Hybridized artificial intelligence models with nature-inspired algorithms for river flow modeling: A comprehensive review, assessment, and possible future research …
H Tao, SI Abba, AM Al-Areeq, F Tangang… - … Applications of Artificial …, 2024 - Elsevier
River flow (Q flow) is a hydrological process that considerably impacts the management and
sustainability of water resources. The literature has shown great potential for nature-inspired …
sustainability of water resources. The literature has shown great potential for nature-inspired …
Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm
With the rapid expansion of Internet of Things (IoT) networks, the need for robust security
measures to detect and report potential threats is becoming more urgent. In this paper, we …
measures to detect and report potential threats is becoming more urgent. In this paper, we …
A survey of CNN-based network intrusion detection
Over the past few years, Internet applications have become more advanced and widely
used. This has increased the need for Internet networks to be secured. Intrusion detection …
used. This has increased the need for Internet networks to be secured. Intrusion detection …
Review of the metaheuristic algorithms in applications: Visual analysis based on bibliometrics (1994–2023)
G Li, T Zhang, CY Tsai, L Yao, Y Lu, J Tang - Expert Systems with …, 2024 - Elsevier
Metaheuristic algorithms have gradually become the mainstream way to solve complex
optimization problems with their streamlined structure and robust performance. Innovative …
optimization problems with their streamlined structure and robust performance. Innovative …
Reptile search algorithm: Theory, variants, applications, and performance evaluation
Abstract Reptile Search Algorithm (RSA) is a recently developed nature-inspired meta-
heuristics optimization algorithm inspired by the encircling mechanism, hunting mechanism …
heuristics optimization algorithm inspired by the encircling mechanism, hunting mechanism …
Enhancing intrusion detection systems for IoT and cloud environments using a growth optimizer algorithm and conventional neural networks
Intrusion detection systems (IDS) play a crucial role in securing networks and identifying
malicious activity. This is a critical problem in cyber security. In recent years, metaheuristic …
malicious activity. This is a critical problem in cyber security. In recent years, metaheuristic …
Binary improved white shark algorithm for intrusion detection systems
Intrusion Detection (ID) is an essential task in the cyberattacks domain built to secure
Internet applications and networks from malicious actors. The main shortcoming of the …
Internet applications and networks from malicious actors. The main shortcoming of the …
The applications of metaheuristics for human activity recognition and fall detection using wearable sensors: A comprehensive analysis
In this paper, we study the applications of metaheuristics (MH) optimization algorithms in
human activity recognition (HAR) and fall detection based on sensor data. It is known that …
human activity recognition (HAR) and fall detection based on sensor data. It is known that …
Anomaly detection in industrial IoT using distributional reinforcement learning and generative adversarial networks
Anomaly detection is one of the biggest issues of security in the Industrial Internet of Things
(IIoT) due to the increase in cyber attack dangers for distributed devices and critical …
(IIoT) due to the increase in cyber attack dangers for distributed devices and critical …
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Abstract The Internet of Things (IoT) is extensively used in modern-day life, such as in smart
homes, intelligent transportation, etc. However, the present security measures cannot fully …
homes, intelligent transportation, etc. However, the present security measures cannot fully …