HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare
        Saved in:
      
    
          | Published in | Microprocessors and microsystems p. 104622 | 
|---|---|
| Main Authors | , , , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
          
        01.08.2022
     | 
| Online Access | Get full text | 
| ISSN | 0141-9331 | 
| DOI | 10.1016/j.micpro.2022.104622 | 
Cover
| ArticleNumber | 104622 | 
    
|---|---|
| Author | Shanmuganathan, Vimal Saif, Sohail Khari, Manju Biswas, Suparna Das, Priya  | 
    
| Author_xml | – sequence: 1 givenname: Sohail surname: Saif fullname: Saif, Sohail – sequence: 2 givenname: Priya surname: Das fullname: Das, Priya – sequence: 3 givenname: Suparna orcidid: 0000-0002-6150-9316 surname: Biswas fullname: Biswas, Suparna – sequence: 4 givenname: Manju orcidid: 0000-0001-5395-5335 surname: Khari fullname: Khari, Manju – sequence: 5 givenname: Vimal orcidid: 0000-0002-1467-1206 surname: Shanmuganathan fullname: Shanmuganathan, Vimal  | 
    
| BookMark | eNp9kE1uwjAQhb2gUqHtDbrwBUJt54-wq-gPSEhdlK6jiT0hRo4T2UaIo_S2TaCrLrqap5l5T0_fjExsZ5GQR87mnPHs6TBvtexdNxdMiGGVZEJMyJTxhEdFHPNbMvP-wBhLWSam5Hu92bx8Lun6XDmtqLYBjdF7tGHU7uh1Z6nCgDKMyp99wJZi23cndKjoSYeGtiAbbZEaBGe13VOwirYYoMGj0z5oScHsOzf8tp7WnaPQ90ZLuGRqSzfdjlbgh7wGwYRGgsN7clOD8fjwO-_I19vrbrWOth_vm9XzNpI85SIClSw4Fnkc51hJlleFQMjqiqlcFYuCF0JUKRRxkqs0TuRwBmQZ1ilPkS-UiO_I8porXee9w7qUOlyaBQfalJyVI9jyUF7BliPY8gp2MCd_zL3TLbjz_7Yfm2CHyA | 
    
| CitedBy_id | crossref_primary_10_1007_s00500_023_08178_w crossref_primary_10_1016_j_cose_2024_104034 crossref_primary_10_1007_s11227_025_06948_x crossref_primary_10_1109_ACCESS_2023_3346320 crossref_primary_10_55529_ijrise_46_1_12 crossref_primary_10_1080_23742917_2024_2447124 crossref_primary_10_1016_j_iot_2024_101421 crossref_primary_10_1016_j_asoc_2024_111923 crossref_primary_10_1016_j_eswa_2024_126163 crossref_primary_10_1007_s11042_024_20076_3 crossref_primary_10_1007_s13369_023_08258_x crossref_primary_10_1007_s11277_023_10774_w crossref_primary_10_1007_s12083_024_01727_6 crossref_primary_10_1016_j_ins_2024_120209 crossref_primary_10_1016_j_compeleceng_2024_109949 crossref_primary_10_1007_s40998_024_00700_6 crossref_primary_10_1080_09540091_2023_2246703 crossref_primary_10_1016_j_cose_2024_104169 crossref_primary_10_1109_ACCESS_2024_3362246 crossref_primary_10_1016_j_iot_2023_100887 crossref_primary_10_1002_ett_4824 crossref_primary_10_1109_ACCESS_2024_3491831 crossref_primary_10_1093_jcde_qwae046 crossref_primary_10_1109_ACCESS_2025_3531216 crossref_primary_10_1109_ACCESS_2024_3369915 crossref_primary_10_1007_s10586_023_04248_8 crossref_primary_10_32604_cmes_2024_056308 crossref_primary_10_1590_1678_4324_2024231114 crossref_primary_10_1016_j_comcom_2023_11_002 crossref_primary_10_1038_s41598_024_51154_z crossref_primary_10_1016_j_compeleceng_2023_108600 crossref_primary_10_1016_j_aeue_2023_154723 crossref_primary_10_1109_ACCESS_2024_3495708 crossref_primary_10_3389_fdata_2023_1081466 crossref_primary_10_3390_sym16010042 crossref_primary_10_1007_s10115_024_02149_9 crossref_primary_10_1016_j_slast_2024_100161 crossref_primary_10_1142_S1469026824500330 crossref_primary_10_1007_s10776_022_00574_7 crossref_primary_10_1016_j_cosrev_2023_100559 crossref_primary_10_1109_ACCESS_2025_3547572 crossref_primary_10_1007_s11042_023_17643_5 crossref_primary_10_1109_ACCESS_2025_3528114 crossref_primary_10_7717_peerj_cs_2333 crossref_primary_10_1016_j_eswa_2023_120772 crossref_primary_10_3233_JIFS_234582 crossref_primary_10_1007_s10586_024_04600_6 crossref_primary_10_1109_ACCESS_2025_3532800 crossref_primary_10_3233_THC_231755 crossref_primary_10_3934_era_2023278  | 
    
