2022
DOI: 10.1007/978-3-031-12413-6_17
|View full text |Cite
|
Sign up to set email alerts
|

The XGBoost Model for Network Intrusion Detection Boosted by Enhanced Sine Cosine Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
10

Relationship

5
5

Authors

Journals

citations
Cited by 34 publications
(9 citation statements)
references
References 50 publications
0
9
0
Order By: Relevance
“…Therefore, the scientists have experimented with wide range of optimization algorithms on a variety of practical problems. Some of the most promising domains include medical diagnostics support [14,20,24,33,43], wireless sensor network tuning [4,9,12,48,57,66], stock price estimations [16], as well as intrusion detection and security domain [1,31,41,45,55,56,60,65] and plant classifying task [17].…”
Section: Metaheuristics Optimizationmentioning
confidence: 99%
“…Therefore, the scientists have experimented with wide range of optimization algorithms on a variety of practical problems. Some of the most promising domains include medical diagnostics support [14,20,24,33,43], wireless sensor network tuning [4,9,12,48,57,66], stock price estimations [16], as well as intrusion detection and security domain [1,31,41,45,55,56,60,65] and plant classifying task [17].…”
Section: Metaheuristics Optimizationmentioning
confidence: 99%
“…NP-hard complexity with real world problems is common and hence the application of these algorithms is diverse. Some notable examples are artificial neural network optimization [7][8][9][10]12,14,15,19,21,26,32,36,48,53,54], wireless sensors networks (WSNs) [4,11,13,52,65,75], cryptocurrency trends estimations [44,49], finally the COVID-19 global epidemic-associated applications [22,25,64,66,[69][70][71]73], computer-conducted MRI classification and sickness determination [17,20,24,33,55], cloud-edge and fog computing and task scheduling [3,5,6,16,23,50,67], and lastly securing networks through intrusion detection [2,31,43,62,…”
Section: Swarm Intelligence Applications In Machine Learningmentioning
confidence: 99%
“…A significant number of metaheuristics methods exist today, explained by the no free lunch theorem [57], stating that an universal solution to all optimization problems is not existing. Consequently, the researchers have implemented a large number of algorithms, and employed them on a wide range of real-world problems from different domains, such as medical diagnostics [15,21,25,37,47], wireless sensor networks [5,10,13,53,63,72], stock price forecasting [17], intrusion detection and other security applications [2,35,45,51,61,62,66,71] and plant classification problem [18]. Metaheuristics algorithms have been also employed to tune the cloud, edge and fog computing [3,6,16,24,52,65], feature selection [9,20,23,36,41,54,67], dropout regularization [12], a wide spectrum of COVID-19 challenges [26,64,[68][69][70], artificial neural networks optimization [4,7,8,…”
Section: Metaheuristics Optimizationmentioning
confidence: 99%