SMO-DNN: Spider Monkey Optimization and Deep Neural Network Hybrid Classifier Model for Intrusion Detection
Published 2020 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
SMO-DNN: Spider Monkey Optimization and Deep Neural Network Hybrid Classifier Model for Intrusion Detection
Authors
Keywords
-
Journal
Electronics
Volume 9, Issue 4, Pages 692
Publisher
MDPI AG
Online
2020-04-24
DOI
10.3390/electronics9040692
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A metaheuristic optimization approach for energy efficiency in the IoT networks
- (2020) Celestine Iwendi et al. SOFTWARE-PRACTICE & EXPERIENCE
- A Novel PCA-Firefly Based XGBoost Classification Model for Intrusion Detection in Networks Using GPU
- (2020) Sweta Bhattacharya et al. Electronics
- Early Detection of Diabetic Retinopathy Using PCA-Firefly Based Deep Learning Model
- (2020) Thippa Reddy Gadekallu et al. Electronics
- Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms
- (2019) Zouhair Chiba et al. COMPUTERS & SECURITY
- A hybrid egocentric video summarization method to improve the healthcare for Alzheimer patients
- (2019) Saba Sultan et al. Journal of Ambient Intelligence and Humanized Computing
- A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks
- (2019) Sahil Garg et al. IEEE Transactions on Network and Service Management
- Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm
- (2019) Taief Alaa Alamiedy et al. Journal of Ambient Intelligence and Humanized Computing
- A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Towards Universal and Resilient Systems
- (2018) Elhadj Benkhelifa et al. IEEE Communications Surveys and Tutorials
- Related families-based attribute reduction of dynamic covering decision information systems
- (2018) Guangming Lang et al. KNOWLEDGE-BASED SYSTEMS
- LION IDS: A meta-heuristics approach to detect DDoS attacks against Software-Defined Networks
- (2018) D. Arivudainambi et al. NEURAL COMPUTING & APPLICATIONS
- Updating the Silent Speech Challenge benchmark with deep learning
- (2018) Yan Ji et al. SPEECH COMMUNICATION
- Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
- (2018) Shadi Aljawarneh et al. Journal of Computational Science
- On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique
- (2018) Celestine Iwendi et al. IEEE Access
- New studies on dynamic analysis of inertial neural networks involving non-reduced order method
- (2018) Chuangxia Huang et al. NEUROCOMPUTING
- Firefly algorithm based feature selection for network intrusion detection
- (2018) Selvakumar B et al. COMPUTERS & SECURITY
- A survey of intrusion detection in Internet of Things
- (2017) Bruno Bogaz Zarpelão et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Face presentation attack detection using guided scale texture
- (2017) Fei Peng et al. MULTIMEDIA TOOLS AND APPLICATIONS
- A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks
- (2017) Chuanlong Yin et al. IEEE Access
- Finite-time synchronization by switching state-feedback control for discontinuous Cohen–Grossberg neural networks with mixed delays
- (2017) Zuo-Wei Cai et al. International Journal of Machine Learning and Cybernetics
- Testing and Defending Methods Against DOS Attack in State Estimation
- (2016) Heng Zhang et al. ASIAN JOURNAL OF CONTROL
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks
- (2016) Tao Ma et al. SENSORS
- Spider monkey optimization algorithm for constrained optimization problems
- (2016) Kavita Gupta et al. SOFT COMPUTING
- Ageist Spider Monkey Optimization algorithm
- (2016) Avinash Sharma et al. Swarm and Evolutionary Computation
- A novel hybrid KPCA and SVM with GA model for intrusion detection
- (2014) Fangjun Kuang et al. APPLIED SOFT COMPUTING
- A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection
- (2014) Fangjun Kuang et al. SOFT COMPUTING
- Incremental approaches to knowledge reduction based on characteristic matrices
- (2014) Guangming Lang et al. International Journal of Machine Learning and Cybernetics
- SVELTE: Real-time intrusion detection in the Internet of Things
- (2013) Shahid Raza et al. Ad Hoc Networks
- CRACK LOCALIZATION IN HYDRAULIC TURBINE BLADES BASED ON KERNEL INDEPENDENT COMPONENT ANALYSIS AND WAVELET NEURAL NETWORK
- (2013) Xianghong Wang et al. International Journal of Computational Intelligence Systems
- Spider Monkey Optimization algorithm for numerical optimization
- (2013) Jagdish Chand Bansal et al. Memetic Computing
- Intrusion detection system: A comprehensive review
- (2012) Hung-Jen Liao et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A VMM-based intrusion prevention system in cloud computing environment
- (2011) Hai Jin et al. JOURNAL OF SUPERCOMPUTING
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started