| Cites_doi | 10.1016/j.procs.2015.04.058 10.1109/ACCESS.2020.3000421 10.1016/j.micpro.2020.103261 10.1109/TDSC.2014.2312327 10.5121/ijnsa.2012.4203 10.1007/s10586-020-03082-6 10.1007/s12652-020-01899-y 10.1109/ACCESS.2020.3026260 10.5121/ijnsa.2010.2307 10.1016/j.engappai.2014.02.001 10.1016/j.inffus.2019.01.002 10.1016/j.cose.2008.08.003 10.1109/TCOMM.2012.031912.110179 10.1007/s12243-016-0495-x 10.1504/IJSN.2016.075074 10.5121/ijnsa.2011.3511 10.1016/j.procs.2015.05.108 10.1007/s12539-020-00372-w 10.1016/j.future.2017.08.043 10.1007/978-3-642-40675-1_43 10.1109/TII.2018.2836150 10.1109/ACCESS.2017.2714258 10.1186/s13638-018-1128-z 10.1023/A:1024600519144 10.1007/s10916-016-0596-0 10.1016/j.comcom.2007.05.002 10.1016/S1353-4858(09)70053-4 10.1016/j.asoc.2015.07.029  | 
    
| ContentType | Journal Article | 
    
| DBID | AAYXX CITATION  | 
    
| DOI | 10.1016/j.micpro.2022.104622 | 
    
| DatabaseName | CrossRef | 
    
| DatabaseTitle | CrossRef | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Computer Science | 
    
| ExternalDocumentID | 10_1016_j_micpro_2022_104622 | 
    
| GroupedDBID | --K --M -~X .DC .~1 0R~ 123 1B1 1~. 1~5 29M 4.4 457 4G. 5VS 7-5 71M 8P~ 9JN AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AATTM AAXKI AAXUO AAYFN AAYWO AAYXX ABBOA ABDPE ABJNI ABMAC ABWVN ABXDB ACDAQ ACGFS ACIWK ACLOT ACNNM ACRLP ACRPL ACVFH ACZNC ADBBV ADCNI ADEZE ADJOM ADMUD ADNMO ADTZH AEBSH AECPX AEIPS AEKER AENEX AEUPX AFJKZ AFPUW AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIGII AIIUN AIKHN AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD APXCP AXJTR BJAXD BKOJK BLXMC CITATION CS3 DU5 EBS EFJIC EFKBS EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W JJJVA KOM LG9 LY7 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 ROL RPZ SBC SDF SDG SDP SES SET SEW SPC SPCBC SST SSV SSZ T5K T9H TN5 UHS WUQ XOL XPP ZMT ~G- ~HD  | 
    
| ID | FETCH-LOGICAL-c1512-ad481e97337ebc07b92ea6fb0d7d9891922b5a9347d534cb92ae06ef515e18d23 | 
    
| ISSN | 0141-9331 | 
    
| IngestDate | Thu Apr 24 23:12:52 EDT 2025 Thu Oct 02 04:29:35 EDT 2025  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Language | English | 
    
| LinkModel | OpenURL | 
    
| MergedId | FETCHMERGED-LOGICAL-c1512-ad481e97337ebc07b92ea6fb0d7d9891922b5a9347d534cb92ae06ef515e18d23 | 
    
| ORCID | 0000-0002-6150-9316 0000-0002-1467-1206 0000-0001-5395-5335  | 
    
| ParticipantIDs | crossref_citationtrail_10_1016_j_micpro_2022_104622 crossref_primary_10_1016_j_micpro_2022_104622  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2022-8-00 | 
    
