{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T21:02:18Z","timestamp":1770930138774,"version":"3.50.1"},"reference-count":91,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10586-025-05890-0","type":"journal-article","created":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T18:57:40Z","timestamp":1770922660000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A hybrid MaOEA-ML framework for network intrusion detection system in the Internet of Health Things (IoHT)"],"prefix":"10.1007","volume":"29","author":[{"given":"Shashank","family":"Sawan","sequence":"first","affiliation":[]},{"given":"B Ramachandra","family":"Reddy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,12]]},"reference":[{"key":"5890_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103179","volume":"192","author":"S Ketu","year":"2021","unstructured":"Ketu, S., Mishra, P.K.: Internet of healthcare things: a contemporary survey. J. Netw. Comput. Appl. 192, 103179 (2021)","journal-title":"J. Netw. Comput. Appl."},{"key":"5890_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s00604-020-04615-x","volume":"187","author":"R Antiochia","year":"2020","unstructured":"Antiochia, R.: Nanobiosensors as new diagnostic tools for SARS, MERS and COVID-19: from past to perspectives. Microchim. Acta 187, 639 (2020)","journal-title":"Microchim. Acta"},{"key":"5890_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102491","volume":"111","author":"M Mamdouh","year":"2021","unstructured":"Mamdouh, M., Awad, A.I., Khalaf, A.A.M., Hamed, H.F.A.: Authentication and identity management of IoHT devices: achievements, challenges, and future directions. Comput. Secur. 111, 102491 (2021)","journal-title":"Comput. Secur."},{"key":"5890_CR4","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"SE-13","author":"DE Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. SE-13, 222\u2013232 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5890_CR5","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1016\/j.compeleceng.2008.12.005","volume":"35","author":"MA Ayd\u0131n","year":"2009","unstructured":"Ayd\u0131n, M.A., Zaim, A.H., Ceylan, K.G.: A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng. 35, 517\u2013526 (2009)","journal-title":"Comput. Electr. Eng."},{"key":"5890_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MilCIS.2015.7348942","volume-title":"2015 Military communications and information systems conference (MilCIS)","author":"N Moustafa","year":"2015","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military communications and information systems conference (MilCIS), pp. 1\u20136. IEEE (2015). https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942"},{"key":"5890_CR7","doi-asserted-by":"crossref","unstructured":"Carlin, A., Hammoudeh, M. & Aldabbas, O.: Intrusion detection and countermeasure of virtual cloud systems - state of the art and current challenges. Int. J. Adv. Comput. Sci. Appl. 6, (2015)","DOI":"10.14569\/IJACSA.2015.060601"},{"key":"5890_CR8","doi-asserted-by":"publisher","unstructured":"Shalaginov, A., Banin, S., Dehghantanha, A. & Franke, K.: Machine learning aided static malware analysis: a survey and tutorial. 7\u201345 (2018). https:\/\/doi.org\/10.1007\/978-3-319-73951-9_2","DOI":"10.1007\/978-3-319-73951-9_2"},{"key":"5890_CR9","doi-asserted-by":"publisher","unstructured":"Deb, K., Sindhya, K. & Okabe, T.: Self-adaptive simulated binary crossover for real-parameter optimization. In: Proceedings of the 9th annual conference on Genetic and evolutionary computation, 1187\u20131194. ACM, New York, NY, USA, (2007). https:\/\/doi.org\/10.1145\/1276958.1277190","DOI":"10.1145\/1276958.1277190"},{"key":"5890_CR10","doi-asserted-by":"publisher","unstructured":"Abraham, J. A. & Bindu, V. R.: Intrusion detection and prevention in networks using machine learning and deep learning approaches: A review. In: 2021 international conference on advancements in electrical, electronics, communication, computing and automation (ICAECA), 1\u20134. IEEE. (2021). https:\/\/doi.org\/10.1109\/ICAECA52838.2021.9675595","DOI":"10.1109\/ICAECA52838.2021.9675595"},{"key":"5890_CR11","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150","author":"Z