Author:
Kumari Deepshikha,Sinha Abhinav,Dutta Sandip,Pranav Prashant
Publisher
Springer Science and Business Media LLC
Reference34 articles.
1. Singh, A., Vaish, A., & Keserwani, P. K. Information security: Components and techniques. Int. J. Adv. Res. Comput. Sci. Softw. Eng., 4(1). (2014)
2. Thakkar, A. & Lohiya, R. A survey on intrusion detection system: Feature selection, model, performance measures, application perspective, challenges, and future research directions. Artif. Intell. Rev. 55(1), 453–563 (2022).
3. Khare, N. et al. Smo-dnn: Spider monkey optimization and deep neural network hybrid classifier model for intrusion detection. Electronics 9(4), 692 (2020).
4. Shenfield, A., Day, D. & Ayesh, A. Intelligent intrusion detection systems using artificial neural networks. Ict Express 4(2), 95–99 (2018).
5. Agrawal, A., Garg, D., Sethi, R. & Shrivastava, A. K. Optimum redundancy allocation using spider monkey optimization. Soft Comput. 27(21), 15595–15608 (2023).