Bald eagle search algorithm: a comprehensive review with its variants and applications

MA El-Shorbagy, A Bouaouda, HA Nabwey… - Systems Science & …, 2024 - Taylor & Francis
Bald Eagle Search (BES) is a recent and highly successful swarm-based metaheuristic
algorithm inspired by the hunting strategy of bald eagles in capturing prey. With its …

A Self‐adaptive Bald Eagle Search optimization algorithm with dynamic opposition‐based learning for global optimization problems

SR Sharma, M Kaur, B Singh - Expert Systems, 2023 - Wiley Online Library
Abstract Bald Eagle Search optimization (BES) is introduced recently, which mimics the bald
eagles' hunting and food searching behaviour. The capability of a BES algorithm is …

i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security

S Ennaji, N El Akkad, K Haddouch - International Journal of …, 2023 - igi-global.com
The potential of machine learning mechanisms played a key role in improving the intrusion
detection task. However, other factors such as quality of data, overfitting, imbalanced …

Feature selection algorithm characterization for NIDS using machine and deep learning

J Verma, A Bhandari, G Singh - 2022 IEEE International IOT …, 2022 - ieeexplore.ieee.org
Data dimensionality is increasing at a rapid rate, posing difficulties for traditional mining and
learning algorithms. Commercial NIDS models make use of statistical measures to analyze …

AI-Enabled IDS for Identifying Malicious Traffics in Cloud Systems Check for updates

S Biswas, C Kumar, S Som, MSA Ansari… - … of ICACCP 2023, 2023 - books.google.com
The widespread usage of the Internet has increased network security issues. Some of the
serious threats are Brute force, Heartbleed, Botnet, Web attacks, DOS, DDOS, and Infiltration …

AI-Enabled IDS for Identifying Malicious Traffics in Cloud Systems

S Biswas, C Kumar, S Som, MSA Ansari… - … Conference on Advanced …, 2023 - Springer
The widespread usage of the Internet has increased network security issues. Some of the
serious threats are Brute force, Heartbleed, Botnet, Web attacks, DoS, DDoS, and Infiltration …