{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T04:53:53Z","timestamp":1771736033281,"version":"3.50.1"},"reference-count":109,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s10586-025-05861-5","type":"journal-article","created":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:32:50Z","timestamp":1767713570000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An efficient intrusion detection system for IoT and TCP\/IP networks based on hybrid genetic and binary Grey Wolf Algorithms with a multi-objective fitness function"],"prefix":"10.1007","volume":"29","author":[{"given":"Sheyda","family":"Davahli","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,6]]},"reference":[{"issue":"6","key":"5861_CR1","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.1007\/s10586-022-03776-z","volume":"26","author":"A Heidari","year":"2023","unstructured":"Heidari, A., Jamali, M.A.J.: Internet of things intrusion detection systems: a comprehensive review and future directions. Cluster Comput. 26(6), 3753\u20133780 (2023)","journal-title":"Cluster Comput."},{"key":"5861_CR2","doi-asserted-by":"crossref","unstructured":"Sundaram, K., et al.: A novel hybrid feature selection with cascaded LSTM: enhancing security in IoT networks. Wireless Commun. Mobile Comput. 1, 5522431 (2024)","DOI":"10.1155\/2024\/5522431"},{"issue":"1","key":"5861_CR3","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/8981988","volume":"2023","author":"SVN Santhosh Kumar","year":"2023","unstructured":"Santhosh Kumar, S.V.N., Selvi, M., Kannan, A.: A comprehensive survey on machine learning-based intrusion detection systems for secure communication in internet of things. Comput. Intell. Neurosci. 2023(1), 8981988 (2023)","journal-title":"Comput. Intell. Neurosci."},{"key":"5861_CR4","doi-asserted-by":"crossref","unstructured":"Li, J., et al.: Ai-based two-stage intrusion detection for software defined IoT networks. IEEE Internet Things J. 6(2), 2093\u20132102 (2018)","DOI":"10.1109\/JIOT.2018.2883344"},{"issue":"1","key":"5861_CR5","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/s11063-022-10892-9","volume":"55","author":"S Karthic","year":"2023","unstructured":"Karthic, S., Kumar, S.M.: Hybrid optimized deep neural network with enhanced conditional random field based intrusion detection on wireless sensor network. Neural. Process. Lett. 55(1), 459\u2013479 (2023)","journal-title":"Neural. Process. Lett."},{"issue":"8","key":"5861_CR6","doi-asserted-by":"publisher","first-page":"2431","DOI":"10.1007\/s11276-016-1300-5","volume":"23","author":"M Usha","year":"2017","unstructured":"Usha, M., Kavitha, P.: Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier. Wireless Networks 23(8), 2431\u20132446 (2017)","journal-title":"Wireless Networks"},{"key":"5861_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101701","volume":"105","author":"K Khan","year":"2020","unstructured":"Khan, K., et al.: A survey on intrusion detection and prevention in wireless ad-hoc networks. Journal of Systems Architecture 105, 101701 (2020)","journal-title":"Journal of Systems Architecture"},{"key":"5861_CR8","doi-asserted-by":"crossref","unstructured":"Suhana, S., Karthic, S., Yuvaraj, N.: Ensemble based dimensionality reduction for intrusion detection using random forest in wireless networks. In: 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE (2023).","DOI":"10.1109\/ICSSIT55814.2023.10060929"},{"key":"5861_CR9","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.comcom.2023.02.003","volume":"202","author":"KG Maheswari","year":"2023","unstructured":"Maheswari, K.G., Siva, C., Nalinipriya, G.: Optimal cluster based feature selection for intrusion detection system in web and cloud computing environment using hybrid teacher learning optimization enables deep recurrent neural network. Computer Communications 202, 145\u2013153 (2023)","journal-title":"Computer Communications"},{"key":"5861_CR10","unstructured":"Pajouh, H.H., et al.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans. Emerg. Top. Comput. (2016)"},{"issue":"12","key":"5861_CR11","doi-asserted-by":"publisher","first-page":"9395","DOI":"10.1016\/j.aej.2022.02.063","volume":"61","author":"YK Saheed","year":"2022","unstructured":"Saheed, Y.K., et al.: A machine learning-based intrusion detection for detecting internet of things network attacks. Alexandria Engineering Journal 61(12), 9395\u20139409 (2022)","journal-title":"Alexandria Engineering Journal"},{"issue":"5","key":"5861_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-01926-7","volume":"4","author":"N Gupta","year":"2023","unstructured":"Gupta, N., Jindal, V., Bedi, P.: A survey on intrusion detection and prevention systems. SN Comput. Sci. 4(5), 439 (2023)","journal-title":"SN Comput. Sci."