2022
DOI: 10.1007/s10586-022-03607-1
|View full text |Cite
|
Sign up to set email alerts
|

A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(8 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Method Accuracy(%) Zegarra et al [41] TabNet 97.03 Yao R et al [42] XGBoost 91.06 Kareem et al [43] GTO-BSA 98.79 Jeyaselvi, M. et al [44] EXPSO-STFA 95.65 Proposed BBO 99.1 Reference Method Accuracy(%) Yaseen et al [45] differential evalution 80.15 Yao R et al [42] XGBoost 91.06 Kareem et al [43] GTO-BSA 95.59 Ingre et al [46] CFS+ANN 79.9 Proposed BBO 97.5…”
Section: Referencementioning
confidence: 99%
“…Method Accuracy(%) Zegarra et al [41] TabNet 97.03 Yao R et al [42] XGBoost 91.06 Kareem et al [43] GTO-BSA 98.79 Jeyaselvi, M. et al [44] EXPSO-STFA 95.65 Proposed BBO 99.1 Reference Method Accuracy(%) Yaseen et al [45] differential evalution 80.15 Yao R et al [42] XGBoost 91.06 Kareem et al [43] GTO-BSA 95.59 Ingre et al [46] CFS+ANN 79.9 Proposed BBO 97.5…”
Section: Referencementioning
confidence: 99%
“…In fact, FS is a preprocessing step in which redundant, irrelevant, and ineffective features are omitted because they do not contribute to the accuracy of the data mining model [27,28]. The technique has gained in popularity in recent years for numerous data mining applications in science [29][30][31], engineering [32][33][34], and medical diagnostics [35][36][37]. FS is a binary optimization problem in which the search agents are confined to binary (0, 1) values only, with the length of the vector depending on the number of features in the dataset, and these values correspond to selected and unselected features [7].…”
Section: Introductionmentioning
confidence: 99%
“…The entities or objects that are involved within an IoT network system are wirelessly linked using smart tiny sensors. Therefore, IoT devices have the capacity to interact with others without any human intervention [1]. IoT devices perform across numerous environments to achieve various objectives, leading to the development of several computing and communication technologies used in healthcare, military, agriculture, business and education [2].…”
Section: Introductionmentioning
confidence: 99%