iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.7717/PEERJ-CS.1405
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T21:58:56Z","timestamp":1726351136531},"reference-count":127,"publisher":"PeerJ","license":[{"start":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T00:00:00Z","timestamp":1688083200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004515","name":"Universiti Kebangsaan Malaysia","doi-asserted-by":"crossref","award":["GUP-2022-060"],"id":[{"id":"10.13039\/501100004515","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"An ever increasing number of electronic devices integrated into the Internet of Things (IoT) generates vast amounts of data, which gets transported via<\/jats:italic> network and stored for further analysis. However, besides the undisputed advantages of this technology, it also brings risks of unauthorized access and data compromise, situations where machine learning (ML) and artificial intelligence (AI) can help with detection of potential threats, intrusions and automation of the diagnostic process. The effectiveness of the applied algorithms largely depends on the previously performed optimization, i.e<\/jats:italic>., predetermined values of hyperparameters and training conducted to achieve the desired result. Therefore, to address very important issue of IoT security, this article proposes an AI framework based on the simple convolutional neural network (CNN) and extreme machine learning machine (ELM) tuned by modified sine cosine algorithm (SCA). Not withstanding that many methods for addressing security issues have been developed, there is always a possibility for further improvements and proposed research tried to fill in this gap. The introduced framework was evaluated on two ToN IoT intrusion detection datasets, that consist of the network traffic data generated in Windows 7 and Windows 10 environments. The analysis of the results suggests that the proposed model achieved superior level of classification performance for the observed datasets. Additionally, besides conducting rigid statistical tests, best derived model is interpreted by SHapley Additive exPlanations (SHAP) analysis and results findings can be used by security experts to further enhance security of IoT systems.<\/jats:p>","DOI":"10.7717\/peerj-cs.1405","type":"journal-article","created":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T07:28:51Z","timestamp":1688110131000},"page":"e1405","source":"Crossref","is-referenced-by-count":20,"title":["Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach"],"prefix":"10.7717","volume":"9","author":[{"given":"Milos","family":"Dobrojevic","sequence":"first","affiliation":[{"name":"Informatics and Computing, Singidunum University, Belgrade, Serbia"}]},{"given":"Miodrag","family":"Zivkovic","sequence":"additional","affiliation":[{"name":"Informatics and Computing, Singidunum University, Belgrade, Serbia"}]},{"given":"Amit","family":"Chhabra","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering & Technology, Guru Nanak Dev University, Amritsar, India"}]},{"given":"Nor Samsiah","family":"Sani","sequence":"additional","affiliation":[{"name":"Center for Artificial Intelligence Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2062-924X","authenticated-orcid":true,"given":"Nebojsa","family":"Bacanin","sequence":"additional","affiliation":[{"name":"Informatics and Computing, Singidunum University, Belgrade, Serbia"}]},{"given":"Maifuza","family":"Mohd Amin","sequence":"additional","affiliation":[{"name":"Center for Artificial Intelligence Technology, Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia"}]}],"member":"4443","published-online":{"date-parts":[[2023,6,30]]},"reference":[{"issue":"3","key":"10.7717\/peerj-cs.1405\/ref-1","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s43154-021-00063-4","article-title":"Aerial swarms: recent applications and challenges","volume":"2","author":"Abdelkader","year":"2021","journal-title":"Current Robotics Reports"},{"issue":"8","key":"10.7717\/peerj-cs.1405\/ref-2","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0255312","article-title":"A clustering approach to identify multidimensional poverty indicators for the bottom 40 percent group","volume":"16","author":"Abdul Rahman","year":"2021","journal-title":"PLOS ONE"},{"issue":"8","key":"10.7717\/peerj-cs.1405\/ref-3","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.3390\/sym13081377","article-title":"IoT botnet detection using salp swarm and ant lion hybrid optimization model","volume":"13","author":"Abu Khurma","year":"2021","journal-title":"Symmetry"},{"key":"10.7717\/peerj-cs.1405\/ref-4","doi-asserted-by":"publisher","first-page":"116158","DOI":"10.1016\/j.eswa.2021.116158","article-title":"Reptile search algorithm (RSA): a nature-inspired meta-heuristic optimizer","volume":"191","author":"Abualigah","year":"2022","journal-title":"Expert Systems with Applications"},{"key":"10.7717\/peerj-cs.1405\/ref-5","doi-asserted-by":"publisher","first-page":"113609","DOI":"10.1016\/j.cma.2020.113609","article-title":"The arithmetic optimization algorithm","volume":"376","author":"Abualigah","year":"2021","journal-title":"Computer