Supervised feature selection techniques in network intrusion detection: A critical review

M Di Mauro, G Galatro, G Fortino, A Liotta - Engineering Applications of …, 2021 - Elsevier
Abstract Machine Learning (ML) techniques are becoming an invaluable support for network
intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats …

[BOOK][B] Applied integer programming: modeling and solution

DS Chen, RG Batson, Y Dang - 2011 - books.google.com
An accessible treatment of the modeling and solution of integer programming problems,
featuring modern applications and software In order to fully comprehend the algorithms …

[BOOK][B] Handbook of approximation algorithms and metaheuristics

TF Gonzalez - 2007 - taylorfrancis.com
Delineating the tremendous growth in this area, the Handbook of Approximation Algorithms
and Metaheuristics covers fundamental, theoretical topics as well as advanced, practical …

Tabu search

M Gendreau, JY Potvin - … introductory tutorials in optimization and decision …, 2005 - Springer
Over the last 15 years, hundreds of papers presenting applications of tabu search, a
heuristic method originally proposed by (1986), to various combinatorial problems have …

[BOOK][B] Introduction to computational optimization models for production planning in a supply chain

S Voß, DL Woodruff - 2006 - books.google.com
provide models that could be used by do-it-yourselfers and also can be used toprovideunderstandingofthebackgroundiss…
job of working with the (proprietary) algorithms of the software vendors. In this book we …

Tabu search for attribute reduction in rough set theory

AR Hedar, J Wang, M Fukushima - Soft Computing, 2008 - Springer
In this paper, we consider a memory-based heuristic of tabu search to solve the attribute
reduction problem in rough set theory. The proposed method, called tabu search attribute …

A survey on evolutionary algorithms dynamics and its complexity–Mutual relations, past, present and future

I Zelinka - Swarm and Evolutionary Computation, 2015 - Elsevier
Swarm and evolutionary based algorithms represent a class of search methods that can be
used for solving optimization problems. They mimic natural principles of evolution and …

Hybrid immune-genetic algorithm method for benefit maximisation of distribution network operators and distributed generation owners in a deregulated environment

A Soroudi, M Ehsan, R Caire, N Hadjsaid - IET generation, transmission & …, 2011 - IET
In deregulated power systems, distribution network operators (DNO) are responsible for
maintaining the proper operation and efficiency of distribution networks. This is achieved …

Rough set and scatter search metaheuristic based feature selection for credit scoring

J Wang, AR Hedar, S Wang, J Ma - Expert Systems with Applications, 2012 - Elsevier
As the credit industry has been growing rapidly, credit scoring models have been widely
used by the financial industry during this time to improve cash flow and credit collections …

The case for strategic oscillation

F Glover, JK Hao - Annals of Operations Research, 2011 - Springer
We study a “hard” optimization problem for metaheuristic search, where a natural
neighborhood (that consists of moves for flip** the values of zero-one variables) confronts …