A comprehensive review of bat inspired algorithm: Variants, applications, and hybridization
Bat algorithm (BA) is one of the promising metaheuristic algorithms. It proved its efficiency in
dealing with various optimization problems in diverse fields, such as power and energy …
dealing with various optimization problems in diverse fields, such as power and energy …
Gradient-based optimizer (gbo): a review, theory, variants, and applications
This paper introduces a comprehensive survey of a new population-based algorithm so-
called gradient-based optimizer (GBO) and analyzes its major features. GBO considers as …
called gradient-based optimizer (GBO) and analyzes its major features. GBO considers as …
[HTML][HTML] TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks
Abstract The Internet of Things (IoT) is a global network that connects a large number of
smart devices. MQTT is a de facto standard, lightweight, and reliable protocol for machine-to …
smart devices. MQTT is a de facto standard, lightweight, and reliable protocol for machine-to …
[HTML][HTML] An optimized and efficient android malware detection framework for future sustainable computing
Android-based smart devices cater to services in almost every aspect of our lives like
personal, professional, social, banking, business, etc. However, people with increasingly …
personal, professional, social, banking, business, etc. However, people with increasingly …
Memory-based sand cat swarm optimization for feature selection in medical diagnosis
The rapid expansion of medical data poses numerous challenges for Machine Learning
(ML) tasks due to their potential to include excessive noisy, irrelevant, and redundant …
(ML) tasks due to their potential to include excessive noisy, irrelevant, and redundant …
TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization
Industrial cyber-physical systems (CPS) are vulnerable to cyberattacks that can compromise
their operations, safety, and security. Traditional intrusion detection systems are ineffective …
their operations, safety, and security. Traditional intrusion detection systems are ineffective …
A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions
W Fei, H Ohno, S Sampalli - ACM Computing Surveys, 2023 - dl.acm.org
The Internet of Things (IoT) encompasses a network of physical objects embedded with
sensors, software, and data processing technologies that can establish connections and …
sensors, software, and data processing technologies that can establish connections and …
Optimal cluster based feature selection for intrusion detection system in web and cloud computing environment using hybrid teacher learning optimization enables …
KG Maheswari, C Siva, G Nalinipriya - Computer Communications, 2023 - Elsevier
Abstract Information technology organizations have experienced rapid growth in recent
years, resulting in scalability, mobility, and flexibility challenges. Those organizations move …
years, resulting in scalability, mobility, and flexibility challenges. Those organizations move …
Optimizing airport slot scheduling problem using optimization algorithms
MK Shambour, MA Abu-Hashem - Soft Computing, 2023 - Springer
The primary objective of airport management worldwide is always to make it easier to
provide transportation services and minimize latency. This could be accomplished by …
provide transportation services and minimize latency. This could be accomplished by …
Intrusion detection using chaotic poor and rich optimization with deep learning model for smart city environment
Artificial intelligence (AI) techniques play a vital role in the evolving growth and rapid
development of smart cities. To develop a smart environment, enhancements to the …
development of smart cities. To develop a smart environment, enhancements to the …