| PublicationDateYYYYMMDD | 2022-08-01 | 
    
| PublicationDate_xml | – month: 08 year: 2022 text: 2022-8-00  | 
    
| PublicationDecade | 2020 | 
    
| PublicationTitle | Microprocessors and microsystems | 
    
| PublicationYear | 2022 | 
    
| References | G.Angelo (10.1016/j.micpro.2022.104622_bib0026) 2015; 36 Hou (10.1016/j.micpro.2022.104622_bib0051) 2018 Al-Obeidat (10.1016/j.micpro.2022.104622_bib0002) 2019; 23 Saif (10.1016/j.micpro.2022.104622_bib0011) 2018 Kasinathan (10.1016/j.micpro.2022.104622_bib0035) 2013 Tavallaee (10.1016/j.micpro.2022.104622_bib0008) 2009 Ali (10.1016/j.micpro.2022.104622_bib0009) 2018 Niyaz (10.1016/j.micpro.2022.104622_bib0031) 2016 Wang (10.1016/j.micpro.2022.104622_bib0037) 2009 Alrashdi (10.1016/j.micpro.2022.104622_bib0052) 2019 Zhang (10.1016/j.micpro.2022.104622_bib0010) 2020 Boubiche (10.1016/j.micpro.2022.104622_bib0040) 2012; 4 Manimurugan (10.1016/j.micpro.2022.104622_bib0060) 2020; 79 A.N.Toosi (10.1016/j.micpro.2022.104622_bib0057) 2007; 30 Bao (10.1016/j.micpro.2022.104622_bib0038) 2012; 9 Chen (10.1016/j.micpro.2022.104622_bib0054) 2016 Zhang (10.1016/j.micpro.2022.104622_bib0042) 2000 Zhang (10.1016/j.micpro.2022.104622_bib0058) 2006; 5 Thamilarasu (10.1016/j.micpro.2022.104622_bib0005) 2020; 8 A.Abraham (10.1016/j.micpro.2022.104622_bib0045) 2007; 4 Verner (10.1016/j.micpro.2022.104622_bib0050) 2017 Jaber (10.1016/j.micpro.2022.104622_bib0007) 2020; 23 Mitchell (10.1016/j.micpro.2022.104622_bib0020) 2015; 12 Maleh (10.1016/j.micpro.2022.104622_bib0048) 2015; 52 Thamilarasu (10.1016/j.micpro.2022.104622_bib0019) 2016; 11 Sabhnani (10.1016/j.micpro.2022.104622_bib0059) 2003 Garc´ıa-Teodoro (10.1016/j.micpro.2022.104622_bib0016) 2009; 28 Krontiris (10.1016/j.micpro.2022.104622_bib0036) 2009; 5432 Khan (10.1016/j.micpro.2022.104622_bib0039) 2009; 2009 Yang (10.1016/j.micpro.2022.104622_bib0027) 2018; 25 Ukil (10.1016/j.micpro.2022.104622_bib0017) 2016 Christy (10.1016/j.micpro.2022.104622_bib0021) 2015; 50 Bhatia (10.1016/j.micpro.2022.104622_bib0015) 2017; 10 Jadidoleslamy (10.1016/j.micpro.2022.104622_bib0033) 2011; 3 Li (10.1016/j.micpro.2022.104622_bib0028) 2019; 6 Anthi (10.1016/j.micpro.2022.104622_bib0024) 2018 Wazid (10.1016/j.micpro.2022.104622_bib0004) 2016; 40 Deya (10.1016/j.micpro.2022.104622_bib0006) 2019; 49 Deng (10.1016/j.micpro.2022.104622_bib0047) 2003; 3 Mamun (10.1016/j.micpro.2022.104622_bib0034) 2010; 2 Saif (10.1016/j.micpro.2022.104622_bib0013) 2020 Shamshirband (10.1016/j.micpro.2022.104622_bib0043) 2014; 32 M.O.Pahl (10.1016/j.micpro.2022.104622_bib0023) 2018 Thakur (10.1016/j.micpro.2022.104622_bib0001) 2020 Liu (10.1016/j.micpro.2022.104622_bib0029) 2018; 2018 Abbas (10.1016/j.micpro.2022.104622_bib0049) 2016; 71 M.L.Martin (10.1016/j.micpro.2022.104622_bib0030) 2017; 17 Khan (10.1016/j.micpro.2022.104622_bib0018) 2017; 5 Ngai (10.1016/j.micpro.2022.104622_bib0046) 2006; 8 Hady (10.1016/j.micpro.2022.104622_bib0053) 2020; 8 S.Saif (10.1016/j.micpro.2022.104622_bib0012) 2019 Diro (10.1016/j.micpro.2022.104622_bib0025) 2018; 82 Kim (10.1016/j.micpro.2022.104622_bib0056) 2014; 274 Saif (10.1016/j.micpro.2022.104622_bib0003) 2018 Pajouh (10.1016/j.micpro.2022.104622_bib0055) 2015 Brown (10.1016/j.micpro.2022.104622_bib0014) 2002 Kavitha (10.1016/j.micpro.2022.104622_bib0032) 2019; 43 Zhang (10.1016/j.micpro.2022.104622_bib0041) 2003; 9 Liu (10.1016/j.micpro.2022.104622_bib0022) 2018; 14 Agah (10.1016/j.micpro.2022.104622_bib0044) 2004  | 
    
