Open Access
ARTICLE
Sooyong Jeong1,#, Cheolhee Park2,#, Dowon Hong3,*, Changho Seo4
1 Basic Science Research Institution, Kongju National University, Gongju, 32588, Republic of Korea
2 Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, 34129, Republic of Korea
3 Department of Applied Mathematics, Kongju National University, Gongju, 32588, Republic of Korea
4 Department of Convergence Science, Kongju National University, Gongju, 32588, Republic of Korea
* Corresponding Author: Dowon Hong. Email:
# These authors contributed equally to this work
(This article belongs to the Special Issue: AI-Driven Intrusion Detection and Threat Analysis in Cybersecurity)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.072561
Received 29 August 2025; Accepted 20 November 2025; Published online 12 December 2025
View
Download
Like
Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems
Reem Alkanhel, Doaa Sami Khafaga,...Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
Reem Alkanhel, El-Sayed M. El-kenawy,...Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection
Doaa Sami Khafaga, Faten Khalid...Internet of Things Intrusion Detection System Based on Convolutional Neural Network
Jie Yin, Yuxuan Shi, Wen Deng,...Network Intrusion Detection Model Using Fused Machine Learning Technique
Fahad Mazaed Alotaibi