An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning

Saved in:
Bibliographic Details
Published inExpert systems with applications Vol. 213; p. 118745
Main Authors Abu Alghanam, Orieb, Almobaideen, Wesam, Saadeh, Maha, Adwan, Omar
Format Journal Article
LanguageEnglish
Published 01.03.2023
Online AccessGet full text
ISSN0957-4174
DOI10.1016/j.eswa.2022.118745

Cover

ArticleNumber 118745
Author Adwan, Omar
Almobaideen, Wesam
Abu Alghanam, Orieb
Saadeh, Maha
Author_xml – sequence: 1
  givenname: Orieb
  orcidid: 0000-0002-2485-9237
  surname: Abu Alghanam
  fullname: Abu Alghanam, Orieb
– sequence: 2
  givenname: Wesam
  surname: Almobaideen
  fullname: Almobaideen, Wesam
– sequence: 3
  givenname: Maha
  surname: Saadeh
  fullname: Saadeh, Maha
– sequence: 4
  givenname: Omar
  surname: Adwan
  fullname: Adwan, Omar
BookMark eNp9kL1uwjAUhT1QqUD7Ap38AkltJ46dEaH-ICHRgc6RE19T08Smtini7UtEpw6dro50viPdb4YmzjtA6IGSnBJaPe5ziCeVM8JYTqkUJZ-gKam5yEoqyls0i3FPCBWEiCn6Wjhsh0Pw36Dx22qDDah0DIAj9NAl6x1W_c4Hmz4GbHzAK7_FDtLJh09sXQrHOHY0pN92PMcEA25VvAxeMrgIQ9sD7kEFZ93uDt0Y1Ue4_71z9P78tF2-ZuvNy2q5WGcdK0XKOlkzqQgvKk1My3XN2oIIZiSwqiq4AWm0ppqKSjDWllWhueatFAVnShY1KeaIXXe74GMMYJpDsIMK54aSZhTV7JtRVDOKaq6iLpD8A3U2qfGxFJTt_0N_AN-1das
CitedBy_id crossref_primary_10_3390_systems11080436
crossref_primary_10_1016_j_cose_2023_103283
crossref_primary_10_1007_s10586_024_04768_x
crossref_primary_10_3934_era_2024060
crossref_primary_10_48084_etasr_9020
crossref_primary_10_1007_s10115_025_02366_w
crossref_primary_10_1007_s11235_023_01059_5
crossref_primary_10_1016_j_iot_2024_101102
crossref_primary_10_1007_s10586_024_04270_4
crossref_primary_10_1007_s10586_024_04616_y
crossref_primary_10_1007_s42979_024_03364_5
crossref_primary_10_1016_j_eswa_2023_121493
crossref_primary_10_1109_JIOT_2023_3317089
crossref_primary_10_1007_s10586_024_04422_6
crossref_primary_10_1109_JIOT_2023_3248259
crossref_primary_10_1007_s12083_024_01720_z
crossref_primary_10_48084_etasr_8268
crossref_primary_10_1007_s11227_024_06475_1
crossref_primary_10_1109_TNSM_2024_3455768
crossref_primary_10_3390_fi17010030
crossref_primary_10_3233_JHS_222070
crossref_primary_10_1007_s11277_024_11260_7
crossref_primary_10_1007_s11042_024_19962_7
crossref_primary_10_1038_s41598_024_78976_1
crossref_primary_10_1007_s40031_024_01178_w
crossref_primary_10_3390_s23198191
crossref_primary_10_3390_app13095427
crossref_primary_10_3390_electronics12061467
crossref_primary_10_1109_ACCESS_2024_3369237
crossref_primary_10_1142_S0219649224500333
crossref_primary_10_3390_s23167215
crossref_primary_10_1016_j_iot_2024_101138
crossref_primary_10_32604_cmc_2023_041507
Cites_doi 10.11591/ijeecs.v10.i1.pp371-379
10.1016/j.eswa.2021.115524
10.3390/electronics8111210
10.1016/j.asoc.2016.08.011
10.1016/j.procs.2020.08.020
10.1145/1541880.1541882
10.1016/j.future.2021.06.046
10.1016/j.neucom.2018.05.027
10.1016/j.jisa.2022.103173
10.32604/cmes.2019.07758
10.1007/s10586-021-03249-9
10.1007/s00500-016-2278-8
10.1016/j.eswa.2021.115782
10.3390/bdcc5010001
10.1016/j.chaos.2018.03.010
10.1007/s00138-018-0957-4
10.1016/j.jtbi.2003.07.003
10.1109/ACCESS.2022.3162074
10.1016/j.jisa.2019.102419
10.1109/ACCESS.2020.2978035
10.1007/s11432-018-9546-4
10.1111/j.1558-5646.1989.tb04220.x
10.1016/j.cose.2022.102725
10.1145/3338840.3355641
10.1007/s10586-015-0527-8
10.3390/electronics9010173
10.1108/IJICC-02-2014-0005
10.1016/j.eswa.2020.113842
10.1016/j.eswa.2014.11.009
10.1504/IJSN.2020.106833
10.1007/s12530-020-09342-5
