{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:44:13Z","timestamp":1774525453018,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":56,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811680588","type":"print"},{"value":"9789811680595","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_21","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"340-360","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2516-1404","authenticated-orcid":false,"given":"Taief Alaa","family":"Alamiedy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7026-6408","authenticated-orcid":false,"given":"Mohammed F. R.","family":"Anbar","sequence":"additional","affiliation":[]},{"given":"Bahari","family":"Belaton","sequence":"additional","affiliation":[]},{"given":"Arkan Hamoodi","family":"Kabla","sequence":"additional","affiliation":[]},{"given":"Baidaa Hamza","family":"Khudayer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Al-Hadhrami, Y., Hussain, F.K.: DDoS attacks in IoT networks: a comprehensive systematic literature review (2021)","DOI":"10.1007\/s11280-020-00855-2"},{"key":"21_CR2","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1007\/978-3-319-99007-1_57","volume-title":"Recent Trends in Data Science and Soft Computing","author":"TA Alamiedy","year":"2019","unstructured":"Alamiedy, T.A., Anbar, M., Al-Ani, A.K., Al-Tamimi, B.N., Faleh, N.: Review on feature selection algorithms for anomaly-based intrusion detection system. In: Saeed, F., Gazem, N., Mohammed, F., Busalim, A. (eds.) Recent Trends in Data Science and Soft Computing. Advances in Intelligent Systems and Computing, pp. 605\u2013619. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-99007-1_57"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: Current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015, pp. 336\u2013341. IEEE (2016)","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Cisco: Cisco Annual Internet Report (2018\u20132023). Comput. Fraud Secur. 2020, 4 (2020)","DOI":"10.1016\/S1361-3723(20)30026-9"},{"key":"21_CR5","doi-asserted-by":"publisher","unstructured":"Fields, B.K.K., Demirjian, N.L., Gholamrezanezhad, A.: Coronavirus Disease 2019 (COVID-19) diagnostic technologies: a country-based retrospective analysis of screening and containment procedures during the first wave of the pandemic (2020). https:\/\/doi.org\/10.1016\/j.clinimag.2020.08.014","DOI":"10.1016\/j.clinimag.2020.08.014"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Whitelaw, S., Mamas, M.A., Topol, E., Van Spall, H.G.C.: Applications of digital technology in COVID-19 pandemic planning and response (2020)","DOI":"10.1016\/S2589-7500(20)30142-4"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1016\/j.jsurg.2020.03.018","volume":"77","author":"RC Chick","year":"2020","unstructured":"Chick, R.C., et al.: Using technology to maintain the education of residents during the COVID-19 pandemic. J. Surg. Educ. 77, 729\u2013732 (2020). https:\/\/doi.org\/10.1016\/j.jsurg.2020.03.018","journal-title":"J. Surg. Educ."},{"key":"21_CR8","doi-asserted-by":"publisher","unstructured":"Kaharuddin, Ahmad, D., Mardiana, Rusni: Contributions of technology, culture, and attitude to English learning motivation during COVID-19 outbreaks. Syst. Rev. Pharm. 11, 76\u201384 (2020). https:\/\/doi.org\/10.31838\/srp.2020.11.13","DOI":"10.31838\/srp.2020.11.13"},{"key":"21_CR9","doi-asserted-by":"publisher","unstructured":"Alashhab, Z.R., Anbar, M., Singh, M.M., Leau, Y.B., Al-Sai, Z.A., Alhayja\u2019a, S.A.: Impact of coronavirus pandemic crisis on technologies and cloud computing applications. J. Electron. Sci. Technol. 