},{"key":"5861_CR13","doi-asserted-by":"publisher","first-page":"152379","DOI":"10.1109\/ACCESS.2021.3126834","volume":"9","author":"S Wang","year":"2021","unstructured":"Wang, S., et al.: Machine learning in network anomaly detection: a survey. IEEE Access 9, 152379\u2013152396 (2021)","journal-title":"IEEE Access"},{"key":"5861_CR14","doi-asserted-by":"crossref","unstructured":"Nathiya, N., et al.: An anomaly\u2014misuse hybrid system for efficient intrusion detection in clustered wireless sensor network using neural network. In: International Conference on Computing Science, Communication and Security. Cham: Springer Nature Switzerland, 161\u2013175 (2024)","DOI":"10.1007\/978-3-031-75170-7_12"},{"issue":"13","key":"5861_CR15","doi-asserted-by":"publisher","DOI":"10.3390\/s22134926","volume":"22","author":"A Sarwar","year":"2022","unstructured":"Sarwar, A., et al.: Enhanced anomaly detection system for IoT based on improved dynamic SBPSO. Sensors 22(13), 4926 (2022)","journal-title":"Sensors"},{"issue":"1","key":"5861_CR16","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00531-w","volume":"8","author":"AA Megantara","year":"2021","unstructured":"Megantara, A.A., Ahmad, T.: A hybrid machine learning method for increasing the performance of network intrusion detection systems. J. Big Data 8(1), 142 (2021)","journal-title":"J. Big Data"},{"key":"5861_CR17","doi-asserted-by":"crossref","unstructured":"Musa, U.S., et al.: A review on intrusion detection system using machine learning techniques. In: 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). IEEE, pp. 541\u2013549 (2021)","DOI":"10.1109\/ICCCIS51004.2021.9397121"},{"issue":"2","key":"5861_CR18","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2015","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"5861_CR19","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/s10489-016-0843-6","volume":"46","author":"AV Phan","year":"2017","unstructured":"Phan, A.V., Nguyen, M.L., Bui, L.T.: Feature weighting and SVM parameters optimization based on genetic algorithms for classification problems. Appl. Intell. 46(2), 455\u2013469 (2017)","journal-title":"Appl. Intell."},{"issue":"2","key":"5861_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00991-0","volume":"3","author":"B Deore","year":"2022","unstructured":"Deore, B., Bhosale, S.: Intrusion detection system based on RNN classifier for feature reduction. SN Comput. Sci. 3(2), 114 (2022)","journal-title":"SN Comput. Sci."},{"issue":"4","key":"5861_CR21","first-page":"107","volume":"2","author":"VR Balasaraswathi","year":"2017","unstructured":"Balasaraswathi, V.R., Muthukumarasamy, S., Hamid, Y.: Fs techniques for intrusion detection using non-bio-inspired and bio-inspired optimization algorithms. J. Commun. Inf. Networks 2(4), 107\u2013119 (2017)","journal-title":"J. Commun. Inf. Networks"},{"key":"5861_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103587","volume":"137","author":"AV Turukmane","year":"2024","unstructured":"Turukmane, A.V., Devendiran, R.: M-multisvm: an efficient FS assisted network intrusion detection system using machine learning. Comput. Secur. 137, 103587 (2024)","journal-title":"Comput. Secur."},{"key":"5861_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107136","volume":"126","author":"A Moslemi","year":"2023","unstructured":"Moslemi, A.: A tutorial-based survey on feature selection: recent advancements on feature selection. Eng. Appl. Artif. Intell. 126, 107136 (2023)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"4","key":"5861_CR24","doi-asserted-by":"publisher","first-page":"4543","DOI":"10.1007\/s10489-021-02550-9","volume":"52","author":"P Dhal","year":"2022","unstructured":"Dhal, P., Azad, C.: A comprehensive survey on FS in the various fields of machine learning. Appl. Intell. 52(4), 4543\u20134581 (2022)","journal-title":"Appl. Intell."},{"key":"5861_CR25","doi-asserted-by":"crossref","unstructured":"Hancer, E., Xue, B., Zhang, M.: A survey on evolutionary FS in multi-label classification. IEEE Trans. Evol. Comput. (2025)","DOI":"10.1109\/TEVC.2025.3544681"},{"key":"5861_CR26","doi-asserted-by":"crossref","unstructured":"Haar, L., et al.: Comparison between supervised and unsupervised FS methods. ICPRAM, 582\u2013589 (2019)","DOI":"10.5220\/0007385305820589"},{"issue":"3","key":"5861_CR27","doi-asserted-by":"publisher","first-page":"2011","DOI":"10.1007\/s11277-022-10030-7","volume":"128","author":"KG Maheswari","year":"2023","unstructured":"Maheswari, K.G., Siva, C., Nalini Priya, G.: An optimal cluster based intrusion detection system for defence against attack in web and cloud computing environments. Wirel. Pers. Commun. 128(3), 2011\u20132037 (2023)","journal-title":"Wirel. Pers. Commun."