HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare

Saved in:
Bibliographic Details
Published inMicroprocessors and microsystems p. 104622
Main Authors Saif, Sohail, Das, Priya, Biswas, Suparna, Khari, Manju, Shanmuganathan, Vimal
Format Journal Article
LanguageEnglish
Published 01.08.2022
Online AccessGet full text
ISSN0141-9331
DOI10.1016/j.micpro.2022.104622

Cover

ArticleNumber 104622
Author Shanmuganathan, Vimal
Saif, Sohail
Khari, Manju
Biswas, Suparna
Das, Priya
Author_xml – sequence: 1
  givenname: Sohail
  surname: Saif
  fullname: Saif, Sohail
– sequence: 2
  givenname: Priya
  surname: Das
  fullname: Das, Priya
– sequence: 3
  givenname: Suparna
  orcidid: 0000-0002-6150-9316
  surname: Biswas
  fullname: Biswas, Suparna
– sequence: 4
  givenname: Manju
  orcidid: 0000-0001-5395-5335
  surname: Khari
  fullname: Khari, Manju
– sequence: 5
  givenname: Vimal
  orcidid: 0000-0002-1467-1206
  surname: Shanmuganathan
  fullname: Shanmuganathan, Vimal
BookMark eNp9kE1uwjAQhb2gUqHtDbrwBUJt54-wq-gPSEhdlK6jiT0hRo4T2UaIo_S2TaCrLrqap5l5T0_fjExsZ5GQR87mnPHs6TBvtexdNxdMiGGVZEJMyJTxhEdFHPNbMvP-wBhLWSam5Hu92bx8Lun6XDmtqLYBjdF7tGHU7uh1Z6nCgDKMyp99wJZi23cndKjoSYeGtiAbbZEaBGe13VOwirYYoMGj0z5oScHsOzf8tp7WnaPQ90ZLuGRqSzfdjlbgh7wGwYRGgsN7clOD8fjwO-_I19vrbrWOth_vm9XzNpI85SIClSw4Fnkc51hJlleFQMjqiqlcFYuCF0JUKRRxkqs0TuRwBmQZ1ilPkS-UiO_I8porXee9w7qUOlyaBQfalJyVI9jyUF7BliPY8gp2MCd_zL3TLbjz_7Yfm2CHyA
CitedBy_id crossref_primary_10_1007_s00500_023_08178_w
crossref_primary_10_1016_j_cose_2024_104034
crossref_primary_10_1007_s11227_025_06948_x
crossref_primary_10_1109_ACCESS_2023_3346320
crossref_primary_10_55529_ijrise_46_1_12
crossref_primary_10_1080_23742917_2024_2447124
crossref_primary_10_1016_j_iot_2024_101421
crossref_primary_10_1016_j_asoc_2024_111923
crossref_primary_10_1016_j_eswa_2024_126163
crossref_primary_10_1007_s11042_024_20076_3
crossref_primary_10_1007_s13369_023_08258_x
crossref_primary_10_1007_s11277_023_10774_w
crossref_primary_10_1007_s12083_024_01727_6
crossref_primary_10_1016_j_ins_2024_120209
crossref_primary_10_1016_j_compeleceng_2024_109949
crossref_primary_10_1007_s40998_024_00700_6
crossref_primary_10_1080_09540091_2023_2246703
crossref_primary_10_1016_j_cose_2024_104169
crossref_primary_10_1109_ACCESS_2024_3362246
crossref_primary_10_1016_j_iot_2023_100887
crossref_primary_10_1002_ett_4824
crossref_primary_10_1109_ACCESS_2024_3491831
crossref_primary_10_1093_jcde_qwae046
crossref_primary_10_1109_ACCESS_2025_3531216
crossref_primary_10_1109_ACCESS_2024_3369915
crossref_primary_10_1007_s10586_023_04248_8
crossref_primary_10_32604_cmes_2024_056308
crossref_primary_10_1590_1678_4324_2024231114
crossref_primary_10_1016_j_comcom_2023_11_002
crossref_primary_10_1038_s41598_024_51154_z
crossref_primary_10_1016_j_compeleceng_2023_108600
crossref_primary_10_1016_j_aeue_2023_154723
crossref_primary_10_1109_ACCESS_2024_3495708
crossref_primary_10_3389_fdata_2023_1081466
crossref_primary_10_3390_sym16010042
crossref_primary_10_1007_s10115_024_02149_9
crossref_primary_10_1016_j_slast_2024_100161
crossref_primary_10_1142_S1469026824500330
crossref_primary_10_1007_s10776_022_00574_7
crossref_primary_10_1016_j_cosrev_2023_100559
crossref_primary_10_1109_ACCESS_2025_3547572
crossref_primary_10_1007_s11042_023_17643_5
crossref_primary_10_1109_ACCESS_2025_3528114
crossref_primary_10_7717_peerj_cs_2333
crossref_primary_10_1016_j_eswa_2023_120772
crossref_primary_10_3233_JIFS_234582
crossref_primary_10_1007_s10586_024_04600_6
crossref_primary_10_1109_ACCESS_2025_3532800