Methods in Applied Mechanics and Engineering"},{"issue":"1","key":"10.7717\/peerj-cs.1405\/ref-6","doi-asserted-by":"publisher","first-page":"46","DOI":"10.56578\/jimd010106","article-title":"Hybrid neural network prediction for time series analysis of COVID-19 cases in Nigeria","volume":"1","author":"Adedotun","year":"2022","journal-title":"Journal of Intelligent Management Decision"},{"issue":"2","key":"10.7717\/peerj-cs.1405\/ref-7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.promfg.2020.02.018","article-title":"Propulsion monitoring system for digitized ship management: preliminary results from a case study","volume":"42","author":"Aiello","year":"2020","journal-title":"Procedia Manufacturing"},{"issue":"8","key":"10.7717\/peerj-cs.1405\/ref-8","doi-asserted-by":"publisher","first-page":"1796","DOI":"10.1109\/TCYB.2015.2490802","article-title":"Data randomization and cluster-based partitioning for botnet intrusion detection","volume":"46","author":"Al-Jarrah","year":"2016","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"3","key":"10.7717\/peerj-cs.1405\/ref-9","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jocs.2017.03.006","article-title":"Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model","volume":"25","author":"Aljawarneh","year":"2018","journal-title":"Journal of Computational Science"},{"issue":"8","key":"10.7717\/peerj-cs.1405\/ref-10","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1007\/s13042-017-0642-3","article-title":"Two swarm intelligence approaches for tuning extreme learning machine","volume":"9","author":"Alshamiri","year":"2017","journal-title":"International Journal of Machine Learning and Cybernetics"},{"issue":"12","key":"10.7717\/peerj-cs.1405\/ref-11","doi-asserted-by":"publisher","first-page":"5725","DOI":"10.3390\/app11125725","article-title":"Industry 4.0 technologies for manufacturing sustainability: a systematic review and future research directions","volume":"11","author":"Anbesh","year":"2021","journal-title":"Applied Sciences"},{"issue":"10","key":"10.7717\/peerj-cs.1405\/ref-12","doi-asserted-by":"publisher","first-page":"103041","DOI":"10.1016\/j.scs.2021.103041","article-title":"IoTBoT-IDS: a novel statistical learning-enabled botnet detection framework for protecting networks of smart cities","volume":"72","author":"Ashraf","year":"2021","journal-title":"Sustainable Cities and Society"},{"issue":"13","key":"10.7717\/peerj-cs.1405\/ref-13","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1108\/IJOPM-01-2022-0069","article-title":"Socially responsible operations in the industry 4.0 era: post-COVID-19 technology adoption and perspectives on future research","volume":"42","author":"Asokan","year":"2022","journal-title":"International Journal of Operations & Production Management"},{"key":"10.7717\/peerj-cs.1405\/ref-14","article-title":"What is the smart factory? The impact of factory 4.0 on manufacturing","author":"AVSystem","year":"2020"},{"key":"10.7717\/peerj-cs.1405\/ref-15","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1007\/s10586-022-03609-z","article-title":"Energy efficient offloading mechanism using particle swarm optimization in 5G enabled edge nodes","volume":"26","author":"Bacanin","year":"2022","journal-title":"Cluster Computing"},{"issue":"10","key":"10.7717\/peerj-cs.1405\/ref-16","doi-asserted-by":"publisher","first-page":"106639","DOI":"10.1016\/j.compstruc.2021.106639","article-title":"A new comprehensive model of damage for flexural subassemblies prone to fatigue","volume":"256","author":"Bai","year":"2021","journal-title":"Computers & Structures"},{"key":"10.7717\/peerj-cs.1405\/ref-17","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/978-981-15-7106-0_16","article-title":"Enhanced flower pollination algorithm for task scheduling in cloud computing environment","volume-title":"Machine Learning for Predictive Analysis","author":"Bezdan","year":"2021"},{"key":"10.7717\/peerj-cs.1405\/ref-18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/B978-008043152-9.02201-6","article-title":"Neural networks in materials science","volume-title":"Encyclopedia of Materials: Science and Technology","author":"Bhadeshia","year":"2008"},{"issue":"2","key":"10.7717\/peerj-cs.1405\/ref-19","doi-asserted-by":"publisher","first-page":"128","DOI":"10.56578\/jimd010206","article-title":"Analysis of the impact of artificial intelligence in enhancing the human resource practices","volume":"1","author":"Biliavska","year":"2022","journal-title":"Journal of Intelligent Management Decision"},{"key":"10.7717\/peerj-cs.1405\/ref-20","volume-title":"Comprehensive biomedical physics","author":"Brahme","year":"2014"},{"issue":"10","key":"10.7717\/peerj-cs.1405\/ref-21","doi-asserted-by":"publisher","first-page":"1429","DOI":"10.1016\/j.enbuild.2017.11.045","article-title":"Prediction of wind pressure coefficients on building surfaces using artificial neural networks","volume":"158","author":"Bre","year":"2018","journal-title":"Energy and Buildings"},{"key":"10.7717\/peerj-cs.1405\/ref-22","article-title":"Artificial intelligence in finance","author":"Buchanan","year":"2019"},{"issue":"3","key":"10.7717\/peerj-cs.1405\/ref-23","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/TEVC.2003.810069","article-title":"Chaotic sequences to improve the performance of evolutionary algorithms","volume":"7","author":"Caponetto","year":"2003","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"3","key":"10.7717\/peerj-cs.1405\/ref-24","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.amc.2014.04.039","article-title":"Towards an optimal support vector machine classifier using a parallel particle swarm optimization strategy","volume":"239","author":"Chen","year":"2014","journal-title":"Applied Mathematics and Computation"},{"issue":"6","key":"10.7717\/peerj-cs.1405\/ref-25","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MSP.2022.3198201","article-title":"Rethinking bayesian learning for data analysis: the art of prior and inference in sparsity-aware modeling","volume":"39","author":"Cheng","year":"2022","journal-title":"IEEE Signal Processing Magazine"},{"issue":"1","key":"10.7717\/peerj-cs.1405\/ref-26","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1177\/001316446002000104","article-title":"A coefficient of agreement for nominal scales","volume":"20","author":"Cohen","year":"1960","journal-title":"Educational and Psychological Measurement"},{"key":"10.7717\/peerj-cs.1405\/ref-27","first-page":"4487","article-title":"Generation of a new IDS test dataset: time to retire the KDD collection","author":"Creech","year":"2013"},{"issue":"4","key":"10.7717\/peerj-cs.1405\/ref-28","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.neucom.2014.09.083","article-title":"PCA filtering and probabilistic SOM for network intrusion detection","volume":"164","author":"De La Hoz","year":"2015","journal-title":"Neurocomputing"},{"issue":"7","key":"10.7717\/peerj-cs.1405\/ref-29","doi-asserted-by":"publisher","first-page":"1004","DOI":"10.3390\/electronics11071004","article-title":"IoT as a backbone of intelligent homestead automation","volume":"11","author":"Dobrojevic","year":"2022","journal-title":"Electronics"},{"issue":"10","key":"10.7717\/peerj-cs.1405\/ref-30","doi-asserted-by":"publisher","first-page":"8322","DOI":"10.1109\/TWC.2022.3165588","article-title":"Robust online CSI estimation in a complex environment","volume":"21","author":"Du","year":"2022","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"61","key":"10.7717\/peerj-cs.1405\/ref-31","first-page":"2121","article-title":"Adaptive subgradient methods for online learning and stochastic optimization","volume":"12","author":"Duchi","year":"2011","journal-title":"Journal of Machine Learning Research"},{"issue":"7639","key":"10.7717\/peerj-cs.1405\/ref-32","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1038\/nature21056","article-title":"Dermatologist-level classification of skin cancer with deep neural networks","volume":"542","author":"Esteva","year":"2017","journal-title":"Nature"},{"issue":"06","key":"10.7717\/peerj-cs.1405\/ref-33","doi-asserted-by":"publisher","first-page":"1650033","DOI":"10.1142\/S0218213016500330","article-title":"Optimizing the learning process of feedforward neural networks using lightning search algorithm","volume":"25","author":"Faris","year":"2016","journal-title":"International Journal on Artificial Intelligence Tools"},{"key":"10.7717\/peerj-cs.1405\/ref-34","first-page":"3","volume-title":"Hyperparameter optimization","author":"Feurer","year":"2019"},{"key":"10.7717\/peerj-cs.1405\/ref-35","article-title":"Host-based intrusion detection using user signatures","author":"Freeman","year":"2002"},{"issue":"4","key":"10.7717\/peerj-cs.1405\/ref-36","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/BF00344251","article-title":"Neocognitron: a self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position","volume":"36","author":"Fukushima","year":"1980","journal-title":"Biological Cybernetics"},{"issue":"7","key":"10.7717\/peerj-cs.1405\/ref-37","doi-asserted-by":"publisher","first-page":"5469","DOI":"10.1007\/s10462-021-10026-y","article-title":"A comprehensive survey of sine cosine algorithm: variants and applications","volume":"54","author":"Gabis","year":"2021","journal-title":"Artificial Intelligence Review"},{"issue":"4","key":"10.7717\/peerj-cs.1405\/ref-38","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1148\/87.4.613","article-title":"Breast cancer with microcalcifications: diagnostic difficulties","volume":"87","author":"Gershon-Cohen","year":"1966","journal-title":"Radiology"},{"issue":"3","key":"10.7717\/peerj-cs.1405\/ref-39","doi-asserted-by":"publisher","first-page":"187","DOI":"10.3102\/00028312003003187","article-title":"Testing homogeneity of variances","volume":"3","author":"Glass","year":"1966","journal-title":"American Educational Research Journal"},{"issue":"6","key":"10.7717\/peerj-cs.1405\/ref-40","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.jnca.2017.03.018","article-title":"Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling","volume":"87","author":"Haider","year":"2017","journal-title":"Journal of Network and Computer Applications"},{"key":"10.7717\/peerj-cs.1405\/ref-41","article-title":"State