Augmented whale feature selection for IoT attacks: Structure, analysis and applications
暂无分享,去创建一个
Hossam Faris | Ibrahim Aljarah | Majdi M. Mafarja | Ali Asghar Heidari | Ali Asghar Heidari | Maria Habib | Thaer Thaher | Hossam Faris | Ibrahim Aljarah | Thaer Thaher | Maria Habib
[1] Hossam Faris,et al. Asynchronous accelerating multi-leader salp chains for feature selection , 2018, Appl. Soft Comput..
[2] Patrick Siarry,et al. A survey on optimization metaheuristics , 2013, Inf. Sci..
[3] Ferat Sahin,et al. A survey on feature selection methods , 2014, Comput. Electr. Eng..
[4] Jon Atli Benediktsson,et al. Feature Selection Based on Hybridization of Genetic Algorithm and Particle Swarm Optimization , 2015, IEEE Geoscience and Remote Sensing Letters.
[5] Muhammad Kamran Siddiqui,et al. Study of biological networks using graph theory , 2017, Saudi journal of biological sciences.
[6] Hesham F. A. Hamed,et al. Intrusion detection systems for IoT-based smart environments: a survey , 2018, Journal of Cloud Computing.
[7] Hossam Faris,et al. A Modified Multi-objective Particle Swarm Optimizer-Based Lévy Flight: An Approach Toward Intrusion Detection in Internet of Things , 2020, Arabian Journal for Science and Engineering.
[8] Seyed Mohammad Mirjalili,et al. Whale optimization approaches for wrapper feature selection , 2018, Appl. Soft Comput..
[9] Hossam M. Zawbaa,et al. Feature selection based on antlion optimization algorithm , 2015, 2015 Third World Conference on Complex Systems (WCCS).
[10] Abdelmadjid Boukra,et al. GAB-BBO: Adaptive Biogeography Based Feature Selection Approach for Intrusion Detection , 2017, Int. J. Comput. Intell. Syst..
[11] Chengye Li,et al. Gaussian mutational chaotic fruit fly-built optimization and feature selection , 2020, Expert Syst. Appl..
[12] S. Mercy Shalinie,et al. Design of cognitive fog computing for intrusion detection in Internet of Things , 2018, Journal of Communications and Networks.
[13] Huiling Chen,et al. An efficient double adaptive random spare reinforced whale optimization algorithm , 2020, Expert Syst. Appl..
[14] Jin Song Dong,et al. Binary Harris Hawks Optimizer for High-Dimensional, Low Sample Size Feature Selection , 2019, Algorithms for Intelligent Systems.
[15] K. Muneeswaran,et al. Firefly algorithm based feature selection for network intrusion detection , 2019, Comput. Secur..
[16] Hao Chen,et al. Advanced orthogonal learning-driven multi-swarm sine cosine optimization: Framework and case studies , 2020, Expert Syst. Appl..
[17] Russell C. Eberhart,et al. A discrete binary version of the particle swarm algorithm , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.
[18] Adeel Akram,et al. Using Genetic Algorithm to Minimize False Alarms in Insider Threats Detection of Information Misuse in Windows Environment , 2014 .
[19] Hossein Gharaee,et al. A new feature selection IDS based on genetic algorithm and SVM , 2016, 2016 8th International Symposium on Telecommunications (IST).
[20] Hossam Faris,et al. Efficient Hybrid Nature-Inspired Binary Optimizers for Feature Selection , 2019, Cognitive Computation.
[21] El-Ghazali Talbi,et al. Metaheuristics - From Design to Implementation , 2009 .
[22] Xiangyang Wang,et al. Feature selection based on rough sets and particle swarm optimization , 2007, Pattern Recognit. Lett..
[23] Robert C. Atkinson,et al. Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).
[24] Hossein Nezamabadi-pour,et al. GSA: A Gravitational Search Algorithm , 2009, Inf. Sci..
[25] Shuai Han,et al. A Novel Hybrid Prediction Model for Hourly Gas Consumption in Supply Side Based on Improved Whale Optimization Algorithm and Relevance Vector Machine , 2019, IEEE Access.
[26] Ali Dehghantanha,et al. Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..