crossref_primary_10_3233_THC_231755
crossref_primary_10_3934_era_2023278
Cites_doi 10.1016/j.procs.2015.04.058
10.1109/ACCESS.2020.3000421
10.1016/j.micpro.2020.103261
10.1109/TDSC.2014.2312327
10.5121/ijnsa.2012.4203
10.1007/s10586-020-03082-6
10.1007/s12652-020-01899-y
10.1109/ACCESS.2020.3026260
10.5121/ijnsa.2010.2307
10.1016/j.engappai.2014.02.001
10.1016/j.inffus.2019.01.002
10.1016/j.cose.2008.08.003
10.1109/TCOMM.2012.031912.110179
10.1007/s12243-016-0495-x
10.1504/IJSN.2016.075074
10.5121/ijnsa.2011.3511
10.1016/j.procs.2015.05.108
10.1007/s12539-020-00372-w
10.1016/j.future.2017.08.043
10.1007/978-3-642-40675-1_43
10.1109/TII.2018.2836150
10.1109/ACCESS.2017.2714258
10.1186/s13638-018-1128-z
10.1023/A:1024600519144
10.1007/s10916-016-0596-0
10.1016/j.comcom.2007.05.002
10.1016/S1353-4858(09)70053-4
10.1016/j.asoc.2015.07.029
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.1016/j.micpro.2022.104622
DatabaseName CrossRef
DatabaseTitle CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID 10_1016_j_micpro_2022_104622
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
123
1B1
1~.
1~5
29M
4.4
457
4G.
5VS
7-5
71M
8P~
9JN
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AATTM
AAXKI
AAXUO
AAYFN
AAYWO
AAYXX
ABBOA
ABDPE
ABJNI
ABMAC
ABWVN
ABXDB
ACDAQ
ACGFS
ACIWK
ACLOT
ACNNM
ACRLP
ACRPL
ACVFH
ACZNC
ADBBV
ADCNI
ADEZE
ADJOM
ADMUD
ADNMO
ADTZH
AEBSH
AECPX
AEIPS
AEKER
AENEX
AEUPX
AFJKZ
AFPUW
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIGII
AIIUN
AIKHN
AITUG
AKBMS
AKRWK
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
AOUOD
APXCP
AXJTR
BJAXD
BKOJK
BLXMC
CITATION
CS3
DU5
EBS
EFJIC
EFKBS
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
LG9
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
ROL
RPZ
SBC
SDF
SDG
SDP
SES
SET
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
T9H
TN5
UHS
WUQ
XOL
XPP
ZMT
~G-
~HD
ID FETCH-LOGICAL-c1512-ad481e97337ebc07b92ea6fb0d7d9891922b5a9347d534cb92ae06ef515e18d23
ISSN 0141-9331
IngestDate Thu Apr 24 23:12:52 EDT 2025
Thu Oct 02 04:29:35 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c1512-ad481e97337ebc07b92ea6fb0d7d9891922b5a9347d534cb92ae06ef515e18d23
ORCID 0000-0002-6150-9316
0000-0002-1467-1206
0000-0001-5395-5335
ParticipantIDs crossref_citationtrail_10_1016_j_micpro_2022_104622
crossref_primary_10_1016_j_micpro_2022_104622
PublicationCentury 2000
PublicationDate 2022-8-00
PublicationDateYYYYMMDD 2022-08-01
PublicationDate_xml – month: 08
  year: 2022
  text: 2022-8-00
PublicationDecade 2020
PublicationTitle Microprocessors and microsystems
PublicationYear 2022
References G.Angelo (10.1016/j.micpro.2022.104622_bib0026) 2015; 36
Hou (10.1016/j.micpro.2022.104622_bib0051) 2018
Al-Obeidat (10.1016/j.micpro.2022.104622_bib0002) 2019; 23
Saif (10.1016/j.micpro.2022.104622_bib0011) 2018
Kasinathan (10.1016/j.micpro.2022.104622_bib0035) 2013
Tavallaee (10.1016/j.micpro.2022.104622_bib0008) 2009
Ali (10.1016/j.micpro.2022.104622_bib0009) 2018
Niyaz (10.1016/j.micpro.2022.104622_bib0031) 2016
Wang (10.1016/j.micpro.2022.104622_bib0037) 2009
Alrashdi (10.1016/j.micpro.2022.104622_bib0052) 2019
Zhang (10.1016/j.micpro.2022.104622_bib0010) 2020
Boubiche (10.1016/j.micpro.2022.104622_bib0040) 2012; 4
Manimurugan (10.1016/j.micpro.2022.104622_bib0060) 2020; 79
A.N.Toosi (10.1016/j.micpro.2022.104622_bib0057) 2007; 30
Bao (10.1016/j.micpro.2022.104622_bib0038) 2012; 9
Chen (10.1016/j.micpro.2022.104622_bib0054) 2016
Zhang (10.1016/j.micpro.2022.104622_bib0042) 2000
Zhang (10.1016/j.micpro.2022.104622_bib0058) 2006; 5
