2020
DOI: 10.1007/s11227-020-03161-w
|View full text |Cite
|
Sign up to set email alerts
|

Incorporating evolutionary computation for securing wireless network against cyberthreats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 60 publications
0
12
0
Order By: Relevance
“…To beat this impediment, authors in [6,7] proposed another hybrid feature selection technique that diminishes the non-applicable features and selects the best ideal component subsets. The recurring pattern study in [8] indicated that individual hunt calculation locates the most suitable subsets that amplify information over-fitting, while a probing interest is less prone to information over-fitting in the part assurance, developing a modest number of tests [9]. Authors in [10] proposed the use of ELM and alpha profiling to diminish the required time while superfluous highlights were disposed of utilizing a group of separated, relationship and consistency-based feature selection procedures.…”
Section: Related Workmentioning
confidence: 99%
“…To beat this impediment, authors in [6,7] proposed another hybrid feature selection technique that diminishes the non-applicable features and selects the best ideal component subsets. The recurring pattern study in [8] indicated that individual hunt calculation locates the most suitable subsets that amplify information over-fitting, while a probing interest is less prone to information over-fitting in the part assurance, developing a modest number of tests [9]. Authors in [10] proposed the use of ELM and alpha profiling to diminish the required time while superfluous highlights were disposed of utilizing a group of separated, relationship and consistency-based feature selection procedures.…”
Section: Related Workmentioning
confidence: 99%
“…Genetic algorithms used in solving multicriteria optimization problems are variants of evolutionary search methods [7]. A large number of works have been devoted to researches in this area over the past few years.…”
Section: Review and Analysis Of Previous Studiesmentioning
confidence: 99%
“…IPT set cost. Relation (7) shows how it is possible to reduce (or increase) the risk of information loss for each invested cost unit. Next, we consider how the resulting expressions can be applied in GA.…”
Section: G Chmentioning
confidence: 99%
See 1 more Smart Citation
“…In general, wrapper methods can obtain better results than filter methods, but bring more expensive computational cost. A lot of evolutionary algorithms such as genetic algorithm (GA), differential evolution (DE), ant colony optimization (ACO), and simulated annealing are commonly used as wrapper methods for gene selection [57,58].…”
Section: Introductionmentioning
confidence: 99%