An effect of chaos grasshopper optimization algorithm for protection of network infrastructure

作者: Shubhra Dwivedi , Manu Vardhan , Sarsij Tripathi

DOI: 10.1016/J.COMNET.2020.107251

关键词:

摘要: … optimization issues. In this work, we present the chaotic initialization of maps in the AGOA optimization … Chaotic maps are used to efficiently balance exploration and exploitation and …

参考文章(71)
Lu Lv, Wenhai Wang, Zeyin Zhang, Xinggao Liu, A novel intrusion detection system based on an optimal hybrid kernel extreme learning machine Knowledge Based Systems. ,vol. 195, pp. 105648- ,(2020) , 10.1016/J.KNOSYS.2020.105648
Prasanta Gogoi, Monowar H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita, Packet and Flow Based Network Intrusion Dataset international conference on contemporary computing. pp. 322- 334 ,(2012) , 10.1007/978-3-642-32129-0_34
Warusia Yassin, Nur Izura Udzir, Azizol Abdullah, Mohd Taufik Abdullah, Zaiton Muda, Hazura Zulzalil, Packet Header Anomaly Detection Using Statistical Analysis soco-cisis-iceute. pp. 473- 482 ,(2014) , 10.1007/978-3-319-07995-0_47
Mohamed M. Abd-Eldayem, A proposed HTTP service based IDS Egyptian Informatics Journal. ,vol. 15, pp. 13- 24 ,(2014) , 10.1016/J.EIJ.2014.01.001
Artur J. Ferreira, Mário A.T. Figueiredo, Efficient feature selection filters for high-dimensional data Pattern Recognition Letters. ,vol. 33, pp. 1794- 1804 ,(2012) , 10.1016/J.PATREC.2012.05.019
Chien-Pang Lee, Yungho Leu, Wei-Ning Yang, Constructing gene regulatory networks from microarray data using GA/PSO with DTW Applied Soft Computing. ,vol. 12, pp. 1115- 1124 ,(2012) , 10.1016/J.ASOC.2011.11.013
Miao Xie, Jiankun Hu, Evaluating host-based anomaly detection systems: A preliminary analysis of ADFA-LD international congress on image and signal processing. ,vol. 03, pp. 1711- 1716 ,(2013) , 10.1109/CISP.2013.6743952
Amin Karami, Manel Guerrero-Zapata, A hybrid multiobjective RBF-PSO method for mitigating DoS attacks in Named Data Networking Neurocomputing. ,vol. 151, pp. 1262- 1282 ,(2015) , 10.1016/J.NEUCOM.2014.11.003
Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, Ali A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for intrusion detection Computers & Security. ,vol. 31, pp. 357- 374 ,(2012) , 10.1016/J.COSE.2011.12.012