{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:21:43Z","timestamp":1774369303270,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T00:00:00Z","timestamp":1643068800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T00:00:00Z","timestamp":1643068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11227-021-04284-4","type":"journal-article","created":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T12:14:40Z","timestamp":1643112880000},"page":"10725-10756","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":65,"title":["Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier"],"prefix":"10.1007","volume":"78","author":[{"given":"Sumaiya Thaseen","family":"Ikram","sequence":"first","affiliation":[]},{"given":"V.","family":"Priya","sequence":"additional","affiliation":[]},{"given":"B.","family":"Anbarasu","sequence":"additional","affiliation":[]},{"given":"Xiaochun","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Muhammad Rukunuddin","family":"Ghalib","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3165-3293","authenticated-orcid":false,"given":"Achyut","family":"Shankar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,25]]},"reference":[{"key":"4284_CR1","doi-asserted-by":"crossref","unstructured":"Morris T, Gao W (2014) Industrial control system traffic data sets for intrusion detection research. In: International Conference on Critical Infrastructure Protection. Springer, Berlin, pp 65\u201378","DOI":"10.1007\/978-3-662-45355-1_5"},{"issue":"6","key":"4284_CR2","doi-asserted-by":"publisher","first-page":"690","DOI":"10.3390\/math9060690","volume":"9","author":"R Panigrahi","year":"2021","unstructured":"Panigrahi R, Borah S, Bhoi AK, Ijaz MF, Pramanik M, Jhaveri RH, Chowdhary CL (2021) Performance assessment of supervised classifiers for designing intrusion detection systems: a comprehensive review and recommendations for future research. Mathematics 9(6):690","journal-title":"Mathematics"},{"issue":"7","key":"4284_CR3","doi-asserted-by":"publisher","first-page":"751","DOI":"10.3390\/math9070751","volume":"9","author":"R Panigrahi","year":"2021","unstructured":"Panigrahi R, Borah S, Bhoi AK, Ijaz MF, Pramanik M, Kumar Y, Jhaveri RH (2021) A consolidated decision tree-based intrusion detection system for binary and multiclass imbalanced datasets. Mathematics 9(7):751","journal-title":"Mathematics"},{"key":"4284_CR4","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.swevo.2013.12.005","volume":"16","author":"SC Satapathy","year":"2014","unstructured":"Satapathy SC, Naik A (2014) Modified teaching\u2013learning-based optimization algorithm for global numerical optimization\u2014a comparative study. Swarm Evol Comput 16:28\u201337","journal-title":"Swarm Evol Comput"},{"key":"4284_CR5","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.compind.2016.05.008","volume":"82","author":"AD Li","year":"2016","unstructured":"Li AD, He Z, Zhang Y (2016) Bi-objective variable selection for key quality characteristics selection based on a modified NSGA-II and the ideal point method. Comput Ind 82:95\u2013103","journal-title":"Comput Ind"},{"issue":"4","key":"4284_CR6","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1109\/TEVC.2015.2504420","volume":"20","author":"B Xue","year":"2015","unstructured":"Xue B, Zhang M, Browne WN, Yao X (2015) A survey on evolutionary computation approaches to feature selection. IEEE Trans Evol Comput 20(4):606\u2013626","journal-title":"IEEE Trans Evol Comput"},{"issue":"6","key":"4284_CR7","doi-asserted-by":"publisher","first-page":"1496","DOI":"10.1109\/TCYB.2016.2549639","volume":"47","author":"K Mistry","year":"2016","unstructured":"Mistry K, Zhang L, Neoh SC, Lim CP, Fielding B (2016) A micro-GA embedded PSO feature selection approach to intelligent facial emotion recognition. IEEE Trans Cybern 47(6):1496\u20131509","journal-title":"IEEE Trans Cybern"},{"issue":"6","key":"4284_CR8","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1109\/TEVC.2017.2688863","volume":"21","author":"A Rosales-P\u00e9rez","year":"2017","unstructured":"Rosales-P\u00e9rez A, Garc\u00eda S, Gonzalez JA, Coello CAC, Herrera F (2017) An evolutionary multiobjective model and instance selection for support vector machines with pareto-based ensembles. IEEE Trans Evol Comput 21(6):863\u2013877","journal-title":"IEEE Trans Evol Comput"},{"key":"4284_CR9","doi-asserted-by":"publisher","first-page":"106852","DOI":"10.1016\/j.cie.2020.106852","volume":"149","author":"AD Li","year":"2020","unstructured":"Li AD, He Z (2020) Multiobjective feature selection for key quality characteristic identification in production processes using a nondominated-sorting-based whale optimization algorithm. Comput Ind Eng 149:106852","journal-title":"Comput Ind Eng"},{"issue":"10","key":"4284_CR10","doi-asserted-by":"publisher","first-page":"3927","DOI":"10.1007\/s00500-016-2128-8","volume":"20","author":"HB Nguyen","year":"2016","unstructured":"Nguyen HB, Xue B, Liu I, Andreae P, Zhang M (2016) New mechanism for archive maintenance in PSO-based multi-objective feature selection. Soft Comput 20(10):3927\u20133946","journal-title":"Soft Comput"},{"key":"4284_CR11","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.eswa.2018.07.013","volume":"113","author":"M Amoozegar","year":"2018","unstructured":"Amoozegar M, Minaei-Bidgoli B (2018) Optimizing multi-objective PSO based feature selection method using a feature elitism mechanism. Expert Syst Appl 113:499\u2013514","journal-title":"Expert Syst Appl"},{"key":"4284_CR12","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.eswa.2019.06.044","volume":"137","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Cheng S, Shi Y, Gong DW, Zhao X (2019) Cost-sensitive feature selection using two-archive multi-objective artificial bee colony algorithm. Expert Syst Appl 137:46\u201358","journal-title":"Expert Syst Appl"},{"key":"4284_CR13","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.ins.2017.09.028","volume":"422","author":"E Hancer","year":"2018","unstructured":"Hancer E, Xue B, Zhang M, Karaboga D, Akay B (2018) Pareto front feature selection based on artificial bee colony optimization. Inf Sci 422:462\u2013479","journal-title":"Inf Sci"},{"key":"4284_CR14","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.knosys.2016.10.030","volume":"116","author":"Y Zhu","year":"2017","unstructured":"Zhu Y, Liang J, Chen J, Ming Z (2017) An improved NSGA-III algorithm for feature selection used in intrusion detection. Knowl-Based Syst 116:74\u201385","journal-title":"Knowl-Based Syst"},{"issue":"3","key":"4284_CR15","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1016\/j.ejor.2018.10.051","volume":"274","author":"AD Li","year":"2019","unstructured":"Li AD, He Z, Wang Q, Zhang Y (2019) Key quality characteristics selection for imbalanced production data using a two-phase bi-objective feature selection method. Eur J Oper Res 274(3):978\u2013989","journal-title":"Eur J Oper Res"},{"issue":"11","key":"4284_CR16","doi-asserted-by":"publisher","first-page":"7704","DOI":"10.1109\/TII.2020.3025755","volume":"17","author":"M Abdel-Basset","year":"2020","unstructured":"Abdel-Basset M, Chang V, Hawash H, Chakrabortty RK, Ryan M (2020) Deep-IFS: intrusion detection approach for IIoT traffic in fog environment. IEEE Trans Ind Inf 17(11):7704\u20137715","journal-title":"IEEE Trans Ind Inf"},{"key":"4284_CR17","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi A, Moustafa N, Tari Z, Mahmood A, Anwar A (2020) TON_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access 8:165130\u2013165150","journal-title":"IEEE Access"},{"key":"4284_CR18","doi-asserted-by":"crossref","unstructured":"Latif S, Idrees Z, Zou Z, Ahmad J (2020) DRaNN: a deep random neural network model for intrusion detection in industrial IoT. In: 2020 International Conference on UK\u2013China Emerging Technologies (UCET). IEEE, pp 1\u20134","DOI":"10.1109\/UCET51115.2020.9205361"},{"key":"4284_CR19","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.ins.2017.04.009","volume":"405","author":"DY Eroglu","year":"2017","unstructured":"Eroglu DY, Kilic K (2017) A novel hybrid genetic local search algorithm for feature