Review and empirical analysis of sparrow search algorithm
Y Yue, L Cao, D Lu, Z Hu, M Xu, S Wang, B Li… - Artificial Intelligence …, 2023 - Springer
In recent years, swarm intelligence algorithms have received extensive attention and
research. Swarm intelligence algorithms are a biological heuristic method, which is widely …
research. Swarm intelligence algorithms are a biological heuristic method, which is widely …
Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system
The mission of an intrusion detection system (IDS) is to monitor network activities and
assess whether or not they are malevolent. Specifically, anomaly-based IDS can discover …
assess whether or not they are malevolent. Specifically, anomaly-based IDS can discover …
A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones
A Heidari, NJ Navimipour… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The Internet of Drones (IoD) is built on the Internet of Things (IoT) by replacing “Things” with
“Drones” while retaining incomparable features. Because of its vital applications, IoD …
“Drones” while retaining incomparable features. Because of its vital applications, IoD …
Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures
Computer viruses, malicious, and other hostile attacks can affect a computer network.
Intrusion detection is a key component of network security as an active defence technology …
Intrusion detection is a key component of network security as an active defence technology …
A systematic literature review on swarm intelligence based intrusion detection system: past, present and future
Swarm Intelligence (SI) has proven to be useful in solving issues that are difficult to solve
using traditional mathematical methodologies by using a collective behavior of a …
using traditional mathematical methodologies by using a collective behavior of a …
RETRACTED: An enhanced consortium blockchain diversity mining technique for IoT metadata aggregation
P Chithaluru, F Al-Turjman, R Dugyala, T Stephan… - 2024 - Elsevier
The authors have plagiarized part of a Doctoral Thesis that had already appeared in
Shodhganga, 7 December 2022, Modeling and evaluation of consortium based blockchain …
Shodhganga, 7 December 2022, Modeling and evaluation of consortium based blockchain …
A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)
Today, wireless sensor networks (WSNs) are growing rapidly and provide a lot of comfort to
human life. Due to the use of WSNs in various areas, like health care and battlefield, security …
human life. Due to the use of WSNs in various areas, like health care and battlefield, security …
Binary improved white shark algorithm for intrusion detection systems
Intrusion Detection (ID) is an essential task in the cyberattacks domain built to secure
Internet applications and networks from malicious actors. The main shortcoming of the …
Internet applications and networks from malicious actors. The main shortcoming of the …
Building a cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model
The adoption of cloud computing has become increasingly widespread across various
domains. However, the inherent security vulnerabilities of cloud computing pose significant …
domains. However, the inherent security vulnerabilities of cloud computing pose significant …
An enhanced self-learning-based clustering scheme for real-time traffic data distribution in wireless networks
The process of examining the data flow over the internet to identify abnormalities in wireless
network performance is known as network traffic analysis. When analyzing network traffic …
network performance is known as network traffic analysis. When analyzing network traffic …