},{"issue":"22","key":"5861_CR28","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7046","volume":"34","author":"KG Maheswari","year":"2022","unstructured":"Maheswari, K.G., Siva, C., Nalinipriya, G.: A hybrid soft computing technique for intrusion detection in web and cloud environment. Concurrency and Computation: Practice and Experience 34(22), e7046 (2022)","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"5861_CR29","doi-asserted-by":"crossref","unstructured":"Xue, Y., et al.: An evolutionary computation based FS method for intrusion detection. In: Security and Communication Networks 2018 (2018)","DOI":"10.1155\/2018\/2492956"},{"key":"5861_CR30","volume-title":"A Review of Metaheuristic Algorithms","author":"R Mohammadi","year":"2021","unstructured":"Mohammadi, R., Mohammadi, D.: A Review of Metaheuristic Algorithms. Arshadan (2021)"},{"key":"5861_CR31","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili, S., Mirjalili, S.M., Lewis, A.: Grey wolf optimizer. Advances in Engineering Software 69, 46\u201361 (2014)","journal-title":"Advances in Engineering Software"},{"issue":"2","key":"5861_CR32","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s00521-017-3272-5","volume":"30","author":"H Faris","year":"2018","unstructured":"Faris, H., et al.: Grey wolf optimizer: a review of recent variants and applications. Neural Computing and Applications 30(2), 413\u2013435 (2018)","journal-title":"Neural Computing and Applications"},{"key":"5861_CR33","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.neucom.2015.06.083","volume":"172","author":"E Emary","year":"2016","unstructured":"Emary, E., Zawbaa, H.M., Hassanien, A.E.: Binary grey wolf optimization approaches for feature selection. Neurocomputing 172, 371\u2013381 (2016)","journal-title":"Neurocomputing"},{"key":"5861_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119656","volume":"649","author":"Z Cai","year":"2023","unstructured":"Cai, Z., et al.: Toward explicit control between exploration and exploitation in evolutionary algorithms: a case study of differential evolution. Information Sciences 649, 119656 (2023)","journal-title":"Information Sciences"},{"issue":"1","key":"5861_CR35","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/s10586-015-0527-8","volume":"19","author":"S-H Kang","year":"2016","unstructured":"Kang, S.-H., Kim, K.J.: A FS approach to find optimal feature subsets for the network intrusion detection system. Cluster Comput. 19(1), 325\u2013333 (2016)","journal-title":"Cluster Comput."},{"key":"5861_CR36","doi-asserted-by":"publisher","first-page":"13624","DOI":"10.1109\/ACCESS.2018.2810198","volume":"6","author":"P Tao","year":"2018","unstructured":"Tao, P., Sun, Z., Sun, Z.: An improved intrusion detection algorithm based on GA and SVM. IEEE Access 6, 13624\u201313631 (2018)","journal-title":"IEEE Access"},{"key":"5861_CR37","unstructured":"NSL-KDD Data Set [Online]. Available: http:\/\/www.unb.ca\/cic\/research\/datasets\/nsl.html, (n.d.)"},{"key":"5861_CR38","unstructured":"AWID Data Set, [online], Available: http:\/\/icsdweb.aegean.gr (2018)"},{"issue":"15","key":"5861_CR39","doi-asserted-by":"publisher","first-page":"9731","DOI":"10.1007\/s00500-021-05893-0","volume":"25","author":"G Kocher","year":"2021","unstructured":"Kocher, G., Kumar, G.: Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges. Soft. Comput. 25(15), 9731\u20139763 (2021)","journal-title":"Soft. Comput."},{"issue":"5","key":"5861_CR40","doi-asserted-by":"publisher","first-page":"2670","DOI":"10.1016\/j.eswa.2014.11.009","volume":"42","author":"AS Eesa","year":"2015","unstructured":"Eesa, A.S., Orman, Z., Abdulazeez Brifcani, A.M.: A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Systems with Applications 42(5), 2670\u20132679 (2015)","journal-title":"Expert Systems with Applications"},{"key":"5861_CR41","doi-asserted-by":"crossref","unstructured":"Seijo-Pardo, B., Bol\u00f3n-Canedo, V., Alonso-Betanzos, A.: Using data complexity measures for thresholding in FS rankers. In: Conference of the Spanish Association for Artificial Intelligence. Springer, Cham (2016)","DOI":"10.1007\/978-3-319-44636-3_12"},{"issue":"23","key":"5861_CR42","doi-asserted-by":"publisher","DOI":"10.3390\/s22239318","volume":"22","author":"S Sheikhi","year":"2022","unstructured":"Sheikhi, S., Kostakos, P.: A novel anomaly-based intrusion detection model using PSOGWO-optimized BP neural network and GA-based feature selection. Sensors 22(23), 9318 (2022)","journal-title":"Sensors"},{"issue":"2","key":"5861_CR43","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.gltp.2021.08.066","volume":"2","author":"T Yerriswamy","year":"2021","unstructured":"Yerriswamy, T., Murtugudde, G.: An efficient algorithm for anomaly intrusion detection in a network. Glob. Trans. Proc. 2(2), 255\u2013260 (2021)","journal-title":"Glob. Trans. Proc."