An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning
Saved in:
| Published in | Expert systems with applications Vol. 213; p. 118745 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
01.03.2023
|
| Online Access | Get full text |
| ISSN | 0957-4174 |
| DOI | 10.1016/j.eswa.2022.118745 |
Cover
| ArticleNumber | 118745 |
|---|---|
| Author | Adwan, Omar Almobaideen, Wesam Abu Alghanam, Orieb Saadeh, Maha |
| Author_xml | – sequence: 1 givenname: Orieb orcidid: 0000-0002-2485-9237 surname: Abu Alghanam fullname: Abu Alghanam, Orieb – sequence: 2 givenname: Wesam surname: Almobaideen fullname: Almobaideen, Wesam – sequence: 3 givenname: Maha surname: Saadeh fullname: Saadeh, Maha – sequence: 4 givenname: Omar surname: Adwan fullname: Adwan, Omar |
| BookMark | eNp9kL1uwjAUhT1QqUD7Ap38AkltJ46dEaH-ICHRgc6RE19T08Smtini7UtEpw6dro50viPdb4YmzjtA6IGSnBJaPe5ziCeVM8JYTqkUJZ-gKam5yEoqyls0i3FPCBWEiCn6Wjhsh0Pw36Dx22qDDah0DIAj9NAl6x1W_c4Hmz4GbHzAK7_FDtLJh09sXQrHOHY0pN92PMcEA25VvAxeMrgIQ9sD7kEFZ93uDt0Y1Ue4_71z9P78tF2-ZuvNy2q5WGcdK0XKOlkzqQgvKk1My3XN2oIIZiSwqiq4AWm0ppqKSjDWllWhueatFAVnShY1KeaIXXe74GMMYJpDsIMK54aSZhTV7JtRVDOKaq6iLpD8A3U2qfGxFJTt_0N_AN-1das |
| CitedBy_id | crossref_primary_10_3390_systems11080436 crossref_primary_10_1016_j_cose_2023_103283 crossref_primary_10_1007_s10586_024_04768_x crossref_primary_10_3934_era_2024060 crossref_primary_10_48084_etasr_9020 crossref_primary_10_1007_s10115_025_02366_w crossref_primary_10_1007_s11235_023_01059_5 crossref_primary_10_1016_j_iot_2024_101102 crossref_primary_10_1007_s10586_024_04270_4 crossref_primary_10_1007_s10586_024_04616_y crossref_primary_10_1007_s42979_024_03364_5 crossref_primary_10_1016_j_eswa_2023_121493 crossref_primary_10_1109_JIOT_2023_3317089 crossref_primary_10_1007_s10586_024_04422_6 crossref_primary_10_1109_JIOT_2023_3248259 crossref_primary_10_1007_s12083_024_01720_z crossref_primary_10_48084_etasr_8268 crossref_primary_10_1007_s11227_024_06475_1 crossref_primary_10_1109_TNSM_2024_3455768 crossref_primary_10_3390_fi17010030 crossref_primary_10_3233_JHS_222070 crossref_primary_10_1007_s11277_024_11260_7 crossref_primary_10_1007_s11042_024_19962_7 crossref_primary_10_1038_s41598_024_78976_1 crossref_primary_10_1007_s40031_024_01178_w crossref_primary_10_3390_s23198191 crossref_primary_10_3390_app13095427 crossref_primary_10_3390_electronics12061467 crossref_primary_10_1109_ACCESS_2024_3369237 crossref_primary_10_1142_S0219649224500333 crossref_primary_10_3390_s23167215 crossref_primary_10_1016_j_iot_2024_101138 crossref_primary_10_32604_cmc_2023_041507 |
| Cites_doi | 10.11591/ijeecs.v10.i1.pp371-379 10.1016/j.eswa.2021.115524 10.3390/electronics8111210 10.1016/j.asoc.2016.08.011 10.1016/j.procs.2020.08.020 10.1145/1541880.1541882 10.1016/j.future.2021.06.046 10.1016/j.neucom.2018.05.027 10.1016/j.jisa.2022.103173 10.32604/cmes.2019.07758 10.1007/s10586-021-03249-9 10.1007/s00500-016-2278-8 10.1016/j.eswa.2021.115782 10.3390/bdcc5010001 10.1016/j.chaos.2018.03.010 10.1007/s00138-018-0957-4 10.1016/j.jtbi.2003.07.003 10.1109/ACCESS.2022.3162074 10.1016/j.jisa.2019.102419 10.1109/ACCESS.2020.2978035 10.1007/s11432-018-9546-4 10.1111/j.1558-5646.1989.tb04220.x 10.1016/j.cose.2022.102725 10.1145/3338840.3355641 10.1007/s10586-015-0527-8 10.3390/electronics9010173 10.1108/IJICC-02-2014-0005 10.1016/j.eswa.2020.113842 10.1016/j.eswa.2014.11.009 10.1504/IJSN.2020.106833 10.1007/s12530-020-09342-5 10.1016/j.eswa.2020.113249 