10.1016/j.eswa.2020.113249
10.1109/TC.2016.2519914
10.1016/j.future.2019.05.041
10.3390/s22041396
10.1109/ACCESS.2019.2928048
10.11591/ijece.v11i3.pp2414-2422
10.1002/sec.1335
10.1109/ACCESS.2019.2919956
10.3390/ijerph17249347
10.1016/j.jisa.2016.04.002
10.1023/A:1018054314350
10.1007/s10922-022-09653-9
10.1016/j.eswa.2021.115744
10.1016/j.cageo.2020.104484
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.1016/j.eswa.2022.118745
DatabaseName CrossRef
DatabaseTitle CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID 10_1016_j_eswa_2022_118745
GroupedDBID --K
--M
.DC
.~1
0R~
13V
1B1
1RT
1~.
1~5
29G
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
9JO
AAAKF
AAAKG
AABNK
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AARIN
AATTM
AAXKI
AAXUO
AAYFN
AAYWO
AAYXX
ABBOA
ABFNM
ABJNI
ABKBG
ABMAC
ABMVD
ABUCO
ABUFD
ABWVN
ABXDB
ACDAQ
ACGFS
ACHRH
ACLOT
ACNNM
ACNTT
ACRLP
ACRPL
ACVFH
ACZNC
ADBBV
ADCNI
ADEZE
ADJOM
ADMUD
ADNMO
ADTZH
AEBSH
AECPX
AEIPS
AEKER
AENEX
AEUPX
AFJKZ
AFPUW
AFTJW
AGHFR
AGQPQ
AGUBO
AGUMN
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIGII
AIIUN
AIKHN
AITUG
AKBMS
AKRWK
AKYEP
ALEQD
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
AOUOD
APLSM
APXCP
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
BNSAS
CITATION
CS3
DU5
EBS
EFJIC
EFKBS
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HAMUX
HLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
LG9
LY1
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
ROL
RPZ
SBC
SDF
SDG
SDP
SDS
SES
SET
SEW
SPC
SPCBC
SSB
SSD
SSL
SST
SSV
SSZ
T5K
TN5
WUQ
XPP
ZMT
~G-
~HD
ID FETCH-LOGICAL-c247t-c8928a0536d0fb5d92b3072f8e26635fe8fdd1d176722b463d5d5b87352a83903
ISSN 0957-4174
IngestDate Sat Oct 25 05:57:54 EDT 2025
Thu Apr 24 22:52:27 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c247t-c8928a0536d0fb5d92b3072f8e26635fe8fdd1d176722b463d5d5b87352a83903
ORCID 0000-0002-2485-9237
ParticipantIDs crossref_primary_10_1016_j_eswa_2022_118745
crossref_citationtrail_10_1016_j_eswa_2022_118745
PublicationCentury 2000
PublicationDate 2023-03-00
PublicationDateYYYYMMDD 2023-03-01
PublicationDate_xml – month: 03
  year: 2023
  text: 2023-03-00
PublicationDecade 2020
PublicationTitle Expert systems with applications
PublicationYear 2023
References da Costa (10.1016/j.eswa.2022.118745_b25) 2021; 168
Alzaqebah (10.1016/j.eswa.2022.118745_b12) 2021; 11
Alhajjar (10.1016/j.eswa.2022.118745_b9) 2021
Rashid (10.1016/j.eswa.2022.118745_b60) 2020; 17
Aydın (10.1016/j.eswa.2022.118745_b15) 2022
Kareem (10.1016/j.eswa.2022.118745_b36) 2022; 22
Alsahaf (10.1016/j.eswa.2022.118745_b11) 2021
Tama (10.1016/j.eswa.2022.118745_b65) 2019; 7
Rice (10.1016/j.eswa.2022.118745_b62) 1989; 43
Khraisat (10.1016/j.eswa.2022.118745_b38) 2020; 9
Pérez (10.1016/j.eswa.2022.118745_b56) 2019
Abualghanam (10.1016/j.eswa.2022.118745_b3) 2019; 97
Koroniotis (10.1016/j.eswa.2022.118745_b41) 2020
Tian (10.1016/j.eswa.2022.118745_b67) 2018; 310
Bouzoubaa (10.1016/j.eswa.2022.118745_b17) 2021; 12
Ma (10.1016/j.eswa.2022.118745_b46) 2019; 121
Koroniotis (10.1016/j.eswa.2022.118745_b40) 2020
Mbanaso (10.1016/j.eswa.2022.118745_b49) 2015; 17
Asassfeh (10.1016/j.eswa.2022.118745_b14) 2020; 12
Moustafa (10.1016/j.eswa.2022.118745_b52) 2016; 25
Chen (10.1016/j.eswa.2022.118745_b23) 2019; 62
Bache (10.1016/j.eswa.2022.118745_b16) 2013
Camiña (10.1016/j.eswa.2022.118745_b19) 2019; 30
Breiman (10.1016/j.eswa.2022.118745_b18) 1996; 24
Pérez (10.1016/j.eswa.2022.118745_b57) 2021; 12