},{"issue":"3","key":"5861_CR44","doi-asserted-by":"publisher","DOI":"10.3390\/computers8030059","volume":"8","author":"A-U-H Qureshi","year":"2019","unstructured":"Qureshi, A.-U.-H., et al.: RNN-ABC: a new swarm optimization based technique for anomaly detection. Computers 8(3), 59 (2019)","journal-title":"Computers"},{"key":"5861_CR45","unstructured":"Blake, C.L.: CJ Merz UCI Repository of Machine Learning Databases. University of California at Irvine (1998)"},{"key":"5861_CR46","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.aej.2024.12.057","volume":"116","author":"M Alotaibi","year":"2025","unstructured":"Alotaibi, M., et al.: Hybrid GWQBBA model for optimized classification of attacks in intrusion detection system. Alexandria Engineering Journal 116, 9\u201319 (2025)","journal-title":"Alexandria Engineering Journal"},{"key":"5861_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109838","volume":"120","author":"A Ali","year":"2024","unstructured":"Ali, A., et al.: An optimized multilayer perceptron-based network intrusion detection using gray wolf optimization. Computers and Electrical Engineering 120, 109838 (2024)","journal-title":"Computers and Electrical Engineering"},{"issue":"3","key":"5861_CR48","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1007\/s10586-023-04102-x","volume":"27","author":"AV Hanafi","year":"2024","unstructured":"Hanafi, A.V., et al.: Intrusion detection in Internet of things using improved binary golden jackal optimization algorithm and LSTM. Cluster Comput. 27(3), 2673\u20132690 (2024)","journal-title":"Cluster Comput."},{"issue":"10","key":"5861_CR49","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-024-06209-1","volume":"6","author":"SA Elsaid","year":"2024","unstructured":"Elsaid, S.A., et al.: Hybrid intrusion detection models based on GWO optimized deep learning. Discover Applied Sciences 6(10), 531 (2024)","journal-title":"Discover Applied Sciences"},{"issue":"4","key":"5861_CR50","doi-asserted-by":"publisher","first-page":"2173","DOI":"10.1007\/s11276-023-03637-6","volume":"30","author":"H Ghasemi","year":"2024","unstructured":"Ghasemi, H., Babaie, S.: A new intrusion detection system based on SVM\u2013GWO algorithms for Internet of Things. Wirel. Netw. 30(4), 2173\u20132185 (2024)","journal-title":"Wirel. Netw."},{"issue":"7","key":"5861_CR51","doi-asserted-by":"publisher","first-page":"9917","DOI":"10.1007\/s10586-024-04458-8","volume":"27","author":"EI Elsedimy","year":"2024","unstructured":"Elsedimy, E.I., Elhadidy, H., Abohashish, S.M.M.: A novel intrusion detection system based on a hybrid quantum support vector machine and improved Grey Wolf optimizer. Cluster Comput. 27(7), 9917\u20139935 (2024)","journal-title":"Cluster Comput."},{"key":"5861_CR52","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.033273","author":"R Alkanhel","year":"2023","unstructured":"Alkanhel, R., et al.: Network intrusion detection based on feature selection and hybrid metaheuristic optimization. Computers, Materials & Continua (2023). https:\/\/doi.org\/10.32604\/cmc.2023.033273","journal-title":"Computers, Materials & Continua"},{"issue":"1","key":"5861_CR53","first-page":"8478457","volume":"2023","author":"M Yuvaraja","year":"2023","unstructured":"Yuvaraja, M., et al.: Improved Grey Wolf Optimization-(IGWO-) based feature selection on multiview features and enhanced multimodal-sequential network intrusion detection approach. Wirel. Commun. Mob. Comput. 2023(1), 8478457 (2023)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"26","key":"5861_CR54","doi-asserted-by":"publisher","first-page":"19427","DOI":"10.1007\/s00521-023-08772-x","volume":"35","author":"NA Alawad","year":"2023","unstructured":"Alawad, N.A., et al.: Binary improved white shark algorithm for intrusion detection systems. Neural Computing and Applications 35(26), 19427\u201319451 (2023)","journal-title":"Neural Computing and Applications"},{"issue":"6","key":"5861_CR55","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-02311-0","volume":"4","author":"K Sundaram","year":"2023","unstructured":"Sundaram, K., et al.: Improving performance of intrusion detection using ALO selected features and GRU network. SN Comput. Sci. 4(6), 809 (2023)","journal-title":"SN Comput. Sci."