4.7 Article

An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

Parameter adaptation-based ant colony optimization with dynamic hybrid mechanism

Xiangbing Zhou et al.

Summary: This paper proposes a parameter adaptation-based ant colony optimization (ACO) algorithm called PF3SACO, which combines particle swarm optimization (PSO), fuzzy system, and 3-Opt algorithm to improve the optimization ability and convergence, and avoid falling into local optima. The PF3SACO utilizes dynamic parameter adjustment and adaptive search to achieve better optimization performance, and applies 3-Opt algorithm to optimize the generated path.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2022)

Article Automation & Control Systems

A new interval type-2 fuzzy logic system under dynamic environment: Application to financial investment

Akihiko Takahashi et al.

Summary: This paper introduces a new interval type-2 fuzzy logic system (IT2 FLS) designed for financial investment, with adaptive time-varying parameters for real-time data streams. The system utilizes an online learning method based on a state-space framework, showing superiority over traditional type-1 FLS in empirical experiments with global financial asset time-series data.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2021)

Article Automation & Control Systems

A density-based evolutionary clustering algorithm for intelligent development

Haibin Xie et al.

Summary: Inspired by human cognitive development, this paper proposes a density-based evolutionary clustering algorithm called DBEC, which starts from zero state and simulates the cognitive development process. By using different strategy combinations, three types of DBEC algorithms are developed, including conservative, robust, and radical ones, to find various clustering attributes of the samples.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2021)

Article Automation & Control Systems

Forecasting exchange rates with the iMLP: New empirical insight on one multi-layer perceptron for interval time series (ITS)

Carlos Mate et al.

Summary: The foreign exchange market involves converting one country's currency into another, with spot exchange rates being closely monitored worldwide. Neural networks, such as the Multi-Layer Perceptron (MLP) and interval MLP (iMLP), are utilized for FX forecasting. By analyzing different behaviors and accuracy measures, it is evident that considering multiple iMLP networks is beneficial for FX forecasting.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2021)

Article Engineering, Electrical & Electronic

A Hyperspectral Image Classification Method Using Multifeature Vectors and Optimized KELM

Huayue Chen et al.

Summary: A feature extraction method combining PCA and LBP is developed to optimize the KELM model for hyperspectral image classification in this article. Experimental results demonstrate that the proposed method achieves higher classification accuracy and better generalization ability for small samples, providing a new idea for hyperspectral image processing.

IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING (2021)

Article Computer Science, Theory & Methods

QASEC: A secured data communication scheme for mobile Ad-hoc networks

Muhammad Usman et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Artificial Intelligence

An efficient feature selection based Bayesian and Rough set approach for intrusion detection

Mahendra Prasad et al.

APPLIED SOFT COMPUTING (2020)

Article Computer Science, Information Systems

Optimized evolutionary algorithm and supervised ACO mechanism to mitigate attacks and improve performance of adhoc network

J. Sathya Priya et al.

COMPUTER COMMUNICATIONS (2020)

Article Automation & Control Systems

Boosting algorithms for network intrusion detection: A comparative evaluation of Real AdaBoost, Gentle AdaBoost and Modest AdaBoost

Amin Shahraki et al.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2020)

Article Computer Science, Information Systems

Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detection

Mahendra Prasad et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Information Systems

Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device

Fang Feng et al.

AD HOC NETWORKS (2019)

Article Computer Science, Hardware & Architecture

An efficient stream region sink position analysis model for routing attack detection in mobile ad hoc networks

M. Vigenesh et al.

COMPUTERS & ELECTRICAL ENGINEERING (2019)

Article Computer Science, Hardware & Architecture

Design of a security-aware routing scheme in Mobile Ad-hoc Network using repeated game model

Subramanian Balaji et al.

COMPUTER STANDARDS & INTERFACES (2019)

Article Engineering, Industrial

Performance reliability evaluation for mobile ad hoc networks

Shihu Xiang et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2018)

Article Computer Science, Theory & Methods

A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks

Farrukh Aslam Khan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Computer Science, Interdisciplinary Applications

Energy and mobility conscious multipath routing scheme for route stability and load balancing in MANETs

Waheb A. Jabbar et al.

SIMULATION MODELLING PRACTICE AND THEORY (2017)

Article Computer Science, Hardware & Architecture

Dynamic anomaly detection using cross layer security in MANET

G. Usha et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Computer Science, Hardware & Architecture

A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks

Mohammad Rmayti et al.

COMPUTER NETWORKS (2017)

Article Automation & Control Systems

A population-based incremental learning approach with artificial immune system for network intrusion detection

Meng-Hui Chen et al.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2016)

Article Engineering, Industrial

Reliability and survivability of vehicular ad hoc networks: An analytical approach

S. Dharmaraja et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2016)

Article Computer Science, Hardware & Architecture

A model of data forwarding in MANETs for lightweight detection of malicious packet dropping

Leovigildo Sanchez-Casado et al.

COMPUTER NETWORKS (2015)

Article Computer Science, Artificial Intelligence

An intrusion detection system using network traffic profiling and online sequential extreme learning machine

Raman Singh et al.

EXPERT SYSTEMS WITH APPLICATIONS (2015)

Article Computer Science, Information Systems

A probabilistic framework for jammer identification in MANETs

Massimiliano Albanese et al.

AD HOC NETWORKS (2014)

Article Computer Science, Information Systems

An intrusion detection & adaptive response mechanism for MANETs

Adnan Nadeem et al.

AD HOC NETWORKS (2014)

Article Computer Science, Hardware & Architecture

Modified DSR protocol for detection and removal of selective black hole attack in MANET

M. Mohanapriya et al.

COMPUTERS & ELECTRICAL ENGINEERING (2014)

Article Automation & Control Systems

A novel general approach to evaluating the reliability of gas turbine system

Manjit Verma et al.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2014)

Article Computer Science, Hardware & Architecture

PHAODV: Power aware heterogeneous routing protocol for MANETs

Haidar Safa et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Article Computer Science, Information Systems

Intrusion detection in MANET using classification algorithms: The effects of cost and model selection

Aikaterini Mitrokotsa et al.

AD HOC NETWORKS (2013)

Article Computer Science, Hardware & Architecture

Evolutionary computation techniques for intrusion detection in mobile ad hoc networks

Sevil Sen et al.

COMPUTER NETWORKS (2011)