{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:20:00Z","timestamp":1759335600668},"reference-count":34,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T00:00:00Z","timestamp":1714694400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T00:00:00Z","timestamp":1714694400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19107-w","type":"journal-article","created":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T06:01:53Z","timestamp":1714716113000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["OCCOA for clustering-based intrusion detection system with MLP-RNN architecture"],"prefix":"10.1007","author":[{"given":"Ranjeet B.","family":"Kagade","sequence":"first","affiliation":[]},{"given":"N.","family":"Vijayaraj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,3]]},"reference":[{"key":"19107_CR1","doi-asserted-by":"publisher","unstructured":"Brindha G, Juliet PS (2021) An energy-aware cluster head selection protocol based on multi-objective dolphin swarm optimization in wireless sensor network. International Journal of Intelligent Communication, Computing and Networks Open Access Journal. https:\/\/doi.org\/10.51735\/ijiccn\/001\/14","DOI":"10.51735\/ijiccn\/001\/14"},{"issue":"1","key":"19107_CR2","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/s11277-021-08352-z","volume":"127","author":"SG Qureshi","year":"2022","unstructured":"Qureshi SG, Shandilya SK (2022) Novel fuzzy based crow search optimization algorithm for secure node-to-node data transmission in WSN. Wirel Pers Commun 127(1):577\u201397. https:\/\/doi.org\/10.1007\/s11277-021-08352-z","journal-title":"Wirel Pers Commun"},{"issue":"5","key":"19107_CR3","doi-asserted-by":"publisher","first-page":"1375","DOI":"10.3390\/s20051375","volume":"20","author":"Iman Almomani","year":"2020","unstructured":"Almomani Iman, Alromi Afnan (2020) Integrating software engineering processes in the development of efficient intrusion detection systems in wireless sensor networks. Sensors 20(5):1375","journal-title":"Sensors"},{"key":"19107_CR4","first-page":"120","volume":"23","author":"Gautam M Borkar","year":"2019","unstructured":"Borkar Gautam M, Patil Leena H, Dalgade Dilip (September 2019) Ankush Hutke, A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: a data mining concept. Sustain Comput: Inform Syst 23:120\u2013135","journal-title":"Sustain Comput: Inform Syst"},{"key":"19107_CR5","doi-asserted-by":"crossref","unstructured":"Rouissi N, Gharsellaoui H, Bouamama S (2019) Improvement of Watermarking-LEACH algorithm based on trust for wireless sensor networks, In: 23rd International conference on knowledge-based and intelligent information & engineering systems, Procedia Computer Science (vol.159, pp 803\u2013813)","DOI":"10.1016\/j.procs.2019.09.239"},{"key":"19107_CR6","doi-asserted-by":"publisher","first-page":"244","DOI":"10.3103\/S1060992X20030029","volume":"29","author":"Ashwini B Abhale","year":"2020","unstructured":"Abhale Ashwini B, Manivannan SS (2020) Supervised machine learning classification algorithmic approach for finding anomaly type of intrusion detection in wireless sensor network. Opt Mem Neural Netw 29:244\u2013256. https:\/\/doi.org\/10.3103\/S1060992X20030029","journal-title":"Opt Mem Neural Netw"},{"issue":"1","key":"19107_CR7","doi-asserted-by":"publisher","first-page":"62","DOI":"10.3103\/S0146411620010046","volume":"54","author":"L Gandhimathia","year":"2020","unstructured":"Gandhimathia L, Murugaboopathia G (2020) A novel hybrid intrusion detection using flow-based anomaly detection and cross-layer features in wireless sensor network. Autom Control Comput Sci 54(1):62\u201369","journal-title":"Autom Control Comput Sci"},{"key":"19107_CR8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.ins.2019.05.040","volume":"497","author":"K