Ahmad","year":"2021","unstructured":"Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., Ahmad, F.: Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. (2021). https:\/\/doi.org\/10.1002\/ett.4150","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"5890_CR12","doi-asserted-by":"publisher","first-page":"77396","DOI":"10.1109\/ACCESS.2020.2986013","volume":"8","author":"S Manimurugan","year":"2020","unstructured":"Manimurugan, S., et al.: Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access 8, 77396\u201377404 (2020)","journal-title":"IEEE Access"},{"key":"5890_CR13","doi-asserted-by":"publisher","first-page":"91992","DOI":"10.1109\/ACCESS.2019.2927465","volume":"7","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Chen, J., Zhou, Y., Han, L., Lin, J.: A multiple-layer representation learning model for network-based attack detection. IEEE Access 7, 91992\u201392008 (2019)","journal-title":"IEEE Access"},{"key":"5890_CR14","doi-asserted-by":"publisher","first-page":"49730","DOI":"10.1109\/ACCESS.2020.2980136","volume":"8","author":"Y Yu","year":"2020","unstructured":"Yu, Y., Bian, N.: An intrusion detection method using few-shot learning. IEEE Access 8, 49730\u201349740 (2020)","journal-title":"IEEE Access"},{"key":"5890_CR15","doi-asserted-by":"publisher","first-page":"32150","DOI":"10.1109\/ACCESS.2020.2973219","volume":"8","author":"G Karatas","year":"2020","unstructured":"Karatas, G., Demir, O., Sahingoz, O.K.: Increasing the performance of machine learning-based IDSs on an imbalanced and up-to-date dataset. IEEE Access 8, 32150\u201332162 (2020)","journal-title":"IEEE Access"},{"key":"5890_CR16","doi-asserted-by":"publisher","first-page":"32464","DOI":"10.1109\/ACCESS.2020.2973730","volume":"8","author":"K Jiang","year":"2020","unstructured":"Jiang, K., Wang, W., Wang, A., Wu, H.: Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8, 32464\u201332476 (2020)","journal-title":"IEEE Access"},{"key":"5890_CR17","doi-asserted-by":"publisher","unstructured":"Wu, P. & Guo, H.; LuNet: A deep neural network for network intrusion detection. In: 2019 IEEE symposium series on computational intelligence (SSCI), 617\u2013624. IEEE, (2019) https:\/\/doi.org\/10.1109\/SSCI44817.2019.9003126","DOI":"10.1109\/SSCI44817.2019.9003126"},{"key":"5890_CR18","doi-asserted-by":"publisher","first-page":"42169","DOI":"10.1109\/ACCESS.2020.2977007","volume":"8","author":"Y Yang","year":"2020","unstructured":"Yang, Y., Zheng, K., Wu, B., Yang, Y., Wang, X.: Network intrusion detection based on supervised adversarial variational auto-encoder with regularization. IEEE Access 8, 42169\u201342184 (2020)","journal-title":"IEEE Access"},{"key":"5890_CR19","doi-asserted-by":"publisher","first-page":"29575","DOI":"10.1109\/ACCESS.2020.2972627","volume":"8","author":"T Su","year":"2020","unstructured":"Su, T., Sun, H., Zhu, J., Wang, S., Li, Y.: BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access 8, 29575\u201329585 (2020)","journal-title":"IEEE Access"},{"key":"5890_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102688","volume":"164","author":"Z Wu","year":"2020","unstructured":"Wu, Z., Wang, J., Hu, L., Zhang, Z., Wu, H.: A network intrusion detection method based on semantic re-encoding and deep learning. J. Netw. Comput. Appl. 164, 102688 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"5890_CR21","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10151854","volume":"10","author":"J Toldinas","year":"2021","unstructured":"Toldinas, J., et al.: A novel approach for network intrusion detection using multistage deep learning image recognition. Electronics 10, 1854 (2021)","journal-title":"Electronics"},{"key":"5890_CR22","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s11277-021-08756-x","volume":"126","author":"Y Li","year":"2022","unstructured":"Li, Y., Ghoreishi, S., Issakhov, A.: Improving theaccuracy of network intrusion detection system in medical IoT systems through butterfly optimization algorithm. Wirel. Pers. Commun. 126, 1999\u20132017 (2022)","journal-title":"Wirel. Pers. Commun."