• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4606053)   Today's Articles (5414)   Subscriber (49373)
For: Almomani O. A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms. Symmetry (Basel) 2020;12:1046. [DOI: 10.3390/sym12061046] [Citation(s) in RCA: 58] [Impact Index Per Article: 14.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
Number Cited by Other Article(s)
1
Eltoukhy MM, Gaber T, Almazroi AA, Mohamed MF. ONE3A: one-against-all authentication model for smartphone using GAN network and optimization techniques. PeerJ Comput Sci 2024;10:e2001. [PMID: 38699213 PMCID: PMC11065406 DOI: 10.7717/peerj-cs.2001] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/26/2023] [Accepted: 03/28/2024] [Indexed: 05/05/2024]
2
Liu Z, Wang Y, Feng F, Liu Y, Li Z, Shan Y. A DDoS Detection Method Based on Feature Engineering and Machine Learning in Software-Defined Networks. SENSORS (BASEL, SWITZERLAND) 2023;23:6176. [PMID: 37448025 DOI: 10.3390/s23136176] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/18/2023] [Revised: 06/26/2023] [Accepted: 07/03/2023] [Indexed: 07/15/2023]
3
Sharma RK, Issac B, Xin Q, Gadekallu TR, Nath K. Plant and Salamander Inspired Network Attack Detection and Data Recovery Model. SENSORS (BASEL, SWITZERLAND) 2023;23:5562. [PMID: 37420729 DOI: 10.3390/s23125562] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/15/2023] [Revised: 04/24/2023] [Accepted: 06/01/2023] [Indexed: 07/09/2023]
4
Almuqren L, Al-Mutiri F, Maashi M, Mohsen H, Hilal AM, Alsaid MI, Drar S, Abdelbagi S. Sine-Cosine-Adopted African Vultures Optimization with Ensemble Autoencoder-Based Intrusion Detection for Cybersecurity in CPS Environment. SENSORS (BASEL, SWITZERLAND) 2023;23:4804. [PMID: 37430718 DOI: 10.3390/s23104804] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/31/2023] [Revised: 03/22/2023] [Accepted: 05/12/2023] [Indexed: 07/12/2023]
5
Sallam YF, Abd El‐Nabi S, El‐Shafai W, Ahmed HEH, Saleeb A, El‐Bahnasawy NA, Abd El‐Samie FE. Efficient implementation of image representation, visual geometry group with 19 layers and residual network with 152 layers for intrusion detection from UNSW‐NB15 dataset. SECURITY AND PRIVACY 2023. [DOI: 10.1002/spy2.300] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/18/2022] [Accepted: 01/14/2023] [Indexed: 09/01/2023]
6
Salman EH, Taher MA, Hammadi YI, Mahmood OA, Muthanna A, Koucheryavy A. An Anomaly Intrusion Detection for High-Density Internet of Things Wireless Communication Network Based Deep Learning Algorithms. SENSORS (BASEL, SWITZERLAND) 2022;23:s23010206. [PMID: 36616806 DOI: 10.3390/electronics11203332] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/30/2022] [Revised: 12/10/2022] [Accepted: 12/22/2022] [Indexed: 05/27/2023]
7
Salman EH, Taher MA, Hammadi YI, Mahmood OA, Muthanna A, Koucheryavy A. An Anomaly Intrusion Detection for High-Density Internet of Things Wireless Communication Network Based Deep Learning Algorithms. SENSORS (BASEL, SWITZERLAND) 2022;23:s23010206. [PMID: 36616806 PMCID: PMC9824352 DOI: 10.3390/s23010206] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/30/2022] [Revised: 12/10/2022] [Accepted: 12/22/2022] [Indexed: 05/14/2023]
8
A new intrusion detection system based on using non-linear statistical analysis and features selection techniques. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102906] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
9
Xiao Y, Kang C, Yu H, Fan T, Zhang H. Anomalous Network Traffic Detection Method Based on an Elevated Harris Hawks Optimization Method and Gated Recurrent Unit Classifier. SENSORS (BASEL, SWITZERLAND) 2022;22:7548. [PMID: 36236647 PMCID: PMC9571187 DOI: 10.3390/s22197548] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/25/2022] [Revised: 09/22/2022] [Accepted: 09/29/2022] [Indexed: 06/16/2023]
10
Awad M, Fraihat S, Salameh K, Al Redhaei A. Examining the Suitability of NetFlow Features in Detecting IoT Network Intrusions. SENSORS (BASEL, SWITZERLAND) 2022;22:6164. [PMID: 36015924 PMCID: PMC9412997 DOI: 10.3390/s22166164] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 06/29/2022] [Revised: 08/08/2022] [Accepted: 08/16/2022] [Indexed: 06/15/2023]
11
A framework to detect DDoS attack in Ryu controller based software defined networks using feature extraction and classification. APPL INTELL 2022. [DOI: 10.1007/s10489-022-03565-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
12
