The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review
Given the prevailing state of cybersecurity, it is reasonable to understand why cybersecurity
experts are seriously considering artificial intelligence as a potential field that can aid …
experts are seriously considering artificial intelligence as a potential field that can aid …
Recent trends in computational intelligence for educational big data analysis
Educational big data analytics and computational intelligence have transformed our
understanding of learning ability and computing power, catalyzing the emergence of …
understanding of learning ability and computing power, catalyzing the emergence of …
An intrusion detection system based on normalized mutual information antibodies feature selection and adaptive quantum artificial immune system
Z Ling, ZJ Hao - International Journal on Semantic Web and …, 2022 - igi-global.com
The intrusion detection system (IDS) has lower speed, less adaptability and lower detection
accuracy especially for small samples sets. This paper presents a detection model based on …
accuracy especially for small samples sets. This paper presents a detection model based on …
An artificial immunity based intrusion detection system for unknown cyberattacks
The evolving unknown cyberattacks have rapidly expanded the cyber threat landscape.
Identifying unknown cyberattacks, therefore, remains a challenging issue, compounded by …
Identifying unknown cyberattacks, therefore, remains a challenging issue, compounded by …
Novel harris hawks optimization and deep neural network approach for intrusion detection
Intrusion detection systems attempt to identify assaults while they occur or after they have
occurred and they detect abnormal behavior in a network of computer systems in order to …
occurred and they detect abnormal behavior in a network of computer systems in order to …
Negative selection algorithm research and applications in the last decade: A review
The negative selection algorithm (NSA) is one of the important methods in the field of
immunological computation (or artificial immune systems). Over the years, some progress …
immunological computation (or artificial immune systems). Over the years, some progress …
Negative selection in anomaly detection—A survey
P Saurabh, B Verma - Computer Science Review, 2023 - Elsevier
The remarkable ability to separate and identify self and non-self in a given problem space,
makes negative selection a fascinating concept of artificial immune system. Therefore …
makes negative selection a fascinating concept of artificial immune system. Therefore …
Spam message detection using Danger theory and Krill herd optimization
Due to proliferation of online posts and rise in the active social media users, fraudulent
activities related with spam messages have taken a spike drift. Spam is an activity by which …
activities related with spam messages have taken a spike drift. Spam is an activity by which …
A genetic algorithm-based dendritic cell algorithm for input signal generation
D Zhang, Y Zhang, Y Liang - Applied Intelligence, 2023 - Springer
The dendritic cell algorithm (DCA) is a classification algorithm based on the biological
antigen presentation process. Its classification efficiently depends on a data preprocessing …
antigen presentation process. Its classification efficiently depends on a data preprocessing …
Service coverage optimization for facility location: considering line-of-sight coverage in continuous demand space
The reliable service coverage of many facilities or sensors used in smart city infrastructure is
highly susceptible to obstructions in urban environments. Optimizing the line-of-sight (LOS) …
highly susceptible to obstructions in urban environments. Optimizing the line-of-sight (LOS) …