Hybridized artificial intelligence models with nature-inspired algorithms for river flow modeling: A comprehensive review, assessment, and possible future research …

H Tao, SI Abba, AM Al-Areeq, F Tangang… - … Applications of Artificial …, 2024 - Elsevier
River flow (Q flow) is a hydrological process that considerably impacts the management and
sustainability of water resources. The literature has shown great potential for nature-inspired …

Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm

S Fraihat, S Makhadmeh, M Awad, MA Al-Betar… - Internet of Things, 2023 - Elsevier
With the rapid expansion of Internet of Things (IoT) networks, the need for robust security
measures to detect and report potential threats is becoming more urgent. In this paper, we …

A survey of CNN-based network intrusion detection

L Mohammadpour, TC Ling, CS Liew, A Aryanfar - Applied Sciences, 2022 - mdpi.com
Over the past few years, Internet applications have become more advanced and widely
used. This has increased the need for Internet networks to be secured. Intrusion detection …

Review of the metaheuristic algorithms in applications: Visual analysis based on bibliometrics (1994–2023)

G Li, T Zhang, CY Tsai, L Yao, Y Lu, J Tang - Expert Systems with …, 2024 - Elsevier
Metaheuristic algorithms have gradually become the mainstream way to solve complex
optimization problems with their streamlined structure and robust performance. Innovative …

Reptile search algorithm: Theory, variants, applications, and performance evaluation

B Sasmal, AG Hussien, A Das, KG Dhal… - Archives of Computational …, 2024 - Springer
Abstract Reptile Search Algorithm (RSA) is a recently developed nature-inspired meta-
heuristics optimization algorithm inspired by the encircling mechanism, hunting mechanism …

Enhancing intrusion detection systems for IoT and cloud environments using a growth optimizer algorithm and conventional neural networks

A Fatani, A Dahou, M Abd Elaziz, MAA Al-Qaness, S Lu… - Sensors, 2023 - mdpi.com
Intrusion detection systems (IDS) play a crucial role in securing networks and identifying
malicious activity. This is a critical problem in cyber security. In recent years, metaheuristic …

Binary improved white shark algorithm for intrusion detection systems

NA Alawad, BH Abed-alguni, MA Al-Betar… - Neural Computing and …, 2023 - Springer
Intrusion Detection (ID) is an essential task in the cyberattacks domain built to secure
Internet applications and networks from malicious actors. The main shortcoming of the …

The applications of metaheuristics for human activity recognition and fall detection using wearable sensors: A comprehensive analysis

MAA Al-Qaness, AM Helmi, A Dahou, MA Elaziz - Biosensors, 2022 - mdpi.com
In this paper, we study the applications of metaheuristics (MH) optimization algorithms in
human activity recognition (HAR) and fall detection based on sensor data. It is known that …

Anomaly detection in industrial IoT using distributional reinforcement learning and generative adversarial networks

H Benaddi, M Jouhari, K Ibrahimi, J Ben Othman… - Sensors, 2022 - mdpi.com
Anomaly detection is one of the biggest issues of security in the Industrial Internet of Things
(IIoT) due to the increase in cyber attack dangers for distributed devices and critical …

A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models

OBJ Rabie, S Selvarajan, T Hasanin, AM Alshareef… - Scientific Reports, 2024 - nature.com
Abstract The Internet of Things (IoT) is extensively used in modern-day life, such as in smart
homes, intelligent transportation, etc. However, the present security measures cannot fully …