Kittidachanan (10.1016/j.eswa.2022.118745_b39) 2020
AbuAlghanam (10.1016/j.eswa.2022.118745_b4) 2022; 67
Khraisat (10.1016/j.eswa.2022.118745_b37) 2019; 8
Wu (10.1016/j.eswa.2022.118745_b70) 2019; 7
Tavallaee (10.1016/j.eswa.2022.118745_b66) 2009
Ambusaidi (10.1016/j.eswa.2022.118745_b13) 2016; 65
Guilford (10.1016/j.eswa.2022.118745_b31) 2004; 227
Xiong (10.1016/j.eswa.2022.118745_b71) 2020; 140
Revathi (10.1016/j.eswa.2022.118745_b61) 2013; 2
Moustafa (10.1016/j.eswa.2022.118745_b51) 2015
Carletti (10.1016/j.eswa.2022.118745_b20) 2020
Imrana (10.1016/j.eswa.2022.118745_b32) 2021; 185
Alazzam (10.1016/j.eswa.2022.118745_b7) 2021
Jain (10.1016/j.eswa.2022.118745_b33) 2021; 24
Kang (10.1016/j.eswa.2022.118745_b34) 2016; 19
Abu (10.1016/j.eswa.2022.118745_b1) 2018; 10
Paulauskas (10.1016/j.eswa.2022.118745_b55) 2015; 8
Zhou (10.1016/j.eswa.2022.118745_b72) 2022; 187
Zhou (10.1016/j.eswa.2022.118745_b73) 2021; 164
Kaplan (10.1016/j.eswa.2022.118745_b35) 2020; 176
Koroniotis (10.1016/j.eswa.2022.118745_b42) 2019; 100
Rajasegarar (10.1016/j.eswa.2022.118745_b59) 2008
Maglaras (10.1016/j.eswa.2022.118745_b48) 2016; 30
Gopalan (10.1016/j.eswa.2022.118745_b30) 2021
Patro (10.1016/j.eswa.2022.118745_b54) 2015
Lippmann (10.1016/j.eswa.2022.118745_b44) 1998
Ferrag (10.1016/j.eswa.2022.118745_b29) 2020; 50
Feng (10.1016/j.eswa.2022.118745_b28) 2022; 10
Vijayanand (10.1016/j.eswa.2022.118745_b68) 2020; 8
Sohn (10.1016/j.eswa.2022.118745_b63) 2020
Eesa (10.1016/j.eswa.2022.118745_b27) 2015; 42
Chandola (10.1016/j.eswa.2022.118745_b21) 2009; 41
Aguilar (10.1016/j.eswa.2022.118745_b5) 2021; 125
Chauhan (10.1016/j.eswa.2022.118745_b22) 2021
Alazzam (10.1016/j.eswa.2022.118745_b6) 2020; 148
Sun (10.1016/j.eswa.2022.118745_b64) 2014
Naseri (10.1016/j.eswa.2022.118745_b53) 2022; 30
Almobaideen (10.1016/j.eswa.2022.118745_b10) 2020; 15
Wan (10.1016/j.eswa.2022.118745_b69) 2016; 49
Li (10.1016/j.eswa.2022.118745_b43) 2018; 110
10.1016/j.eswa.2022.118745_b24
AbuAlghanam (10.1016/j.eswa.2022.118745_b2) 2021; 7
Medina-Pérez (10.1016/j.eswa.2022.118745_b50) 2017; 21
Liu (10.1016/j.eswa.2022.118745_b45) 2008
Alghushairy (10.1016/j.eswa.2022.118745_b8) 2021; 5
Qatawneh (10.1016/j.eswa.2022.118745_b58) 2020; 975
Duan (10.1016/j.eswa.2022.118745_b26) 2014
Maglaras (10.1016/j.eswa.2022.118745_b47) 2014
References_xml – volume: 12
  start-page: 131
  issue: 5
  year: 2021
  ident: 10.1016/j.eswa.2022.118745_b17
  article-title: Predicting DOS-DDOS attacks: Review and evaluation study of feature selection methods based on wrapper process
  publication-title: (IJACSA) International Journal of Advanced Computer Science and Applications
– start-page: 1610
  year: 2008
  ident: 10.1016/j.eswa.2022.118745_b59
  article-title: CESVM: Centered hyperellipsoidal support vector machine based anomaly detection
– volume: 975
  start-page: 8887
  year: 2020
  ident: 10.1016/j.eswa.2022.118745_b58
  article-title: Challenges of blockchain technology in context internet of things: A survey
  publication-title: International Journal of Computer Applications
– volume: 10
  start-page: 371
  year: 2018
  ident: 10.1016/j.eswa.2022.118745_b1
  article-title: Cyber threat intelligence – issue and challenges
  publication-title: Indonesian Journal of Electrical Engineering and Computer Science
  doi: 10.11591/ijeecs.v10.i1.pp371-379
– volume: 185
  year: 2021
  ident: 10.1016/j.eswa.2022.118745_b32
  article-title: A bidirectional LSTM deep learning approach for intrusion detection