Selvakumar","year":"2019","unstructured":"Selvakumar K, Karuppiah Marimuthu, SaiRamesh L, Hafizul Islam SK, Choo Kim-Kwang Raymond (2019) Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs. Inform Sci 497:77\u201390","journal-title":"Inform Sci"},{"key":"19107_CR9","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1007\/s12083-019-00781-9","volume":"13","author":"C Umarani","year":"2020","unstructured":"Umarani C, Kannan S (2020) Intrusion detection system using hybrid tissue growing algorithm for wireless sensor network. Peer-to-Peer Netw Appl 13:752\u2013761. https:\/\/doi.org\/10.1007\/s12083-019-00781-9","journal-title":"Peer-to-Peer Netw Appl"},{"key":"19107_CR10","doi-asserted-by":"publisher","first-page":"2822","DOI":"10.12928\/TELKOMNIKA.v18i6.15199","volume":"18","author":"Kaushik Sekaran","year":"2020","unstructured":"Sekaran Kaushik, Rajkumar Y, Thamarai Latchoumi, Kadry Seifedine, Lim Sangsoon, Raja Success (2020) An energy-efficient cluster head selection in wireless sensor network using grey wolf optimization algorithm. TELKOMNIKA (Telecommunication Computing Electronics and Control) 18:2822\u20132833. https:\/\/doi.org\/10.12928\/TELKOMNIKA.v18i6.15199","journal-title":"TELKOMNIKA (Telecommunication Computing Electronics and Control)"},{"key":"19107_CR11","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1007\/s11277-021-08101-2","volume":"118","author":"M Maheswari","year":"2021","unstructured":"Maheswari M, Karthika RA (2021) A novel QoS based secure unequal clustering protocol with intrusion detection system in wireless sensor networks. Wireless Pers Commun 118:1535\u20131557. https:\/\/doi.org\/10.1007\/s11277-021-08101-2","journal-title":"Wireless Pers Commun"},{"issue":"3","key":"19107_CR12","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3390\/jsan9030039","volume":"9","author":"A Rabie","year":"2020","unstructured":"Rabie A (2020) Ramadan, efficient intrusion detection algorithms for smart cities-based wireless sensing technologies. J Sensor Actuator Netw 9(3):39","journal-title":"J Sensor Actuator Netw"},{"key":"19107_CR13","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1007\/s11277-020-07395-y","volume":"114","author":"S Sinha","year":"2020","unstructured":"Sinha S, Paul A (2020) Neuro-fuzzy based intrusion detection system for wireless sensor network. Wireless Pers Commun 114:835\u2013851. https:\/\/doi.org\/10.1007\/s11277-020-07395-y","journal-title":"Wireless Pers Commun"},{"issue":"2","key":"19107_CR14","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1007\/s11227-018-2574-4","volume":"76","author":"LiTu WeizhengXiumei","year":"2020","unstructured":"WeizhengXiumei LiTu (2020) Quality analysis of multi-sensor intrusion detection node deployment in homogeneous wireless sensor networks. J Supercomput 76(2):1331\u20131341","journal-title":"J Supercomput"},{"key":"19107_CR15","doi-asserted-by":"publisher","first-page":"16483","DOI":"10.1007\/s00500-020-04955-z","volume":"24","author":"K Thangaramya","year":"2020","unstructured":"Thangaramya K, Kulothungan K, Indira Gandhi S et al (2020) Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Comput 24:16483\u201316497. https:\/\/doi.org\/10.1007\/s00500-020-04955-z","journal-title":"Soft Comput"},{"key":"19107_CR16","doi-asserted-by":"publisher","first-page":"1559","DOI":"10.1007\/s12652-020-02228-z","volume":"12","author":"M Safaldin","year":"2021","unstructured":"Safaldin M, Otair M, Abualigah L (2021) Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J Ambient Intell Humaniz Comput 12:1559\u201376. https:\/\/doi.org\/10.1007\/s12652-020-02228-z","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"19107_CR17","doi-asserted-by":"publisher","first-page":"61070","DOI":"10.1109\/ACCESS.2020.2983219","volume":"8","author":"T-K