},{"key":"5890_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/3ICT51146.2020.9312002","volume-title":"2020 international conference on innovation and intelligence for informatics, computing and technologies (3ICT)","author":"M Hammad","year":"2020","unstructured":"Hammad, M., El-medany, W., Ismail, Y.: Intrusion detection system using feature selection with clustering and classification machine learning algorithms on the UNSW-NB15 dataset. In: 2020 international conference on innovation and intelligence for informatics, computing and technologies (3ICT), pp. 1\u20136. IEEE (2020). https:\/\/doi.org\/10.1109\/3ICT51146.2020.9312002"},{"key":"5890_CR24","doi-asserted-by":"publisher","first-page":"58392","DOI":"10.1109\/ACCESS.2020.2982418","volume":"8","author":"H Jiang","year":"2020","unstructured":"Jiang, H., He, Z., Ye, G., Zhang, H.: Network intrusion detection based on PSO-Xgboost model. IEEE Access 8, 58392\u201358401 (2020)","journal-title":"IEEE Access"},{"key":"5890_CR25","doi-asserted-by":"publisher","first-page":"1881","DOI":"10.1007\/s10586-020-03229-5","volume":"24","author":"S Dwivedi","year":"2021","unstructured":"Dwivedi, S., Vardhan, M., Tripathi, S.: Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection. Cluster Comput. 24, 1881\u20131900 (2021)","journal-title":"Cluster Comput."},{"key":"5890_CR26","first-page":"409","volume":"68","author":"O Almomani","year":"2021","unstructured":"Almomani, O.: A hybrid model using bio-inspired metaheuristic algorithms for network intrusion detection system. Comput. Mater. Contin. 68, 409\u2013429 (2021)","journal-title":"Comput. Mater. Contin."},{"key":"5890_CR27","doi-asserted-by":"publisher","first-page":"215202","DOI":"10.1109\/ACCESS.2020.3040740","volume":"8","author":"S Moghanian","year":"2020","unstructured":"Moghanian, S., Saravi, F.B., Javidi, G., Sheybani, E.O.: GOAMLP: Network intrusion detection with multilayer perceptron and grasshopper optimization algorithm. IEEE Access 8, 215202\u2013215213 (2020)","journal-title":"IEEE Access"},{"key":"5890_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/8530312","volume":"2022","author":"S Sumathi","year":"2022","unstructured":"Sumathi, S., Rajesh, R., Lim, S.: Recurrent and deep learning neural network models for DDoS attack detection. J. Sens 2022, 1\u201321 (2022)","journal-title":"J. Sens"},{"key":"5890_CR29","doi-asserted-by":"publisher","first-page":"e7334","DOI":"10.1002\/cpe.7334","volume":"34","author":"Sumathi Sokkalingam","year":"2022","unstructured":"Sokkalingam, S., Ramakrishnan, R.: An intelligent intrusion detection system for distributed denial of service attacks: A support vector machine with hybrid optimization algorithm based approach. Concurr. Comput. 34, e7334 (2022)","journal-title":"Concurr. Comput."},{"key":"5890_CR30","doi-asserted-by":"publisher","first-page":"e8264","DOI":"10.1002\/cpe.8264","volume":"36","author":"S Sumathi","year":"2024","unstructured":"Sumathi, S., Rajesh, R.: HybGBS: A hybrid neural network and grey wolf optimizer for intrusion detection in a cloud computing environment. Concurr. Comput. 36, e8264 (2024)","journal-title":"Concurr. Comput."},{"key":"5890_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2023.100658","volume":"44","author":"Y Zhang","year":"2024","unstructured":"Zhang, Y., Zhu, D., Wang, M., Li, J., Zhang, J.: A comparative study of cyber security intrusion detection in healthcare systems. Int. J. Crit. Infrastruct. Prot. 44, 100658 (2024)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"5890_CR32","doi-asserted-by":"publisher","unstructured":"Kunhare, N., Tiwari, R. & Dhar, J.: Network packet analysis in real time traffic and study of snort IDS during the variants of DoS attacks. 362\u2013375 (2021). https:\/\/doi.org\/10.1007\/978-3-030-49336-3_36","DOI":"10.1007\/978-3-030-49336-3_36"},{"key":"5890_CR33","doi-asserted-by":"publisher","first-page":"584","DOI":"10.37394\/23203.2021.16.54","volume":"16","author":"S Sumathi","year":"2021","unstructured":"Sumathi, S., Rajesh, R.: Comparative study on TCP SYN flood DDoS attack detection: a machine learning algorithm based approach. WSEAS Trans. Syst. Control 16, 584\u2013591 (2021)","journal-title":"WSEAS Trans. Syst. Control"},{"key":"5890_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102621","volume":"122","author":"M Ahmed","year":"2021","unstructured":"Ahmed, M., Byreddy, S., Nutakki, A., Sikos, L.F., Haskell-Dowland, P.: ECU-IoHT: a dataset for analyzing cyberattacks in internet of health things. Ad Hoc Netw. 122, 102621 (2021)","journal-title":"Ad Hoc Netw."},{"key":"5890_CR35","doi-asserted-by":"publisher","DOI":"10.3390\/pr11041072","volume":"11","author":"KP Vijayakumar","year":"2023","unstructured":"Vijayakumar, K.P., Pradeep, K., Balasundaram, A., Prusty, M.R.: Enhanced cyber attack detection process for internet of health things (IoHT) devices using deep neural network. Processes 11, 1072 (2023)","journal-title":"Processes"},{"key":"5890_CR36","doi-asserted-by":"publisher","first-page":"106576","DOI":"10.1109\/ACCESS.2020.3000421","volume":"8","author":"AA Hady","year":"2020","unstructured":"Hady, A.A., Ghubaish, A., Salman, T., Unal, D., Jain, R.: Intrusion detection system for healthcare systems using medical and network data: a comparison study. IEEE Access 8, 106576\u2013106584 (2020)","journal-title":"IEEE Access"},{"key":"5890_CR37","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12112427","volume":"12","author":"M Bakro","year":"2023","unstructured":"Bakro, M., et al.: Efficient intrusion detection system in the cloud using fusion feature selection approaches and an ensemble classifier. Electronics 12, 2427 (2023)","journal-title":"Electronics"},{"key":"5890_CR38","doi-asserted-by":"publisher","first-page":"64228","DOI":"10.1109\/ACCESS.2023.3289405","volume":"11","author":"M Bakro","year":"2023","unstructured":"Bakro, M., et al.: An improved design for a cloud intrusion detection system using hybrid features selection approach with ML classifier. IEEE Access 11, 64228\u201364247 (2023)","journal-title":"IEEE Access"},{"key":"5890_CR39","doi-asserted-by":"publisher","first-page":"8846","DOI":"10.1109\/ACCESS.2024.3353055","volume":"12","author":"M Bakro","year":"2024","unstructured":"Bakro, M., et al.: Building a cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model. IEEE Access 12, 8846\u20138874 (2024)","journal-title":"IEEE Access"},{"key":"5890_CR40","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s12046-020-1308-5","volume":"45","author":"N Kunhare","year":"2020","unstructured":"Kunhare, N., Tiwari, R., Dhar, J.: Particle swarm optimization and feature selection for intrusion detection system. S\u0101dhan\u0101 45, 109 (2020)","journal-title":"S\u0101dhan\u0101"},{"key":"5890_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108383","volume":"103","author":"N Kunhare","year":"2022","unstructured":"Kunhare, N., Tiwari, R., Dhar, J.: Intrusion detection system using hybrid classifiers with meta-heuristic algorithms for the optimization and feature selection by genetic algorithm. Comput. Electr. Eng. 103, 108383 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"5890_CR42","first-page":"276","volume":"81","author":"S Sumathi","year":"2022","unstructured":"Sumathi, S., Rajesh, R., Nagarajan, K.: DDoS attack detection using hybrid machine learning based IDS models. J. Sci. Ind. Res. (India) 81, 276\u2013286 (2022)","journal-title":"J. Sci. Ind. Res. (India)"},{"key":"5890_CR43","doi-asserted-by":"publisher","first-page":"3890","DOI":"10.17485\/IJST\/v16i43.1718","volume":"16","author":"S Sumathi","year":"2023","unstructured":"Sumathi, S., Rajesh, R.: A dynamic BPN-MLP neural network DDoS detection model using hybrid swarm intelligent framework. Indian J. Sci. Technol. 16, 3890\u20133904 (2023)","journal-title":"Indian J. Sci. Technol."