Thamilarasu (10.1016/j.micpro.2022.104622_bib0005) 2020; 8
A.Abraham (10.1016/j.micpro.2022.104622_bib0045) 2007; 4
Verner (10.1016/j.micpro.2022.104622_bib0050) 2017
Jaber (10.1016/j.micpro.2022.104622_bib0007) 2020; 23
Mitchell (10.1016/j.micpro.2022.104622_bib0020) 2015; 12
Maleh (10.1016/j.micpro.2022.104622_bib0048) 2015; 52
Thamilarasu (10.1016/j.micpro.2022.104622_bib0019) 2016; 11
Sabhnani (10.1016/j.micpro.2022.104622_bib0059) 2003
Garc´ıa-Teodoro (10.1016/j.micpro.2022.104622_bib0016) 2009; 28
Krontiris (10.1016/j.micpro.2022.104622_bib0036) 2009; 5432
Khan (10.1016/j.micpro.2022.104622_bib0039) 2009; 2009
Yang (10.1016/j.micpro.2022.104622_bib0027) 2018; 25
Ukil (10.1016/j.micpro.2022.104622_bib0017) 2016
Christy (10.1016/j.micpro.2022.104622_bib0021) 2015; 50
Bhatia (10.1016/j.micpro.2022.104622_bib0015) 2017; 10
Jadidoleslamy (10.1016/j.micpro.2022.104622_bib0033) 2011; 3
Li (10.1016/j.micpro.2022.104622_bib0028) 2019; 6
Anthi (10.1016/j.micpro.2022.104622_bib0024) 2018
Wazid (10.1016/j.micpro.2022.104622_bib0004) 2016; 40
Deya (10.1016/j.micpro.2022.104622_bib0006) 2019; 49
Deng (10.1016/j.micpro.2022.104622_bib0047) 2003; 3
Mamun (10.1016/j.micpro.2022.104622_bib0034) 2010; 2
Saif (10.1016/j.micpro.2022.104622_bib0013) 2020
Shamshirband (10.1016/j.micpro.2022.104622_bib0043) 2014; 32
M.O.Pahl (10.1016/j.micpro.2022.104622_bib0023) 2018
Thakur (10.1016/j.micpro.2022.104622_bib0001) 2020
Liu (10.1016/j.micpro.2022.104622_bib0029) 2018; 2018
Abbas (10.1016/j.micpro.2022.104622_bib0049) 2016; 71
M.L.Martin (10.1016/j.micpro.2022.104622_bib0030) 2017; 17
Khan (10.1016/j.micpro.2022.104622_bib0018) 2017; 5
Ngai (10.1016/j.micpro.2022.104622_bib0046) 2006; 8
Hady (10.1016/j.micpro.2022.104622_bib0053) 2020; 8
S.Saif (10.1016/j.micpro.2022.104622_bib0012) 2019
Diro (10.1016/j.micpro.2022.104622_bib0025) 2018; 82
Kim (10.1016/j.micpro.2022.104622_bib0056) 2014; 274
Saif (10.1016/j.micpro.2022.104622_bib0003) 2018
Pajouh (10.1016/j.micpro.2022.104622_bib0055) 2015
Brown (10.1016/j.micpro.2022.104622_bib0014) 2002
Kavitha (10.1016/j.micpro.2022.104622_bib0032) 2019; 43
Zhang (10.1016/j.micpro.2022.104622_bib0041) 2003; 9
Liu (10.1016/j.micpro.2022.104622_bib0022) 2018; 14
Agah (10.1016/j.micpro.2022.104622_bib0044) 2004
References_xml – volume: 50
  start-page: 209
  year: 2015
  ident: 10.1016/j.micpro.2022.104622_bib0021
  article-title: Cluster based outlier detection algorithm for healthcare data
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2015.04.058
– volume: 8
  start-page: 106576
  year: 2020
  ident: 10.1016/j.micpro.2022.104622_bib0053
  article-title: Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3000421
– volume: 3
  start-page: 2147
  year: 2003
  ident: 10.1016/j.micpro.2022.104622_bib0047
  article-title: SVM-based intrusion detection system for wireless ad hoc networks
– volume: 6
  start-page: 2093
  issue: 2
  year: 2019
  ident: 10.1016/j.micpro.2022.104622_bib0028
  article-title: AI-based two-stage intrusion detection for software definedIoT networks
  publication-title: IEEEInternet of Tings Journal
– year: 2002
  ident: 10.1016/j.micpro.2022.104622_bib0014
– volume: 79
  year: 2020
  ident: 10.1016/j.micpro.2022.104622_bib0060
  article-title: Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system
  publication-title: Microprocessors and Microsystems
  doi: 10.1016/j.micpro.2020.103261
– start-page: 343
  year: 2004
  ident: 10.1016/j.micpro.2022.104622_bib0044
  article-title: Intrusion detection in sensor networks: a non-cooperative game approach