19, 25\u201340 (2021). https:\/\/doi.org\/10.1016\/j.jnlest.2020.100059","DOI":"10.1016\/j.jnlest.2020.100059"},{"key":"21_CR10","unstructured":"Lueth, K.L.: The impact of Covid-19 on the Internet of Things Part 2. https:\/\/iot-analytics.com\/the-impact-of-covid-19-on-the-internet-of-things-part-2\/"},{"key":"21_CR11","unstructured":"Ligero, R.: Accent Systems developed a connected wristband to contain Covid-19. https:\/\/accent-systems.com\/blog\/accent-systems-developed-connected-wristband-technology-contain-covid19\/?v=75dfaed2dded"},{"key":"21_CR12","unstructured":"Chen, Y., Chanet, J.P., Hou, K.M., Zhou, P.: A context-aware tool-set for routing-targeted mutual configuration and optimization of LLNs through bridging virtual and physical worlds. In: New and smart Information Communication Science and Technology to support Sustainable Development (NICST 2014) (2014). 5 p."},{"key":"21_CR13","doi-asserted-by":"publisher","unstructured":"Ammar Rafea, S., Abdulrahman Kadhim, A.: Routing with energy threshold for WSN-IoT based on RPL protocol. Iraqi J. Comput. Commun. Control Syst. Eng. 71\u201381 (2019). https:\/\/doi.org\/10.33103\/uot.ijccce.19.1.9","DOI":"10.33103\/uot.ijccce.19.1.9"},{"key":"21_CR14","doi-asserted-by":"publisher","unstructured":"Tennina, S., Gaddour, O., Koub\u00e2a, A., Royo, F., Alves, M., Abid, M.: Z-Monitor: A protocol analyzer for IEEE 802.15.4-based low-power wireless networks. Comput. Netw. 95, 77\u201396 (2016). https:\/\/doi.org\/10.1016\/j.comnet.2015.12.002","DOI":"10.1016\/j.comnet.2015.12.002"},{"key":"21_CR15","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1021\/ci400128m","volume":"53","author":"A Fallis","year":"2013","unstructured":"Fallis, A.: RFC6550 RPL: IPv6 routing protocol for low-power and lossy networks. J. Chem. Inf. Model. 53, 1689\u20131699 (2013)","journal-title":"J. Chem. Inf. Model."},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Palattella, M.R., et al.: Standardized protocol stack for the internet of (important) things (2013)","DOI":"10.1109\/SURV.2012.111412.00158"},{"key":"21_CR17","doi-asserted-by":"publisher","unstructured":"Mahmoud, C., Aouag, S.: Security for internet of things: a state of the art on existing protocols and open research issues. In: ACM International Conference Proceedings Series (2019). https:\/\/doi.org\/10.1145\/3361570.3361622","DOI":"10.1145\/3361570.3361622"},{"key":"21_CR18","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.comnet.2017.07.001","volume":"126","author":"HS Kim","year":"2017","unstructured":"Kim, H.S., Cho, H., Kim, H., Bahk, S.: DT-RPL: diverse bidirectional traffic delivery through RPL routing protocol in low power and lossy networks. Comput. Netw. 126, 150\u2013161 (2017). https:\/\/doi.org\/10.1016\/j.comnet.2017.07.001","journal-title":"Comput. Netw."},{"key":"21_CR19","doi-asserted-by":"publisher","unstructured":"Tian, H., Qian, Z., Wang, X., Liang, X.: QoI-Aware DODAG construction in RPL-based event detection wireless sensor networks. J. Sens. 2017 (2017). https:\/\/doi.org\/10.1155\/2017\/1603713","DOI":"10.1155\/2017\/1603713"},{"key":"21_CR20","doi-asserted-by":"publisher","unstructured":"Xiao, W., Liu, J., Jiang, N., Shi, H.: An optimization of the object function for routing protocol of low-power and Lossy networks. In: 2014 2nd International Conference on Systems and Informatics, ICSAI 2014, pp. 515\u2013519 (2015). https:\/\/doi.org\/10.1109\/ICSAI.2014.7009341","DOI":"10.1109\/ICSAI.2014.7009341"},{"key":"21_CR21","doi-asserted-by":"publisher","unstructured":"Lamaazi, H., Benamar, N., Jara, A.J.: RPL-based networks in static and mobile environment: a performance assessment analysis. J. King Saud Univ. - Comput. Inf. Sci. 30, 320\u2013333 (2018). https:\/\/doi.org\/10.1016\/j.jksuci.2017.04.001","DOI":"10.1016\/j.jksuci.2017.04.001"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Ma, G., Li, X., Pei, Q., Li, Z.: A security routing protocol for internet of things based on RPL. In: Proceedings - 2017 International Conference on Networking and Network Applications, NaNA 2017, pp. 209\u2013213. Institute of Electrical and Electronics Engineers Inc. (2017)","DOI":"10.1109\/NaNA.2017.28"},{"key":"21_CR23","doi-asserted-by":"publisher","first-page":"3685","DOI":"10.1109\/JSEN.2013.2266399","volume":"13","author":"A Le","year":"2013","unstructured":"Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., Chai, M.: The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sens. J. 13, 3685\u20133692 (2013). https:\/\/doi.org\/10.1109\/JSEN.2013.2266399","journal-title":"IEEE Sens. J."