10.1109/TC.2016.2519914 10.1016/j.future.2019.05.041 10.3390/s22041396 10.1109/ACCESS.2019.2928048 10.11591/ijece.v11i3.pp2414-2422 10.1002/sec.1335 10.1109/ACCESS.2019.2919956 10.3390/ijerph17249347 10.1016/j.jisa.2016.04.002 10.1023/A:1018054314350 10.1007/s10922-022-09653-9 10.1016/j.eswa.2021.115744 10.1016/j.cageo.2020.104484 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.eswa.2022.118745 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| ExternalDocumentID | 10_1016_j_eswa_2022_118745 |
| GroupedDBID | --K --M .DC .~1 0R~ 13V 1B1 1RT 1~. 1~5 29G 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN 9JO AAAKF AAAKG AABNK AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AARIN AATTM AAXKI AAXUO AAYFN AAYWO AAYXX ABBOA ABFNM ABJNI ABKBG ABMAC ABMVD ABUCO ABUFD ABWVN ABXDB ACDAQ ACGFS ACHRH ACLOT ACNNM ACNTT ACRLP ACRPL ACVFH ACZNC ADBBV ADCNI ADEZE ADJOM ADMUD ADNMO ADTZH AEBSH AECPX AEIPS AEKER AENEX AEUPX AFJKZ AFPUW AFTJW AGHFR AGQPQ AGUBO AGUMN AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIGII AIIUN AIKHN AITUG AKBMS AKRWK AKYEP ALEQD ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD APLSM APXCP ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC BNSAS CITATION CS3 DU5 EBS EFJIC EFKBS EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HAMUX HLZ HVGLF HZ~ IHE J1W JJJVA KOM LG9 LY1 LY7 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- ROL RPZ SBC SDF SDG SDP SDS SES SET SEW SPC SPCBC SSB SSD SSL SST SSV SSZ T5K TN5 WUQ XPP ZMT ~G- ~HD |
| ID | FETCH-LOGICAL-c247t-c8928a0536d0fb5d92b3072f8e26635fe8fdd1d176722b463d5d5b87352a83903 |
| ISSN | 0957-4174 |
| IngestDate | Sat Oct 25 05:57:54 EDT 2025 Thu Apr 24 22:52:27 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c247t-c8928a0536d0fb5d92b3072f8e26635fe8fdd1d176722b463d5d5b87352a83903 |
| ORCID | 0000-0002-2485-9237 |
| ParticipantIDs | crossref_primary_10_1016_j_eswa_2022_118745 crossref_citationtrail_10_1016_j_eswa_2022_118745 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-03-00 |
| PublicationDateYYYYMMDD | 2023-03-01 |
| PublicationDate_xml | – month: 03 year: 2023 text: 2023-03-00 |
| PublicationDecade | 2020 |
| PublicationTitle | Expert systems with applications |
| PublicationYear | 2023 |
| References | da Costa (10.1016/j.eswa.2022.118745_b25) 2021; 168 Alzaqebah (10.1016/j.eswa.2022.118745_b12) 2021; 11 Alhajjar (10.1016/j.eswa.2022.118745_b9) 2021 Rashid (10.1016/j.eswa.2022.118745_b60) 2020; 17 Aydın (10.1016/j.eswa.2022.118745_b15) 2022 Kareem (10.1016/j.eswa.2022.118745_b36) 2022; 22 Alsahaf (10.1016/j.eswa.2022.118745_b11) 2021 Tama (10.1016/j.eswa.2022.118745_b65) 2019; 7 Rice (10.1016/j.eswa.2022.118745_b62) 1989; 43 Khraisat (10.1016/j.eswa.2022.118745_b38) 2020; 9 Pérez (10.1016/j.eswa.2022.118745_b56) 2019 Abualghanam (10.1016/j.eswa.2022.118745_b3) 2019; 97 Koroniotis (10.1016/j.eswa.2022.118745_b41) 2020 Tian (10.1016/j.eswa.2022.118745_b67) 2018; 310 Bouzoubaa (10.1016/j.eswa.2022.118745_b17) 2021; 12 Ma (10.1016/j.eswa.2022.118745_b46) 2019; 121 Koroniotis (10.1016/j.eswa.2022.118745_b40) 2020 Mbanaso (10.1016/j.eswa.2022.118745_b49) 2015; 17 Asassfeh (10.1016/j.eswa.2022.118745_b14) 2020; 12 Moustafa (10.1016/j.eswa.2022.118745_b52) 2016; 25 Chen (10.1016/j.eswa.2022.118745_b23) 2019; 62 Bache (10.1016/j.eswa.2022.118745_b16) 2013 Camiña (10.1016/j.eswa.2022.118745_b19) 2019; 30 Breiman (10.1016/j.eswa.2022.118745_b18) 1996; 24 Pérez (10.1016/j.eswa.2022.118745_b57) 2021; 12 Kittidachanan (10.1016/j.eswa.2022.118745_b39) 2020 AbuAlghanam (10.1016/j.eswa.2022.118745_b4) 2022; 67 Khraisat (10.1016/j.eswa.2022.118745_b37) 2019; 8 Wu (10.1016/j.eswa.2022.118745_b70) 2019; 7 Tavallaee (10.1016/j.eswa.2022.118745_b66) 2009 Ambusaidi (10.1016/j.eswa.2022.118745_b13) 2016; 65 Guilford (10.1016/j.eswa.2022.118745_b31) 2004; 227 Xiong (10.1016/j.eswa.2022.118745_b71) 2020; 140 Revathi (10.1016/j.eswa.2022.118745_b61) 2013; 2 Moustafa (10.1016/j.eswa.2022.118745_b51) 2015 Carletti (10.1016/j.eswa.2022.118745_b20) 2020 Imrana (10.1016/j.eswa.2022.118745_b32) 2021; 185 Alazzam (10.1016/j.eswa.2022.118745_b7) 2021 Jain (10.1016/j.eswa.2022.118745_b33) 2021; 24 Kang (10.1016/j.eswa.2022.118745_b34) 2016; 19 Abu (10.1016/j.eswa.2022.118745_b1) 2018; 10 Paulauskas (10.1016/j.eswa.2022.118745_b55) 2015; 8 Zhou (10.1016/j.eswa.2022.118745_b72) 2022; 187 Zhou (10.1016/j.eswa.2022.118745_b73) 2021; 164 Kaplan (10.1016/j.eswa.2022.118745_b35) 2020; 176 Koroniotis (10.1016/j.eswa.2022.118745_b42) 2019; 100 Rajasegarar (10.1016/j.eswa.2022.118745_b59) 2008 Maglaras (10.1016/j.eswa.2022.118745_b48) 2016; 30 Gopalan (10.1016/j.eswa.2022.118745_b30) 2021 Patro (10.1016/j.eswa.2022.118745_b54) 2015 Lippmann (10.1016/j.eswa.2022.118745_b44) 1998 Ferrag (10.1016/j.eswa.2022.118745_b29) 2020; 50 Feng (10.1016/j.eswa.2022.118745_b28) 2022; 10 Vijayanand (10.1016/j.eswa.2022.118745_b68) 2020; 8 Sohn (10.1016/j.eswa.2022.118745_b63) 2020 Eesa (10.1016/j.eswa.2022.118745_b27) 2015; 42 Chandola (10.1016/j.eswa.2022.118745_b21) 2009; 41 Aguilar (10.1016/j.eswa.2022.118745_b5) 2021; 125 Chauhan (10.1016/j.eswa.2022.118745_b22) 2021 Alazzam (10.1016/j.eswa.2022.118745_b6) 2020; 148 Sun (10.1016/j.eswa.2022.118745_b64) 2014 Naseri (10.1016/j.eswa.2022.118745_b53) 2022; 30 Almobaideen (10.1016/j.eswa.2022.118745_b10) 2020; 15 Wan (10.1016/j.eswa.2022.118745_b69) 2016; 49 Li (10.1016/j.eswa.2022.118745_b43) 2018; 110 10.1016/j.eswa.2022.118745_b24 AbuAlghanam (10.1016/j.eswa.2022.118745_b2) 2021; 7 Medina-Pérez (10.1016/j.eswa.2022.118745_b50) 2017; 21 Liu (10.1016/j.eswa.2022.118745_b45) 2008 Alghushairy (10.1016/j.eswa.2022.118745_b8) 2021; 5 Qatawneh (10.1016/j.eswa.2022.118745_b58) 2020; 975 Duan (10.1016/j.eswa.2022.118745_b26) 2014 Maglaras (10.1016/j.eswa.2022.118745_b47) 2014 |
| References_xml | – volume: 12 start-page: 131 issue: 5 year: 2021 ident: 10.1016/j.eswa.2022.118745_b17 article-title: Predicting DOS-DDOS attacks: Review and evaluation study of feature selection methods based on wrapper process publication-title: (IJACSA) International Journal of Advanced Computer Science and Applications – start-page: 1610 year: 2008 ident: 10.1016/j.eswa.2022.118745_b59 article-title: CESVM: Centered hyperellipsoidal support vector machine based anomaly detection – volume: 975 start-page: 8887 year: 2020 ident: 10.1016/j.eswa.2022.118745_b58 article-title: Challenges of blockchain technology in context internet of things: A survey publication-title: International Journal of Computer Applications – volume: 10 start-page: 371 year: 2018 ident: 10.1016/j.eswa.2022.118745_b1 article-title: Cyber threat intelligence – issue and challenges publication-title: Indonesian Journal of Electrical Engineering and Computer Science doi: 10.11591/ijeecs.v10.i1.pp371-379 – volume: 185 year: 2021 ident: 10.1016/j.eswa.2022.118745_b32 article-title: A