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2021.115524
– volume: 25
  start-page: 18
  issue: 1–3
  year: 2016
  ident: 10.1016/j.eswa.2022.118745_b52
  article-title: The evaluation of network anomaly detection systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set
  publication-title: Information Security Journal: A Global Perspective
– volume: 8
  start-page: 1210
  issue: 11
  year: 2019
  ident: 10.1016/j.eswa.2022.118745_b37
  article-title: A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks
  publication-title: Electronics
  doi: 10.3390/electronics8111210
– volume: 49
  start-page: 248
  year: 2016
  ident: 10.1016/j.eswa.2022.118745_b69
  article-title: A feature selection method based on modified binary coded ant colony optimization algorithm
  publication-title: Applied Soft Computing
  doi: 10.1016/j.asoc.2016.08.011
– volume: 7
  start-page: 8
  year: 2021
  ident: 10.1016/j.eswa.2022.118745_b2
  article-title: Multimodal biometric fusion online handwritten signature verification using neural network and support vector machine
  publication-title: Transactions
– volume: 176
  start-page: 185
  year: 2020
  ident: 10.1016/j.eswa.2022.118745_b35
  article-title: An improved bigan based approach for anomaly detection
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2020.08.020
– volume: 97
  start-page: 3217
  issue: 22
  year: 2019
  ident: 10.1016/j.eswa.2022.118745_b3
  article-title: A survey of key distribution in the context of internet of things
  publication-title: Journal of Theoretical and Applied Information Technology
– start-page: 1416
  year: 2014
  ident: 10.1016/j.eswa.2022.118745_b64
  article-title: PID controller design based on prey-predator pigeon-inspired optimization algorithm
– volume: 41
  start-page: 1
  issue: 3
  year: 2009
  ident: 10.1016/j.eswa.2022.118745_b21
  article-title: Anomaly detection: A survey
  publication-title: ACM Computing Surveys
  doi: 10.1145/1541880.1541882
– year: 2015
  ident: 10.1016/j.eswa.2022.118745_b54
– volume: 125
  start-page: 71
  year: 2021
  ident: 10.1016/j.eswa.2022.118745_b5
  article-title: PBC4occ: A novel contrast pattern-based classifier for one-class classification
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2021.06.046
– start-page: 133
  year: 2014
  ident: 10.1016/j.eswa.2022.118745_b47
  article-title: Ocsvm model combined with k-means recursive clustering for intrusion detection in scada systems
– volume: 310
  start-page: 223
  year: 2018
  ident: 10.1016/j.eswa.2022.118745_b67
  article-title: Ramp loss one-class support vector machine; a robust and effective approach to anomaly detection problems
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2018.05.027
– volume: 67
  year: 2022
  ident: 10.1016/j.eswa.2022.118745_b4
  article-title: A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2022.103173
– volume: 121
  start-page: 569
  issue: 2
  year: 2019
  ident: 10.1016/j.eswa.2022.118745_b46
  article-title: Feature selection with a local search strategy based on the forest optimization algorithm
  publication-title: Computer Modeling in Engineering & Sciences (CMES)
  doi: 10.32604/cmes.2019.07758
– volume: 24
  start-page: 2099
  issue: 3
  year: 2021
  ident: 10.1016/j.eswa.2022.118745_b33
  article-title: Distributed anomaly detection using concept drift detection based hybrid ensemble techniques in streamed network data
