{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T07:56:05Z","timestamp":1776153365242,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T00:00:00Z","timestamp":1615161600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T00:00:00Z","timestamp":1615161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100005605","name":"Universiti Malaysia Pahang","doi-asserted-by":"publisher","award":["RDU192215"],"award-info":[{"award-number":["RDU192215"]}],"id":[{"id":"10.13039\/501100005605","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11042-021-10567-y","type":"journal-article","created":{"date-parts":[[2021,3,8]],"date-time":"2021-03-08T15:02:38Z","timestamp":1615215758000},"page":"31381-31399","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":54,"title":["Effective combining of feature selection techniques for machine learning-enabled IoT intrusion detection"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8221-6168","authenticated-orcid":false,"given":"Md Arafatur","family":"Rahman","sequence":"first","affiliation":[]},{"given":"A. Taufiq","family":"Asyhari","sequence":"additional","affiliation":[]},{"given":"Ong Wei","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Husnul","family":"Ajra","sequence":"additional","affiliation":[]},{"given":"Yussuf","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Farhat","family":"Anwar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,8]]},"reference":[{"issue":"9","key":"10567_CR1","doi-asserted-by":"publisher","first-page":"3735","DOI":"10.1007\/s12652-019-01569-8","volume":"11","author":"TA Alamiedy","year":"2020","unstructured":"Alamiedy TA, Anbar M, Alqattan ZNM, Alzubi QM (2020) Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm. J Amb Intell Hum Comput 11(9):3735\u20133756","journal-title":"J Amb Intell Hum Comput"},{"issue":"8","key":"10567_CR2","doi-asserted-by":"publisher","first-page":"1796","DOI":"10.1109\/TCYB.2015.2490802","volume":"46","author":"OY Al-Jarrah","year":"2016","unstructured":"Al-Jarrah OY, Alhussein O, Yoo PD, Muhaidat S, Taha K, Kim K (2016) Data randomization and cluster-based partitioning for botnet intrusion detection. IEEE Trans Cybern 46(8):1796\u20131806","journal-title":"IEEE Trans Cybern"},{"issue":"3","key":"10567_CR3","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/TIFS.2017.2762828","volume":"13","author":"ME Aminanto","year":"2018","unstructured":"Aminanto ME, Choi R, Tanuwidjaja HC, Yoo PD, Kim K (2018) Deep abstraction and weighted feature selection for Wi-Fi impersonation detection. IEEE Trans Inf Foren Sec 13(3):621\u2013636","journal-title":"IEEE Trans Inf Foren Sec"},{"key":"10567_CR4","doi-asserted-by":"crossref","unstructured":"Bhosale KS, Nenova M, Iliev G (2018) Modified naive bayes intrusion detection system (MNBIDS). In: 2018 international conference on computational techniques, electronics and mechanical systems (CTEMS). IEEE, pp 291\u2013296","DOI":"10.1109\/CTEMS.2018.8769248"},{"issue":"6","key":"10567_CR5","doi-asserted-by":"publisher","first-page":"2381","DOI":"10.1109\/JSTARS.2015.2388577","volume":"8","author":"Y Chen","year":"2015","unstructured":"Chen Y, Zhao X, Jia X (2015) Spectral\u2013spatial classification of hyperspectral data based on deep belief network. IEEE J Sel Topics Appl Earth Observ Remote Sens 8(6):2381\u20132392","journal-title":"IEEE J Sel Topics Appl Earth Observ Remote Sens"},{"key":"10567_CR6","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.ins.2019.01.064","volume":"484","author":"KL Chiew","year":"2019","unstructured":"Chiew KL, Tan CL, Wong K, Yong KS, Tiong WK (2019) A new hybrid ensemble feature selection framework for machine learning-based phishing detection system. Inf Sci 484:153\u2013166","journal-title":"Inf Sci"},{"key":"10567_CR7","volume-title":"Elements of information theory","author":"TM Cover","year":"2006","unstructured":"Cover TM, Thomas JA (2006) Elements of information theory, 2nd edn. Wiley, Hoboken","edition":"2nd edn."