[1] Kappagantu, M., Villamor, D. E. V., Bullock, J. M., & Eastwell, K. C. (2017). A rapid isothermal assay for the detection of Hop stunt viroid in hop plants (Humulus lupulus), and its application in disease surveys.
Journal of Virological Methods,
245, 81-85.
https://d oi.org/10.1016/j.jviromet.2017.04.002
[2] Dhiman, G., & Kumar, V. (2019). Seagull optimization algorithm: Theory and its applications for large-scale industrial engineering problems.
Knowledge-Based Systems,
165, 169-196.
https://doi.org/10.1016/j.knosys.2018.11.024
[4] Mohammadi, S., Mirvaziri, H., Ghazizadeh Ahsaee, M., & Karimipour, H. (2019). Cyber intrusion detection by combined feature selection algorithm.
Journal of Information Security and Applications,
44, 80-88.
https://doi.org/10.1016/j.jisa.2018.11.007
[5] Rios, A. L. G., Li, Z., Bekshentayeva, K., & Trajković, L. (2020, October 12-14).
Detection of Denial of Service Attacks in Communication Networks. 2020 Institute of Electrical and Electronics Engineers International Symposium on Circuits and Systems Seville, Spain.
https://doi.org/10.1109/ISCAS45731.2020.9180445
[6] Bedi, P., Gupta, N., & Jindal, V. (2020). Siam-IDS: Handling class imbalance problem in Intrusion Detection Systems using Siamese Neural Network.
Procedia Computer Science,
171, 780-789.
https://doi.org/10.1016/j.procs.2020.04.085
[7] Marir, N., Wang, H., Feng, G., Li, B., & Jia, M. (2018). Distributed Abnormal Behavior Detection Approach Based on Deep Belief Network and Ensemble SVM Using Spark.
Institute of Electrical and Electronics Engineers Access,
6, 59657-59671.
https://doi .org/10.1109/ACCESS.2018.2875045
[8] Kurochkin, I., & Volkov, S. (2020, September 6-13).
Using GRU based deep neural network for intrusion detection in software-defined networks. Institute of Physics Conference Series: Materials Science and Engineering 2020: XIII International Conference on Applied Mathematics and Mechanics in the Aerospace Industry, Alushta, Russia.
ht tps://doi.org/10.1088/1757-899X/927/1/012035
[9] Mulyanto, M., Faisal, M., Prakosa, S. W., & Leu, J-S. (2021). Effectiveness of Focal Loss for Minority Classification in Network Intrusion Detection Systems.
Symmetry,
13(1), 4.
https://doi.org/10.3390/sym13010004
[10] Abdolhosseini, M., Abdollahi, R., & Rajaee, M. (2021). Designing of PIλDδ controller for PMBLDC motor using metaheuristic algorithms.
Karafan Quarterly Scientific Journal,
17(4), 149-165.
https://doi.org/10.48301/kssa.2021.128401
[11] Tama, B. A., & Lim, S. (2021). A Stacking-Based Deep Neural Network Approach for Effective Network Anomaly Detection.
Computers Materials & Continua,
66(2), 2217 - 2227.
https://doi.org/10.32604/cmc.2020.012432
[12] Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep Learning Approach for Intelligent Intrusion Detection System.
Institute of Electrical and Electronics Engineers Access,
7, 41525-41550.
https://doi.org/10.1109/ACCESS.2019.2895334
[13] Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018, January 22-24).
Toward generating a new intrusion detection dataset and intrusion traffic characterization. Proceedings of the 4th International Conference on Information Systems Security and Privacy, Funchal, Madeira, Portugal.
https://doi.org/10.5220/0006639801080116
[14] Singh Panwar, S., Raiwani, Y., & Panwar, L. S. (2019, March 15).
Evaluation of network intrusion detection with features selection and machine learning algorithms on CICIDS-2017 dataset. International Conference on Advances in Engineering Science Management & Technology 2019 Uttaranchal University, Dehradun, India.
http://dx.doi.org/10.2 139/ssrn.3394103
[15] Gao, D., Zhang, Y-X., & Zhao, Y-H. (2009). Random forest algorithm for classification of multiwavelength data.
Research in Astronomy and Astrophysics,
9(2), 220-226.
https://doi.org/10.1088/1674-4527/9/2/011
[16] Bhavani, T. T., Rao, M. K., & Reddy, A. M. (2020). Network Intrusion Detection System Using Random Forest and Decision Tree Machine Learning Techniques. In A. K. Luhach, J. A. Kosa, R. C. Poonia, X.-Z. Gao, & D. Singh (Eds.),
First International Conference on Sustainable Technologies for Computational Intelligence. Springer Singapore.
h ttps://doi.org/10.1007/978-981-15-0029-9_50
[17] Mirjalili, S. (2016). Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems.
Neural Computing and Applications,
27(4), 1053-1073.
https://doi.org/10.1007/s00521-015-1920-1
[18] Rohart, F., Gautier, B., Singh, A., & Lê Cao, K-A. (2017). mixOmics: An R package for ‘omics feature selection and multiple data integration.
PLoS computational biology,
13(11), e1005752.
https://doi.org/10.1371/journal.pcbi.1005752
[19] Rashno, A., Nazari, B., Sadri, S., & Saraee, M. (2017). Effective pixel classification of Mars images based on ant colony optimization feature selection and extreme learning machine.
Neurocomputing,
226, 66-79.
https://doi.org/10.1016/j.neucom.2016.11.030
[20] Joshi, R. (2016). Accuracy, Precision, Recall & F1 Score: interpretation of performance measures.