  publication-title: Cluster Computing
  doi: 10.1007/s10586-021-03249-9
– volume: 21
  start-page: 557
  issue: 3
  year: 2017
  ident: 10.1016/j.eswa.2022.118745_b50
  article-title: Bagging-tpminer: A classifier ensemble for masquerader detection based on typical objects
  publication-title: Soft Computing
  doi: 10.1007/s00500-016-2278-8
– year: 2021
  ident: 10.1016/j.eswa.2022.118745_b9
  article-title: Adversarial machine learning in network intrusion detection systems
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2021.115782
– year: 2020
  ident: 10.1016/j.eswa.2022.118745_b41
– volume: 5
  start-page: 1
  issue: 1
  year: 2021
  ident: 10.1016/j.eswa.2022.118745_b8
  article-title: A review of local outlier factor algorithms for outlier detection in big data streams
  publication-title: Big Data and Cognitive Computing
  doi: 10.3390/bdcc5010001
– year: 2020
  ident: 10.1016/j.eswa.2022.118745_b20
– volume: 110
  start-page: 33
  year: 2018
  ident: 10.1016/j.eswa.2022.118745_b43
  article-title: Nearest neighbors based density peaks approach to intrusion detection
  publication-title: Chaos, Solitons & Fractals
  doi: 10.1016/j.chaos.2018.03.010
– start-page: 413
  year: 2008
  ident: 10.1016/j.eswa.2022.118745_b45
  article-title: Isolation forest
– start-page: 1
  year: 2015
  ident: 10.1016/j.eswa.2022.118745_b51
  article-title: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)
– volume: 30
  start-page: 959
  issue: 5
  year: 2019
  ident: 10.1016/j.eswa.2022.118745_b19
  article-title: Bagging-RandomMiner: A one-class classifier for file access-based masquerade detection
  publication-title: Machine Vision and Applications
  doi: 10.1007/s00138-018-0957-4
– volume: 227
  start-page: 25
  issue: 1
  year: 2004
  ident: 10.1016/j.eswa.2022.118745_b31
  article-title: Positional entropy during pigeon homing II: navigational interpretation of Bayesian latent state models
  publication-title: Journal of Theoretical Biology
  doi: 10.1016/j.jtbi.2003.07.003
– volume: 10
  start-page: 33301
  year: 2022
  ident: 10.1016/j.eswa.2022.118745_b28
  article-title: A novel feature selection method with neighborhood rough set and improved particle swarm optimization
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3162074
– volume: 50
  year: 2020
  ident: 10.1016/j.eswa.2022.118745_b29
  article-title: Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2019.102419
– volume: 8
  start-page: 56847
  year: 2020
  ident: 10.1016/j.eswa.2022.118745_b68
  article-title: A novel feature selection method using whale optimization algorithm and genetic operators for intrusion detection system in wireless mesh network
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2978035
– volume: 62
  start-page: 1
  issue: 7
  year: 2019
  ident: 10.1016/j.eswa.2022.118745_b23
  article-title: A hybrid quantum-based PIO algorithm for global numerical optimization
  publication-title: Science China. Information Sciences
  doi: 10.1007/s11432-018-9546-4
– volume: 43
  start-page: 223
  issue: 1
  year: 1989
  ident: 10.1016/j.eswa.2022.118745_b62
  article-title: Analyzing tables of statistical tests
  publication-title: Evolution
  doi: 10.1111/j.1558-5646.1989.tb04220.x
– year: 2022
  ident: 10.1016/j.eswa.2022.118745_b15
  article-title: A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2022.102725
– ident: 10.1016/j.eswa.2022.118745_b24
  doi: 10.1145/3338840.3355641
– year: 2021
  ident: 10.1016/j.eswa.2022.118745_b11