– volume: 12
  start-page: 16
  issue: 1
  year: 2015
  ident: 10.1016/j.micpro.2022.104622_bib0020
  article-title: Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
  publication-title: IEEE Transactions on Dependable and Secure Computing
  doi: 10.1109/TDSC.2014.2312327
– volume: 4
  start-page: 35
  issue: 2
  year: 2012
  ident: 10.1016/j.micpro.2022.104622_bib0040
  article-title: Cross layer intrusion detection system for wireless sensor network
  publication-title: International Journal of Network Security & Its Applications
  doi: 10.5121/ijnsa.2012.4203
– volume: 23
  start-page: 777
  year: 2019
  ident: 10.1016/j.micpro.2022.104622_bib0002
  article-title: Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols
  publication-title: PersUbiquitComput
– start-page: 629
  year: 2020
  ident: 10.1016/j.micpro.2022.104622_bib0013
  article-title: On the Implementation and Performance Evaluation of Security Algorithms for Healthcare
– start-page: 665
  year: 2019
  ident: 10.1016/j.micpro.2022.104622_bib0012
– volume: 23
  start-page: 3221
  year: 2020
  ident: 10.1016/j.micpro.2022.104622_bib0007
  article-title: FCM–SVM based intrusion detection system for cloud computing environment
  publication-title: Cluster Comput
  doi: 10.1007/s10586-020-03082-6
– year: 2020
  ident: 10.1016/j.micpro.2022.104622_bib0001
  article-title: Smartphone based human activity monitoring and recognition using ML and DL: a comprehensive survey
  publication-title: J Ambient Intell Human Comput, Springer
  doi: 10.1007/s12652-020-01899-y
– volume: 8
  start-page: 181560
  year: 2020
  ident: 10.1016/j.micpro.2022.104622_bib0005
  article-title: An Intrusion Detection System for Internet of Medical Things
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3026260
– volume: 2
  start-page: 102
  issue: 3
  year: 2010
  ident: 10.1016/j.micpro.2022.104622_bib0034
  article-title: Hierarchical design based intrusion detection system for wireless ad hoc sensor network
  publication-title: International Journal of Network Security & Its Applications
  doi: 10.5121/ijnsa.2010.2307
– volume: 32
  start-page: 228
  year: 2014
  ident: 10.1016/j.micpro.2022.104622_bib0043
  article-title: Cooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks
  publication-title: Engineering Applications of Artifcial Intelligence
  doi: 10.1016/j.engappai.2014.02.001
– start-page: 994
  year: 2016
  ident: 10.1016/j.micpro.2022.104622_bib0017
  article-title: IoT Healthcare Analytics: The Importance of Anomaly Detection
– volume: 49
  start-page: 205
  year: 2019
  ident: 10.1016/j.micpro.2022.104622_bib0006
  article-title: A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks
  publication-title: Information Fusion
  doi: 10.1016/j.inffus.2019.01.002
– start-page: 405
  year: 2018
  ident: 10.1016/j.micpro.2022.104622_bib0011
  article-title: Secure Data Transmission Beyond Tier 1 of Medical Body Sensor Network
– start-page: 161
  year: 2017
  ident: 10.1016/j.micpro.2022.104622_bib0050
  article-title: A Machine Learning Approach to Detecting Sensor Data Modification Intrusions in WBANs
– volume: 28
  start-page: 18
  issue: 1-2
  year: 2009
  ident: 10.1016/j.micpro.2022.104622_bib0016
  article-title: Anomaly-based network intrusion detection: tech- ´niques, systems and challenges
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2008.08.003
– start-page: 0515
  year: 2019
  ident: 10.1016/j.micpro.2022.104622_bib0052
  article-title: FBAD: Fog-based Attack Detection for IoT Healthcare in Smart Cities
