Related references
Note: Only part of the references are listed.Honey Badger Algorithm: New metaheuristic algorithm for solving optimization problems
Fatma A. Hashim et al.
MATHEMATICS AND COMPUTERS IN SIMULATION (2022)
Unital Design Based Location Service for Subterranean Network Using Long Range Topology
S. J. Syed Ali Fathima et al.
WIRELESS PERSONAL COMMUNICATIONS (2022)
An integrated approach explaining the detection of distributed denial of service attacks
Raj Kumar Batchu et al.
COMPUTER NETWORKS (2022)
Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing
S. Krishnaveni et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2021)
Large group activity security risk assessment and risk early warning based on random forest algorithm
Yanyu Chen et al.
PATTERN RECOGNITION LETTERS (2021)
A cognitive mechanism for mitigating DDoS attacks using the artificial immune system in a cloud environment
Damai Jessica Prathyusha et al.
EVOLUTIONARY INTELLIGENCE (2021)
Bird swarm algorithms with chaotic mapping
Elif Varol Altay et al.
ARTIFICIAL INTELLIGENCE REVIEW (2020)
Moth-flame optimization algorithm: variants and applications
Mohammad Shehab et al.
NEURAL COMPUTING & APPLICATIONS (2020)
FCM-SVM based intrusion detection system for cloud computing environment
Aws Naser Jaber et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2020)
Hybrid many-objective particle swarm optimization algorithm for green coal production problem
Zhihua Cui et al.
INFORMATION SCIENCES (2020)
Whale optimization algorithm: a systematic review of contemporary applications, modifications and developments
Nadim Rana et al.
NEURAL COMPUTING & APPLICATIONS (2020)
Detection of distributed denial of service attacks based on information theoretic approach in time series models
Jisa David et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)
Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues
Shahab Shamshirband et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)
Hyperband Tuned Deep Neural Network With Well Posed Stacked Sparse AutoEncoder for Detection of DDoS Attacks in Cloud
Aanshi Bhardwaj et al.
IEEE ACCESS (2020)
On the performance improvement of elephant herding optimization algorithm
Mostafa A. Elhosseini et al.
KNOWLEDGE-BASED SYSTEMS (2019)
Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud
Trung Phan et al.
IEEE ACCESS (2019)
Intrusion detection of distributed denial of service attack in cloud
S. Velliangiri et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm
Bahram Hajimirzaei et al.
ICT EXPRESS (2019)