| References_xml | – volume: 50 start-page: 209 year: 2015 ident: 10.1016/j.micpro.2022.104622_bib0021 article-title: Cluster based outlier detection algorithm for healthcare data publication-title: Procedia Computer Science doi: 10.1016/j.procs.2015.04.058 – volume: 8 start-page: 106576 year: 2020 ident: 10.1016/j.micpro.2022.104622_bib0053 article-title: Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3000421 – volume: 3 start-page: 2147 year: 2003 ident: 10.1016/j.micpro.2022.104622_bib0047 article-title: SVM-based intrusion detection system for wireless ad hoc networks – volume: 6 start-page: 2093 issue: 2 year: 2019 ident: 10.1016/j.micpro.2022.104622_bib0028 article-title: AI-based two-stage intrusion detection for software definedIoT networks publication-title: IEEEInternet of Tings Journal – year: 2002 ident: 10.1016/j.micpro.2022.104622_bib0014 – volume: 79 year: 2020 ident: 10.1016/j.micpro.2022.104622_bib0060 article-title: Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system publication-title: Microprocessors and Microsystems doi: 10.1016/j.micpro.2020.103261 – start-page: 343 year: 2004 ident: 10.1016/j.micpro.2022.104622_bib0044 article-title: Intrusion detection in sensor networks: a non-cooperative game approach – volume: 12 start-page: 16 issue: 1 year: 2015 ident: 10.1016/j.micpro.2022.104622_bib0020 article-title: Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2014.2312327 – volume: 4 start-page: 35 issue: 2 year: 2012 ident: 10.1016/j.micpro.2022.104622_bib0040 article-title: Cross layer intrusion detection system for wireless sensor network publication-title: International Journal of Network Security & Its Applications doi: 10.5121/ijnsa.2012.4203 – volume: 23 start-page: 777 year: 2019 ident: 10.1016/j.micpro.2022.104622_bib0002 article-title: Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols publication-title: PersUbiquitComput – start-page: 629 year: 2020 ident: 10.1016/j.micpro.2022.104622_bib0013 article-title: On the Implementation and Performance Evaluation of Security Algorithms for Healthcare – start-page: 665 year: 2019 ident: 10.1016/j.micpro.2022.104622_bib0012 – volume: 23 start-page: 3221 year: 2020 ident: 10.1016/j.micpro.2022.104622_bib0007 article-title: FCM–SVM based intrusion detection system for cloud computing environment publication-title: Cluster Comput doi: 10.1007/s10586-020-03082-6 – year: 2020 ident: 10.1016/j.micpro.2022.104622_bib0001 article-title: Smartphone based human activity monitoring and recognition using ML and DL: a comprehensive survey publication-title: J Ambient Intell Human Comput, Springer doi: 10.1007/s12652-020-01899-y – volume: 8 start-page: 181560 year: 2020 ident: 10.1016/j.micpro.2022.104622_bib0005 article-title: An Intrusion Detection System for Internet of Medical Things publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3026260 – volume: 2 start-page: 102 issue: 3 year: 2010 ident: 10.1016/j.micpro.2022.104622_bib0034 article-title: Hierarchical design based intrusion detection system for wireless ad hoc sensor network publication-title: International Journal of Network Security & Its Applications doi: 10.5121/ijnsa.2010.2307 – volume: 32 start-page: 228 year: 2014 ident: 10.1016/j.micpro.2022.104622_bib0043 article-title: Cooperative game theoretic approach usingfuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks publication-title: Engineering Applications of Artifcial Intelligence doi: 10.1016/j.engappai.2014.02.001 – start-page: 994 year: 2016 ident: 10.1016/j.micpro.2022.104622_bib0017 article-title: IoT Healthcare Analytics: The Importance of Anomaly Detection – volume: 49 start-page: 205 year: 2019 ident: 10.1016/j.micpro.2022.104622_bib0006 article-title: A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks publication-title: Information Fusion doi: 10.1016/j.inffus.2019.01.002 – start-page: 405 year: 2018 ident: 10.1016/j.micpro.2022.104622_bib0011 article-title: Secure Data Transmission Beyond Tier 1 of Medical Body Sensor Network – start-page: 161 year: 2017 ident: 10.1016/j.micpro.2022.104622_bib0050 