},{"key":"21_CR24","doi-asserted-by":"publisher","first-page":"1582","DOI":"10.1109\/COMST.2018.2885894","volume":"21","author":"A Raoof","year":"2019","unstructured":"Raoof, A., Matrawy, A., Lung, C.H.: Routing attacks and mitigation methods for RPL-based internet of things. IEEE Commun. Surv. Tutor. 21, 1582\u20131606 (2019). https:\/\/doi.org\/10.1109\/COMST.2018.2885894","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"21_CR25","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17, 2347\u20132376 (2015). https:\/\/doi.org\/10.1109\/COMST.2015.2444095","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"21_CR26","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1108\/IJPCC-11-2019-0088","volume":"16","author":"Y AlSawafi","year":"2020","unstructured":"AlSawafi, Y., Touzene, A., Day, K., Alzeidi, N.: Hybrid RPL-based sensing and routing protocol for smart city. Int. J. Pervasive Comput. Commun. 16, 279\u2013306 (2020). https:\/\/doi.org\/10.1108\/IJPCC-11-2019-0088","journal-title":"Int. J. Pervasive Comput. Commun."},{"key":"21_CR27","unstructured":"Winter, T., Thubert, P.: RPL: IPv6 routing protocol for low power and lossy networks, draft-ietf-roll-rpl-04.txt. IETF, Internet Draft (work progress) (2009)"},{"key":"21_CR28","doi-asserted-by":"publisher","unstructured":"Fatima-Tuz-Zahra, Jhanjhi, N.Z., Brohi, S.N., Malik, N.A.: Proposing a rank and wormhole attack detection framework using machine learning. In: MACS 2019 - 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics Proceedings (2019). https:\/\/doi.org\/10.1109\/MACS48846.2019.9024821","DOI":"10.1109\/MACS48846.2019.9024821"},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Fatima-Tuz-Zahra, Jhanjhi, N.Z., Brohi, S.N., Malik, N.A., Humayun, M.: Proposing a hybrid RPL protocol for rank and wormhole attack mitigation using machine learning. In: 2020 2nd International Conference on Computer and Information Sciences, ICCIS 2020, pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ICCIS49240.2020.9257607"},{"key":"21_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-319-67910-5_6","volume-title":"Ad-hoc, Mobile, and Wireless Networks","author":"P Perazzo","year":"2017","unstructured":"Perazzo, P., Vallati, C., Arena, A., Anastasi, G., Dini, G.: An implementation and evaluation of the security features of RPL. In: Puliafito, A., Bruneo, D., Distefano, S., Longo, F. (eds.) ADHOC-NOW 2017. LNCS, vol. 10517, pp. 63\u201376. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67910-5_6"},{"key":"21_CR31","unstructured":"Mayzaud, A., Badonnel, R., Chrisment, I.: A taxonomy of attacks in RPL-based internet of things (2016)"},{"key":"21_CR32","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1155\/2013\/794326","volume":"2013","author":"L Wallgren","year":"2013","unstructured":"Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Netw. 2013, 11 (2013). https:\/\/doi.org\/10.1155\/2013\/794326","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"21_CR33","doi-asserted-by":"crossref","unstructured":"Alzubaidi, M., Anbar, M., Hanshi, S.M.: Neighbor-passive monitoring technique for detecting sinkhole attacks in RPL networks. In: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence - CSAI 2017. ACM Press, New York (2017)","DOI":"10.1145\/3168390.3168439"},{"key":"21_CR34","doi-asserted-by":"publisher","unstructured":"Alzubaidi, M., Anbar, M., Chong, Y.W., Al-Sarawi, S.: Hybrid monitoring technique for detecting abnormal behaviour in RPL-based network. J. Commun. 