A Novel Chimp Optimization Algorithm with Refraction Learning and Its Engineering Applications. ALGORITHMS 2022. [DOI: 10.3390/a15060189] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/04/2023]
13
Balasaraswathi VR, Mary Shamala L, Hamid Y, Pachhaiammal Alias Priya M, Shobana M, Sugumaran M. An Efficient Feature Selection for Intrusion Detection System Using B-HKNN and C2 Search Based Learning Model. Neural Process Lett 2022. [DOI: 10.1007/s11063-022-10854-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
14
A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System. MATHEMATICS 2022. [DOI: 10.3390/math10060999] [Citation(s) in RCA: 9] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/04/2022]
15
A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things. SENSORS 2022;22:s22062112. [PMID: 35336282 PMCID: PMC8953567 DOI: 10.3390/s22062112] [Citation(s) in RCA: 7] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/13/2022] [Revised: 03/04/2022] [Accepted: 03/05/2022] [Indexed: 12/19/2022]
16
Alzahrani MY, Bamhdi AM. Hybrid deep-learning model to detect botnet attacks over internet of things environments. Soft comput 2022. [DOI: 10.1007/s00500-022-06750-4] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
17
Effective Intrusion Detection System to Secure Data in Cloud Using Machine Learning. Symmetry (Basel) 2021. [DOI: 10.3390/sym13122306] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
18
Momanyi E, Segera D. A Master-Slave Binary Grey Wolf Optimizer for Optimal Feature Selection in Biomedical Data Classification. BIOMED RESEARCH INTERNATIONAL 2021;2021:5556941. [PMID: 34676261 PMCID: PMC8526239 DOI: 10.1155/2021/5556941] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/28/2021] [Revised: 09/10/2021] [Accepted: 09/20/2021] [Indexed: 11/30/2022]
19
Herrera-Semenets V, Bustio-Martínez L, Hernández-León R, van den Berg J. A multi-measure feature selection algorithm for efficacious intrusion detection. Knowl Based Syst 2021. [DOI: 10.1016/j.knosys.2021.107264] [Citation(s) in RCA: 11] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
20
Particle Swarm Optimization and Multiple Stacked Generalizations to Detect Nitrogen and Organic-Matter in Organic-Fertilizer Using Vis-NIR. SENSORS 2021;21:s21144882. [PMID: 34300620 PMCID: PMC8309747 DOI: 10.3390/s21144882] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/20/2021] [Revised: 07/13/2021] [Accepted: 07/16/2021] [Indexed: 11/29/2022]
21
Botnet Attack Detection Using Local Global Best Bat Algorithm for Industrial Internet of Things. ELECTRONICS 2021. [DOI: 10.3390/electronics10111341] [Citation(s) in RCA: 27] [Impact Index Per Article: 9.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
22
HCRNNIDS: Hybrid Convolutional Recurrent Neural Network-Based Network Intrusion Detection System. Processes (Basel) 2021. [DOI: 10.3390/pr9050834] [Citation(s) in RCA: 37] [Impact Index Per Article: 12.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
23
A two-stage intrusion detection approach for software-defined IoT networks. Soft comput 2021. [DOI: 10.1007/s00500-021-05809-y] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
24
Prediction of software vulnerability based deep symbiotic genetic algorithms: Phenotyping of dominant-features. APPL INTELL 2021. [DOI: 10.1007/s10489-021-02324-3] [Citation(s) in RCA: 14] [Impact Index Per Article: 4.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
25
Luo K, Jiao Y. Automatic fault detection of sensors in leather cutting control system under GWO-SVM algorithm. PLoS One 2021;16:e0248515. [PMID: 33760850 PMCID: PMC7990226 DOI: 10.1371/journal.pone.0248515] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/12/2020] [Accepted: 02/28/2021] [Indexed: 11/18/2022]  Open
26
Analysis of the Optimal Application of Blockchain-Based Smart Lockers in the Logistics Industry Based on FFD-SAGA and Grey Decision-Making. Symmetry (Basel) 2021. [DOI: 10.3390/sym13020329] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]  Open
27
An Analysis of the KDD99 and UNSW-NB15 Datasets for the Intrusion Detection System. Symmetry (Basel) 2020. [DOI: 10.3390/sym12101666] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
28
Feature Selection Methods Simultaneously Improve the Detection Accuracy and Model Building Time of Machine Learning Classifiers. Symmetry (Basel) 2020. [DOI: 10.3390/sym12091424] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]  Open
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA