Effective gorilla troops optimization-based hierarchical clustering with HOP field neural network for intrusion detection
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.23Keywords:
Intrusion detection, Gorilla troops optimization, Hierarchical clustering, Hopfield neural network, Cybersecurity.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
An intrusion detection system (IDS) armed with signature and attack pattern databases as reference tools are used to protect computer networks from intrusion. This article provides a hybrid machine learning algorithm for gorilla troops optimization (GTO) integrating hierarchical clustering and Hopfield neural network. In this paper, the authors present a model to improve intrusion detection accuracy and contain high operational flexibility of these techniques. It is inspired by social behavior in gorillas and optimizes the clustering process HNN. Experimental results show that the proposed approach enhances the traditional methods in intrusion detection for a variety of intrusions and it presents an effective solution that can help cybersecurity application development better.Abstract
How to Cite
Downloads
Similar Articles
- Anurag Tripathi, Shri Prakash, Prem Narayan Tripathi, Impact of SARS-CoV-2 (COVID-19) on the Nervous System: A Critical Review , The Scientific Temper: Vol. 11 No. 1&2 (2020): The Scientific Temper
- Goutam Mandal, Baibaswata Bhattacharjee, Biosynthesis of ZnO nanoparticles using the young fruit of Borassus flabellifer: Characterization and photocatalytic removal of biohazardous safranin-O dye using solar irradiation , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Ritu Nagila, Abhishek Kumar Mishra, Ashish Nagila, Role of big data in enhancing lung cancer prediction and treatment , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- Elangovan G. Reddy, Anjana Devi V, Subedha V, Tirapathi Reddy B, Viswanathan R, A smart irrigation monitoring service using wireless sensor networks , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Brigith Gladys L, Merline Vinotha J, Sustainable fuzzy rough multi-objective multi-route cold transportation model with traffic flow and route constraints , The Scientific Temper: Vol. 16 No. 01 (2025): The Scientific Temper
- S. SATHIYAVATHI, V. MATHIVANAN, SELVI SABHANAYAKAM, WESTERN BLOT ASSAY OF SELECTED PATIENTS BLOOD INFECED WITH HIV : IN AND AROUND SALEM DISTRICT, TAMILNADU, INDIA. , The Scientific Temper: Vol. 2 No. 1&2 (2011): The Scientific Temper
- R.R. Jenifer, V.S.J. Prakash, Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- M. Monika, J. Merline Vinotha, Optimization of a Lean Vendor–Buyer Supply Chain Model under Neutrosophic Fuzzy Environment with Transportation, Loading, and Unloading Considerations , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- R. Prabhu, P. Archana, S. Anusooya, P. Anuradha, Improved Steganography for IoT Network Node Data Security Promoting Secure Data Transmission using Generative Adversarial Networks , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
<< < 13 14 15 16 17 18 19 20 21 22 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- N. Anbarasi, K. Anitha, S. Hemalatha, A study on energy sum of dominating sets in East Indian states , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- V. Seethala Devi, N. Vanjulavalli, K. Sujith, R. Surendiran, A metaheuristic optimisation algorithm-based optimal feature subset strategy that enhances the machine learning algorithm’s classifier performance , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- S. Hemalatha, N. Vanjulavalli, K. Sujith, R. Surendiran, Chaotic-based optimization, based feature selection with shallow neural network technique for effective identification of intrusion detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper

