Review and empirical analysis of sparrow search algorithm

Y Yue, L Cao, D Lu, Z Hu, M Xu, S Wang, B Li… - Artificial Intelligence …, 2023 - Springer
In recent years, swarm intelligence algorithms have received extensive attention and
research. Swarm intelligence algorithms are a biological heuristic method, which is widely …

Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system

MHL Louk, BA Tama - Expert Systems with Applications, 2023 - Elsevier
The mission of an intrusion detection system (IDS) is to monitor network activities and
assess whether or not they are malevolent. Specifically, anomaly-based IDS can discover …

A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones

A Heidari, NJ Navimipour… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The Internet of Drones (IoD) is built on the Internet of Things (IoT) by replacing “Things” with
“Drones” while retaining incomparable features. Because of its vital applications, IoD …

Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures

IA Kandhro, SM Alanazi, F Ali, A Kehar, K Fatima… - IEEE …, 2023 - ieeexplore.ieee.org
Computer viruses, malicious, and other hostile attacks can affect a computer network.
Intrusion detection is a key component of network security as an active defence technology …

A systematic literature review on swarm intelligence based intrusion detection system: past, present and future

DKK Reddy, J Nayak, HS Behera… - … Methods in Engineering, 2024 - Springer
Swarm Intelligence (SI) has proven to be useful in solving issues that are difficult to solve
using traditional mathematical methodologies by using a collective behavior of a …

RETRACTED: An enhanced consortium blockchain diversity mining technique for IoT metadata aggregation

P Chithaluru, F Al-Turjman, R Dugyala, T Stephan… - 2024 - Elsevier
The authors have plagiarized part of a Doctoral Thesis that had already appeared in
Shodhganga, 7 December 2022, Modeling and evaluation of consortium based blockchain …

A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)

M Hosseinzadeh, J Yoo, S Ali, J Lansky, S Mildeova… - Scientific Reports, 2023 - nature.com
Today, wireless sensor networks (WSNs) are growing rapidly and provide a lot of comfort to
human life. Due to the use of WSNs in various areas, like health care and battlefield, security …

Binary improved white shark algorithm for intrusion detection systems

NA Alawad, BH Abed-alguni, MA Al-Betar… - Neural Computing and …, 2023 - Springer
Intrusion Detection (ID) is an essential task in the cyberattacks domain built to secure
Internet applications and networks from malicious actors. The main shortcoming of the …

Building a cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model

M Bakro, RR Kumar, M Husain, Z Ashraf, A Ali… - IEEE …, 2024 - ieeexplore.ieee.org
The adoption of cloud computing has become increasingly widespread across various
domains. However, the inherent security vulnerabilities of cloud computing pose significant …

An enhanced self-learning-based clustering scheme for real-time traffic data distribution in wireless networks

A Jain, T Mehrotra, A Sisodia, S Vishnoi, S Upadhyay… - Heliyon, 2023 - cell.com
The process of examining the data flow over the internet to identify abnormalities in wireless
network performance is known as network traffic analysis. When analyzing network traffic …