},{"issue":"4","key":"10567_CR8","doi-asserted-by":"publisher","first-page":"9889","DOI":"10.1007\/s10586-018-1847-2","volume":"22","author":"L Deng","year":"2019","unstructured":"Deng L, Li D, Yao X, Cox D, Wang H (2019) Mobile network intrusion detection for iot system based on transfer learning algorithm. Clust Comput 22(4):9889\u20139904","journal-title":"Clust Comput"},{"key":"10567_CR9","doi-asserted-by":"crossref","unstructured":"Elgammal MA, Mostafa H, Salama KN, Nader Mohieldin A (2019) A comparison of artificial neural network(ANN) and support vector machine(SVM) classifiers for neural seizure detection. In: 2019 IEEE 62nd international midwest symposium on circuits and systems (MWSCAS). IEEE, pp 646\u2013649","DOI":"10.1109\/MWSCAS.2019.8884989"},{"issue":"6","key":"10567_CR10","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1631\/FITEE.1601491","volume":"19","author":"A Firdaus","year":"2018","unstructured":"Firdaus A, Anuar NB, Karim A, Razak MFA (2018) Discovering optimal features using static analysis and a genetic search based method for Android malware detection. Front Inf Technol Elec Eng 19(6):712\u2013736","journal-title":"Front Inf Technol Elec Eng"},{"key":"10567_CR11","doi-asserted-by":"publisher","first-page":"82512","DOI":"10.1109\/ACCESS.2019.2923640","volume":"7","author":"X Gao","year":"2019","unstructured":"Gao X, Shan C, Hu C, Niu Z, Liu Z (2019) An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7:82512\u201382521","journal-title":"IEEE Access"},{"issue":"1","key":"10567_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-020-00206-6","volume":"9","author":"R Gassais","year":"2020","unstructured":"Gassais R, Ezzati-Jivan N, Fernandez JM, Aloise D, Dagenais MR (2020) Multi-level host-based intrusion detection system for internet of things. J Cloud Comput 9(1):1\u201316","journal-title":"J Cloud Comput"},{"key":"10567_CR13","doi-asserted-by":"crossref","unstructured":"Gul A, Adali E (2017) A feature selection algorithm for IDS. In: 2017 international conference on computer science and engineering (UBMK). IEEE, pp 816\u2013820","DOI":"10.1109\/UBMK.2017.8093538"},{"issue":"4","key":"10567_CR14","doi-asserted-by":"publisher","first-page":"1052","DOI":"10.1109\/JSYST.2013.2257594","volume":"8","author":"S Han","year":"2014","unstructured":"Han S, Xie M, Chen HH, Ling Y (2014) Intrusion detection in cyber-physical systems: techniques and challenges. IEEE Sys J 8(4):1052\u20131062","journal-title":"IEEE Sys J"},{"issue":"4","key":"10567_CR15","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1109\/MNET.001.1900480","volume":"34","author":"D He","year":"2020","unstructured":"He D, Liu X, Zheng J, Chan S, Zhu S, Min W, Guizani N (2020) A lightweight and intelligent intrusion detection system for integrated electronic systems. IEEE Netw 34(4):173\u2013179","journal-title":"IEEE Netw"},{"key":"10567_CR16","doi-asserted-by":"crossref","unstructured":"Jaber AN, Rehman SU (2020) FCM\u2013SVM Based intrusion detection system for cloud computing environment. Cluster Comput","DOI":"10.1007\/s10586-020-03082-6"},{"key":"10567_CR17","doi-asserted-by":"publisher","first-page":"42450","DOI":"10.1109\/ACCESS.2019.2907965","volume":"7","author":"SU Jan","year":"2019","unstructured":"Jan SU, Ahmed S, Shakhov V, Koo I (2019) Toward a lightweight intrusion detection system for the internet of things. IEEE Access 7:42450\u201342471","journal-title":"IEEE Access"},{"key":"10567_CR18","doi-asserted-by":"crossref","unstructured":"Javadpour A, Kazemi Abharian S, Wang G (2017) Feature selection and intrusion detection in cloud environment based on machine learning algorithms. In: 2017 IEEE International symposium on parallel and distributed processing with applications and 2017 IEEE international conference on ubiquitous computing and communications (ISPA\/IUCC). IEEE, pp 1417\u20131421","DOI":"10.1109\/ISPA\/IUCC.2017.00215"},{"key":"10567_CR19","doi-asserted-by":"publisher","first-page":"38597","DOI":"10.1109\/ACCESS.2019.2905633","volume":"7","author":"SM Kasongo","year":"2019","unstructured":"Kasongo SM, Sun Y (2019) A deep learning method with filter based feature engineering for wireless intrusion detection system. IEEE Access 7:38597\u201338607","journal-title":"IEEE Access"},{"key":"10567_CR20","doi-asserted-by":"publisher","first-page":"101752","DOI":"10.1016\/j.cose.2020.101752","volume":"92","author":"SM Kasongo","year":"2020","unstructured":"Kasongo SM, Sun Y (2020) A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Comput Secur 92:101752","journal-title":"Comput Secur"},{"issue":"8","key":"10567_CR21","doi-asserted-by":"publisher","first-page":"3906","DOI":"10.1109\/TIP.2016.2570569","volume":"25","author":"LLC Kasun","year":"2016","unstructured":"Kasun LLC, Yang Y, Huang GB, Zhang Z (2016) Dimension reduction with extreme learning machine. IEEE Trans Image Process 25(8):3906\u20133918","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"10567_CR22","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/COMST.2015.2402161","volume":"18","author":"C