IoT |
Internet of Things |
IDS |
Intrusion Detection Systems |
PSO |
Particle Swarm Optimization |
IDSBPSO |
Improved Dynamic Sticky Binary Particle Swarm Optimization |
IPS |
Intrusion Prevention Systems |
SIDS |
Signature-based Intrusion Detection Systems |
AIDS |
Anomaly-based Intrusion Detection Systems |
ML |
Machine Learning |
SBPSO |
Sticky Binary Particle Swarm Optimization |
BPSO |
Binary Particle Swarm Optimization |
KNN |
K Nearest Neighbors |
LDA |
Linear Discriminant Analysis |
U2R |
User to Root |
R2L |
Remote to Local |
STL |
Self Taught Learning |
CNN |
Convolutional Neural Network |
DDoS |
Distributed Denial of Service |
FGLCC-CFA |
Feature Grouping according to the Linear Correlation Coefficient-Cuttlefish Algorithm |
ANN |
Artificial Neural Network |
CST-GR |
Correlated Set Thresholding on Gain Ratio |
DRL |
Deep Reinforcement Learning |
HIDS |
Hybrid Intrusion Detection Systems |
CL |
Curriculum Learning |
CPSO |
Continuous Particle Swarm Optimization |
PBest |
Personal Best |
Gbest |
Global Best |
DoS |
Denial of Service |
MITM |
Man in the Middle |
OOB |
Out-of-Bag |
DRL |
Deep Reinforcement Learning |
AC |
Accuracy |
PR |
Precision |
RC |
Recall |
F1S |
F1-Score |