  article-title: A framework for feature selection through boosting
  publication-title: Expert Systems with Applications
– volume: 19
  start-page: 325
  year: 2016
  ident: 10.1016/j.eswa.2022.118745_b34
  article-title: A feature selection approach to find optimal feature subsets for the network intrusion detection system
  publication-title: Cluster Computing
  doi: 10.1007/s10586-015-0527-8
– start-page: 463
  year: 2019
  ident: 10.1016/j.eswa.2022.118745_b56
  article-title: Comparison of network intrusion detection performance using feature representation
– volume: 9
  start-page: 173
  issue: 1
  year: 2020
  ident: 10.1016/j.eswa.2022.118745_b38
  article-title: Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine
  publication-title: Electronics
  doi: 10.3390/electronics9010173
– year: 2014
  ident: 10.1016/j.eswa.2022.118745_b26
  article-title: Pigeon-inspired optimization: a new swarm intelligence optimizer for air robot path planning
  publication-title: International Journal of Intelligent Computing and Cybernetics
  doi: 10.1108/IJICC-02-2014-0005
– volume: 164
  year: 2021
  ident: 10.1016/j.eswa.2022.118745_b73
  article-title: A feature selection algorithm of decision tree based on feature weight
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2020.113842
– volume: 42
  start-page: 2670
  year: 2015
  ident: 10.1016/j.eswa.2022.118745_b27
  article-title: A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2014.11.009
– volume: 15
  start-page: 111
  issue: 2
  year: 2020
  ident: 10.1016/j.eswa.2022.118745_b10
  article-title: Fog computing: survey on decoy information technology
  publication-title: International Journal of Security and Networks
  doi: 10.1504/IJSN.2020.106833
– year: 2021
  ident: 10.1016/j.eswa.2022.118745_b7
  article-title: Lightweight intelligent network intrusion detection system using OCSVM and pigeon inspired optimizer
  publication-title: Applied Intelligence: The International Journal of Artificial Intelligence, Neural Networks, and Complex Problem-Solving Technologies
– volume: 12
  start-page: 302
  issue: 3
  year: 2020
  ident: 10.1016/j.eswa.2022.118745_b14
  article-title: Anonymous authentication protocols for IoT based-healthcare systems: A survey
  publication-title: International Journal of Communication Networks and Information Security
– start-page: 770
  year: 2021
  ident: 10.1016/j.eswa.2022.118745_b22
  article-title: Selection of tree based ensemble classifier for detecting network attacks in IoT
– volume: 12
  start-page: 79
  issue: 1
  year: 2021
  ident: 10.1016/j.eswa.2022.118745_b57
  article-title: Evaluation of feature learning for anomaly detection in network traffic
  publication-title: Evolving Systems
  doi: 10.1007/s12530-020-09342-5
– start-page: 1
  year: 2021
  ident: 10.1016/j.eswa.2022.118745_b30
  article-title: IoT security in healthcare using AI: A survey
– volume: 148
  year: 2020
  ident: 10.1016/j.eswa.2022.118745_b6
  article-title: A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2020.113249
– volume: 65
  start-page: 2986
  issue: 10
  year: 2016
  ident: 10.1016/j.eswa.2022.118745_b13
  article-title: Building an intrusion detection system using a filter-based feature selection algorithm
  publication-title: IEEE Transactions on Computers
  doi: 10.1109/TC.2016.2519914
– volume: 100
  start-page: 779
  year: 2019
  ident: 10.1016/j.eswa.2022.118745_b42