of IoT 2022: number of connected IoT devices growing 18% to 14.4 billion globally","author":"Hasan","year":"2022"},{"key":"10.7717\/peerj-cs.1405\/ref-42","first-page":"188","article-title":"Shortening the local food supply chain management in Indonesia based on IoT (Internet of Thing)","author":"Herawati","year":"2021"},{"issue":"1","key":"10.7717\/peerj-cs.1405\/ref-43","article-title":"Diabetic neuropathy: new perspectives on early diagnosis and treatments","volume":"1","author":"Hopek","year":"2020","journal-title":"Journal of Current Diabetes Reports"},{"issue":"2","key":"10.7717\/peerj-cs.1405\/ref-44","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1021\/ci500540s","article-title":"Calculation of substructural analysis weights using a genetic algorithm","volume":"55","author":"Holliday","year":"2015","journal-title":"Journal of Chemical Information and Modeling"},{"issue":"4","key":"10.7717\/peerj-cs.1405\/ref-45","doi-asserted-by":"publisher","first-page":"S10","DOI":"10.1186\/bcr2739","article-title":"The emerging breast cancer epidemic: early diagnosis and treatment","volume":"12","author":"Howell","year":"2010","journal-title":"Breast Cancer Research"},{"key":"10.7717\/peerj-cs.1405\/ref-46","doi-asserted-by":"crossref","DOI":"10.1002\/9781118445112.stat05929","article-title":"Paired t test","volume-title":"Wiley StatsRef: statistics reference online","author":"Hsu","year":"2014"},{"issue":"3\u20134","key":"10.7717\/peerj-cs.1405\/ref-47","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.neucom.2013.09.027","article-title":"Nonadditive similarity-based single-layer perceptron for multi-criteria collaborative filtering","volume":"129","author":"Hu","year":"2014","journal-title":"Neurocomputing"},{"issue":"6","key":"10.7717\/peerj-cs.1405\/ref-48","doi-asserted-by":"publisher","first-page":"1936","DOI":"10.1109\/TRO.2021.3071615","article-title":"A decentralized cluster formation containment framework for multirobot systems","volume":"37","author":"Hu","year":"2021","journal-title":"IEEE Transactions on Robotics"},{"issue":"4","key":"10.7717\/peerj-cs.1405\/ref-49","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.dsx.2020.04.032","article-title":"Industry 4.0 technologies and their applications in fighting COVID-19 pandemic","volume":"14","author":"Javaid","year":"2020","journal-title":"Diabetes & Metabolic Syndrome: Clinical Research & Reviews"},{"key":"10.7717\/peerj-cs.1405\/ref-50","doi-asserted-by":"publisher","first-page":"012049","DOI":"10.1088\/1742-6596\/1000\/1\/012049","article-title":"A survey on anomaly based host intrusion detection system","volume":"1000","author":"Jose","year":"2018","journal-title":"Journal of Physics: Conference Series"},{"issue":"13","key":"10.7717\/peerj-cs.1405\/ref-51","doi-asserted-by":"publisher","first-page":"2272","DOI":"10.3390\/math10132272","article-title":"Tuning machine learning models using a group search firefly algorithm for credit card fraud detection","volume":"10","author":"Jovanovic","year":"2022a","journal-title":"Mathematics"},{"key":"10.7717\/peerj-cs.1405\/ref-52","doi-asserted-by":"publisher","article-title":"Machine learning tuning by diversity oriented firefly metaheuristics for industry 4.0","author":"Jovanovic","year":"2022b","DOI":"10.1111\/exsy.13293"},{"issue":"3","key":"10.7717\/peerj-cs.1405\/ref-53","doi-asserted-by":"publisher","first-page":"6915","DOI":"10.4249\/scholarpedia.6915","article-title":"Artificial bee colony algorithm","volume":"5","author":"Karaboga","year":"2010","journal-title":"Scholarpedia"},{"issue":"1","key":"10.7717\/peerj-cs.1405\/ref-54","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1016\/j.asoc.2007.05.007","article-title":"On the performance of artificial bee colony (ABC) algorithm","volume":"8","author":"Karaboga","year":"2008","journal-title":"Applied Soft Computing"},{"issue":"4","key":"10.7717\/peerj-cs.1405\/ref-55","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.3390\/s22041396","article-title":"An effective feature selection model using hybrid metaheuristic algorithms for IoT intrusion detection","volume":"22","author":"Kareem","year":"2022","journal-title":"Sensors"},{"issue":"45","key":"10.7717\/peerj-cs.1405\/ref-56","first-page":"501","article-title":"ANN models optimized using swarm intelligence algorithms","volume":"13","author":"Kayarvizhy","year":"2014","journal-title":"WSEAS Transactions on Computers"},{"issue":"1","key":"10.7717\/peerj-cs.1405\/ref-57","doi-asserted-by":"publisher","first-page":"14122","DOI":"10.1038\/s41598-022-18257-x","article-title":"CNN-XGBoost fusion-based affective state recognition using EEG spectrogram image analysis","volume":"12","author":"Khan","year":"2022","journal-title":"Scientific Reports"},{"issue":"1","key":"10.7717\/peerj-cs.1405\/ref-58","doi-asserted-by":"publisher","first-page":"113338","DOI":"10.1016\/j.eswa.2020.113338","article-title":"Chimp optimization algorithm","volume":"149","author":"Khishe","year":"2020","journal-title":"Expert Systems with Applications"},{"key":"10.7717\/peerj-cs.1405\/ref-59","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1412.6980","article-title":"Adam: a method for stochastic optimization","author":"Kingma","year":"2015","journal-title":"CoRR"},{"issue":"7","key":"10.7717\/peerj-cs.1405\/ref-60","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Future Generation Computer Systems"},{"issue":"9","key":"10.7717\/peerj-cs.1405\/ref-61","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.3390\/app8091613","article-title":"An ant-lion optimizer-trained artificial neural network system for chaotic electroencephalogram (EEG) prediction","volume":"8","author":"Kose","year":"2018","journal-title":"Applied Sciences"},{"issue":"2","key":"10.7717\/peerj-cs.1405\/ref-62","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1038\/nbt1386","article-title":"What are artificial neural networks?","volume":"26","author":"Krogh","year":"2008","journal-title":"Nature Biotechnology"},{"issue":"3","key":"10.7717\/peerj-cs.1405\/ref-63","doi-asserted-by":"publisher","first-page":"100973","DOI":"10.1016\/j.swevo.2021.100973","article-title":"A prescription of methodological guidelines for comparing bio-inspired optimization algorithms","volume":"67","author":"LaTorre","year":"2021","journal-title":"Swarm and Evolutionary Computation"},{"key":"10.7717\/peerj-cs.1405\/ref-64","doi-asserted-by":"publisher","first-page":"106343","DOI":"10.1016\/j.ipl.2022.106343","article-title":"Bicriteria scheduling on an unbounded parallel-batch machine for minimizing makespan and maximum cost","volume":"180","author":"Li","year":"2023","journal-title":"Information Processing Letters"},{"issue":"1","key":"10.7717\/peerj-cs.1405\/ref-65","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1142\/S0129065706000482","article-title":"Classification of mental tasks from EEG signals using extreme learning machine","volume":"16","author":"Liang","year":"2006","journal-title":"International Journal of Neural Systems"},{"key":"10.7717\/peerj-cs.1405\/ref-66","first-page":"12","article-title":"Evaluating intrusion detection systems: the 1998 darpa off-line intrusion detection evaluation","volume":"2","author":"Lippmann","year":"2000"},{"issue":"3","key":"10.7717\/peerj-cs.1405\/ref-67","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1007\/s10460-022-10298-2","article-title":"Agroecological producers shortening food chains during Covid-19: opportunities and challenges in costa rica","volume":"39","author":"Little","year":"2022","journal-title":"Agriculture and Human Values"},{"issue":"4","key":"10.7717\/peerj-cs.1405\/ref-68","doi-asserted-by":"publisher","first-page":"114369","DOI":"10.1016\/j.eswa.2020.114369","article-title":"Chaos-assisted multi-population salp swarm algorithms: framework and case studies","volume":"168","author":"Liu","year":"2021","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"10.7717\/peerj-cs.1405\/ref-69","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.neucom.2013.04.038","article-title":"Effects-based feature identification for network intrusion detection","volume":"121","author":"Louvieris","year":"2013","journal-title":"Advances in Artificial Neural Networks and Machine Learning"},{"key":"10.7717\/peerj-cs.1405\/ref-70","article-title":"A unified approach to interpreting model predictions","volume-title":"Advances in Neural Information Processing Systems","volume":"30","author":"Lundberg","year":"2017"},{"issue":"5","key":"10.7717\/peerj-cs.1405\/ref-71","doi-asserted-by":"publisher","first-page":"164","DOI":"10.4236\/jcc.2015.35021","article-title":"Internet of Things (IoT): a literature review","volume":"3","author":"Madakam","year":"2015","journal-title":"Journal of Computer and Communications"},{"issue":"23","key":"10.7717\/peerj-cs.1405\/ref-72","doi-asserted-by":"publisher","first-page":"11512","DOI":"10.3390\/app112311512","article-title":"Supply chain management and big data concept effects on economic sustainability of building design and project planning","volume":"11","author":"Mandi\u010d\u00e1k","year":"2021","journal-title":"Applied Sciences"},{"issue":"5\u20136","key":"10.7717\/peerj-cs.1405\/ref-73","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1016\/S0893-6080(03)00115-1","article-title":"Subject independent facial expression recognition with robust face detection using a convolutional neural network","volume":"16","author":"Matsugu","year":"2003","journal-title":"Neural Networks"},{"issue":"3","key":"10.7717\/peerj-cs.1405\/ref-74","doi-asserted-by":"publisher","first-page":"276","DOI":"10.11613\/BM.2012.031","article-title":"Interrater reliability: the kappa statistic","volume":"22","author":"McHugh","year":"2012","journal-title":"Biochemia Medica"},{"issue":"63","key":"10.7717\/peerj-cs.1405\/ref-75","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.knosys.2015.12.022","article-title":"SCA: a sine cosine algorithm for solving optimization problems","volume":"96","author":"Mirjalili","year":"2016","journal-title":"Knowledge-Based Systems"},{"issue":"12","key":"10.7717\/peerj-cs.1405\/ref-76","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","article-title":"The whale optimization algorithm","volume":"95","author":"Mirjalili","year":"2016","journal-title":"Advances in Engineering