– volume: 9
  start-page: 169
  issue: 2
  year: 2012
  ident: 10.1016/j.micpro.2022.104622_bib0038
  article-title: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
  publication-title: IEEE Transactions on Network and Service Management
  doi: 10.1109/TCOMM.2012.031912.110179
– start-page: 113
  year: 2016
  ident: 10.1016/j.micpro.2022.104622_bib0054
  article-title: Towards Autonomic Security Management of Healthcare Information Systems
– start-page: 1
  year: 2018
  ident: 10.1016/j.micpro.2022.104622_bib0009
  article-title: A hybrid Particle swarm optimization -Extreme Learning Machine approach for Intrusion Detection System
– volume: 71
  start-page: 477
  year: 2016
  ident: 10.1016/j.micpro.2022.104622_bib0049
  article-title: Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems
  publication-title: Annals of Telecommunications
  doi: 10.1007/s12243-016-0495-x
– volume: 11
  start-page: 82
  year: 2016
  ident: 10.1016/j.micpro.2022.104622_bib0019
  article-title: iDetect: an intelligent intrusion detection system for wireless body area networks
  publication-title: International Journal of Security and Networks
  doi: 10.1504/IJSN.2016.075074
– volume: 3
  start-page: 131
  issue: 5
  year: 2011
  ident: 10.1016/j.micpro.2022.104622_bib0033
  article-title: A hierarchical intrusion detection architecture for wireless sensor networks
  publication-title: International Journal of Network Security & Its Applications
  doi: 10.5121/ijnsa.2011.3511
– volume: 5432
  start-page: 263
  year: 2009
  ident: 10.1016/j.micpro.2022.104622_bib0036
  article-title: Cooperative intrusion detection in wireless sensor networks
– volume: 5
  start-page: 2388
  year: 2006
  ident: 10.1016/j.micpro.2022.104622_bib0058
  article-title: Anomaly based network intrusion detection with unsupervised outlier detection
– start-page: 209
  year: 2003
  ident: 10.1016/j.micpro.2022.104622_bib0059
  article-title: Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context
– year: 2009
  ident: 10.1016/j.micpro.2022.104622_bib0008
  article-title: A Detailed Analysis of the KDD CUP 99 Data Set
– start-page: 257
  year: 2000
  ident: 10.1016/j.micpro.2022.104622_bib0042
  article-title: Intrusion detection in wireless adhoc networks
– start-page: 1
  year: 2018
  ident: 10.1016/j.micpro.2022.104622_bib0024
– volume: 52
  start-page: 1047
  year: 2015
  ident: 10.1016/j.micpro.2022.104622_bib0048
  article-title: A global hybrid intrusion detection system for wireless sensor networks
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2015.05.108
– volume: 4
  start-page: 328
  issue: 3
  year: 2007
  ident: 10.1016/j.micpro.2022.104622_bib0045
  article-title: Evolutionary design of intrusion detection programs
  publication-title: International Journal of Network Security
– year: 2020
  ident: 10.1016/j.micpro.2022.104622_bib0010
  article-title: Feature Selection for Microarray Data Classification Using Hybrid Information Gain and a Modified Binary Krill Herd Algorithm
  publication-title: Interdisciplinary Sciences, Computational Life Sciences
  doi: 10.1007/s12539-020-00372-w
– volume: 82
  start-page: 761
  year: 2018
  ident: 10.1016/j.micpro.2022.104622_bib0025
  article-title: Distributed attack detection scheme using deep learning approach for Internet of Things
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2017.08.043
– volume: 274
  start-page: 279
  year: 2014
  ident: 10.1016/j.micpro.2022.104622_bib0056