},{"key":"5890_CR44","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00103-8","volume":"5","author":"RA Disha","year":"2022","unstructured":"Disha, R.A., Waheed, S.: Performance analysis of machine learning models for intrusion detection system using Gini impurity-based weighted random forest (GIWRF) feature selection technique. Cybersecurity 5, 1 (2022)","journal-title":"Cybersecurity"},{"key":"5890_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-4470-8","volume-title":"Building machine learning and deep learning models on google cloud platform","author":"E Bisong","year":"2019","unstructured":"Bisong, E.: Building machine learning and deep learning models on google cloud platform. Apress, Berkeley (2019)"},{"key":"5890_CR46","volume-title":"Data mining. concepts and techniques","author":"J Han","year":"2011","unstructured":"Han, J., Kamber, M., Pei, J.: Data mining. concepts and techniques, 3rd edn. The Morgan Kaufmann series in data management systems (2011)","edition":"3"},{"key":"5890_CR47","doi-asserted-by":"publisher","first-page":"4583","DOI":"10.3390\/s20164583","volume":"20","author":"V Dutta","year":"2020","unstructured":"Dutta, V., Chora\u015b, M., Pawlicki, M., Kozik, R.: A deep learning ensemble for network anomaly and cyber-attack detection. Sensors 20, 4583 (2020)","journal-title":"Sensors"},{"key":"5890_CR48","doi-asserted-by":"publisher","first-page":"6390","DOI":"10.1109\/TNNLS.2021.3136503","volume":"34","author":"D Dablain","year":"2023","unstructured":"Dablain, D., Krawczyk, B., Chawla, N.V.: DeepSMOTE: fusing deep learning and SMOTE for imbalanced data. IEEE Trans. Neural Netw. Learn. Syst. 34, 6390\u20136404 (2023)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"5890_CR49","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon, I., Elisseeff, A.: An introduction of variable and feature selection. J. Mach. Learn. Res. Special Issue Var. Feature Selection 3, 1157\u20131182 (2003)","journal-title":"J. Mach. Learn. Res. Special Issue Var. Feature Selection"},{"key":"5890_CR50","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.1007\/s12652-019-01364-5","volume":"11","author":"F Moslehi","year":"2020","unstructured":"Moslehi, F., Haeri, A.: A novel hybrid wrapper\u2013filter approach based on genetic algorithm, particle swarm optimization for feature subset selection. J. Ambient. Intell. Humaniz. Comput. 11, 1105\u20131127 (2020)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"5890_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CEC.2010.5586536","volume-title":"IEEE congress on evolutionary computation","author":"A Purohit","year":"2010","unstructured":"Purohit, A., Chaudhari, N.S., Tiwari, A.: Construction of classifier with feature selection based on genetic programming. In: IEEE congress on evolutionary computation, pp. 1\u20135. IEEE (2010). https:\/\/doi.org\/10.1109\/CEC.2010.5586536"},{"key":"5890_CR52","doi-asserted-by":"publisher","unstructured":"Tran, B., Xue, B. & Zhang, M.:Overview of particle swarm optimisation for feature selection in classification. In: 605\u2013617 (2014). https:\/\/doi.org\/10.1007\/978-3-319-13563-2_51","DOI":"10.1007\/978-3-319-13563-2_51"},{"key":"5890_CR53","doi-asserted-by":"publisher","first-page":"10377","DOI":"10.1007\/s10586-024-04510-7","volume":"27","author":"M Maazalahi","year":"2024","unstructured":"Maazalahi, M., Hosseini, S.: K-means and meta-heuristic algorithms for intrusion detection systems. Cluster Comput. 27, 10377\u201310419 (2024)","journal-title":"Cluster Comput."},{"key":"5890_CR54","doi-asserted-by":"publisher","DOI":"10.3390\/diagnostics14192244","volume":"14","author":"D G\u00fcrkan Kuntalp","year":"2024","unstructured":"G\u00fcrkan Kuntalp, D., \u00d6zcan, N., D\u00fczyel, O., Kababulut, F.Y., Kuntalp, M.: A comparative study of metaheuristic feature selection algorithms for respiratory disease classification. Diagnostics 14, 2244 (2024)","journal-title":"Diagnostics"},{"key":"5890_CR55","doi-asserted-by":"publisher","first-page":"4049","DOI":"10.1007\/s11831-022-09730-x","volume":"29","author":"A Bouaouda","year":"2022","unstructured":"Bouaouda, A., Sayouti, Y.: Hybrid meta-heuristic algorithms for optimal sizing of hybrid renewable energy system: a review of the state-of-the-art. Arch. Comput. Methods Eng. 29, 4049\u20134083 (2022)","journal-title":"Arch. Comput. Methods Eng."