[27] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[28] Hossam Faris,et al. Time-varying hierarchical chains of salps with random weight networks for feature selection , 2020, Expert Syst. Appl..
[29] Kalyanmoy Deb,et al. Messy Genetic Algorithms: Motivation, Analysis, and First Results , 1989, Complex Syst..
[30] D. Jiang,et al. Physical simulation of construction and control of two butted-well horizontal cavern energy storage using large molded rock salt specimens , 2019, Energy.
[31] Yuval Elovici,et al. N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.
[32] Hossein Moayedi,et al. Teaching–learning-based metaheuristic scheme for modifying neural computing in appraising energy performance of building , 2020, Engineering with Computers.
[33] Hossam Faris,et al. Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection , 2019, Journal of Ambient Intelligence and Humanized Computing.
[34] Hossam Faris,et al. An efficient binary Salp Swarm Algorithm with crossover scheme for feature selection problems , 2018, Knowl. Based Syst..
[35] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[36] Alyani Ismail,et al. A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization , 2018, IEEE Access.
[37] Zhifeng Zhao,et al. AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks , 2018, IEEE Internet of Things Journal.
[38] Ashutosh Tiwari,et al. The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence , 2016, 2016 IEEE Congress on Evolutionary Computation (CEC).
[39] Qiao Weibiao. Differential Scanning Calorimetry and Electrochemical Tests for the Analysis of Delamination of 3PE Coatings , 2019, International Journal of Electrochemical Science.
[40] Manas Ranjan Patra,et al. A Layered Approach to Network Intrusion Detection Using Rule Learning Classifiers with Nature-Inspired Feature Selection , 2018 .
[41] Zong Woo Geem,et al. A New Heuristic Optimization Algorithm: Harmony Search , 2001, Simul..
[42] José García,et al. Putting Continuous Metaheuristics to Work in Binary Search Spaces , 2017, Complex..
[43] J. Daemen,et al. Discontinuous fatigue of salt rock with low-stress intervals , 2019, International Journal of Rock Mechanics and Mining Sciences.
[44] Mengjie Zhang,et al. Particle Swarm Optimization for Feature Selection in Classification: A Multi-Objective Approach , 2013, IEEE Transactions on Cybernetics.
[45] Wei Gao,et al. Nano properties analysis via fourth multiplicative ABC indicator calculating , 2017, Arabian Journal of Chemistry.
[46] Hossam Faris,et al. An evolutionary gravitational search-based feature selection , 2019, Inf. Sci..
[47] Andrew Lewis,et al. The Whale Optimization Algorithm , 2016, Adv. Eng. Softw..
[48] Wei Gao,et al. Partial multi-dividing ontology learning algorithm , 2018, Inf. Sci..
[49] Wei Gao,et al. An independent set degree condition for fractional critical deleted graphs , 2019, Discrete & Continuous Dynamical Systems - S.
[50] Yining Wang,et al. The Forecasting of PM2.5 Using a Hybrid Model Based on Wavelet Transform and an Improved Deep Learning Algorithm , 2019, IEEE Access.
[51] Zhe Yang,et al. Modified Dolphin Swarm Algorithm Based on Chaotic Maps for Solving High-Dimensional Function Optimization Problems , 2019, IEEE Access.
[52] John Geraghty,et al. Genetic Algorithm Performance with Different Selection Strategies in Solving TSP , 2011 .
[53] Hossam Faris,et al. Binary dragonfly optimization for feature selection using time-varying transfer functions , 2018, Knowl. Based Syst..
[54] Ezz El-Din Hemdan,et al. Cybercrimes Investigation and Intrusion Detection in Internet of Things Based on Data Science Methods , 2018 .
[55] Hossam Faris,et al. Evolutionary Population Dynamics and Grasshopper Optimization approaches for feature selection problems , 2017, Knowl. Based Syst..
[56] James E. Baker,et al. Adaptive Selection Methods for Genetic Algorithms , 1985, International Conference on Genetic Algorithms.
[57] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[58] Taufik Abrão,et al. Network Anomaly Detection System using Genetic Algorithm and Fuzzy Logic , 2018, Expert Syst. Appl..