bidirectional LSTM deep learning approach for intrusion detection publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2021.115524 – volume: 25 start-page: 18 issue: 1–3 year: 2016 ident: 10.1016/j.eswa.2022.118745_b52 article-title: The evaluation of network anomaly detection systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set publication-title: Information Security Journal: A Global Perspective – volume: 8 start-page: 1210 issue: 11 year: 2019 ident: 10.1016/j.eswa.2022.118745_b37 article-title: A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks publication-title: Electronics doi: 10.3390/electronics8111210 – volume: 49 start-page: 248 year: 2016 ident: 10.1016/j.eswa.2022.118745_b69 article-title: A feature selection method based on modified binary coded ant colony optimization algorithm publication-title: Applied Soft Computing doi: 10.1016/j.asoc.2016.08.011 – volume: 7 start-page: 8 year: 2021 ident: 10.1016/j.eswa.2022.118745_b2 article-title: Multimodal biometric fusion online handwritten signature verification using neural network and support vector machine publication-title: Transactions – volume: 176 start-page: 185 year: 2020 ident: 10.1016/j.eswa.2022.118745_b35 article-title: An improved bigan based approach for anomaly detection publication-title: Procedia Computer Science doi: 10.1016/j.procs.2020.08.020 – volume: 97 start-page: 3217 issue: 22 year: 2019 ident: 10.1016/j.eswa.2022.118745_b3 article-title: A survey of key distribution in the context of internet of things publication-title: Journal of Theoretical and Applied Information Technology – start-page: 1416 year: 2014 ident: 10.1016/j.eswa.2022.118745_b64 article-title: PID controller design based on prey-predator pigeon-inspired optimization algorithm – volume: 41 start-page: 1 issue: 3 year: 2009 ident: 10.1016/j.eswa.2022.118745_b21 article-title: Anomaly detection: A survey publication-title: ACM Computing Surveys doi: 10.1145/1541880.1541882 – year: 2015 ident: 10.1016/j.eswa.2022.118745_b54 – volume: 125 start-page: 71 year: 2021 ident: 10.1016/j.eswa.2022.118745_b5 article-title: PBC4occ: A novel contrast pattern-based classifier for one-class classification publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2021.06.046 – start-page: 133 year: 2014 ident: 10.1016/j.eswa.2022.118745_b47 article-title: Ocsvm model combined with k-means recursive clustering for intrusion detection in scada systems – volume: 310 start-page: 223 year: 2018 ident: 10.1016/j.eswa.2022.118745_b67 article-title: Ramp loss one-class support vector machine; a robust and effective approach to anomaly detection problems publication-title: Neurocomputing doi: 10.1016/j.neucom.2018.05.027 – volume: 67 year: 2022 ident: 10.1016/j.eswa.2022.118745_b4 article-title: A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities publication-title: Journal of Information Security and Applications doi: 10.1016/j.jisa.2022.103173 – volume: 121 start-page: 569 issue: 2 year: 2019 ident: 10.1016/j.eswa.2022.118745_b46 article-title: Feature selection with a local search strategy based on the forest optimization algorithm publication-title: Computer Modeling in Engineering & Sciences (CMES) doi: 10.32604/cmes.2019.07758 – volume: 24 start-page: 2099 issue: 3 year: 2021 ident: 10.1016/j.eswa.2022.118745_b33 article-title: Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data publication-title: Cluster Computing doi: 