article-title: A Machine Learning Approach to Detecting Sensor Data Modification Intrusions in WBANs – volume: 28 start-page: 18 issue: 1-2 year: 2009 ident: 10.1016/j.micpro.2022.104622_bib0016 article-title: Anomaly-based network intrusion detection: tech- ´niques, systems and challenges publication-title: Computers & Security doi: 10.1016/j.cose.2008.08.003 – start-page: 0515 year: 2019 ident: 10.1016/j.micpro.2022.104622_bib0052 article-title: FBAD: Fog-based Attack Detection for IoT Healthcare in Smart Cities – volume: 9 start-page: 169 issue: 2 year: 2012 ident: 10.1016/j.micpro.2022.104622_bib0038 article-title: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection publication-title: IEEE Transactions on Network and Service Management doi: 10.1109/TCOMM.2012.031912.110179 – start-page: 113 year: 2016 ident: 10.1016/j.micpro.2022.104622_bib0054 article-title: Towards Autonomic Security Management of Healthcare Information Systems – start-page: 1 year: 2018 ident: 10.1016/j.micpro.2022.104622_bib0009 article-title: A hybrid Particle swarm optimization -Extreme Learning Machine approach for Intrusion Detection System – volume: 71 start-page: 477 year: 2016 ident: 10.1016/j.micpro.2022.104622_bib0049 article-title: Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems publication-title: Annals of Telecommunications doi: 10.1007/s12243-016-0495-x – volume: 11 start-page: 82 year: 2016 ident: 10.1016/j.micpro.2022.104622_bib0019 article-title: iDetect: an intelligent intrusion detection system for wireless body area networks publication-title: International Journal of Security and Networks doi: 10.1504/IJSN.2016.075074 – volume: 3 start-page: 131 issue: 5 year: 2011 ident: 10.1016/j.micpro.2022.104622_bib0033 article-title: A hierarchical intrusion detection architecture for wireless sensor networks publication-title: International Journal of Network Security & Its Applications doi: 10.5121/ijnsa.2011.3511 – volume: 5432 start-page: 263 year: 2009 ident: 10.1016/j.micpro.2022.104622_bib0036 article-title: Cooperative intrusion detection in wireless sensor networks – volume: 5 start-page: 2388 year: 2006 ident: 10.1016/j.micpro.2022.104622_bib0058 article-title: Anomaly based network intrusion detection with unsupervised outlier detection – start-page: 209 year: 2003 ident: 10.1016/j.micpro.2022.104622_bib0059 article-title: Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context – year: 2009 ident: 10.1016/j.micpro.2022.104622_bib0008 article-title: A Detailed Analysis of the KDD CUP 99 Data Set – start-page: 257 year: 2000 ident: 10.1016/j.micpro.2022.104622_bib0042 article-title: Intrusion detection in wireless adhoc networks – start-page: 1 year: 2018 ident: 10.1016/j.micpro.2022.104622_bib0024 – volume: 52 start-page: 1047 year: 2015 ident: 10.1016/j.micpro.2022.104622_bib0048 article-title: A global hybrid intrusion detection system for wireless sensor networks publication-title: Procedia Computer Science doi: 10.1016/j.procs.2015.05.108 – volume: 4 start-page: 328 issue: 3 year: 2007 ident: 10.1016/j.micpro.2022.104622_bib0045 article-title: Evolutionary design of intrusion detection programs publication-title: International Journal of Network Security – year: 2020 ident: 10.1016/j.micpro.2022.104622_bib0010 article-title: Feature Selection for Microarray Data Classification Using Hybrid Information Gain and a Modified Binary Krill Herd Algorithm publication-title: Interdisciplinary Sciences, Computational Life Sciences doi: 10.1007/s12539-020-00372-w – volume: 82 start-page: 761 year: 2018 ident: 10.1016/j.micpro.2022.104622_bib0025 article-title: Distributed attack detection scheme using deep learning approach for Internet of Things publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2017.08.043 – volume: 274 start-page: 279 year: 2014 ident: 10.1016/j.micpro.2022.104622_bib0056 article-title: A Novel Anomaly Detection System Based on HFR-MLR Method publication-title: Mobile Ubiquitous and Intelligent Computing doi: 10.1007/978-3-642-40675-1_43 – volume: 14 start-page: 