2018 IEEE 4th International Symposium on Wireless Systems Within the International Conferences on Intelligent Data Acquisition 2018
DOI: 10.1109/idaacs-sws.2018.8525539
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Binary Whale Optimization Algorithm for Feature Selection of Network Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 6 publications
0
14
0
1
Order By: Relevance
“…Parameter/operator Name Description [49] linear convergence factor a sine, cosine, tangent, log, and square functions used to update value of a in a non-linear fashion. [50], [51] adaptive inertia weights Parameter a adaptive inertia weight is added to update whale position. Parameter a is changed into a nonlinear convergence factor.…”
Section: Referencementioning
confidence: 99%
See 2 more Smart Citations
“…Parameter/operator Name Description [49] linear convergence factor a sine, cosine, tangent, log, and square functions used to update value of a in a non-linear fashion. [50], [51] adaptive inertia weights Parameter a adaptive inertia weight is added to update whale position. Parameter a is changed into a nonlinear convergence factor.…”
Section: Referencementioning
confidence: 99%
“…Zhong and Long [49] have proposed five non-linear strategies namely sine, cosine, tangent, log and square, to update the value of control parameter a and cosine method outperformed other four techniques and original WOA. Similarly [39], [50], [51] proposed nonlinear value adjustment of the same control parameter a. adaptive inertia weight is also added in [50] to update whales position.…”
Section: Referencementioning
confidence: 99%
See 1 more Smart Citation
“…Xu ve ark. [10] Ağ saldırısı tespiti için geliştirilmiş bir ikili balina optimizasyon algoritmasına (Whale Optimization Algorithm -WOA) dayalı bir özellik seçme yöntemi sunmuşlardır. Önerdikleri yöntemi GA ile karşılaştırmışlar ve sınıflandırma başarısını KDD Cup veri seti üzerinde ölçmüşlerdir.…”
Section: Literatürdeki İlgili çAlışmalarunclassified
“…Also, the dolphin swarm behaviors such as hunting and spraying are demonstrated the feasibility for detection and prevention of malicious nodes, e.g., malicious vehicles, and data attacks from the VANET. The SI-enhanced IDS is also considered in [168] for wireless networks. Different from [167], this study relies on a WOA scheme that can achieve better classification accuracy by using fewer feature subsets.…”
Section: Attack Detectionmentioning
confidence: 99%