[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …
indicating an increase of more than 50% since 2018. With the average cyber insurance …
A review of the modification strategies of the nature inspired algorithms for feature selection problem
This survey is an effort to provide a research repository and a useful reference for
researchers to guide them when planning to develop new Nature-inspired Algorithms …
researchers to guide them when planning to develop new Nature-inspired Algorithms …
A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT
The increasing trend toward using the Internet of Things (IoT) increased the number of
intrusions and intruders annually. Hence, the integration, confidentiality, and access to …
intrusions and intruders annually. Hence, the integration, confidentiality, and access to …
Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in Fog computing
Our world is moving fast towards the era of the Internet of Things (IoT), which connects all
kinds of devices to digital services and brings significant convenience to our lives. With the …
kinds of devices to digital services and brings significant convenience to our lives. With the …
Dynamic bargain game theory in the internet of things for data trustworthiness
Smart home and smart building systems based on the Internet of Things (IoT) in smart cities
currently suffer from security issues. In particular, data trustworthiness and efficiency are two …
currently suffer from security issues. In particular, data trustworthiness and efficiency are two …
Android ransomware detection based on a hybrid evolutionary approach in the context of highly imbalanced data
In recent years, Ransomware has been a critical threat that attacks smartphones.
Ransomware is a kind of malware that blocks the mobile's system and prevents the user of …
Ransomware is a kind of malware that blocks the mobile's system and prevents the user of …
Augmented whale feature selection for IoT attacks: Structure, analysis and applications
Smart connected appliances expand the boundaries of the conventional Internet into the
new Internet of Things (IoT). IoT started to hold a significant role in our life, and in several …
new Internet of Things (IoT). IoT started to hold a significant role in our life, and in several …
Survey of lévy flight-based metaheuristics for optimization
J Li, Q An, H Lei, Q Deng, GG Wang - Mathematics, 2022 - mdpi.com
Lévy flight is a random walk mechanism which can make large jumps at local locations with
a high probability. The probability density distribution of Lévy flight was characterized by …
a high probability. The probability density distribution of Lévy flight was characterized by …
Intrusion detection for the internet of things (IoT) based on the emperor penguin colony optimization algorithm
Abstract In the Internet of Things (IoT), the data that are sent via devices are sometimes
unrelated, duplicated, or erroneous, which makes it difficult to perform the required tasks …
unrelated, duplicated, or erroneous, which makes it difficult to perform the required tasks …
MOAEOSCA: an enhanced multi-objective hybrid artificial ecosystem-based optimization with sine cosine algorithm for feature selection in botnet detection in IoT
The number of Internet of Things (IoT) devices overgrows, and this technology dominates.
The importance of IoT security and the growing need to devise intrusion detection systems …
The importance of IoT security and the growing need to devise intrusion detection systems …