3801 issue: 9 year: 2018 ident: 10.1016/j.micpro.2022.104622_bib0022 article-title: Defending ON–OFF Attacks Using Light Probing Messages in Smart Sensors for Industrial Communication Systems publication-title: IEEE Transactions on Industrial Informatics doi: 10.1109/TII.2018.2836150 – volume: 5 start-page: 13531 year: 2017 ident: 10.1016/j.micpro.2022.104622_bib0018 article-title: A Continuous Change Detection Mechanism to Identify Anomalies in ECG Signals for WBAN-Based Healthcare Environments publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2714258 – volume: 2018 issue: 1 year: 2018 ident: 10.1016/j.micpro.2022.104622_bib0029 article-title: An intrusion detection method for internet of things based on suppressed fuzzy clustering publication-title: EURASIP Journal on Wireless Communications and Networking doi: 10.1186/s13638-018-1128-z – year: 2016 ident: 10.1016/j.micpro.2022.104622_bib0031 article-title: Deep Learning Approach for Network Intrusion Detection System – volume: 9 start-page: 545 issue: 5 year: 2003 ident: 10.1016/j.micpro.2022.104622_bib0041 article-title: Intrusion detection techniques for mobile wireless networks publication-title: Wireless Networks doi: 10.1023/A:1024600519144 – year: 2018 ident: 10.1016/j.micpro.2022.104622_bib0023 article-title: All eyes on you: distributed multi-dimensional IoTmicroserviceanomalydetection – year: 2009 ident: 10.1016/j.micpro.2022.104622_bib0037 article-title: Catching packet droppers and modifiers in wireless sensor networks – start-page: 1 year: 2015 ident: 10.1016/j.micpro.2022.104622_bib0055 article-title: Two-tier network anomaly detection model: a machine learning approach publication-title: J. Intell. Inf. Syst. – volume: 43 issue: 179 year: 2019 ident: 10.1016/j.micpro.2022.104622_bib0032 article-title: India: Intruder Node Detection and Isolation Action in Mobile Ad Hoc Networks Using Feature Optimization and Classification Approach publication-title: Journal of Medical System – volume: 40 year: 2016 ident: 10.1016/j.micpro.2022.104622_bib0004 article-title: Analysis of Security Protocols for Mobile Healthcare publication-title: Journal of Medical Systems doi: 10.1007/s10916-016-0596-0 – volume: 10 start-page: 1182 year: 2017 ident: 10.1016/j.micpro.2022.104622_bib0015 article-title: Identifying P2P traffic: A survey. Peer-to-Peer Netw publication-title: Appl – volume: 8 start-page: 3383 year: 2006 ident: 10.1016/j.micpro.2022.104622_bib0046 article-title: On the intruder detection for sinkhole attack in wireless sensor networks – volume: 30 start-page: 2201 issue: 10 year: 2007 ident: 10.1016/j.micpro.2022.104622_bib0057 article-title: A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers publication-title: Computer and Communications doi: 10.1016/j.comcom.2007.05.002 – volume: 2009 start-page: 9 issue: 5 year: 2009 ident: 10.1016/j.micpro.2022.104622_bib0039 article-title: Real-time cross-layer design for a large scale food detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks publication-title: Network Security doi: 10.1016/S1353-4858(09)70053-4 – year: 2018 ident: 10.1016/j.micpro.2022.104622_bib0003 article-title: Secure data transmission beyond Tier 1 of medical body sensor network – start-page: 600 year: 2013 ident: 10.1016/j.micpro.2022.104622_bib0035 article-title: Denial-of-service detection in 6LoWPAN based internet ofthings – volume: 25 start-page: 19 year: 2018 ident: 10.1016/j.micpro.2022.104622_bib0027 – volume: 36 start-page: 408 year: 2015 ident: 10.1016/j.micpro.2022.104622_bib0026 article-title: An uncertainty-managing batch relevance-based approach to network anomaly detection publication-title: Applied Soft Computing doi: 10.1016/j.asoc.2015.07.029 – volume: 17 year: 2017 ident: 10.1016/j.micpro.2022.104622_bib0030 article-title: Conditional VariationalAutoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT publication-title: Sensors – start-page: 1 year: 2018 ident: 10.1016/j.micpro.2022.104622_bib0051 article-title: A sink node assisted lightweight intrusion detection mechanism for WBAN  | 
    