Dao","year":"2020","unstructured":"Dao T-K, Nguyen T-T, Pan J-S, Qiao Y, Lai Q-A (2020) Identification failure data for cluster heads aggregation in WSN based on improving classification of SVM. IEEE Access 8:61070\u201361084. https:\/\/doi.org\/10.1109\/ACCESS.2020.2983219","journal-title":"IEEE Access"},{"key":"19107_CR18","doi-asserted-by":"publisher","first-page":"1559","DOI":"10.1007\/s12652-020-02228-z","volume":"12","author":"M Safaldin","year":"2021","unstructured":"Safaldin M, Otair M, Abualigah L (2021) Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J Ambient Intell Human Comput 12:1559\u20131576. https:\/\/doi.org\/10.1007\/s12652-020-02228-z","journal-title":"J Ambient Intell Human Comput"},{"key":"19107_CR19","doi-asserted-by":"publisher","first-page":"3825","DOI":"10.1109\/ACCESS.2023.3349248","volume":"12","author":"HM Saleh","year":"2024","unstructured":"Saleh HM, Marouane H, Fakhfakh A (2024) Stochastic gradient descent intrusions detection for wireless sensor network attack detection system using machine learning. IEEE Access 12:3825\u20133836. https:\/\/doi.org\/10.1109\/ACCESS.2023.3349248","journal-title":"IEEE Access"},{"key":"19107_CR20","doi-asserted-by":"publisher","first-page":"169548","DOI":"10.1109\/ACCESS.2020.3024219","volume":"8","author":"Shuai Jiang","year":"2020","unstructured":"Jiang Shuai, Zhao Juan, Xiaolong Xu (2020) SLGBM: an intrusion detection mechanism for wireless sensor networks in smart environments. IEEE Access 8:169548\u2013169558","journal-title":"IEEE Access"},{"key":"19107_CR21","doi-asserted-by":"publisher","first-page":"99837","DOI":"10.1109\/ACCESS.2022.3206425","volume":"10","author":"A Halbouni","year":"2022","unstructured":"Halbouni A, Gunawan TS, Habaebi MH, Halbouni M, Kartiwi M, Ahmad R (2022) CNN-LSTM: hybrid deep neural network for network intrusion detection system. IEEE Access 10:99837\u201399849. https:\/\/doi.org\/10.1109\/ACCESS.2022.3206425","journal-title":"IEEE Access"},{"key":"19107_CR22","doi-asserted-by":"crossref","unstructured":"Kagade RB, Jayagopalan S (2022) Optimization assisted deep learning based intrusion detection system in wireless sensor network with two-tier trust evaluation. Int J Netw Manag 32(4):e2196","DOI":"10.1002\/nem.2196"},{"key":"19107_CR23","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.isatra.2020.11.016","volume":"111","author":"Shashank Gavel","year":"2021","unstructured":"Gavel Shashank, Raghuvanshi Ajay Singh, Tiwari Sundarshan (2021) A novel density estimation based intrusion detection technique with Pearson\u2019s divergence for Wireless Sensor Networks. ISA Trans 111:180\u2013191","journal-title":"ISA Trans"},{"key":"19107_CR24","doi-asserted-by":"publisher","unstructured":"Zhang T, Han D, Marino MD, Wang L, Li KC (2022) An evolutionary-based approach for low-complexity intrusion detection in wireless sensor networks. Wirel Pers Commun 1\u201324. https:\/\/doi.org\/10.1007\/s11277-021-08757-w","DOI":"10.1007\/s11277-021-08757-w"},{"key":"19107_CR25","doi-asserted-by":"publisher","first-page":"1407","DOI":"10.3390\/s22041407","volume":"22","author":"Gaoyuan Liu","year":"2022","unstructured":"Liu Gaoyuan, Zhao Huiqi, Fan Fang, Liu Gang, Qiang Xu, Nazir Shah (2022) An enhanced intrusion detection model based on improved kNN in WSNs. Sensors 22:1407","journal-title":"Sensors"},{"key":"19107_CR26","doi-asserted-by":"publisher","first-page":"35","DOI":"10.3390\/computers12020035","volume":"12","author":"Mandli Rami Reddy","year":"2023","unstructured":"Reddy Mandli Rami, Ravi Chandra ML, Venkatramana P, Dilli Ravilla (2023) Energy-efficient cluster head selection in wireless sensor networks using an improved grey wolf optimization algorithm. Computers 