Software"},{"key":"10.7717\/peerj-cs.1405\/ref-77","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","article-title":"Grey wolf optimizer","volume":"69","author":"Mirjalili","year":"2014","journal-title":"Advances in Engineering Software"},{"issue":"19","key":"10.7717\/peerj-cs.1405\/ref-78","doi-asserted-by":"crossref","first-page":"9467","DOI":"10.3390\/app12199467","article-title":"Clustering analysis for classifying student academic performance in higher education","volume":"12","author":"Mohamed Nafuri","year":"2022","journal-title":"Applied Sciences"},{"issue":"8","key":"10.7717\/peerj-cs.1405\/ref-79","doi-asserted-by":"publisher","first-page":"1975","DOI":"10.1109\/TIFS.2018.2890808","article-title":"Outlier dirichlet mixture mechanism: adversarial statistical learning for anomaly detection in the fog","volume":"14","author":"Moustafa","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.7717\/peerj-cs.1405\/ref-80","first-page":"848","article-title":"Federated TON_IoT windows datasets for evaluating AI-based security applications","author":"Moustafa","year":"2020"},{"key":"10.7717\/peerj-cs.1405\/ref-81","first-page":"1","article-title":"UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)","author":"Moustafa","year":"2015"},{"issue":"8","key":"10.7717\/peerj-cs.1405\/ref-82","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1108\/JMTM-01-2018-0008","article-title":"Business model innovation in small- and medium-sized enterprises","volume":"30","author":"M\u00fcller","year":"2019","journal-title":"Journal of Manufacturing Technology Management"},{"issue":"2","key":"10.7717\/peerj-cs.1405\/ref-83","doi-asserted-by":"crossref","first-page":"1783","DOI":"10.32604\/cmc.2021.018593","article-title":"Optimization of sentiment analysis using teaching-learning based algorithm","volume":"69","author":"Muhammad","year":"2021","journal-title":"Computers, Materials & Continua"},{"key":"10.7717\/peerj-cs.1405\/ref-84","article-title":"The history of computers these breakthroughs in mathematics and science led to the computing age","author":"Nguyen","year":"2019"},{"key":"10.7717\/peerj-cs.1405\/ref-85","first-page":"5453","article-title":"A network traffic anomaly detection method based on CNN and XGBoost","author":"Niu","year":"2020"},{"issue":"November (11)","key":"10.7717\/peerj-cs.1405\/ref-86","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.engappai.2017.01.013","article-title":"Metaheuristic design of feedforward neural networks: a review of two decades of research","volume":"60","author":"Ojha","year":"2017","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"19","key":"10.7717\/peerj-cs.1405\/ref-87","doi-asserted-by":"publisher","first-page":"10704","DOI":"10.3390\/su131910704","article-title":"Comparative traffic flow prediction of a heuristic ANN model and a hybrid ANN-PSO model in the traffic flow modelling of vehicles at a four-way signalized road intersection","volume":"13","author":"Olayode","year":"2021","journal-title":"Sustainability"},{"issue":"1","key":"10.7717\/peerj-cs.1405\/ref-88","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s10845-018-1433-8","article-title":"Literature review of industry 4.0 and related technologies","volume":"31","author":"Oztemel","year":"2020","journal-title":"Journal of Intelligent Manufacturing"},{"key":"10.7717\/peerj-cs.1405\/ref-89","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3042874","article-title":"Industrial artificial intelligence in industry 4.0\u2014systematic review, challenges and outlook","volume":"8","author":"Peres","year":"2020","journal-title":"IEEE Access"},{"key":"10.7717\/peerj-cs.1405\/ref-90","article-title":"US military employs neural networks to figure out interference in photons for quantum communications","author":"Quach","year":"2021"},{"key":"10.7717\/peerj-cs.1405\/ref-91","doi-asserted-by":"publisher","first-page":"108120","DOI":"10.1016\/j.knosys.2022.108120","article-title":"TBSM: a traffic burst-sensitive model for short-term prediction under special events","volume":"240","author":"Ren","year":"2022","journal-title":"Knowledge-Based Systems"},{"issue":"3","key":"10.7717\/peerj-cs.1405\/ref-92","doi-asserted-by":"publisher","first-page":"413","DOI":"10.3390\/ai2030026","article-title":"A deep learning enabled multi-class plant disease detection model based on computer vision","volume":"2","author":"Roy","year":"2021","journal-title":"AI"},{"issue":"2","key":"10.7717\/peerj-cs.1405\/ref-93","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.icte.2021.05.004","article-title":"A review on fog computing: architecture, fog with IoT, algorithms and research challenges","volume":"7","author":"Sabireen","year":"2021","journal-title":"ICT Express"},{"issue":"3","key":"10.7717\/peerj-cs.1405\/ref-94","first-page":"823","article-title":"Ant colony optimization algorithm","volume":"4","author":"Salami","year":"2009","journal-title":"UbiCC Journal"},{"issue":"11","key":"10.7717\/peerj-cs.1405\/ref-95","doi-asserted-by":"crossref","DOI":"10.14569\/IJACSA.2020.0111120","article-title":"Ensemble learning for rainfall prediction.936","volume":"11","author":"Sani","year":"2020","journal-title":"International