  article-title: A Novel Anomaly Detection System Based on HFR-MLR Method
  publication-title: Mobile Ubiquitous and Intelligent Computing
  doi: 10.1007/978-3-642-40675-1_43
– volume: 14
  start-page: 3801
  issue: 9
  year: 2018
  ident: 10.1016/j.micpro.2022.104622_bib0022
  article-title: Defending ON–OFF Attacks Using Light Probing Messages in Smart Sensors for Industrial Communication Systems
  publication-title: IEEE Transactions on Industrial Informatics
  doi: 10.1109/TII.2018.2836150
– volume: 5
  start-page: 13531
  year: 2017
  ident: 10.1016/j.micpro.2022.104622_bib0018
  article-title: A Continuous Change Detection Mechanism to Identify Anomalies in ECG Signals for WBAN-Based Healthcare Environments
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2714258
– volume: 2018
  issue: 1
  year: 2018
  ident: 10.1016/j.micpro.2022.104622_bib0029
  article-title: An intrusion detection method for internet of things based on suppressed fuzzy clustering
  publication-title: EURASIP Journal on Wireless Communications and Networking
  doi: 10.1186/s13638-018-1128-z
– year: 2016
  ident: 10.1016/j.micpro.2022.104622_bib0031
  article-title: Deep Learning Approach for Network Intrusion Detection System
– volume: 9
  start-page: 545
  issue: 5
  year: 2003
  ident: 10.1016/j.micpro.2022.104622_bib0041
  article-title: Intrusion detection techniques for mobile wireless networks
  publication-title: Wireless Networks
  doi: 10.1023/A:1024600519144
– year: 2018
  ident: 10.1016/j.micpro.2022.104622_bib0023
  article-title: All eyes on you: distributed multi-dimensional IoTmicroserviceanomalydetection
– year: 2009
  ident: 10.1016/j.micpro.2022.104622_bib0037
  article-title: Catching packet droppers and modifiers in wireless sensor networks
– start-page: 1
  year: 2015
  ident: 10.1016/j.micpro.2022.104622_bib0055
  article-title: Two-tier network anomaly detection model: a machine learning approach
  publication-title: J. Intell. Inf. Syst.
– volume: 43
  issue: 179
  year: 2019
  ident: 10.1016/j.micpro.2022.104622_bib0032
  article-title: India: Intruder Node Detection and Isolation Action in Mobile Ad Hoc Networks Using Feature Optimization and Classification Approach
  publication-title: Journal of Medical System
– volume: 40
  year: 2016
  ident: 10.1016/j.micpro.2022.104622_bib0004
  article-title: Analysis of Security Protocols for Mobile Healthcare
  publication-title: Journal of Medical Systems
  doi: 10.1007/s10916-016-0596-0
– volume: 10
  start-page: 1182
  year: 2017
  ident: 10.1016/j.micpro.2022.104622_bib0015
  article-title: Identifying P2P traffic: A survey. Peer-to-Peer Netw
  publication-title: Appl
– volume: 8
  start-page: 3383
  year: 2006
  ident: 10.1016/j.micpro.2022.104622_bib0046
  article-title: On the intruder detection for sinkhole attack in wireless sensor networks
– volume: 30
  start-page: 2201
  issue: 10
  year: 2007
  ident: 10.1016/j.micpro.2022.104622_bib0057
  article-title: A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
  publication-title: Computer and Communications
  doi: 10.1016/j.comcom.2007.05.002
– volume: 2009
  start-page: 9
  issue: 5
  year: 2009
  ident: 10.1016/j.micpro.2022.104622_bib0039
  article-title: Real-time cross-layer design for a large scale food detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks
  publication-title: Network Security
  doi: 10.1016/S1353-4858(09)70053-4
– year: 2018
  ident: 10.1016/j.micpro.2022.104622_bib0003
  article-title: Secure data transmission beyond Tier 1 of medical body sensor network
