithm using opposition-based learning , 2018, Expert Syst. Appl..
[17] Sachin Tripathi,et al. An efficient feature selection based Bayesian and Rough set approach for intrusion detection , 2020, Appl. Soft Comput..
[18] Jugal Kalita,et al. Active learning to detect DDoS attack using ranked features , 2019, Comput. Commun..
[19] Rossitza Setchi,et al. Feature selection using Joint Mutual Information Maximisation , 2015, Expert Syst. Appl..
[20] Nima Jafari Navimipour,et al. Intrusion detection systems in the Internet of things: A comprehensive investigation , 2019, Comput. Networks.
[21] Jugal K. Kalita,et al. Packet and Flow Based Network Intrusion Dataset , 2012, IC3.
[22] Alok Kumar Shukla,et al. A hybrid framework for optimal feature subset selection , 2019, J. Intell. Fuzzy Syst..
[23] Akhan Akbulut,et al. Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic , 2020, Comput. Networks.
[24] Shahram Babaie,et al. A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection , 2018, Comput. Networks.
[25] Ian F. Akyildiz,et al. A survey on wireless multimedia sensor networks , 2007, Comput. Networks.
[26] Ahmed Fathy,et al. Recent meta-heuristic grasshopper optimization algorithm for optimal reconfiguration of partially shaded PV array , 2018, Solar Energy.
[27] Hao Yu,et al. Distributed Machine Learning on Smart-Gateway Network Towards Real-Time Indoor Data Analytics , 2017 .
[28] Ali Bou Nassif,et al. Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection , 2019, Comput. Networks.
[29] Miad Faezipour,et al. Enhancing Wireless Intrusion Detection Using Machine Learning Classification with Reduced Attribute Sets , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).
[30] Claudio A. Perez,et al. Gender Classification Based on Fusion of Different Spatial Scale Features Selected by Mutual Information From Histogram of LBP, Intensity, and Shape , 2013, IEEE Transactions on Information Forensics and Security.
[31] Taufik Abrão,et al. Network Anomaly Detection System using Genetic Algorithm and Fuzzy Logic , 2018, Expert Syst. Appl..
[32] Nur Izura Udzir,et al. Packet Header Anomaly Detection Using Statistical Analysis , 2014, SOCO-CISIS-ICEUTE.
[33] Hadis Karimipour,et al. Cyber intrusion detection by combined feature selection algorithm , 2019, J. Inf. Secur. Appl..
[34] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[35] Ali A. Ghorbani,et al. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.
[36] Ali Fanian,et al. A real-time alert correlation method based on code-books for intrusion detection systems , 2020, Comput. Secur..
[37] Lu Lv,et al. A novel intrusion detection system based on an optimal hybrid kernel extreme learning machine , 2020, Knowl. Based Syst..
[38] Alok Kumar Shukla,et al. Building an Effective Approach toward Intrusion Detection Using Ensemble Feature Selection , 2019, Int. J. Inf. Secur. Priv..
[39] Maninder Singh,et al. Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks , 2019, Neural Computing and Applications.
[40] Jiankun Hu,et al. Evaluating host-based anomaly detection systems: A preliminary analysis of ADFA-LD , 2013, 2013 6th International Congress on Image and Signal Processing (CISP).
[41] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[42] Muhammad Tariq,et al. Accurate detection of sitting posture activities in a secure IoT based assisted living environment , 2018, Future Gener. Comput. Syst..
[43] Can Berk Kalayci,et al. A survey of swarm intelligence for portfolio optimization: Algorithms and applications , 2018, Swarm Evol. Comput..
[44] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[45] Lothar Thiele,et al. A Comparison of Selection Schemes Used in Evolutionary Algorithms , 1996, Evolutionary Computation.
[46] Dewan Md Farid,et al. Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs , 2014, The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014).
[47] Mohammad Kazem Ebrahimpour,et al. Ensemble of feature selection methods: A hesitant fuzzy sets approach , 2017, Appl. Soft Comput..
[48] L. Javier García-Villalba,et al. Adaptive artificial immune networks for mitigating DoS flooding attacks , 2018, Swarm Evol. Comput..
[49] Mamun Bin Ibne Reaz,et al. A survey of intrusion detection systems based on ensemble and hybrid classifiers , 2017, Comput. Secur..
[50] Emin Anarim,et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..
[51] Manu Vardhan,et al. Defense against distributed DoS attack detection by using intelligent evolutionary algorithm , 2020, International Journal of Computers and Applications.
[52] Jill Slay,et al. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set , 2016, Inf. Secur. J. A Glob. Perspect..
[53] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[54] Pietro Sabatino,et al. Ensemble based collaborative and distributed intrusion detection systems: A survey , 2016, J. Netw. Comput. Appl..
[55] Iraj Mahdavi,et al. Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms , 2019, J. King Saud Univ. Comput. Inf. Sci..
[56] Ruby Sharma,et al. An Enhanced Approach to Fuzzy C-means Clustering for Anomaly Detection , 2018 .
[57] Andrew Lewis,et al. Grey Wolf Optimizer , 2014, Adv. Eng. Softw..
[58] Manu Vardhan,et al. An adaptive inertia weight teaching-learning-based optimization algorithm and its applications , 2020 .
[59] Rahul Dubey,et al. Robust heart rate estimation from multimodal physiological signals using beat signal quality index based majority voting fusion method , 2017, Biomed. Signal Process. Control..
[60] Mamun Bin Ibne Reaz,et al. A novel weighted support vector machines multiclass classifier based on differential evolution for intrusion detection systems , 2017, Inf. Sci..
[61] M. Hemalatha,et al. Effective approach toward Intrusion Detection System using data mining techniques , 2014 .
[62] Arezoo Zakeri,et al. Efficient feature selection method using real-valued grasshopper optimization algorithm , 2019, Expert Syst. Appl..
[63] R. Vijayanand,et al. Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection , 2018, Comput. Secur..
[64] Zhong Jin,et al. A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection , 2014, Soft Computing.
[65] Kangfeng Zheng,et al. Feature selection method with joint maximal information entropy between features and class , 2018, Pattern Recognit..
[66] Xuehua Zhao,et al. An improved grasshopper optimization algorithm with application to financial stress prediction , 2018, Applied Mathematical Modelling.
[67] Sankalap Arora,et al. Chaotic grasshopper optimization algorithm for global optimization , 2019, Neural Computing and Applications.
[68] Andrew Lewis,et al. Grasshopper Optimisation Algorithm: Theory and application , 2017, Adv. Eng. Softw..
[69] Kwangjo Kim,et al. Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection , 2018, IEEE Transactions on Information Forensics and Security.
[70] Sanjeev Kumar Pippal,et al. An empirical evaluation of teaching–learning-based optimization, genetic algorithm and particle swarm optimization , 2019, International Journal of Computers and Applications.