  article-title: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2019.05.041
– volume: 22
  start-page: 1396
  issue: 4
  year: 2022
  ident: 10.1016/j.eswa.2022.118745_b36
  article-title: An effective feature selection model using hybrid metaheuristic algorithms for iot intrusion detection
  publication-title: Sensors
  doi: 10.3390/s22041396
– year: 2020
  ident: 10.1016/j.eswa.2022.118745_b63
  article-title: Deep belief network based intrusion detection techniques: A survey
  publication-title: Expert Systems with Applications
– volume: 7
  start-page: 94497
  year: 2019
  ident: 10.1016/j.eswa.2022.118745_b65
  article-title: TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2928048
– volume: 11
  start-page: 2414
  issue: 3
  year: 2021
  ident: 10.1016/j.eswa.2022.118745_b12
  article-title: Hybrid feature selection method based on particle swarm optimization and adaptive local search method
  publication-title: International Journal of Electrical and Computer Engineering (IJECE)
  doi: 10.11591/ijece.v11i3.pp2414-2422
– volume: 8
  start-page: 4203
  year: 2015
  ident: 10.1016/j.eswa.2022.118745_b55
  article-title: Local outlier factor use for the network flow anomalydetection
  publication-title: Security and Communication Networks
  doi: 10.1002/sec.1335
– start-page: 163
  year: 1998
  ident: 10.1016/j.eswa.2022.118745_b44
  article-title: The 1998 DARPA/AFRL off-line intrusion detection evaluation
– year: 2013
  ident: 10.1016/j.eswa.2022.118745_b16
– start-page: 64
  year: 2020
  ident: 10.1016/j.eswa.2022.118745_b39
  article-title: Anomaly detection based on GS-OCSVM classification
– volume: 7
  start-page: 80588
  year: 2019
  ident: 10.1016/j.eswa.2022.118745_b70
  article-title: A feature selection method based on hybrid improved binary quantum particle swarm optimization
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2919956
– volume: 17
  start-page: 9347
  issue: 24
  year: 2020
  ident: 10.1016/j.eswa.2022.118745_b60
  article-title: Cyberattacks detection in iot-based smart city applications using machine learning techniques
  publication-title: International Journal of Environmental Research and Public Health
  doi: 10.3390/ijerph17249347
– start-page: 1
  year: 2009
  ident: 10.1016/j.eswa.2022.118745_b66
  article-title: A detailed analysis of the KDD CUP 99 data set
– volume: 30
  start-page: 15
  year: 2016
  ident: 10.1016/j.eswa.2022.118745_b48
  article-title: Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2016.04.002
– volume: 24
  start-page: 123
  issue: 2
  year: 1996
  ident: 10.1016/j.eswa.2022.118745_b18
  article-title: Bagging predictors
  publication-title: Machine Learning
  doi: 10.1023/A:1018054314350
– volume: 17
  start-page: 17
  issue: 3
  year: 2015
  ident: 10.1016/j.eswa.2022.118745_b49
  article-title: The cyberspace: Redefining a new world
  publication-title: IOSR Journal of Computer Engineering (IOSR-JCE)
– volume: 30
  start-page: 1
  issue: 3
  year: 2022
  ident: 10.1016/j.eswa.2022.118745_b53
  article-title: A feature selection based on the farmland fertility algorithm for improved intrusion detection systems
  publication-title: Journal of Network and Systems Management
  doi: 10.1007/s10922-022-09653-9
– volume: 187
  year: 2022
  ident: 10.1016/j.eswa.2022.118745_b72
  article-title: Anomaly detection based on a granular Markov model
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2021.115744
– volume: 140
  year: 2020
  ident: 10.1016/j.eswa.2022.118745_b71