},{"issue":"7","key":"5861_CR56","doi-asserted-by":"publisher","first-page":"3719","DOI":"10.1007\/s41870-022-01015-7","volume":"14","author":"S Karthic","year":"2022","unstructured":"Karthic, S., Kumar, S.M., Prakash, P.N.S.: Grey wolf based feature reduction for intrusion detection in WSN using LSTM. International Journal of Information Technology 14(7), 3719\u20133724 (2022)","journal-title":"International Journal of Information Technology"},{"key":"5861_CR57","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108383","volume":"103","author":"N Kunhare","year":"2022","unstructured":"Kunhare, N., Tiwari, R., Dhar, J.: Intrusion detection system using hybrid classifiers with meta-heuristic algorithms for the optimization and feature selection by genetic algorithm. Computers and Electrical Engineering 103, 108383 (2022)","journal-title":"Computers and Electrical Engineering"},{"key":"5861_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117597","volume":"204","author":"QM Alzubi","year":"2022","unstructured":"Alzubi, Q.M., et al.: Intrusion detection system based on hybridizing a modified binary grey wolf optimization and particle swarm optimization. Expert Systems with Applications 204, 117597 (2022)","journal-title":"Expert Systems with Applications"},{"issue":"6","key":"5861_CR59","doi-asserted-by":"publisher","DOI":"10.3390\/math10060999","volume":"10","author":"A Alzaqebah","year":"2022","unstructured":"Alzaqebah, A., et al.: A modified grey wolf optimization algorithm for an intrusion detection system. Mathematics 10(6), 999 (2022)","journal-title":"Mathematics"},{"issue":"4","key":"5861_CR60","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9040577","volume":"9","author":"A Golrang","year":"2020","unstructured":"Golrang, A., et al.: A novel hybrid IDS based on modified NSGAII-ANN and random forest. Electronics 9(4), 577 (2020)","journal-title":"Electronics"},{"issue":"2","key":"5861_CR61","doi-asserted-by":"publisher","first-page":"181","DOI":"10.3934\/mfc.2018009","volume":"1","author":"MA Tawhid","year":"2018","unstructured":"Tawhid, M.A., Dsouza, K.B.: Hybrid binary dragonfly enhanced particle swarm optimization algorithm for solving feature selection problems. Math. Found. Comput. 1(2), 181\u2013200 (2018)","journal-title":"Math. Found. Comput."},{"issue":"1","key":"5861_CR62","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s40860-020-00126-x","volume":"7","author":"PK Keserwani","year":"2021","unstructured":"Keserwani, P.K., et al.: A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO\u2013PSO\u2013RF model. Journal of Reliable Intelligent Environments 7(1), 3\u201321 (2021)","journal-title":"Journal of Reliable Intelligent Environments"},{"issue":"4","key":"5861_CR63","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1080\/23335777.2020.1811383","volume":"7","author":"PK Keserwani","year":"2021","unstructured":"Keserwani, P.K., Govil, M.C., Pilli, E.S.: An optimal intrusion detection system using GWO-CSA-DSAE model. Cyber-Physical Syst. 7(4), 197\u2013220 (2021)","journal-title":"Cyber-Physical Syst."},{"issue":"1","key":"5861_CR64","doi-asserted-by":"publisher","DOI":"10.1007\/s12046-020-1308-5","volume":"45","author":"N Kunhare","year":"2020","unstructured":"Kunhare, N., Tiwari, R., Dhar, J.: Particle swarm optimization and feature selection for intrusion detection system. S\u0101dhan\u0101 45(1), 109 (2020)","journal-title":"S\u0101dhan\u0101"},{"issue":"11","key":"5861_CR65","doi-asserted-by":"publisher","first-page":"5581","DOI":"10.1007\/s12652-020-01919-x","volume":"11","author":"A Davahli","year":"2020","unstructured":"Davahli, A., Shamsi, M., Abaei, G.: Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks. Journal of Ambient Intelligence and Humanized Computing 11(11), 5581\u20135609 (2020)","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"1","key":"5861_CR66","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1080\/0952813X.2019.1647558","volume":"32","author":"S Velliangiri","year":"2020","unstructured":"Velliangiri, S.: A hybrid BGWO with KPCA for intrusion detection. J. Exp. Theor. Artif. Intell. 32(1), 165\u2013180 (2020)","journal-title":"J. Exp. Theor. Artif. Intell."},{"key":"5861_CR67","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.03.011","author":"M Mazini","year":"2019","unstructured":"Mazini, M., Shirazi, B., Mahdavi, I.: Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. Journal of King Saud University - Computer and Information Sciences (2019). https:\/\/doi.org\/10.1016\/j.jksuci.2018.03.011","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"key":"5861_CR68","doi-asserted-by":"publisher","unstructured":"Alzubi, Q.M., et al.: Intrusion detection system based on a modified binary grey wolf optimisation. Neural Comput. Appl. 10 (2019). https:\/\/doi.org\/10.1007\/s00521-019-04103-1","DOI":"10.1007\/s00521-019-04103-1"},{"issue":"4","key":"5861_CR69","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4999","volume":"32","author":"EM Roopa Devi","year":"2020","unstructured":"Roopa Devi, E.M., Suganthe, R.C.: Enhanced transductive support vector machine classification with grey wolf optimizer cuckoo search optimization for intrusion detection system. Concurrency and Computation: Practice and Experience 32(4), e4999 (2020)","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"2","key":"5861_CR70","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s10462-017-9543-9","volume":"50","author":"A Bouraoui","year":"2018","unstructured":"Bouraoui, A., Jamoussi, S., BenAyed, Y.: A multi-objective genetic algorithm for simultaneous model and FS for support vector machines. Artif. Intell. Rev. 50(2), 261\u2013281 (2018)","journal-title":"Artif. Intell. Rev."