10.1007/s10586-021-03249-9 – volume: 21 start-page: 557 issue: 3 year: 2017 ident: 10.1016/j.eswa.2022.118745_b50 article-title: Bagging-tpminer: A classifier ensemble for masquerader detection based on typical objects publication-title: Soft Computing doi: 10.1007/s00500-016-2278-8 – year: 2021 ident: 10.1016/j.eswa.2022.118745_b9 article-title: Adversarial machine learning in network intrusion detection systems publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2021.115782 – year: 2020 ident: 10.1016/j.eswa.2022.118745_b41 – volume: 5 start-page: 1 issue: 1 year: 2021 ident: 10.1016/j.eswa.2022.118745_b8 article-title: A review of local outlier factor algorithms for outlier detection in big data streams publication-title: Big Data and Cognitive Computing doi: 10.3390/bdcc5010001 – year: 2020 ident: 10.1016/j.eswa.2022.118745_b20 – volume: 110 start-page: 33 year: 2018 ident: 10.1016/j.eswa.2022.118745_b43 article-title: Nearest neighbors based density peaks approach to intrusion detection publication-title: Chaos, Solitons & Fractals doi: 10.1016/j.chaos.2018.03.010 – start-page: 413 year: 2008 ident: 10.1016/j.eswa.2022.118745_b45 article-title: Isolation forest – start-page: 1 year: 2015 ident: 10.1016/j.eswa.2022.118745_b51 article-title: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) – volume: 30 start-page: 959 issue: 5 year: 2019 ident: 10.1016/j.eswa.2022.118745_b19 article-title: Bagging-RandomMiner: A one-class classifier for file access-based masquerade detection publication-title: Machine Vision and Applications doi: 10.1007/s00138-018-0957-4 – volume: 227 start-page: 25 issue: 1 year: 2004 ident: 10.1016/j.eswa.2022.118745_b31 article-title: Positional entropy during pigeon homing II: navigational interpretation of Bayesian latent state models publication-title: Journal of Theoretical Biology doi: 10.1016/j.jtbi.2003.07.003 – volume: 10 start-page: 33301 year: 2022 ident: 10.1016/j.eswa.2022.118745_b28 article-title: A novel feature selection method with neighborhood rough set and improved particle swarm optimization publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3162074 – volume: 50 year: 2020 ident: 10.1016/j.eswa.2022.118745_b29 article-title: Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study publication-title: Journal of Information Security and Applications doi: 10.1016/j.jisa.2019.102419 – volume: 8 start-page: 56847 year: 2020 ident: 10.1016/j.eswa.2022.118745_b68 article-title: A novel feature selection method using whale optimization algorithm and genetic operators for intrusion detection system in wireless mesh network publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2978035 – volume: 62 start-page: 1 issue: 7 year: 2019 ident: 10.1016/j.eswa.2022.118745_b23 article-title: A hybrid quantum-based PIO algorithm for global numerical optimization publication-title: Science China. Information Sciences doi: 10.1007/s11432-018-9546-4 – volume: 43 start-page: 223 issue: 1 year: 1989 ident: 10.1016/j.eswa.2022.118745_b62 article-title: Analyzing tables of statistical tests publication-title: Evolution doi: 10.1111/j.1558-5646.1989.tb04220.x – year: 2022 ident: 10.1016/j.eswa.2022.118745_b15 article-title: A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment publication-title: Computers & Security doi: 10.1016/j.cose.2022.102725 – ident: 10.1016/j.eswa.2022.118745_b24 doi: 10.1145/3338840.3355641 – year: 2021 ident: 