},{"key":"5890_CR56","doi-asserted-by":"publisher","first-page":"133931","DOI":"10.1109\/ACCESS.2023.3335314","volume":"11","author":"A Singh","year":"2023","unstructured":"Singh, A., Prakash, N., Jain, A.: Particle swarm optimization-based random forest framework for the classification of chronic diseases. IEEE Access 11, 133931\u2013133946 (2023)","journal-title":"IEEE Access"},{"key":"5890_CR57","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TEVC.2013.2281535","volume":"18","author":"K Deb","year":"2014","unstructured":"Deb, K., Jain, H.: An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, Part I: solving problems with box constraints. IEEE Trans. Evol. Comput. 18, 577\u2013601 (2014)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"5890_CR58","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6, 182\u2013197 (2002)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"5890_CR59","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1137\/S1052623496307510","volume":"8","author":"I Das","year":"1998","unstructured":"Das, I., Dennis, J.E.: Normal-boundary intersection: a new method for generating the Pareto surface in nonlinear multicriteria optimization problems. SIAM J. Optim. 8, 631\u2013657 (1998)","journal-title":"SIAM J. Optim."},{"key":"5890_CR60","doi-asserted-by":"publisher","unstructured":"Panichella, A.: An adaptive evolutionary algorithm based on non-euclidean geometry for many-objective optimization. In Proceedings of the genetic and evolutionary computation conference, pp. 595\u2013603. ACM, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3321707.3321839","DOI":"10.1145\/3321707.3321839"},{"key":"5890_CR61","doi-asserted-by":"publisher","unstructured":"Panichella, A: An improved Pareto front modeling algorithm for large-scale many-objective optimization. In Proceedings of the genetic and evolutionary computation conference, pp. 565\u2013573. ACM, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3512290.3528732","DOI":"10.1145\/3512290.3528732"},{"key":"5890_CR62","doi-asserted-by":"publisher","unstructured":"Blank, J., Deb, K. & Roy, P. C.: Investigating the normalization procedure of NSGA-III. In: 229\u2013240 (2019). https:\/\/doi.org\/10.1007\/978-3-030-12598-1_19","DOI":"10.1007\/978-3-030-12598-1_19"},{"key":"5890_CR63","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1109\/TEVC.2007.892759","volume":"11","author":"Q Zhang","year":"2007","unstructured":"Zhang, Q., Li, H.: MOEA\/D: a multiobjective evolutionary algorithm based on decomposition. IEEE Trans. Evol. Comput. 11, 712\u2013731 (2007)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"5890_CR64","doi-asserted-by":"publisher","first-page":"2490","DOI":"10.1109\/CEC.2003.1299401","volume-title":"The 2003 congress on evolutionary computation, 2003. CEC \u201803","author":"JD Knowles","year":"2003","unstructured":"Knowles, J.D., Corne, D.W., Fleischer, M.: Bounded archiving using the lebesgue measure. In: The 2003 congress on evolutionary computation, 2003. CEC \u201803, pp. 2490\u20132497. IEEE (2003). https:\/\/doi.org\/10.1109\/CEC.2003.1299401"},{"key":"5890_CR65","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TEVC.2003.810755","volume":"7","author":"J Knowles","year":"2003","unstructured":"Knowles, J., Corne, D.: Properties of an adaptive archiving algorithm for storing nondominated vectors. IEEE Trans. Evol. Comput. 7, 100\u2013116 (2003)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"5890_CR66","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1016\/j.ejor.2006.08.008","volume":"181","author":"N Beume","year":"2007","unstructured":"Beume, N., Naujoks, B., Emmerich, M.: SMS-EMOA: multiobjective selection based on dominated hypervolume. Eur. J. Oper. Res. 181, 1653\u20131669 (2007)","journal-title":"Eur. J. Oper. Res."},{"key":"5890_CR67","volume-title":"Genetic algorithms in search","author":"DE Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic algorithms in search. Addison-Wesley, Optimization and Machine Learning (1989)"},{"key":"5890_CR68","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102448","volume":"110","author":"Z Halim","year":"2021","unstructured":"Halim, Z., et al.: An effective genetic algorithm-based feature selection method for intrusion detection systems. Comput. Secur. 110, 102448 (2021)","journal-title":"Comput. Secur."