},{"issue":"1\u20132","key":"5861_CR71","first-page":"117","volume":"16","author":"MA Tawhid","year":"2020","unstructured":"Tawhid, M.A., Dsouza, K.B.: Hybrid binary bat enhanced particle swarm optimization algorithm for solving feature selection problems. Applied Computing and Informatics 16(1\u20132), 117\u2013136 (2020)","journal-title":"Applied Computing and Informatics"},{"key":"5861_CR72","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/j.asoc.2017.11.006","volume":"62","author":"M Mafarja","year":"2018","unstructured":"Mafarja, M., Mirjalili, S.: Whale optimization approaches for wrapper feature selection. Applied Soft Computing 62, 441\u2013453 (2018)","journal-title":"Applied Soft Computing"},{"key":"5861_CR73","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.swevo.2018.02.021","volume":"42","author":"HM Zawbaa","year":"2018","unstructured":"Zawbaa, H.M., et al.: Large-dimensionality small-instance set feature selection: a hybrid bio-inspired heuristic approach. Swarm and Evolutionary Computation 42, 29\u201342 (2018)","journal-title":"Swarm and Evolutionary Computation"},{"key":"5861_CR74","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.ins.2017.09.028","volume":"422","author":"E Hancer","year":"2018","unstructured":"Hancer, E., et al.: Pareto front feature selection based on artificial bee colony optimization. Information Sciences 422, 462\u2013479 (2018)","journal-title":"Information Sciences"},{"key":"5861_CR75","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.cmpb.2017.10.024","volume":"154","author":"PA Karthick","year":"2018","unstructured":"Karthick, P.A., Ghosh, D.M., Ramakrishnan, S.: Surface electromyography based muscle fatigue detection using high-resolution time-frequency methods and machine learning algorithms. Computer Methods and Programs in Biomedicine 154, 45\u201356 (2018)","journal-title":"Computer Methods and Programs in Biomedicine"},{"key":"5861_CR76","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.procs.2017.06.004","volume":"111","author":"D Zeng","year":"2017","unstructured":"Zeng, D., et al.: A GA-based feature selection and parameter optimization for support tucker machine. Procedia Comput. Sci. 111, 17\u201323 (2017)","journal-title":"Procedia Comput. Sci."},{"key":"5861_CR77","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.swevo.2017.04.002","volume":"36","author":"P Shunmugapriya","year":"2017","unstructured":"Shunmugapriya, P., Kanmani, S.: A hybrid algorithm using ant and bee colony optimization for feature selection and classification (AC-ABC hybrid). Swarm and Evolutionary Computation 36, 27\u201336 (2017)","journal-title":"Swarm and Evolutionary Computation"},{"key":"5861_CR78","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.cose.2017.06.005","volume":"70","author":"C Khammassi","year":"2017","unstructured":"Khammassi, C., Krichen, S.: A GA-LR wrapper approach for feature selection in network intrusion detection. Computers & Security 70, 255\u2013277 (2017)","journal-title":"Computers & Security"},{"key":"5861_CR79","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9512741","author":"Q Li","year":"2017","unstructured":"Li, Q., et al.: An enhanced grey wolf optimization based feature selection wrapped kernel extreme learning machine for medical diagnosis. Comput. Math. Methods Med. (2017). https:\/\/doi.org\/10.1155\/2017\/9512741","journal-title":"Comput. Math. Methods Med."},{"key":"5861_CR80","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.neucom.2017.04.053","volume":"260","author":"MM Mafarja","year":"2017","unstructured":"Mafarja, M.M., Mirjalili, S.: Hybrid whale optimization algorithm with simulated annealing for feature selection. Neurocomputing 260, 302\u2013312 (2017)","journal-title":"Neurocomputing"},{"key":"5861_CR81","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1016\/j.ins.2017.08.047","volume":"418","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Song, X.-F., Gong, D.-W.: A return-cost-based binary firefly algorithm for feature selection. Inf. Sci. 418, 561\u2013574 (2017)","journal-title":"Inf. Sci."