Kolias","year":"2016","unstructured":"Kolias C, Kambourakis G, Stavrou A, Gritzalis S (2016) Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun Surv Tutor 18(1):184\u2013208","journal-title":"IEEE Commun Surv Tutor"},{"key":"10567_CR23","doi-asserted-by":"publisher","first-page":"65520","DOI":"10.1109\/ACCESS.2020.2985089","volume":"8","author":"SJ Lee","year":"2020","unstructured":"Lee SJ, Yoo PD, Asyhari AT, Jhi Y, Chermak L, Yeun CY, Taha K (2020) Impact: impersonation attack detection via edge computing using deep autoencoder and feature abstraction. IEEE Access 8:65520\u201365529","journal-title":"IEEE Access"},{"key":"10567_CR24","doi-asserted-by":"publisher","first-page":"107450","DOI":"10.1016\/j.measurement.2019.107450","volume":"154","author":"Y Li","year":"2020","unstructured":"Li Y, Xu Y, Liu Z, Hou H, Zheng Y, Xin Y, Zhao Y, Cui L (2020) Robust detection for network intrusion of industrial iot based on multi-cnn fusion. Measurement 154:107450","journal-title":"Measurement"},{"key":"10567_CR25","doi-asserted-by":"crossref","unstructured":"Mighan SN, Kahani M (2020) A novel scalable intrusion detection system based on deep learning. Int J Inf Secur: 1\u201317","DOI":"10.1007\/s10207-020-00508-5"},{"issue":"8","key":"10567_CR26","doi-asserted-by":"publisher","first-page":"e4015","DOI":"10.1002\/cpe.4015","volume":"29","author":"Y Mu","year":"2017","unstructured":"Mu Y, Liu X, Yang Z, Liu X (2017) A parallel C4.5 decision tree algorithm based on MapReduce. Concur Comput Prac Exp 29(8):e4015","journal-title":"Concur Comput Prac Exp"},{"key":"10567_CR27","doi-asserted-by":"crossref","unstructured":"Omrani T, Dallali A, Rhaimi BC, Fattahi J (2017) Fusion of ANN and SVM classifiers for network attack detection. In: 2017 18th international conference on sciences and techniques of automatic control and computer engineering (STA). IEEE, pp 374\u2013377","DOI":"10.1109\/STA.2017.8314974"},{"issue":"8","key":"10567_CR28","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.1109\/TPAMI.2017.2738645","volume":"40","author":"W Ouyang","year":"2018","unstructured":"Ouyang W, Zhou H, Li H, Li Q, Yan J, Wang X (2018) Jointly learning deep features, deformable parts, occlusion and classification for pedestrian detection. IEEE Trans Patt Anal Mach Intell 40(8):1874\u20131887","journal-title":"IEEE Trans Patt Anal Mach Intell"},{"key":"10567_CR29","doi-asserted-by":"crossref","unstructured":"Parker LR, Yoo PD, Asyhari TA, Chermak L, Jhi Y, Taha K (2019) DEMISE. In: Proceedings of the 14th international conference on availability, reliability and security - ARES \u201919. ACM Press, New York, pp 1\u201310","DOI":"10.1145\/3339252.3340497"},{"issue":"2","key":"10567_CR30","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/s10489-016-0843-6","volume":"46","author":"AV Phan","year":"2017","unstructured":"Phan AV, Nguyen ML, Bui LT (2017) Feature weighting and SVM parameters optimization based on genetic algorithms for classification problems. Appl Intell 46(2):455\u2013469","journal-title":"Appl Intell"},{"issue":"2","key":"10567_CR31","doi-asserted-by":"publisher","first-page":"40","DOI":"10.3390\/computers8020040","volume":"8","author":"MA Rahman","year":"2019","unstructured":"Rahman MA, Asyhari AT (2019) The emergence of internet of things (iot): Connecting anything, anywhere. Computers 8(2):40","journal-title":"Computers"},{"key":"10567_CR32","doi-asserted-by":"publisher","first-page":"102324","DOI":"10.1016\/j.scs.2020.102324","volume":"61","author":"MA Rahman","year":"2020","unstructured":"Rahman MA, Asyhari AT, Leong L, Satrya G, Hai Tao M, Zolkipli M (2020) Scalable machine learning-based intrusion detection system for iot-enabled smart cities. Sustain Cities Soc 61:102324","journal-title":"Sustain Cities Soc"},{"key":"10567_CR33","doi-asserted-by":"crossref","unstructured":"Sahani R, Shatabdinalini, Rout C, Chandrakanta Badajena J, Jena AK, Das H (2018) Classification of intrusion detection using data mining techniques: 753\u2013764","DOI":"10.1007\/978-981-10-7871-2_72"},{"key":"10567_CR34","doi-asserted-by":"crossref","unstructured":"Salih AA, Abdulrazaq MB (2019) Combining best features selection using three classifiers in intrusion detection system. In: 2019 International conference on advanced science and engineering (ICOASE). IEEE, pp 