},{"key":"5890_CR69","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1002\/9780470225868.ch3","volume-title":"Modern heuristic optimization techniques","author":"V Miranda","year":"2008","unstructured":"Miranda, V.: Fundamentals of evolution strategies and evolutionary programming. In: Modern heuristic optimization techniques, pp. 43\u201370. Wiley (2008). https:\/\/doi.org\/10.1002\/9780470225868.ch3"},{"key":"5890_CR70","first-page":"143","volume":"22","author":"V Filipovi\u0107","year":"2012","unstructured":"Filipovi\u0107, V.: Fine-grained tournament selection operator in genetic algorithms. Comput. Inform. 22, 143\u2013161 (2012)","journal-title":"Comput. Inform."},{"key":"5890_CR71","doi-asserted-by":"publisher","DOI":"10.1201\/9781482268713","volume-title":"Evolutionary computation 1","author":"T Baeck","year":"2018","unstructured":"Baeck, T., Fogel, D.B., Michalewicz, Z.: Evolutionary computation 1. CRC Press (2018)"},{"key":"5890_CR72","doi-asserted-by":"publisher","first-page":"71832","DOI":"10.1109\/ACCESS.2021.3079152","volume":"9","author":"X Wu","year":"2021","unstructured":"Wu, X., Chen, C., Ding, S.: A modified MOEA\/D algorithm for solving bi-objective multi-stage weapon-target assignment problem. IEEE Access 9, 71832\u201371848 (2021)","journal-title":"IEEE Access"},{"key":"5890_CR73","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.jiec.2008.09.003","volume":"15","author":"C Preechakul","year":"2009","unstructured":"Preechakul, C., Kheawhom, S.: Modified genetic algorithm with sampling techniques for chemical engineering optimization. J. Ind. Eng. Chem. 15, 110\u2013118 (2009)","journal-title":"J. Ind. Eng. Chem."},{"key":"5890_CR74","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1162\/EVCO_a_00130","volume":"23","author":"F Chicano","year":"2015","unstructured":"Chicano, F., Sutton, A.M., Whitley, L.D., Alba, E.: Fitness probability distribution of bit-flip mutation. Evol. Comput. 23, 217\u2013248 (2015)","journal-title":"Evol. Comput."},{"key":"5890_CR75","unstructured":"Michell , T. M.: Machine learning , https:\/\/cdn.chools.in\/DIG_LIB\/E-Book\/M1-Machine-Learning-Tom-Mitchell_.pdf"},{"key":"5890_CR76","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"5890_CR77","unstructured":"Nahua, K.: Multi-layer neural networks with sigmoid function\u2014\u201cDeep learning for rookies (2)\u201d, www.towardsdatascience.com, Web, https:\/\/towardsdatascience.com\/multi-layer-neural networks-with-sigmoid-function-deep-learning-for-rookies-2-bf464f09eb7f (2017)"},{"key":"5890_CR78","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1109\/NER.2009.5109299","volume-title":"2009 4th international IEEE\/EMBS conference on neural engineering","author":"A Yazdani","year":"2009","unstructured":"Yazdani, A., Ebrahimi, T., Hoffmann, U.: Classification of EEG signals using Dempster Shafer theory and a k-nearest neighbor classifier. In: 2009 4th international IEEE\/EMBS conference on neural engineering, pp. 327\u2013330. IEEE (2009). https:\/\/doi.org\/10.1109\/NER.2009.5109299"},{"key":"5890_CR79","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10994-006-6226-1","volume":"63","author":"P Geurts","year":"2006","unstructured":"Geurts, P., Ernst, D., Wehenkel, L.: Extremely randomized trees. Mach. Learn. 63, 3\u201342 (2006)","journal-title":"Mach. Learn."},{"key":"5890_CR80","doi-asserted-by":"publisher","first-page":"9029","DOI":"10.1007\/s11042-022-12788-1","volume":"82","author":"D Choudhury","year":"2023","unstructured":"Choudhury, D., Acharjee, T.: A novel approach to fake news detection in social networks using genetic algorithm applying machine learning classifiers. Multimed. Tools Appl. 82, 9029\u20139045 (2023)","journal-title":"Multimed. Tools Appl."},{"key":"5890_CR81","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/s10462-021-10037-9","volume":"55","author":"A Thakkar","year":"2022","unstructured":"Thakkar, A., Lohiya, R.: A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions. Artif. Intell. Rev. 55, 453\u2013563 (2022)","journal-title":"Artif. Intell. Rev."