– start-page: 600
  year: 2013
  ident: 10.1016/j.micpro.2022.104622_bib0035
  article-title: Denial-of-service detection in 6LoWPAN based internet ofthings
– volume: 25
  start-page: 19
  year: 2018
  ident: 10.1016/j.micpro.2022.104622_bib0027
– volume: 36
  start-page: 408
  year: 2015
  ident: 10.1016/j.micpro.2022.104622_bib0026
  article-title: An uncertainty-managing batch relevance-based approach to network anomaly detection
  publication-title: Applied Soft Computing
  doi: 10.1016/j.asoc.2015.07.029
– volume: 17
  year: 2017
  ident: 10.1016/j.micpro.2022.104622_bib0030
  article-title: Conditional VariationalAutoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT
  publication-title: Sensors
– start-page: 1
  year: 2018
  ident: 10.1016/j.micpro.2022.104622_bib0051
  article-title: A sink node assisted lightweight intrusion detection mechanism for WBAN
SSID ssj0005062
Score 2.2652383
SourceID crossref
SourceType Enrichment Source
Index Database
StartPage 104622
Title HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  issn: 0141-9331
  databaseCode: GBLVA
  dateStart: 20110101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0005062
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier ScienceDirect
  issn: 0141-9331
  databaseCode: .~1
  dateStart: 19950101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0005062
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection [SCCMFC]
  issn: 0141-9331
  databaseCode: ACRLP
  dateStart: 19950101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0005062
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals [SCFCJ]
  issn: 0141-9331
  databaseCode: AIKHN
  dateStart: 19950101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0005062
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  issn: 0141-9331
  databaseCode: AKRWK
  dateStart: 19790101
  customDbUrl:
  isFulltext: true
  mediaType: online
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0005062
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF6FcuHCG9Hy0By4RbactZONuSEKSkBBSEml3qzd9ZokapOoTVSVA_8DiR_LjMePLUUV5WJF6814k_m0OzOeb0aIN6qQKjVGBs4MI3JQTKAL64I8lkbqVCqriDs8-TIYHSWfjvvHnc4vL2tptzWh_f5XXsn_aBXHUK_Ekr2FZhuhOICfUb94RQ3j9Z90PBqPD6fk048uiXhV1n7g-ppU-J_oFKTc3G0dNwTnss1dqkZ14ZrE89Myn9LVDSSYs3jqtnrudlzHuatPvq3PcC5Xb-h6b70pXjJez7p0GuYVq5KyyXyjd0JJfxtmJFBvn1I-jZ175dIpyqMXZYnI6XruZX4cMuXs69nisg0eLM4veHi62-Cqmxuf55qp8xO9Wu78kAZ6w3VCXRvl7AVpTeXinZXeRTOD-dqmz_GHZYgrx98SksSwnX61xvYfZ1-TkVgnuy0zlpKRlIyl3BF3JZ4Z1Bgk_OElEEVlu9pmsTUxs8wevL4Wz_DxLJjZQ3G_cj3gHePokei41WPxoG7rAdUu_0T8LGH1FhhU4IEKGlBBAypgJUIDKiBQQQUqqEEFqHS4AipoQQUIKvBAhc8BBBWUoIIWVE_F0ccPs_ejoOrgEViyJAOdJ8OeS1UcK2dspEwqnR4UJspVng5T9C6k6es0TlTejxOLt7WLBq5AI9v1hrmMn4m91XrlngtICjT8-8bKBB0Wq5Qp4lxFhe2lPRdFOtkXcf33ZrYqb09dVk6ym1S7L4LmWxsu73Lj_INbzn8h7rUAfyn2UEnuFVqxW_O6BNNvtXGmYg
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=HIIDS%3A+Hybrid+intelligent+intrusion+detection+system+empowered+with+machine+learning+and+metaheuristic+algorithms+for+application+in+IoT+based+healthcare&rft.jtitle=Microprocessors+and+microsystems&rft.au=Saif%2C+Sohail&rft.au=Das%2C+Priya&rft.au=Biswas%2C+Suparna&rft.au=Khari%2C+Manju&rft.date=2022-08-01&rft.issn=0141-9331&rft.spage=104622&rft_id=info:doi/10.1016%2Fj.micpro.2022.104622&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_micpro_2022_104622
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0141-9331&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0141-9331&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0141-9331&client=summon