94\u201399","DOI":"10.1109\/ICOASE.2019.8723671"},{"key":"10567_CR35","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1016\/j.neucom.2014.10.004","volume":"151","author":"S Sheen","year":"2015","unstructured":"Sheen S, Anitha R, Natarajan V (2015) Android based malware detection using a multifeature collaborative decision fusion approach. Neurocomputing 151:905\u2013912","journal-title":"Neurocomputing"},{"issue":"1","key":"10567_CR36","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/TBDATA.2016.2646700","volume":"3","author":"D Singh","year":"2017","unstructured":"Singh D, Roy D, Mohan CK (2017) Dip-SVM : distribution preserving kernel support vector machine for big data. IEEE Trans Big Data 3(1):79\u201390","journal-title":"IEEE Trans Big Data"},{"issue":"2","key":"10567_CR37","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s12083-017-0630-0","volume":"12","author":"N Sultana","year":"2019","unstructured":"Sultana N, Chilamkurti N, Peng W, Alhadad R (2019) Survey on sdn based network intrusion detection system using machine learning approaches. Peer-to-Peer Netw Appl 12(2):493\u2013501","journal-title":"Peer-to-Peer Netw Appl"},{"key":"10567_CR38","doi-asserted-by":"publisher","first-page":"13624","DOI":"10.1109\/ACCESS.2018.2810198","volume":"6","author":"P Tao","year":"2018","unstructured":"Tao P, Sun Z, Sun Z (2018) An improved intrusion detection algorithm based on GA and SVM. IEEE Access 6:13624\u201313631","journal-title":"IEEE Access"},{"issue":"4","key":"10567_CR39","doi-asserted-by":"publisher","first-page":"2287","DOI":"10.1007\/s11277-019-06986-8","volume":"111","author":"A Verma","year":"2020","unstructured":"Verma A, Ranga V (2020) Machine learning based intrusion detection systems for iot applications. Wirel Pers Commun 111(4):2287\u20132310","journal-title":"Wirel Pers Commun"},{"key":"10567_CR40","doi-asserted-by":"publisher","first-page":"113022","DOI":"10.1016\/j.eswa.2019.113022","volume":"143","author":"M Wadkar","year":"2020","unstructured":"Wadkar M, Di Troia F, Stamp M (2020) Detecting malware evolution using support vector machines. Expert Syst Appl 143:113022","journal-title":"Expert Syst Appl"},{"key":"10567_CR41","doi-asserted-by":"crossref","unstructured":"Wang W, Du X, Shan D, Qin R, Wang N (2020) Cloud intrusion detection method based on stacked contractive Auto-Encoder and support vector machine. IEEE Trans Cloud Comput: 1\u20131","DOI":"10.1109\/TCC.2020.3001017"},{"issue":"11","key":"10567_CR42","doi-asserted-by":"publisher","first-page":"1869","DOI":"10.1109\/TIFS.2014.2353996","volume":"9","author":"W Wang","year":"2014","unstructured":"Wang W, Wang X, Feng D, Liu J, Han Z, Zhang X (2014) Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans Inf Foren Sec 9(11):1869\u20131882","journal-title":"IEEE Trans Inf Foren Sec"},{"issue":"5","key":"10567_CR43","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1109\/THMS.2017.2736948","volume":"47","author":"W Wang","year":"2017","unstructured":"Wang W, Xi J, Chong A, Li L (2017) Driving style classification using a semisupervised support vector machine. IEEE Trans Hum Mach Sys 47 (5):650\u2013660","journal-title":"IEEE Trans Hum Mach Sys"},{"issue":"12","key":"10567_CR44","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1109\/LGRS.2016.2616440","volume":"13","author":"H Wu","year":"2016","unstructured":"Wu H, Liu B, Su W, Zhang W, Sun J (2016) Deep filter banks for Land-Use scene classification. IEEE Geosci Remote Sens Lett 13(12):1895\u20131899","journal-title":"IEEE Geosci Remote Sens Lett"},{"key":"10567_CR45","doi-asserted-by":"crossref","unstructured":"Xu Q, Zhang C, Zhang L, Song Y (2016) The learning effect of different hidden layers stacked autoencoder. In: 2016 8th international conference on intelligent human-machine systems and cybernetics (IHMSC). IEEE, pp 148\u2013151","DOI":"10.1109\/IHMSC.2016.280"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10567-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10567-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10567-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T05:44:23Z","timestamp":1631684663000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10567-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,8]]},"references-count":45,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["10567"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10567-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,8]]},"assertion":[{"value":"14 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}