},{"key":"5890_CR82","unstructured":"Classification: Accuracy, recall, precision, and related metrics, https:\/\/developers.google.com\/machine-learning\/crash-course\/classification\/accuracy-precision-recall, (2024)"},{"key":"5890_CR83","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/s11227-024-06677-7","volume":"81","author":"Y Pourardebil Khah","year":"2025","unstructured":"Pourardebil Khah, Y., Hosseini Shirvani, M., Motameni, H.: A hybrid machine learning approach for feature selection in designing intrusion detection systems (IDS) model for distributed computing networks. J. Supercomput. 81, 254 (2025)","journal-title":"J. Supercomput."},{"key":"5890_CR84","doi-asserted-by":"publisher","unstructured":"Unal, D. BlueTack: IEEE Dataport (2021). https:\/\/doi.org\/10.21227\/skhs-0b39","DOI":"10.21227\/skhs-0b39"},{"key":"5890_CR85","doi-asserted-by":"publisher","first-page":"89497","DOI":"10.1109\/ACCESS.2020.2990567","volume":"8","author":"J Blank","year":"2020","unstructured":"Blank, J., Deb, K.: Pymoo: multi-objective optimization in Python. IEEE Access 8, 89497\u201389509 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2990567","journal-title":"IEEE Access"},{"key":"5890_CR86","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/AICCSA50499.2020.9316514","volume-title":"2020 IEEE\/ACS 17th international conference on computer systems and applications (AICCSA)","author":"S Satam","year":"2020","unstructured":"Satam, S., Satam, P., Hariri, S.: Multi-level bluetooth intrusion detection system. In: 2020 IEEE\/ACS 17th international conference on computer systems and applications (AICCSA), pp. 1\u20138. IEEE (2020). https:\/\/doi.org\/10.1109\/AICCSA50499.2020.9316514"},{"key":"5890_CR87","doi-asserted-by":"publisher","DOI":"10.3390\/s22218280","volume":"22","author":"M Zubair","year":"2022","unstructured":"Zubair, M., et al.: Secure Bluetooth communication in smart healthcare systems: a novel community dataset and intrusion detection system. Sensors 22, 8280 (2022)","journal-title":"Sensors"},{"key":"5890_CR88","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1049\/cp.2018.0035","volume-title":"Living in the Internet of Things Cybersecurity of the IoT - 2018","author":"E Anthi","year":"2018","unstructured":"Anthi, E., Williams, L., Burnap, P.: Pulse: an adaptive intrusion detection for the internet of things. In: Living in the Internet of Things Cybersecurity of the IoT - 2018, p. 35. Institution of Engineering and Technology (2018). https:\/\/doi.org\/10.1049\/cp.2018.0035"},{"key":"5890_CR89","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro, A.A., Chilamkurti, N.: Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener. Comput. Syst. 82, 761\u2013768 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"5890_CR90","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.bbe.2022.11.005","volume":"43","author":"I Firat Kilincer","year":"2023","unstructured":"Firat Kilincer, I., Ertam, F., Sengur, A., Tan, R.-S., Rajendra Acharya, U.: Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multilayer perceptron optimization. Biocybern. Biomed. Eng. 43, 30\u201341 (2023)","journal-title":"Biocybern. Biomed. Eng."},{"key":"5890_CR91","unstructured":"Taylor and Francis\u2019s Wilcoxon signed-rank test homepage, https:\/\/taylorandfrancis.com\/knowledge\/Medicine_and_healthcare\/Medical_statistics_%26_computing\/Wilcoxon_signed_rank_test\/#:~:text=Although%20the%20sign%20test%20frees,is%20not%20equal%20to%200"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05890-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05890-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05890-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T20:02:31Z","timestamp":1770926551000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05890-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,12]]},"references-count":91,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["5890"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05890-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,12]]},"assertion":[{"value":"11 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This material is the authors\u2019 own original work, which has not been previously published elsewhere.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of potential conflicts of interest"}}],"article-number":"141"}}