},{"key":"5861_CR82","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.knosys.2017.07.005","volume":"134","author":"MRG Raman","year":"2017","unstructured":"Raman, M.R.G., et al.: An efficient intrusion detection system based on hypergraph-Genetic algorithm for parameter optimization and feature selection in support vector machine. Knowledge-Based Systems 134, 1\u201312 (2017)","journal-title":"Knowledge-Based Systems"},{"issue":"9","key":"5861_CR83","doi-asserted-by":"publisher","first-page":"2307","DOI":"10.1007\/s00500-015-1942-8","volume":"21","author":"H Bostani","year":"2017","unstructured":"Bostani, H., Sheikhan, M.: Hybrid of binary gravitational search algorithm and mutual information for feature selection in intrusion detection systems. Soft. Comput. 21(9), 2307\u20132324 (2017)","journal-title":"Soft. Comput."},{"issue":"4","key":"5861_CR84","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1007\/s00521-015-2103-9","volume":"28","author":"E Ali\u010dkovi\u0107","year":"2017","unstructured":"Ali\u010dkovi\u0107, E., Subasi, A.: Breast cancer diagnosis using GA feature selection and rotation forest. Neural Comput. Appl. 28(4), 753\u2013763 (2017)","journal-title":"Neural Comput. Appl."},{"issue":"9","key":"5861_CR85","first-page":"59","volume":"11","author":"V Sathish","year":"2017","unstructured":"Sathish, V., Khader, P., Abdul, S.: Improved detecting host based intrusions based on hybrid SVM using grey wolf optimizer. Int. J. Secur. Appl. 11(9), 59\u201372 (2017)","journal-title":"Int. J. Secur. Appl."},{"key":"5861_CR86","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1016\/j.neucom.2015.07.057","volume":"171","author":"Z Yong","year":"2016","unstructured":"Yong, Z., Dun-wei, G., Wan-qiu, Z.: feature selection of unreliable data using an improved multi-objective PSO algorithm. Neurocomputing 171, 1281\u20131290 (2016)","journal-title":"Neurocomputing"},{"key":"5861_CR87","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.eswa.2015.12.004","volume":"49","author":"AS Ghareb","year":"2016","unstructured":"Ghareb, A.S., Bakar, A.A., Hamdan, A.R.: Hybrid feature selection based on enhanced genetic algorithm for text categorization. Expert Syst. Appl. 49, 31\u201347 (2016)","journal-title":"Expert Syst. Appl."},{"key":"5861_CR88","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.asoc.2015.09.045","volume":"40","author":"SA Medjahed","year":"2016","unstructured":"Medjahed, S.A., et al.: Gray wolf optimizer for hyperspectral band selection. Applied Soft Computing 40, 178\u2013186 (2016)","journal-title":"Applied Soft Computing"},{"key":"5861_CR89","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.neucom.2016.03.101","volume":"213","author":"E Emary","year":"2016","unstructured":"Emary, E., Zawbaa, H.M., Hassanien, A.E.: Binary ant lion approaches for feature selection. Neurocomputing 213, 54\u201365 (2016)","journal-title":"Neurocomputing"},{"issue":"3","key":"5861_CR90","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0150652","volume":"11","author":"HM Zawbaa","year":"2016","unstructured":"Zawbaa, H.M., Emary, E., Grosan, C.: Feature selection via chaotic antlion optimization. PLoS ONE 11(3), e0150652 (2016)","journal-title":"PLoS ONE"},{"key":"5861_CR91","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.eswa.2016.06.004","volume":"62","author":"E Zorarpac\u0131","year":"2016","unstructured":"Zorarpac\u0131, E., \u00d6zel, S.A.: A hybrid approach of differential evolution and artificial bee colony for feature selection. Expert Syst. Appl. 62, 91\u2013103 (2016)","journal-title":"Expert Syst. Appl."},{"key":"5861_CR92","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.neucom.2016.03.031","volume":"199","author":"SMH Bamakan","year":"2016","unstructured":"Bamakan, S.M.H., et al.: An effective intrusion detection framework based on MCLP\/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing 199, 90\u2013102 (2016)","journal-title":"Neurocomputing"},{"key":"5861_CR93","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/2739621","author":"Z Chen","year":"2016","unstructured":"Chen, Z., et al.: A parallel genetic algorithm based feature selection and parameter optimization for support vector machine. Scientific Programming (2016). https:\/\/doi.org\/10.1155\/2016\/2739621","journal-title":"Scientific Programming"},{"key":"5861_CR94","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.asoc.2015.10.005","volume":"40","author":"R Sheikhpour","year":"2016","unstructured":"Sheikhpour, R., Sarram, M.A., Sheikhpour, R.: Particle swarm optimization for bandwidth determination and feature selection of kernel density estimation based classifiers in diagnosis of breast cancer. Applied Soft Computing 40, 113\u2013131 (2016)","journal-title":"Applied Soft Computing"},{"issue":"7","key":"5861_CR95","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/365869","volume":"11","author":"K-C Lin","year":"2015","unstructured":"Lin, K.