13, 198\u2013208 (2018). https:\/\/doi.org\/10.12720\/jcm.13.5.198-208","DOI":"10.12720\/jcm.13.5.198-208"},{"key":"21_CR35","doi-asserted-by":"crossref","unstructured":"Alzubaidi, M., Anbar, M., Al-Saleem, S., Al-Sarawi, S., Alieyan, K.: Review on mechanisms for detecting sinkhole attacks on RPLs. In: ICIT 2017 - 8th International Conference on Information Technology, Proceedings, pp. 369\u2013374. Institute of Electrical and Electronics Engineers Inc. (2017)","DOI":"10.1109\/ICITECH.2017.8080028"},{"key":"21_CR36","doi-asserted-by":"crossref","unstructured":"Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing: Advance Communication Technology and Application for Society, ICPC 2015 (2015)","DOI":"10.1109\/PERVASIVE.2015.7087034"},{"key":"21_CR37","doi-asserted-by":"publisher","unstructured":"Napiah, M.N., Bin Idris, M.Y.I., Ramli, R., Ahmedy, I.: Compression header analyzer intrusion detection system (CHA - IDS) for 6LoWPAN communication protocol. IEEE Access 6, 16623\u201316638 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2798626","DOI":"10.1109\/ACCESS.2018.2798626"},{"key":"21_CR38","doi-asserted-by":"publisher","first-page":"3447","DOI":"10.3390\/s90503447","volume":"9","author":"SO Amin","year":"2009","unstructured":"Amin, S.O., Siddiqui, M.S., Hong, C.S., Lee, S.: RIDES: Robust intrusion detection system for IP-based Ubiquitous Sensor Networks. Sensors 9, 3447\u20133468 (2009). https:\/\/doi.org\/10.3390\/s90503447","journal-title":"Sensors"},{"key":"21_CR39","doi-asserted-by":"publisher","unstructured":"Kasinathan, P., Costamagna, G., Khaleel, H., Pastrone, C., Spirito, M.A.: Demo: an IDS framework for internet of things empowered by 6LoWPAN. In: Proceedings of the ACM Conference on Computer & Communications Security, pp. 1337\u20131339 (2013). https:\/\/doi.org\/10.1145\/2508859.2512494","DOI":"10.1145\/2508859.2512494"},{"key":"21_CR40","doi-asserted-by":"crossref","unstructured":"Medjek, F., Tandjaoui, D., Romdhani, I., Djedjig, N.: A trust-based intrusion detection system for mobile RPL based networks. In: Proceedings - 2017 IEEE International Conference on Internet of Things, IEEE Green Computing and Communications, IEEE Cyber, Physical and Social Computing, IEEE Smart Data, iThings-GreenCom-CPSCom-SmartData 2017, pp. 735\u2013742. Institute of Electrical and Electronics Engineers Inc. (2018)","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.113"},{"key":"21_CR41","doi-asserted-by":"crossref","unstructured":"Airehrour, D., Gutierrez, J., Ray, S.K.: Securing RPL routing protocol from blackhole attacks using a trust-based mechanism. In: 26th International Telecommunication Networks and Applications Conference, ITNAC 2016, pp. 115\u2013120. Institute of Electrical and Electronics Engineers Inc. (2017)","DOI":"10.1109\/ATNAC.2016.7878793"},{"key":"21_CR42","doi-asserted-by":"publisher","unstructured":"Airehrour, D., Gutierrez, J., Ray, S.: A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks. Aust. J. Telecommun. Digit. Econ. 5 (2017). https:\/\/doi.org\/10.18080\/ajtde.v5n1.2","DOI":"10.18080\/ajtde.v5n1.2"},{"key":"21_CR43","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1049\/iet-cds.2018.5079","volume":"13","author":"BA Alabsi","year":"2019","unstructured":"Alabsi, B.A., Anbar, M., Manickam, S., Elejla, O.E.: DDoS attack aware environment with secure clustering and routing based on RPL protocol operation. IET Circuits Devices Syst. 13, 748\u2013755 (2019). https:\/\/doi.org\/10.1049\/iet-cds.2018.5079","journal-title":"IET Circuits Devices Syst."