Training a Neural Network for Cyberattack Classification Applications Using Hybridization of an Artificial Bee Colony and Monarch Butterfly Optimization
Published 2019 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Training a Neural Network for Cyberattack Classification Applications Using Hybridization of an Artificial Bee Colony and Monarch Butterfly Optimization
Authors
Keywords
Intrusion detection system (IDS), Neural network training, A multilayer perceptron (MLP), Swarm Intelligence (SI), Artificial Bee Colony Algorithm (ABC), Monarch Butterfly Optimization (MBO)
Journal
NEURAL PROCESSING LETTERS
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2019-10-02
DOI
10.1007/s11063-019-10120-x
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A novel network security algorithm based on improved support vector machine from smart city perspective
- (2018) Xiang Zou et al. COMPUTERS & ELECTRICAL ENGINEERING
- Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection
- (2018) R. Vijayanand et al. COMPUTERS & SECURITY
- Network intrusion detection system based on recursive feature addition and bigram technique
- (2018) Tarfa Hamed et al. COMPUTERS & SECURITY
- Dendron : Genetic trees driven rule induction for network intrusion detection systems
- (2018) Dimitrios Papamartzivanos et al. Future Generation Computer Systems-The International Journal of eScience
- Hardware/Software Co-design for a Neural Network Trained by Particle Swarm Optimization Algorithm
- (2018) Tuan Linh Dang et al. NEURAL PROCESSING LETTERS
- Supervised Training of Spiking Neural Network by Adapting the E-MWO Algorithm for Pattern Classification
- (2018) Ahmed A. Abusnaina et al. NEURAL PROCESSING LETTERS
- Resource discovery in the peer to peer networks using an inverted ant colony optimization algorithm
- (2018) Saied Asghari et al. Peer-to-Peer Networking and Applications
- Fuzzy self organizing maps-based DDoS mitigation mechanism for software defined networking in cloud computing
- (2018) Harikrishna Pillutla et al. Journal of Ambient Intelligence and Humanized Computing
- A hybrid neural network – world cup optimization algorithm for melanoma detection
- (2018) Navid Razmjooy et al. Open Medicine
- A Cognitively Inspired Hybridization of Artificial Bee Colony and Dragonfly Algorithms for Training Multi-layer Perceptrons
- (2018) Waheed A. H. M. Ghanem et al. Cognitive Computation
- Metaheuristic design of feedforward neural networks: A review of two decades of research
- (2017) Varun Kumar Ojha et al. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE
- Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem
- (2017) Seyed Mojtaba Hosseini Bamakan et al. KNOWLEDGE-BASED SYSTEMS
- A novel support vector machine based intrusion detection system for mobile ad hoc networks
- (2017) Erfan A. Shams et al. WIRELESS NETWORKS
- The Whale Optimization Algorithm
- (2016) Seyedali Mirjalili et al. ADVANCES IN ENGINEERING SOFTWARE
- SCA: A Sine Cosine Algorithm for solving optimization problems
- (2016) Seyedali Mirjalili KNOWLEDGE-BASED SYSTEMS
- Hybridizing artificial bee colony with monarch butterfly optimization for numerical optimization problems
- (2016) Waheed A. H. M. Ghanem et al. NEURAL COMPUTING & APPLICATIONS
- A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks
- (2016) Mohammad Alauthaman et al. NEURAL COMPUTING & APPLICATIONS
- A Hybrid Heat Rate Forecasting Model Using Optimized LSSVM Based on Improved GSA
- (2016) Chao Liu et al. NEURAL PROCESSING LETTERS
- The Ant Lion Optimizer
- (2015) Seyedali Mirjalili ADVANCES IN ENGINEERING SOFTWARE
- How effective is the Grey Wolf optimizer in training multi-layer perceptrons
- (2015) Seyedali Mirjalili APPLIED INTELLIGENCE
- Research on prediction of traffic flow based on dynamic fuzzy neural networks
- (2015) Haitao Li NEURAL COMPUTING & APPLICATIONS
- Advances in Artificial Neural Networks and Computational Intelligence
- (2015) Ignacio Rojas et al. NEURAL PROCESSING LETTERS
- Improving Anomalous Rare Attack Detection Rate for Intrusion Detection System Using Support Vector Machine and Genetic Programming
- (2015) Muhammad Syafiq Mohd Pozi et al. NEURAL PROCESSING LETTERS
- Let a biogeography-based optimizer train your Multi-Layer Perceptron
- (2014) Seyedali Mirjalili et al. INFORMATION SCIENCES
- Hybrid intelligent water drop bundled wavelet neural network to solve the islanding detection by inverter-based DG
- (2014) Mehrdad Tarafdar Hagh et al. Frontiers in Energy
- A Rough RBF Neural Network Based on Weighted Regularized Extreme Learning Machine
- (2013) Shifei Ding et al. NEURAL PROCESSING LETTERS
- Toward developing a systematic approach to generate benchmark datasets for intrusion detection
- (2012) Ali Shiravi et al. COMPUTERS & SECURITY
- Swarm intelligence in intrusion detection: A survey
- (2011) C. Kolias et al. COMPUTERS & SECURITY
- An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection
- (2011) Carlos A. Catania et al. EXPERT SYSTEMS WITH APPLICATIONS
- Decision tree based light weight intrusion detection using a wrapper approach
- (2011) Siva S. Sivatha Sindhu et al. EXPERT SYSTEMS WITH APPLICATIONS
- On the versatility of radial basis function neural networks: A case study in the field of intrusion detection
- (2010) Dominik Fisch et al. INFORMATION SCIENCES
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started