-C., et al.: Feature selection and parameter optimization of support vector machines based on modified cat swarm optimization. International Journal of Distributed Sensor Networks 11(7), 365869 (2015)","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"5861_CR96","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.neucom.2012.09.049","volume":"148","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., et al.: Feature selection algorithm based on bare bones particle swarm optimization. Neurocomputing 148, 150\u2013157 (2015)","journal-title":"Neurocomputing"},{"key":"5861_CR97","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1016\/j.procs.2015.09.006","volume":"65","author":"E Emary","year":"2015","unstructured":"Emary, E., et al.: Multi-objective gray-wolf optimization for attribute reduction. Procedia Comput. Sci. 65, 623\u2013632 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"5861_CR98","doi-asserted-by":"crossref","unstructured":"Emary, E., et al.: Feature subset selection approach by gray-wolf optimization. In: Afro-European Conference for Industrial Advancement. Springer, Cham (2015)","DOI":"10.1007\/978-3-319-13572-4_1"},{"key":"5861_CR99","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0792-66","volume":"267","author":"JH Holland","year":"1992","unstructured":"Holland, J.H., Koza, J.R.: Genetic programming. Sci. Am. 267, 66\u201372 (1992)","journal-title":"Sci. Am."},{"key":"5861_CR100","unstructured":"Davis, L.: Handbook of genetic algorithms (1991)"},{"issue":"7\u20138","key":"5861_CR101","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1016\/0098-3004(94)90072-8","volume":"20","author":"K Gallagher","year":"1994","unstructured":"Gallagher, K., Sambridge, M.: Genetic algorithms: a powerful tool for large-scale nonlinear optimization problems. Comput. Geosci. 20(7\u20138), 1229\u20131236 (1994)","journal-title":"Comput. Geosci."},{"issue":"1","key":"5861_CR102","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00398-3","volume":"8","author":"M Rostami","year":"2021","unstructured":"Rostami, M., Berahmand, K., Forouzandeh, S.: A novel community detection based genetic algorithm for feature selection. J. Big Data 8(1), 2 (2021)","journal-title":"J. Big Data"},{"key":"5861_CR103","doi-asserted-by":"crossref","unstructured":"Kolias, C., et al.: Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun. Surv. Tutor. 18(1), 184\u2013208 (2015)","DOI":"10.1109\/COMST.2015.2402161"},{"key":"5861_CR104","unstructured":"WEKA: A Java Machine Learning Package, Available at: http:\/\/www.cs.waikato.ac.nz\/\u02dcml\/weka\/"},{"key":"5861_CR105","doi-asserted-by":"crossref","unstructured":"Frank, E., et al.: Weka-a machine learning workbench for data mining. In: Data Mining and Knowledge Discovery Handbook. Springer, Boston, MA, pp. 1269\u20131277 (2009)","DOI":"10.1007\/978-0-387-09823-4_66"},{"key":"5861_CR106","unstructured":"Witten, I.H., et al.: Weka: practical machine learning tools and techniques with Java implementations (1999)"},{"key":"5861_CR107","doi-asserted-by":"crossref","unstructured":"Zaki, M.J., Meira Jr, W., Meira, W.: Data Mining and Machine Learning: Fundamental Concepts and Algorithms. Cambridge University Press (2020)","DOI":"10.1017\/9781108564175"},{"key":"5861_CR108","unstructured":"Addas, M.O., Khamis, D.: Developing a cloud intrusion detection system with filter-based features selection techniques and SVM classifier. In: Computing, Communication and Learning: First International Conference, CoCoLe 2022, Warangal, India, October 27\u201329, 2022, Proceedings. Springer Nature (2023)"},{"issue":"3","key":"5861_CR109","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2996355","volume":"49","author":"A Aleti","year":"2016","unstructured":"Aleti, A., Moser, I.: A systematic literature review of adaptive parameter control methods for evolutionary algorithms. ACM Comput. Surv. 49(3), 1\u201335 (2016)","journal-title":"ACM Comput. Surv."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05861-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05861-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05861-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T17:03:04Z","timestamp":1767718984000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05861-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,6]]},"references-count":109,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["5861"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05861-5","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,6]]},"assertion":[{"value":"21 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"82"}}