Journal of Advanced Computer Science and Applications"},{"issue":"337","key":"10.7717\/peerj-cs.1405\/ref-96","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1080\/01621459.1972.10481232","article-title":"An approximate analysis of variance test for normality","volume":"67","author":"Shapiro","year":"1972","journal-title":"Journal of the American statistical Association"},{"key":"10.7717\/peerj-cs.1405\/ref-97","article-title":"Correcting the IoT history","author":"Sharma","year":"2017"},{"issue":"6","key":"10.7717\/peerj-cs.1405\/ref-98","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1093\/bib\/bbab297","article-title":"DeepFeature: feature selection in nonimage data using convolutional neural network","volume":"22","author":"Sharma","year":"2021","journal-title":"Briefings in Bioinformatics"},{"key":"10.7717\/peerj-cs.1405\/ref-99","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1016\/j.procir.2016.01.129","article-title":"Opportunities of sustainable manufacturing in industry 4.0","volume":"40","author":"Stock","year":"2016","journal-title":"Procedia CIRP"},{"key":"10.7717\/peerj-cs.1405\/ref-100","doi-asserted-by":"crossref","article-title":"Your botnet is my botnet","author":"Stone-Gross","year":"2009","DOI":"10.1145\/1653662.1653738"},{"key":"10.7717\/peerj-cs.1405\/ref-101","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8890306","article-title":"DL-IDS: extracting features using CNN-LSTM hybrid network for intrusion detection system","volume":"2020","author":"Sun","year":"2020","journal-title":"Security and Communication Networks"},{"key":"10.7717\/peerj-cs.1405\/ref-102","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2952946","article-title":"Classification for remote sensing data with improved CNN-SVM method","volume":"7","author":"Sun","year":"2019","journal-title":"IEEE Access"},{"issue":"1","key":"10.7717\/peerj-cs.1405\/ref-103","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/S0169-7439(97)00061-0","article-title":"Introduction to multi-layer feed-forward neural networks","volume":"39","author":"Svozil","year":"1997","journal-title":"Chemometrics and Intelligent Laboratory Systems"},{"issue":"1","key":"10.7717\/peerj-cs.1405\/ref-104","doi-asserted-by":"publisher","first-page":"80","DOI":"10.7326\/0003-4819-108-1-80","article-title":"Artificial intelligence in medical diagnosis","volume":"108","author":"Szolovits","year":"1988","journal-title":"Annals of Internal Medicine"},{"key":"10.7717\/peerj-cs.1405\/ref-105","article-title":"Collect data with windows performance monitor","author":"Tableau","year":"2020"},{"issue":"2","key":"10.7717\/peerj-cs.1405\/ref-106","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1016\/j.net.2020.04.008","article-title":"ConvXGB: a new deep learning model for classification problems based on CNN and XGBoost","volume":"53","author":"Thongsuwan","year":"2021","journal-title":"Nuclear Engineering and Technology"},{"key":"10.7717\/peerj-cs.1405\/ref-107","article-title":"Number of Internet of Things (IoT) connected devices worldwide from 2019 to 2030, by vertical","author":"Vailshery","year":"2022"},{"issue":"3","key":"10.7717\/peerj-cs.1405\/ref-108","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1016\/j.ifacol.2015.06.139","article-title":"Managing innovative production network of smart factories","volume":"48","author":"Veza","year":"2015","journal-title":"IFAC-PapersOnLine"},{"issue":"17","key":"10.7717\/peerj-cs.1405\/ref-109","doi-asserted-by":"publisher","first-page":"3667","DOI":"10.3390\/s19173667","article-title":"Sensors driven AI-based agriculture recommendation model for assessing land suitability","volume":"19","author":"Vincent","year":"2019","journal-title":"Sensors"},{"issue":"6","key":"10.7717\/peerj-cs.1405\/ref-110","doi-asserted-by":"publisher","first-page":"105946","DOI":"10.1016\/j.asoc.2019.105946","article-title":"Chaotic multi-swarm whale optimizer boosted support vector machine for medical diagnosis","volume":"88","author":"Wang","year":"2020","journal-title":"Applied Soft Computing"},{"key":"10.7717\/peerj-cs.1405\/ref-111","first-page":"1","article-title":"Elephant herding optimization","author":"Wang","year":"2015"},{"issue":"1","key":"10.7717\/peerj-cs.1405\/ref-112","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/4235.585893","article-title":"No free lunch theorems for optimization","volume":"1","author":"Wolpert","year":"1997","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"5","key":"10.7717\/peerj-cs.1405\/ref-113","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1108\/02644401211235834","article-title":"Bat algorithm: a novel approach for global engineering optimization","volume":"29","author":"Yang","year":"2012","journal-title":"Engineering Computations"},{"key":"10.7717\/peerj-cs.1405\/ref-114","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1201\/9780429422614-13","article-title":"Firefly algorithm","volume-title":"Swarm Intelligence Algorithms","author":"Yang","year":"2020"},{"issue":"10","key":"10.7717\/peerj-cs.1405\/ref-115","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1038\/s41551-018-0305-z","article-title":"Artificial