Prediction of software vulnerability based deep symbiotic genetic algorithms: Phenotyping of dominant-features
暂无分享,去创建一个
Özlem Batur Dinler | Laith Abualigah | Canan Batur Şahín | Canan Batur Şahin | L. Abualigah | Ö. Dinler
[1] R.G.S. Asthana,et al. CHAPTER 6 – Evolutionary Algorithms and Neural Networks , 2000 .
[2] Nurdan Akhan Baykan,et al. Feature selection in network intrusion detection using metaheuristic algorithms , 2018 .
[3] Hai Jin,et al. A Comparative Study of Deep Learning-Based Vulnerability Detection System , 2019, IEEE Access.
[4] Omar Almomani,et al. A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms , 2020, Symmetry.
[5] Laith Mohammad Abualigah,et al. Hybrid clustering analysis using improved krill herd algorithm , 2018, Applied Intelligence.
[6] Hoa Khanh Dam,et al. Automatic Feature Learning for Predicting Vulnerable Software Components , 2021, IEEE Transactions on Software Engineering.
[7] Pavlo Bykovyy,et al. Application of Elephant Herd Optimization Algorithm Based on Levy Flight Strategy in Intrusion Detection , 2018, 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS).
[8] S. Sibi Chakkaravarthy,et al. LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks , 2018, Neural Computing and Applications.
[9] Kun Xie,et al. A new evolutionary neural networks based on intrusion detection systems using multiverse optimization , 2017, Applied Intelligence.
[10] Laith Abualigah,et al. Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks , 2020, Journal of Ambient Intelligence and Humanized Computing.
[11] Laith Mohammad Abualigah,et al. Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering , 2017, The Journal of Supercomputing.
[12] L Stepanov,et al. Approach to estimation of level of information security at enterprise based on genetic algorithm , 2018 .
[13] Shigang Liu,et al. A performance evaluation of deep‐learnt features for software vulnerability detection , 2018, Concurr. Comput. Pract. Exp..
[14] Mohammed Azmi Al-Betar,et al. Text feature selection with a robust weight scheme and dynamic dimension reduction to text document clustering , 2017, Expert Syst. Appl..
[15] Laith Mohammad Abualigah,et al. A new feature selection method to improve the document clustering using particle swarm optimization algorithm , 2017, J. Comput. Sci..
[16] Xiaozhen Xue,et al. Predicting Vulnerable Software Components through Deep Neural Network , 2017, ICDLT '17.
[17] Akhan Akbulut,et al. Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic , 2020, Comput. Networks.
[18] Asgarali Bouyer,et al. An efficient vulnerability-driven method for hardening a program against soft-error using genetic algorithm , 2015, Comput. Electr. Eng..
[19] Zhiwei Ye,et al. Modified Naive Bayes Algorithm for Network Intrusion Detection based on Artificial Bee Colony Algorithm , 2018, 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS).
[20] El-Sayed M. El-kenawy,et al. WOA + BRNN: An imbalanced big data classification framework using Whale optimization and deep neural network , 2019, Soft Comput..
[21] Yoshua Bengio,et al. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling , 2014, ArXiv.
[22] Lizhen Qu,et al. CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation , 2022, IEEE Transactions on Dependable and Secure Computing.
[23] Laith Mohammad Abualigah,et al. Feature Selection and Enhanced Krill Herd Algorithm for Text Document Clustering , 2018, Studies in Computational Intelligence.
[24] Shouhuai Xu,et al. SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities , 2018, IEEE Transactions on Dependable and Secure Computing.
[25] Tehseen Zia,et al. Long short-term memory recurrent neural network architectures for Urdu acoustic modeling , 2018, Int. J. Speech Technol..
[26] Darrell Whitley,et al. A genetic algorithm tutorial , 1994, Statistics and Computing.
[27] Onur Ozdemir,et al. Automated Vulnerability Detection in Source Code Using Deep Representation Learning , 2018, 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA).
[28] Amir H. Gandomi,et al. The Arithmetic Optimization Algorithm , 2021, Computer Methods in Applied Mechanics and Engineering.
[29] Laurie A. Williams,et al. Can traditional fault prediction models be used for vulnerability prediction? , 2011, Empirical Software Engineering.
[30] Akhan Akbulut,et al. Development of a Software Vulnerability Prediction Web Service Based on Artificial Neural Networks , 2017, PAKDD.
[31] Matteo Matteucci,et al. Learning behavioral models by recurrent neural networks with discrete latent representations with application to a flexible industrial conveyor , 2020, Comput. Ind..
[32] Minh Le Nguyen,et al. Feature weighting and SVM parameters optimization based on genetic algorithms for classification problems , 2016, Applied Intelligence.
[33] Riccardo Scandariato,et al. The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models , 2017, IEEE Transactions on Reliability.
[34] Saurabh Singh,et al. SMO-DNN: Spider Monkey Optimization and Deep Neural Network Hybrid Classifier Model for Intrusion Detection , 2020, Electronics.
[35] Jinfu Chen,et al. A cost-effective strategy for software vulnerability prediction based on bellwether analysis , 2019, ISSTA.
[36] Jun Wu,et al. Machine Health Monitoring Using Adaptive Kernel Spectral Clustering and Deep Long Short-Term Memory Recurrent Neural Networks , 2019, IEEE Transactions on Industrial Informatics.
[37] Laith Mohammad Abualigah,et al. APPLYING GENETIC ALGORITHMS TO INFORMATION RETRIEVAL USING VECTOR SPACE MODEL , 2015 .
[38] Geoffrey E. Hinton,et al. Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.