| SSID | ssj0005062 | 
    
| Score | 2.2652383 | 
    
| SourceID | crossref | 
    
| SourceType | Enrichment Source Index Database  | 
    
| StartPage | 104622 | 
    
| Title | HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) issn: 0141-9331 databaseCode: GBLVA dateStart: 20110101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0005062 providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier ScienceDirect issn: 0141-9331 databaseCode: .~1 dateStart: 19950101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0005062 providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Complete Freedom Collection [SCCMFC] issn: 0141-9331 databaseCode: ACRLP dateStart: 19950101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0005062 providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals [SCFCJ] issn: 0141-9331 databaseCode: AIKHN dateStart: 19950101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0005062 providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals issn: 0141-9331 databaseCode: AKRWK dateStart: 19790101 customDbUrl: isFulltext: true mediaType: online dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0005062 providerName: Library Specific Holdings  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF6FcuHCG9Hy0By4RbactZONuSEKSkBBSEml3qzd9ZokapOoTVSVA_8DiR_LjMePLUUV5WJF6814k_m0OzOeb0aIN6qQKjVGBs4MI3JQTKAL64I8lkbqVCqriDs8-TIYHSWfjvvHnc4vL2tptzWh_f5XXsn_aBXHUK_Ekr2FZhuhOICfUb94RQ3j9Z90PBqPD6fk048uiXhV1n7g-ppU-J_oFKTc3G0dNwTnss1dqkZ14ZrE89Myn9LVDSSYs3jqtnrudlzHuatPvq3PcC5Xb-h6b70pXjJez7p0GuYVq5KyyXyjd0JJfxtmJFBvn1I-jZ175dIpyqMXZYnI6XruZX4cMuXs69nisg0eLM4veHi62-Cqmxuf55qp8xO9Wu78kAZ6w3VCXRvl7AVpTeXinZXeRTOD-dqmz_GHZYgrx98SksSwnX61xvYfZ1-TkVgnuy0zlpKRlIyl3BF3JZ4Z1Bgk_OElEEVlu9pmsTUxs8wevL4Wz_DxLJjZQ3G_cj3gHePokei41WPxoG7rAdUu_0T8LGH1FhhU4IEKGlBBAypgJUIDKiBQQQUqqEEFqHS4AipoQQUIKvBAhc8BBBWUoIIWVE_F0ccPs_ejoOrgEViyJAOdJ8OeS1UcK2dspEwqnR4UJspVng5T9C6k6es0TlTejxOLt7WLBq5AI9v1hrmMn4m91XrlngtICjT8-8bKBB0Wq5Qp4lxFhe2lPRdFOtkXcf33ZrYqb09dVk6ym1S7L4LmWxsu73Lj_INbzn8h7rUAfyn2UEnuFVqxW_O6BNNvtXGmYg | 
    
| linkProvider | Elsevier | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=HIIDS%3A+Hybrid+intelligent+intrusion+detection+system+empowered+with+machine+learning+and+metaheuristic+algorithms+for+application+in+IoT+based+healthcare&rft.jtitle=Microprocessors+and+microsystems&rft.au=Saif%2C+Sohail&rft.au=Das%2C+Priya&rft.au=Biswas%2C+Suparna&rft.au=Khari%2C+Manju&rft.date=2022-08-01&rft.issn=0141-9331&rft.spage=104622&rft_id=info:doi/10.1016%2Fj.micpro.2022.104622&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_micpro_2022_104622 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0141-9331&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0141-9331&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0141-9331&client=summon |