2021
DOI: 10.1155/2021/6648351
|View full text |Cite
|
Sign up to set email alerts
|

Network Intrusion Detection System Based on the Combination of Multiobjective Particle Swarm Algorithm‐Based Feature Selection and Fast‐Learning Network

Abstract: Given the growth of wireless networks and the increase of the advantages and applications of communication networks, especially mobile ad hoc networks (MANETs), this type of network has attracted the attention of users and researchers more than before. The benefit of these types of networks in various kinds of networks and environments is that MANET does not require to hardware infrastructure to communicate and send and receive data packets within the network. It is one of the main reasons for using these MANE… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
2

Relationship

3
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…e smaller the threshold n of 10∼100-dimensional function, the more time-consuming, but the accuracy of the solution is not necessarily high. ere is an inflection point in the solution accuracy at 5 out of n. It can be seen that the selection of n value has a certain correlation with the dimension of the function [22].…”
Section: Analysis Of Influence Of Parameter Selection On Algorithmmentioning
confidence: 93%
“…e smaller the threshold n of 10∼100-dimensional function, the more time-consuming, but the accuracy of the solution is not necessarily high. ere is an inflection point in the solution accuracy at 5 out of n. It can be seen that the selection of n value has a certain correlation with the dimension of the function [22].…”
Section: Analysis Of Influence Of Parameter Selection On Algorithmmentioning
confidence: 93%
“…On the basis of the above, considering that the emergence of network intrusion behavior is a gradual development process, it is also carried out according to the corresponding steps, and in the actual power communication network, the diversity of intrusion behavior also makes it difficult to describe in a universal sense [23][24]. For this reason, this paper realizes the representation of network channel operation status through nodes.…”
Section: Intelligent Monitoring Of Malicious Intrusion In Power Commu...mentioning
confidence: 99%
“…The PSO applies the concept of social behaviors to flocks of birds or fish to real-world problems. This approach preserves local as well as global solutions and creates the best fit for a goal [24,25]. PSO is also used to implement the information dissemination protocol in the article.…”
Section: Clustering Based On Swarm Intelligencementioning
confidence: 99%