[59] Aderemi Oluyinka Adewumi,et al. Efficient Feature Selection Technique for Network Intrusion Detection System Using Discrete Differential Evolution and Decision , 2017, Int. J. Netw. Secur..
[60] Nima Jafari Navimipour,et al. Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm , 2019, ICT Express.
[61] Hossam Faris,et al. A multi-verse optimizer approach for feature selection and optimizing SVM parameters based on a robust system architecture , 2017, Neural Computing and Applications.
[62] Hossein Nezamabadi-pour,et al. BGSA: binary gravitational search algorithm , 2010, Natural Computing.
[63] Qian Zhang,et al. An efficient chaotic mutative moth-flame-inspired optimizer for global optimization tasks , 2019, Expert Syst. Appl..
[64] Broderick Crawford,et al. Binarization Methods for Shuffled Frog Leaping Algorithms That Solve Set Covering Problems , 2015, CSOC.
[65] Bing Xu,et al. An intrusion detection method for internet of things based on suppressed fuzzy clustering , 2018, EURASIP Journal on Wireless Communications and Networking.
[66] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[67] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[68] Hossam Faris,et al. Multi-objective Particle Swarm Optimization for Botnet Detection in Internet of Things , 2019, Algorithms for Intelligent Systems.
[69] Yu Xue,et al. An Evolutionary Computation Based Feature Selection Method for Intrusion Detection , 2018, Secur. Commun. Networks.
[70] Julie Greensmith,et al. Securing the Internet of Things with Responsive Artificial Immune Systems , 2015, GECCO.
[71] Pengjun Wang,et al. Efficient multi-population outpost fruit fly-driven optimizers: Framework and advances in support vector machines , 2020, Expert Syst. Appl..
[72] Aboul Ella Hassanien,et al. Binary grey wolf optimization approaches for feature selection , 2016, Neurocomputing.
[73] Mohamed Elhoseny,et al. Feature selection based on artificial bee colony and gradient boosting decision tree , 2019, Appl. Soft Comput..
[74] Hossam Faris,et al. Bat-inspired algorithms with natural selection mechanisms for global optimization , 2018, Neurocomputing.
[75] Qian Zhang,et al. Multi-strategy boosted mutative whale-inspired optimization approaches , 2019, Applied Mathematical Modelling.
[76] Vipin Kumar,et al. Introduction to Data Mining , 2022, Data Mining and Machine Learning Applications.
[77] Duoqian Miao,et al. A rough set approach to feature selection based on ant colony optimization , 2010, Pattern Recognit. Lett..
[78] Zhe Yang,et al. Solving Large-Scale Function Optimization Problem by Using a New Metaheuristic Algorithm Based on Quantum Dolphin Swarm Algorithm , 2019, IEEE Access.
[79] José M. Molina López,et al. Applying VorEAl for IoT Intrusion Detection , 2018, HAIS.
[80] H. Moayedi,et al. Employing artificial bee colony and particle swarm techniques for optimizing a neural network in prediction of heating and cooling loads of residential buildings , 2020 .
[81] Andrew Lewis,et al. S-shaped versus V-shaped transfer functions for binary Particle Swarm Optimization , 2013, Swarm Evol. Comput..
[82] Franz Pernkopf,et al. Bayesian network classifiers versus selective k-NN classifier , 2005, Pattern Recognit..
[83] Hossam Faris,et al. An enhanced associative learning-based exploratory whale optimizer for global optimization , 2019, Neural Computing and Applications.
[84] Hongbin Zhang,et al. Feature selection using tabu search method , 2002, Pattern Recognit..
[85] Broderick Crawford,et al. Two swarm intelligence algorithms for the Set Covering Problem , 2014, 2014 9th International Conference on Software Engineering and Applications (ICSOFT-EA).
[86] Wei Liu,et al. Research on the Stability and Treatments of Natural Gas Storage Caverns With Different Shapes in Bedded Salt Rocks , 2020, IEEE Access.
[87] Thomas Bäck,et al. Selective Pressure in Evolutionary Algorithms: A Characterization of Selection Mechanisms , 1994, International Conference on Evolutionary Computation.
[88] Broderick Crawford,et al. Analyzing the effects of binarization techniques when solving the set covering problem through swarm optimization , 2017, Expert Syst. Appl..