},{"key":"21_CR44","unstructured":"Autonomous Networks Research Group: Cooja Simulator \u2013 Contiki. http:\/\/anrg.usc.edu\/contiki\/index.php\/Cooja_Simulator"},{"key":"21_CR45","unstructured":"Wireshark Foundation: Wireshark \u00c2 Go deep. https:\/\/www.wireshark.org\/"},{"key":"21_CR46","doi-asserted-by":"crossref","unstructured":"Pazhaniraja, N., Paul, P., Roja, G., Shanmugapriya, K., Sonali, B.: A study on recent bio-inspired optimization algorithms. ieeexplore.ieee.org (2017)","DOI":"10.1109\/ICSCN.2017.8085674"},{"key":"21_CR47","doi-asserted-by":"publisher","unstructured":"Rai, D., Garg, A.K., Tyagi, K.: Bio-inspired optimization techniques-a critical comparative study 38, 1\u20137 (2013). https:\/\/doi.org\/10.1145\/2492248.2492271, dl.acm.org","DOI":"10.1145\/2492248.2492271"},{"issue":"10","key":"21_CR48","doi-asserted-by":"publisher","first-page":"6125","DOI":"10.1007\/s00521-019-04103-1","volume":"32","author":"QM Alzubi","year":"2019","unstructured":"Alzubi, Q.M., Anbar, M., Alqattan, Z.N.M., Al-Betar, M.A., Abdullah, R.: Intrusion detection system based on a modified binary grey wolf optimisation. Neural Comput. Appl. 32(10), 6125\u20136137 (2019). https:\/\/doi.org\/10.1007\/s00521-019-04103-1","journal-title":"Neural Comput. Appl."},{"issue":"9","key":"21_CR49","doi-asserted-by":"publisher","first-page":"3735","DOI":"10.1007\/s12652-019-01569-8","volume":"11","author":"TA Alamiedy","year":"2019","unstructured":"Alamiedy, T.A., Anbar, M., Alqattan, Z.N.M., Alzubi, Q.M.: Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm. J. Ambient Intell. Human. Comput. 11(9), 3735\u20133756 (2019). https:\/\/doi.org\/10.1007\/s12652-019-01569-8","journal-title":"J. Ambient Intell. Human. Comput."},{"key":"21_CR50","doi-asserted-by":"publisher","first-page":"2031","DOI":"10.5897\/sre12.001","volume":"7","author":"A Altaher","year":"2012","unstructured":"Altaher, A.: Malware detection based on evolving clustering method for classification. Sci. Res. Essays 7, 2031\u20132036 (2012). https:\/\/doi.org\/10.5897\/sre12.001","journal-title":"Sci. Res. Essays"},{"issue":"12","key":"21_CR51","doi-asserted-by":"publisher","first-page":"6963","DOI":"10.1007\/s13369-017-2951-y","volume":"43","author":"MFA Razak","year":"2017","unstructured":"Razak, M.F.A., Anuar, N.B., Othman, F., Firdaus, A., Afifi, F., Salleh, R.: Bio-inspired for features optimization and malware detection. Arab. J. Sci. Eng. 43(12), 6963\u20136979 (2017). https:\/\/doi.org\/10.1007\/s13369-017-2951-y","journal-title":"Arab. J. Sci. Eng."},{"key":"21_CR52","doi-asserted-by":"publisher","unstructured":"Soliman, O.S., Rassem, A.: A network intrusions detection system based on a quantum bio inspired algorithm. Int. J. Eng. Trends Technol. 10, 370\u2013379 (2014). https:\/\/doi.org\/10.14445\/22315381\/ijett-v10p271","DOI":"10.14445\/22315381\/ijett-v10p271"},{"key":"21_CR53","doi-asserted-by":"publisher","unstructured":"Clerc, M.: Particle Swarm Optimization (2010). https:\/\/doi.org\/10.1002\/9780470612163","DOI":"10.1002\/9780470612163"},{"issue":"2","key":"21_CR54","doi-asserted-by":"publisher","first-page":"1559","DOI":"10.1007\/s12652-020-02228-z","volume":"12","author":"M Safaldin","year":"2020","unstructured":"Safaldin, M., Otair, M., Abualigah, L.: Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J. Ambient Intell. Human. Comput. 12(2), 1559\u20131576 (2020). https:\/\/doi.org\/10.1007\/s12652-020-02228-z","journal-title":"J. Ambient Intell. Human. Comput."},{"key":"21_CR55","unstructured":"Yang: Firefly algorithm - Google Scholar. https:\/\/scholar.google.com\/scholar?cluster=3276324836150250709&hl=en&oi=scholarr"},{"key":"21_CR56","doi-asserted-by":"crossref","unstructured":"Mohammadi, M., et al.: A comprehensive survey and taxonomy of the SVM-based intrusion detection systems (2021)","DOI":"10.1016\/j.jnca.2021.102983"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:15:50Z","timestamp":1638450950000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}