  article-title: Recognizing multivariate geochemical anomalies for mineral exploration by combining deep learning and one-class support vector machine
  publication-title: Computers & Geosciences
  doi: 10.1016/j.cageo.2020.104484
– volume: 168
  year: 2021
  ident: 10.1016/j.eswa.2022.118745_b25
  article-title: Evaluation of feature selection methods based on artificial neural network weights
  publication-title: Expert Systems with Applications
– volume: 2
  start-page: 1848
  issue: 12
  year: 2013
  ident: 10.1016/j.eswa.2022.118745_b61
  article-title: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection
  publication-title: International Journal of Engineering Research & Technology (IJERT)
– year: 2020
  ident: 10.1016/j.eswa.2022.118745_b40
SSID ssj0017007
Score 2.6169853
SourceID crossref
SourceType Enrichment Source
Index Database
StartPage 118745
Title An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning
Volume 213
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  issn: 0957-4174
  databaseCode: GBLVA
  dateStart: 20110101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0017007
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier ScienceDirect
  issn: 0957-4174
  databaseCode: .~1
  dateStart: 19950101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0017007
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection [SCCMFC]
  issn: 0957-4174
  databaseCode: ACRLP
  dateStart: 19950101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0017007
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals [SCFCJ] - NZ
  issn: 0957-4174
  databaseCode: AIKHN
  dateStart: 19950101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0017007
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  issn: 0957-4174
  databaseCode: AKRWK
  dateStart: 19900101
  customDbUrl:
  isFulltext: true
  mediaType: online
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017007
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9swDBay7rLL3sO6F3jYzXBQy88cjWFDO2DLDinWm2FZcrIicbbUaYEedt7PHmnKits9sA4BjMSRBcH8RFEU-VGI1wrFSvVPfKUD7UdBXfklcRHWJU6mNMaxB5Qo_OFjcngcvT-JT0ajH4OopW2rxtXlb_NK_keqeA_lSlmyN5Cs6xRv4HeUL15Rwnj9JxnnDWU5btbnaDV-Opp6teloOr2zrrhNF2i8nK9x-79YdeGER-uZ13DcN_FEbLbkKvO0aW1rpnX2aGXTdIqAW1yzotQqW1tifsWPTyTJrX2mT5IbHIfvDpa2Xr6cL8qGsTfFzblyfy5XqFC-aMPa77PhMjbs9EFBmgUnFC3c6pHrC_bZTlflZuizkOEuaMs5H1MEBtfn6fWwDMKBJqUy6Ew0-YuSZ3_D6dicXRBzlJTjXeOrjNrXVjoXf9iHtp0W1EdBfRTcxy1xW-L6QEVAxt9dsBCRGKbM2sjjtulXHCl4fRwDE2dgq8zui7t2kwE5I-aBGJnmobjXF_AAq88fiW95Az2AAAEEFkDgAAQOQIAAAgQQWACBAxA4AAGDAToAAf7uAQQ9gB6L43dvZ28OfVuDw69klLZ-lU1kVqKmTvRBrWI9kQqnsqwzI8lWrU1Wa5zlQZqkUqooCXWsY5WlaNeXaHsfhE_EXrNuzFMBRAwUhyo0ldRRWCUl7e07G9JM8GP2RdC_tqKyBPVUJ2VZ_Flc-8Jzz3xlepa_tH52o9bPxZ0ddl-IPXyp5iVaoK161YHjJ_giiqw
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+improved+PIO+feature+selection+algorithm+for+IoT+network+intrusion+detection+system+based+on+ensemble+learning&rft.jtitle=Expert+systems+with+applications&rft.au=Abu+Alghanam%2C+Orieb&rft.au=Almobaideen%2C+Wesam&rft.au=Saadeh%2C+Maha&rft.au=Adwan%2C+Omar&rft.date=2023-03-01&rft.issn=0957-4174&rft.volume=213&rft.spage=118745&rft_id=info:doi/10.1016%2Fj.eswa.2022.118745&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_eswa_2022_118745
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0957-4174&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0957-4174&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0957-4174&client=summon