Related references
Note: Only part of the references are listed.
Review
Engineering, Civil
Ravdeep Kour et al.
Summary: Digitalization is transforming the railway industry globally, but it also brings increased cybersecurity risks. The current cybersecurity research in the railway industry mainly focuses on conceptual aspects and lacks the application of advanced technologies like artificial intelligence.
PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART F-JOURNAL OF RAIL AND RAPID TRANSIT
(2023)
Article
Computer Science, Interdisciplinary Applications
Fatma A. Hashim et al.
Summary: This paper introduces a new metaheuristic optimization algorithm called Honey Badger Algorithm (HBA), inspired by the intelligent foraging behavior of honey badgers, to develop an efficient search strategy for solving optimization problems. Experimental results demonstrate the effectiveness and superiority of HBA in solving optimization problems with complex search-space.
MATHEMATICS AND COMPUTERS IN SIMULATION
(2022)
Article
Chemistry, Analytical
Gaoyuan Liu et al.
Summary: This paper proposes a WSN intelligent intrusion detection model based on edge computing, which combines the k-Nearest Neighbor algorithm and arithmetic optimization algorithm to detect intrusions in the WSN, achieving high accuracy and performance in experimental tests.
Article
Computer Science, Information Systems
Mohammed Otair et al.
Summary: The intrusion detection system is a method for detecting system attacks. Researchers proposed a technique that combines Grey Wolf Optimization and Particle Swarm Optimization to solve the issue of local optimal solution in intrusion detection. The performance of the technique was verified using k-means and SVM algorithms.
Article
Computer Science, Information Systems
Mohammad Dehghani et al.
Summary: This paper presents a new bio-inspired metaheuristic algorithm called Tasmanian Devil Optimization (TDO), which mimics the feeding behavior of Tasmanian devils. The TDO algorithm demonstrates high ability and competitiveness in optimization problems.
Article
Computer Science, Information Systems
Sridevi Subbiah et al.
Summary: This article introduces an intrusion detection system for wireless sensor networks and proposes a new framework that improves accuracy. By utilizing Boruta feature selection with grid search random forest algorithm, the framework performs well in detecting attacks and outperforms other existing algorithms.
JOURNAL OF COMMUNICATIONS AND NETWORKS
(2022)
Article
Computer Science, Artificial Intelligence
P. Rajesh et al.
Summary: This manuscript presents a hybrid method for energy management system (EMS) in smart homes using internet of things (IoT) that combines Sailfish Optimizer (SFO) and Adaptive Neuro-Fuzzy Interference System (ANFIS) to optimize power and resource management in the distribution system (DS).
APPLIED SOFT COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Vinayakumar Ravi et al.
Summary: This work proposes an end-to-end model for network attack detection and classification using deep learning-based recurrent models. The model extracts features from the hidden layers of recurrent models and uses a feature selection approach to identify optimal features. Experimental results show that the proposed method outperforms existing methods and commonly used machine learning models.
COMPUTERS & ELECTRICAL ENGINEERING
(2022)
Article
Computer Science, Information Systems
Kadiyala Ramana et al.
Summary: The study proposed a unique Whale Optimized Gate Recurrent Unit (WOGRU) Intrusion Detection System for WSN-IoT networks to effectively identify various attacks, using whale algorithm to tune hyperparameters for low computational overhead and great performance, and validated the effectiveness of the framework.
COMPUTER COMMUNICATIONS
(2022)
Article
Telecommunications
Djallel Eddine Boubiche et al.
Summary: The vulnerability of wireless sensor networks to attacks mainly stems from data transmission over the air, lack of tamper-proof sensor nodes, and inability for human intervention in dealing with network compromises. Lightweight and efficient security protocols must be researched, while respecting the specific constraints of the sensor nodes.
WIRELESS PERSONAL COMMUNICATIONS
(2021)
Article
Computer Science, Artificial Intelligence
Mukaram Safaldin et al.
Summary: An enhanced intrusion detection system using the modified binary grey wolf optimizer with support vector machine is proposed in this paper. The system utilizes 3, 5, and 7 wolves to find the optimal number of wolves for intrusion detection in WSN environments, aiming to increase detection accuracy and speed.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING
(2021)
Article
Computer Science, Artificial Intelligence
Abhilash Singh et al.
Summary: This paper proposes three methods based on machine learning approach using GPR model for fast intrusion detection and prevention in Wireless Sensor Networks. By selecting potential features like number of nodes, sensing range, velocity ratio, etc., and extracting features using analytical approach, accurate prediction of k-barrier coverage probability is achieved. The proposed method outperforms other benchmark schemes with higher accuracy.
EXPERT SYSTEMS WITH APPLICATIONS
(2021)
Article
Computer Science, Hardware & Architecture
M. P. Pavan Kumar et al.
Summary: This work presents a structure-preserving non-photorealistic rendering framework that distills prominent structural features, dominant edges, and other essential elements while suppressing unnecessary details. The framework enhances image properties effectively and preserves structural features by integrating a sequence of NPR image filters.
JOURNAL OF SUPERCOMPUTING
(2021)
Article
Telecommunications
M. Maheswari et al.
Summary: This paper introduces a novel secure unequal clustering protocol with intrusion detection technique to optimize the energy efficiency, network lifetime, and security of WSN. The proposed model utilizes adaptive neuro fuzzy based clustering technique to select tentative cluster heads, followed by deer hunting optimization algorithm to select optimal cluster heads. Additionally, a cluster maintenance phase is employed for load balancing, and an intrusion detection system based on deep belief network is utilized for enhancing security.
WIRELESS PERSONAL COMMUNICATIONS
(2021)
Article
Automation & Control Systems
Shashank Gavel et al.
Summary: The proposed technique utilizes a combination of multi-varying kernel density estimation and distributed computing to detect intrusive attacks caused by compromised nodes in the network, providing efficient performance through the calculation of global probability density functions and effective detection within the network, with an approximation of PE divergence carried out using different techniques. Comparing results obtained using PE divergence and an entropy-based method helps to assess the robustness of the approach in estimating intrusion attacks accurately.
Article
Environmental Sciences
Zhitao Chen et al.
Summary: The article introduces a Self-Attention-Based Conditional Variational Autoencoder Generative Adversarial Network (SACVAEGAN) that aims to improve hyperspectral image classification performance by generating enhanced virtual samples, focusing on global information, and incorporating the WGAN-GP loss function to enhance model stability. Experimental results and comparisons with state-of-the-art methods demonstrate the significant advantages of SACVAEGAN in accuracy.
Article
Computer Science, Software Engineering
Takoua Abdellatif et al.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2020)
Article
Engineering, Electrical & Electronic
Periasamy Nancy et al.
IET COMMUNICATIONS
(2020)
Article
Computer Science, Artificial Intelligence
Wenjie Zhang et al.
Article
Computer Science, Artificial Intelligence
Shaimaa Ahmed Elsaid et al.
Article
Telecommunications
Somnath Sinha et al.
WIRELESS PERSONAL COMMUNICATIONS
(2020)
Article
Computer Science, Information Systems
Shuai Jiang et al.
Article
Computer Science, Theory & Methods
Christian Miranda et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2020)
Review
Computer Science, Information Systems
Shah Ahsanul Haque et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS
(2014)
Article
Computer Science, Information Systems
Tianbo Lu et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS
(2014)