10.1016/j.eswa.2022.118745_b11 article-title: A framework for feature selection through boosting publication-title: Expert Systems with Applications – volume: 19 start-page: 325 year: 2016 ident: 10.1016/j.eswa.2022.118745_b34 article-title: A feature selection approach to find optimal feature subsets for the network intrusion detection system publication-title: Cluster Computing doi: 10.1007/s10586-015-0527-8 – start-page: 463 year: 2019 ident: 10.1016/j.eswa.2022.118745_b56 article-title: Comparison of network intrusion detection performance using feature representation – volume: 9 start-page: 173 issue: 1 year: 2020 ident: 10.1016/j.eswa.2022.118745_b38 article-title: Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine publication-title: Electronics doi: 10.3390/electronics9010173 – year: 2014 ident: 10.1016/j.eswa.2022.118745_b26 article-title: Pigeon-inspired optimization: a new swarm intelligence optimizer for air robot path planning publication-title: International Journal of Intelligent Computing and Cybernetics doi: 10.1108/IJICC-02-2014-0005 – volume: 164 year: 2021 ident: 10.1016/j.eswa.2022.118745_b73 article-title: A feature selection algorithm of decision tree based on feature weight publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2020.113842 – volume: 42 start-page: 2670 year: 2015 ident: 10.1016/j.eswa.2022.118745_b27 article-title: A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2014.11.009 – volume: 15 start-page: 111 issue: 2 year: 2020 ident: 10.1016/j.eswa.2022.118745_b10 article-title: Fog computing: survey on decoy information technology publication-title: International Journal of Security and Networks doi: 10.1504/IJSN.2020.106833 – year: 2021 ident: 10.1016/j.eswa.2022.118745_b7 article-title: Lightweight intelligent network intrusion detection system using OCSVM and pigeon inspired optimizer publication-title: Applied Intelligence: The International Journal of Artificial Intelligence, Neural Networks, and Complex Problem-Solving Technologies – volume: 12 start-page: 302 issue: 3 year: 2020 ident: 10.1016/j.eswa.2022.118745_b14 article-title: Anonymous authentication protocols for IoT based-healthcare systems: A survey publication-title: International Journal of Communication Networks and Information Security – start-page: 770 year: 2021 ident: 10.1016/j.eswa.2022.118745_b22 article-title: Selection of tree based ensemble classifier for detecting network attacks in IoT – volume: 12 start-page: 79 issue: 1 year: 2021 ident: 10.1016/j.eswa.2022.118745_b57 article-title: Evaluation of feature learning for anomaly detection in network traffic publication-title: Evolving Systems doi: 10.1007/s12530-020-09342-5 – start-page: 1 year: 2021 ident: 10.1016/j.eswa.2022.118745_b30 article-title: IoT security in healthcare using AI: A survey – volume: 148 year: 2020 ident: 10.1016/j.eswa.2022.118745_b6 article-title: A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2020.113249 – volume: 65 start-page: 2986 issue: 10 year: 2016 ident: 10.1016/j.eswa.2022.118745_b13 article-title: Building an intrusion detection system using a filter-based feature selection algorithm publication-title: IEEE Transactions on Computers doi: 10.1109/TC.2016.2519914 – volume: 100 start-page: 779 year: 2019 ident: 10.1016/j.eswa.2022.118745_b42 article-title: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2019.05.041 – volume: 22 start-page: 1396 issue: 