共 37 条
[21]
Alazab M., Alhyari S., Awajan A., Abdallah A. B., Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance, Cluster Computing, 24, 1, pp. 83-101, (2021)
[22]
Khurma R. A., Aljarah I., Sharieh A., Elaziz M. A., Damasevicius R., Krilavicius T., A review of the modification strategies of the nature inspired algorithms for feature selection problem, Mathematics, 10, 3, (2022)
[23]
Xue Y., Tang T., Pang W., Liu A. X., Self-adaptive parameter and strategy based particle swarm optimization for large-scale feature selection problems with multiple classifiers, Applied Soft Computing, 88, (2020)
[24]
Chen K., Xue B., Zhang M., Zhou F., Correlation-guided updating strategy for feature selection in classification with surrogate-assisted particle swarm optimization, IEEE Transactions on Evolutionary Computation, 26, 5, pp. 1015-1029, (2022)
[25]
Bonab M. S., Ghaffari A., Gharehchopogh F. S., Alemi P., A wrapper-based feature selection for improving performance of intrusion detection systems, International Journal of Communication Systems, 33, 12, (2020)
[26]
Zhou Y., Cheng G., Jiang S., Dai M., Building an efficient intrusion detection system based on feature selection and ensemble classifier, Computer Networks, 174, (2020)
[27]
Fatani A., Dahou A., Al-Qaness M. A., Lu S., Elaziz M. A., Advanced feature extraction and selection approach using deep learning and aquila optimizer for IoT intrusion detection system, Sensors, 22, 1, (2022)
[28]
Mojtahedi A., Sorouri F., Souha A. N., Molazadeh A., Mehr S. S., Feature selection-based intrusion detection system using genetic whale optimization algorithm and sample-based classification, (2022)
[29]
Nazir A., Khan R. A., A novel combinatorial optimization based feature selection method for network intrusion detection, Computers & Security, 102, (2021)
[30]
Maazalahi M., Hosseini S., K-means and meta-heuristic algorithms for intrusion detection systems, Cluster Computing, pp. 1-43, (2024)