12:35","journal-title":"Computers"},{"issue":"2","key":"19107_CR27","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1049\/iet-wss.2018.5008","volume":"9","author":"A Shankar","year":"2019","unstructured":"Shankar A, Jaisankar N, Khan MS, Patan R, Balamurugan B (2019) Hybrid model for security-aware cluster head selection in wireless sensor networks. IET Wireless Sensor Systems 9(2):68\u201376","journal-title":"IET Wireless Sensor Systems"},{"key":"19107_CR28","doi-asserted-by":"publisher","unstructured":"Ivani\u0107 M, Mezei I (2018) Distance estimation based on rssi improvements of orientation aware nodes. In2018 Zooming innovation in consumer technologies conference (ZINC). IEEE, pp 140\u2013143. https:\/\/doi.org\/10.1109\/ZINC.2018.8448660","DOI":"10.1109\/ZINC.2018.8448660"},{"key":"19107_CR29","doi-asserted-by":"crossref","unstructured":"Asha P.N, S.C Lingareddy, Mahalakshmi T, Archana S\u00a0 (2017) Enhancedsecure sensor protocol with information via negotiation(SSPIN). International Journal of Engineering Trends and Technology (IJETT) V43(5):268\u2013273.\u00a0www.ijettjournal.org. published by seventh sense research group","DOI":"10.14445\/22315381\/IJETT-V43P245"},{"key":"19107_CR30","doi-asserted-by":"publisher","first-page":"115352","DOI":"10.1016\/j.eswa.2021.115352","volume":"183","author":"Iraj Naruei","year":"2021","unstructured":"Naruei Iraj, Keynia Farshid (2021) A new optimization method based on COOT bird natural life model. Exp Syst Applic 183:115352. https:\/\/doi.org\/10.1016\/j.eswa.2021.115352. ISSN 0957-4174","journal-title":"Exp Syst Applic"},{"key":"19107_CR31","doi-asserted-by":"publisher","first-page":"1126450","DOI":"10.3389\/fmech.2022.1126450","volume":"8","author":"M Dehghani","year":"2023","unstructured":"Dehghani M, Trojovsk\u00fd P (2023) Osprey optimization algorithm: a new bio-inspired metaheuristic algorithm for solving engineering optimization problems. Front Mech Eng 8:1126450","journal-title":"Front Mech Eng"},{"issue":"2","key":"19107_CR32","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1049\/iet-wss.2018.5008","volume":"9","author":"A Shankar","year":"2019","unstructured":"Shankar A, Jaisankar N, Khan MS, Patan R, Balamurugan B (2019) Hybrid model for security-aware cluster head selection in wireless sensor networks. IET Wireless Sensor Systems 9(2):68\u201376","journal-title":"IET Wireless Sensor Systems"},{"key":"19107_CR33","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1016\/j.procs.2019.09.239","volume":"159","author":"N Rouissi","year":"2019","unstructured":"Rouissi N, Gharsellaoui H, Bouamama S (2019) Improvement of watermarking-LEACH algorithm based on trust for wireless sensor networks. Procedia Comput Sci 159:803\u201313","journal-title":"Procedia Comput Sci"},{"key":"19107_CR34","doi-asserted-by":"crossref","unstructured":"Sharfuddin AA, Tihami MN, Islam MS (2018) A deep recurrent neural network with bilstm model for sentiment classification. In2018 International conference on Bangla speech and language processing (ICBSLP). IEEE, pp 1\u20134","DOI":"10.1109\/ICBSLP.2018.8554396"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19107-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19107-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19107-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T06:05:04Z","timestamp":1714716304000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19107-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,3]]},"references-count":34,"alternative-id":["19107"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19107-w","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,3]]},"assertion":[{"value":"3 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"The authors declare no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}