4 year: 2022 ident: 10.1016/j.eswa.2022.118745_b36 article-title: An effective feature selection model using hybrid metaheuristic algorithms for iot intrusion detection publication-title: Sensors doi: 10.3390/s22041396 – year: 2020 ident: 10.1016/j.eswa.2022.118745_b63 article-title: Deep belief network based intrusion detection techniques: A survey publication-title: Expert Systems with Applications – volume: 7 start-page: 94497 year: 2019 ident: 10.1016/j.eswa.2022.118745_b65 article-title: TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2928048 – volume: 11 start-page: 2414 issue: 3 year: 2021 ident: 10.1016/j.eswa.2022.118745_b12 article-title: Hybrid feature selection method based on particle swarm optimization and adaptive local search method publication-title: International Journal of Electrical and Computer Engineering (IJECE) doi: 10.11591/ijece.v11i3.pp2414-2422 – volume: 8 start-page: 4203 year: 2015 ident: 10.1016/j.eswa.2022.118745_b55 article-title: Local outlier factor use for the network flow anomalydetection publication-title: Security and Communication Networks doi: 10.1002/sec.1335 – start-page: 163 year: 1998 ident: 10.1016/j.eswa.2022.118745_b44 article-title: The 1998 DARPA/AFRL off-line intrusion detection evaluation – year: 2013 ident: 10.1016/j.eswa.2022.118745_b16 – start-page: 64 year: 2020 ident: 10.1016/j.eswa.2022.118745_b39 article-title: Anomaly detection based on GS-OCSVM classification – volume: 7 start-page: 80588 year: 2019 ident: 10.1016/j.eswa.2022.118745_b70 article-title: A feature selection method based on hybrid improved binary quantum particle swarm optimization publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2919956 – volume: 17 start-page: 9347 issue: 24 year: 2020 ident: 10.1016/j.eswa.2022.118745_b60 article-title: Cyberattacks detection in iot-based smart city applications using machine learning techniques publication-title: International Journal of Environmental Research and Public Health doi: 10.3390/ijerph17249347 – start-page: 1 year: 2009 ident: 10.1016/j.eswa.2022.118745_b66 article-title: A detailed analysis of the KDD CUP 99 data set – volume: 30 start-page: 15 year: 2016 ident: 10.1016/j.eswa.2022.118745_b48 article-title: Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems publication-title: Journal of Information Security and Applications doi: 10.1016/j.jisa.2016.04.002 – volume: 24 start-page: 123 issue: 2 year: 1996 ident: 10.1016/j.eswa.2022.118745_b18 article-title: Bagging predictors publication-title: Machine Learning doi: 10.1023/A:1018054314350 – volume: 17 start-page: 17 issue: 3 year: 2015 ident: 10.1016/j.eswa.2022.118745_b49 article-title: The cyberspace: Redefining a new world publication-title: IOSR Journal of Computer Engineering (IOSR-JCE) – volume: 30 start-page: 1 issue: 3 year: 2022 ident: 10.1016/j.eswa.2022.118745_b53 article-title: A feature selection based on the farmland fertility algorithm for improved intrusion detection systems publication-title: Journal of Network and Systems Management doi: 10.1007/s10922-022-09653-9 – volume: 187 year: 2022 ident: 10.1016/j.eswa.2022.118745_b72 article-title: Anomaly detection based on a granular Markov model publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2021.115744 – volume: 140 year: 2020 ident: 10.1016/j.eswa.2022.118745_b71 article-title: Recognizing multivariate geochemical anomalies for mineral exploration by combining