intelligence in healthcare","volume":"2","author":"Yu","year":"2018","journal-title":"Nature Biomedical Engineering"},{"key":"10.7717\/peerj-cs.1405\/ref-116","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1212.5701","article-title":"ADADELTA: a adaptive learning rate method","author":"Zeiler","year":"2012","journal-title":"ArXiv"},{"key":"10.7717\/peerj-cs.1405\/ref-117","volume-title":"Simulation neuronaler netze","author":"Zell","year":"2003"},{"issue":"9","key":"10.7717\/peerj-cs.1405\/ref-118","doi-asserted-by":"publisher","first-page":"346","DOI":"10.3390\/info12090346","article-title":"The acceptance of independent autonomous vehicles and cooperative vehicle-highway autonomous vehicles","volume":"12","author":"Zhang","year":"2021","journal-title":"Information"},{"issue":"6","key":"10.7717\/peerj-cs.1405\/ref-119","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0234254","article-title":"Optimizing hyper-parameters of neural networks with swarm intelligence: a novel framework for credit scoring","volume":"15","author":"Zhang","year":"2020","journal-title":"PLOS ONE"},{"key":"10.7717\/peerj-cs.1405\/ref-120","doi-asserted-by":"publisher","first-page":"109766","DOI":"10.1016\/j.petrol.2021.109766","article-title":"Training effective deep reinforcement learning agents for real-time life-cycle production optimization","volume":"208","author":"Zhang","year":"2022","journal-title":"Journal of Petroleum Science and Engineering"},{"issue":"6","key":"10.7717\/peerj-cs.1405\/ref-121","doi-asserted-by":"publisher","first-page":"1922","DOI":"10.1080\/00207543.2020.1824085","article-title":"The applications of industry 4.0 technologies in manufacturing context: a systematic literature review","volume":"59","author":"Zheng","year":"2021","journal-title":"International Journal of Production Research"},{"issue":"3","key":"10.7717\/peerj-cs.1405\/ref-122","doi-asserted-by":"publisher","first-page":"111245","DOI":"10.1016\/j.jss.2022.111245","article-title":"Interpretability application of the just-in-time software defect prediction model","volume":"188","author":"Zheng","year":"2022","journal-title":"Journal of Systems and Software"},{"issue":"8","key":"10.7717\/peerj-cs.1405\/ref-123","doi-asserted-by":"publisher","first-page":"107247","DOI":"10.1016\/j.comnet.2020.107247","article-title":"Building an efficient intrusion detection system based on feature selection and ensemble classifier","volume":"174","author":"Zhou","year":"2020","journal-title":"Computer Networks"},{"key":"10.7717\/peerj-cs.1405\/ref-124","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/978-981-19-0332-8_17","article-title":"Novel harris hawks optimization and deep neural network approach for intrusion detection","volume-title":"Proceedings of International Joint Conference on Advances in Computational Intelligence","author":"Zivkovic","year":"2022a"},{"key":"10.7717\/peerj-cs.1405\/ref-125","first-page":"1176","article-title":"Wireless sensor networks life time optimization based on the improved firefly algorithm","author":"Zivkovic","year":"2020"},{"key":"10.7717\/peerj-cs.1405\/ref-126","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/978-981-16-9605-3_2","article-title":"Feature selection using modified sine cosine algorithm with COVID-19 dataset","volume-title":"Evolutionary Computing and Mobile Sustainable Networks","author":"Zivkovic","year":"2022b"},{"issue":"2","key":"10.7717\/peerj-cs.1405\/ref-127","doi-asserted-by":"publisher","first-page":"e956","DOI":"10.7717\/peerj-cs.956","article-title":"Novel hybrid firefly algorithm: an application to enhance XGBoost tuning for intrusion detection classification","volume":"8","author":"Zivkovic","year":"2022c","journal-title":"PeerJ Computer Science"}],"container-title":["PeerJ Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/peerj.com\/articles\/cs-1405.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-1405.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-1405.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-1405.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T07:29:28Z","timestamp":1688110168000},"score":1,"resource":{"primary":{"URL":"https:\/\/peerj.com\/articles\/cs-1405"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,30]]},"references-count":127,"alternative-id":["10.7717\/peerj-cs.1405"],"URL":"https:\/\/doi.org\/10.7717\/peerj-cs.1405","archive":["CLOCKSS","LOCKSS","Portico"],"relation":{"has-review":[{"id-type":"doi","id":"10.7287\/peerj-cs.1405v0.1\/reviews\/1","asserted-by":"object"},{"id-type":"doi","id":"10.7287\/peerj-cs.1405v0.2\/reviews\/3","asserted-by":"object"},{"id-type":"doi","id":"10.7287\/peerj-cs.1405v0.2\/reviews\/1","asserted-by":"object"},{"id-type":"doi","id":"10.7287\/peerj-cs.1405v0.1\/reviews\/2","asserted-by":"object"},{"id-type":"doi","id":"10.7287\/peerj-cs.1405v0.2\/reviews\/2","asserted-by":"object"},{"id-type":"doi","id":"10.7287\/peerj-cs.1405v0.1\/reviews\/3","asserted-by":"object"}]},"ISSN":["2376-5992"],"issn-type":[{"value":"2376-5992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,30]]},"article-number":"e1405"}}