deep learning and one-class support vector machine publication-title: Computers & Geosciences doi: 10.1016/j.cageo.2020.104484 – volume: 168 year: 2021 ident: 10.1016/j.eswa.2022.118745_b25 article-title: Evaluation of feature selection methods based on artificial neural network weights publication-title: Expert Systems with Applications – volume: 2 start-page: 1848 issue: 12 year: 2013 ident: 10.1016/j.eswa.2022.118745_b61 article-title: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection publication-title: International Journal of Engineering Research & Technology (IJERT) – year: 2020 ident: 10.1016/j.eswa.2022.118745_b40 |
| SSID | ssj0017007 |
| Score | 2.6169853 |
| SourceID | crossref |
| SourceType | Enrichment Source Index Database |
| StartPage | 118745 |
| Title | An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning |
| Volume | 213 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) issn: 0957-4174 databaseCode: GBLVA dateStart: 20110101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0017007 providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier ScienceDirect issn: 0957-4174 databaseCode: .~1 dateStart: 19950101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0017007 providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Complete Freedom Collection [SCCMFC] issn: 0957-4174 databaseCode: ACRLP dateStart: 19950101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0017007 providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals [SCFCJ] - NZ issn: 0957-4174 databaseCode: AIKHN dateStart: 19950101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0017007 providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals issn: 0957-4174 databaseCode: AKRWK dateStart: 19900101 customDbUrl: isFulltext: true mediaType: online dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017007 providerName: Library Specific Holdings |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9swDBay7rLL3sO6F3jYzXBQy88cjWFDO2DLDinWm2FZcrIicbbUaYEedt7PHmnKits9sA4BjMSRBcH8RFEU-VGI1wrFSvVPfKUD7UdBXfklcRHWJU6mNMaxB5Qo_OFjcngcvT-JT0ajH4OopW2rxtXlb_NK_keqeA_lSlmyN5Cs6xRv4HeUL15Rwnj9JxnnDWU5btbnaDV-Opp6teloOr2zrrhNF2i8nK9x-79YdeGER-uZ13DcN_FEbLbkKvO0aW1rpnX2aGXTdIqAW1yzotQqW1tifsWPTyTJrX2mT5IbHIfvDpa2Xr6cL8qGsTfFzblyfy5XqFC-aMPa77PhMjbs9EFBmgUnFC3c6pHrC_bZTlflZuizkOEuaMs5H1MEBtfn6fWwDMKBJqUy6Ew0-YuSZ3_D6dicXRBzlJTjXeOrjNrXVjoXf9iHtp0W1EdBfRTcxy1xW-L6QEVAxt9dsBCRGKbM2sjjtulXHCl4fRwDE2dgq8zui7t2kwE5I-aBGJnmobjXF_AAq88fiW95Az2AAAEEFkDgAAQOQIAAAgQQWACBAxA4AAGDAToAAf7uAQQ9gB6L43dvZ28OfVuDw69klLZ-lU1kVqKmTvRBrWI9kQqnsqwzI8lWrU1Wa5zlQZqkUqooCXWsY5WlaNeXaHsfhE_EXrNuzFMBRAwUhyo0ldRRWCUl7e07G9JM8GP2RdC_tqKyBPVUJ2VZ_Flc-8Jzz3xlepa_tH52o9bPxZ0ddl-IPXyp5iVaoK161YHjJ_giiqw |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+improved+PIO+feature+selection+algorithm+for+IoT+network+intrusion+detection+system+based+on+ensemble+learning&rft.jtitle=Expert+systems+with+applications&rft.au=Abu+Alghanam%2C+Orieb&rft.au=Almobaideen%2C+Wesam&rft.au=Saadeh%2C+Maha&rft.au=Adwan%2C+Omar&rft.date=2023-03-01&rft.issn=0957-4174&rft.volume=213&rft.spage=118745&rft_id=info:doi/10.1016%2Fj.eswa.2022.118745&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_eswa_2022_118745 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0957-4174&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0957-4174&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0957-4174&client=summon |