selection and weighting with an application in strategic decision making in innovation management. Inf Sci 405:18\u201332","journal-title":"Inf Sci"},{"issue":"9","key":"4284_CR20","doi-asserted-by":"publisher","first-page":"6154","DOI":"10.1109\/TII.2020.2970074","volume":"16","author":"MM Hassan","year":"2020","unstructured":"Hassan MM, Gumaei A, Huda S, Almogren A (2020) Increasing the trustworthiness in the industrial IoT networks through a reliable cyberattack detection model. IEEE Trans Ind Inf 16(9):6154\u20136162","journal-title":"IEEE Trans Ind Inf"},{"key":"4284_CR21","doi-asserted-by":"publisher","first-page":"107417","DOI":"10.1016\/j.comnet.2020.107417","volume":"180","author":"CA De Souza","year":"2020","unstructured":"De Souza CA, Westphall CB, Machado RB, Sobral JBM, dos Santos Vieira G (2020) Hybrid approach to intrusion detection in fog-based IoT environments. Comput Netw 180:107417","journal-title":"Comput Netw"},{"key":"4284_CR22","doi-asserted-by":"publisher","first-page":"107168","DOI":"10.1016\/j.comnet.2020.107168","volume":"173","author":"S Hosseini","year":"2020","unstructured":"Hosseini S, Zade BMH (2020) New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN. Comput Netw 173:107168","journal-title":"Comput Netw"},{"issue":"3","key":"4284_CR23","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1049\/iet-net.2018.5206","volume":"9","author":"M Roopak","year":"2020","unstructured":"Roopak M, Tian GY, Chambers J (2020) Multi-objective-based feature selection for DDoS attack detection in IoT networks. IET Netw 9(3):120\u2013127","journal-title":"IET Netw"},{"issue":"6","key":"4284_CR24","doi-asserted-by":"publisher","first-page":"4149","DOI":"10.1007\/s11276-020-02321-3","volume":"26","author":"S Hosseini","year":"2020","unstructured":"Hosseini S (2020) A new machine learning method consisting of GA-LR and ANN for attack detection. Wirel Netw 26(6):4149\u20134162","journal-title":"Wirel Netw"},{"key":"4284_CR25","first-page":"1","volume":"2020","author":"C Wang","year":"2020","unstructured":"Wang C, Wang B, Liu H, Qu H (2020) Anomaly detection for industrial control system based on autoencoder neural network. Wirel Commun Mob Comput 2020:1\u201310","journal-title":"Wirel Commun Mob Comput"},{"issue":"5","key":"4284_CR26","first-page":"2221","volume":"14","author":"JW Jang","year":"2020","unstructured":"Jang JW, Kwon S, Kim S, Seo J, Oh J, Lee KH (2020) Cybersecurity framework for IIoT-based power system connected to microgrid. KSII Trans Internet Inf Syst (TIIS) 14(5):2221\u20132235","journal-title":"KSII Trans Internet Inf Syst (TIIS)"},{"key":"4284_CR27","doi-asserted-by":"crossref","unstructured":"Taghavinejad SM, Taghavinejad M, Shahmiri L, Zavvar M, Zavvar MH (2020) Intrusion detection in IoT-based smart grid using hybrid decision tree. In: 2020 6th International Conference on Web Research (ICWR). IEEE, pp 152\u2013156","DOI":"10.1109\/ICWR49608.2020.9122320"},{"issue":"2","key":"4284_CR28","doi-asserted-by":"crossref","first-page":"e4014","DOI":"10.1002\/ett.4014","volume":"32","author":"I SumaiyaThaseen","year":"2021","unstructured":"SumaiyaThaseen I, SairaBanu J, Lavanya K, RukunuddinGhalib M, Abhishek K (2021) An integrated intrusion detection system using correlation-based attribute selection and artificial neural network. Trans Emerg Telecommun Technol 32(2):e4014","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"100391","key":"4284_CR29","first-page":"1","volume":"14","author":"E Tsogbaatar","year":"2021","unstructured":"Tsogbaatar E, Bhuyan MH, Taenaka Y, Fall D, Gonchigsumlaa K, Elmroth E, Kadobayashi Y (2021) DeL-IoT: a deep ensemble learning approach to uncover anomalies in IoT. Internet Things 14(100391):1\u201321","journal-title":"Internet Things"},{"key":"4284_CR30","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comcom.2021.05.024","volume":"176","author":"AK Sahu","year":"2021","unstructured":"Sahu AK, Sharma S, Tanveer M, Raja R (2021) Internet of Things attack detection using hybrid deep learning model. Comput Commun 176:146\u2013151","journal-title":"Comput Commun"},{"key":"4284_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3079574","author":"K Yu","year":"2021","unstructured":"Yu K, Guo Z, Shen Y, Wang W, Lin JCW, Sato T (2021) Secure artificial Intelligence of Things for implicit group recommendations. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2021.3079574","journal-title":"IEEE Internet Things J"},{"issue":"103517","key":"4284_CR32","first-page":"1","volume":"76","author":"L Tan","year":"2021","unstructured":"Tan L, Xiao H, Yu K, Aloqaily M, Jararweh Y (2021) A blockchain-empowered crowdsourcing system for 5g-enabled smart cities. Comput Stand Interfaces 76(103517):1\u201321","journal-title":"Comput Stand Interfaces"},{"issue":"3","key":"4284_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3433542","volume":"21","author":"L Tan","year":"2021","unstructured":"Tan L, Shi N, Yu K, Aloqaily M, Jararweh Y (2021) A blockchain-empowered access control framework for smart devices in green Internet of Things. ACM Trans Internet Technol (TOIT) 21(3):1\u201320","journal-title":"ACM Trans Internet Technol (TOIT)"},{"issue":"1","key":"4284_CR34","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/MNET.011.2000223","volume":"35","author":"C Feng","year":"2021","unstructured":"Feng C, Yu K, Bashir AK, Al-Otaibi YD, Lu Y, Chen S, Zhang D (2021) Efficient and secure data sharing for 5G flying drones: a blockchain-enabled approach. IEEE Netw 35(1):130\u2013137","journal-title":"IEEE Netw"},{"issue":"7","key":"4284_CR35","doi-asserted-by":"publisher","first-page":"5114","DOI":"10.1109\/JIOT.2020.3030856","volume":"8","author":"L Zhen","year":"2020","unstructured":"Zhen L, Bashir AK, Yu K, Al-Otaibi YD, Foh CH, Xiao P (2020) Energy-efficient random access for LEO satellite-assisted 6G internet of remote things. IEEE Internet Things J 8(7):5114\u20135128","journal-title":"IEEE Internet Things J"},{"key":"4284_CR36","doi-asserted-by":"publisher","first-page":"7123","DOI":"10.1109\/TII.2021.3050041","volume":"17","author":"L Nie","year":"2021","unstructured":"Nie L, Wang X, Wang S, Ning Z, Obaidat M, Sadoun B, Li S (2021) Network traffic prediction in industrial Internet of Things backbone networks: a multi-task learning mechanism. IEEE Trans Ind Inform 17:7123\u20137132","journal-title":"IEEE Trans Ind Inform"},{"key":"4284_CR37","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1007\/s11265-021-01656-0","volume":"93","author":"F Zhou","year":"2021","unstructured":"Zhou F, Qu H, Liu H, Liu H, Li B (2021) Fingerprinting IIoT devices through machine learning techniques. J Signal Process Syst 93:779\u2013794","journal-title":"J Signal Process Syst"},{"key":"4284_CR38","doi-asserted-by":"crossref","unstructured":"Ullah I, Mahmoud QH (2021) Network traffic flow based machine learning technique for IoT device identification. In: 2021 IEEE International Systems Conference (SysCon). IEEE, pp 1\u20138","DOI":"10.1109\/SysCon48628.2021.9447099"},{"key":"4284_CR39","first-page":"39","volume":"950","author":"AS Rajawat","year":"2021","unstructured":"Rajawat AS, Rawat R, Barhanpurkar K, Shaw RN, Ghosh A (2021) Vulnerability analysis at industrial Internet of Things platform on dark web network using computational intelligence. Comput Intell Syst Appl 950:39\u201351","journal-title":"Comput Intell Syst Appl"},{"issue":"102994","key":"4284_CR40","first-page":"1","volume":"72","author":"N Moustafa","year":"2021","unstructured":"Moustafa N (2021) A new distributed architecture for evaluating AI-based security systems at the edge: network TON_IoT datasets. Sustain Cities Soc 72(102994):1\u201314","journal-title":"Sustain Cities Soc"},{"issue":"4","key":"4284_CR41","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TEVC.2013.2281535","volume":"18","author":"K Deb","year":"2013","unstructured":"Deb K, Jain H (2013) An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part I: solving problems with box constraints. IEEE Trans Evol Comput 18(4):577\u2013601","journal-title":"IEEE Trans Evol Comput"},{"issue":"8","key":"4284_CR42","doi-asserted-by":"publisher","first-page":"8820","DOI":"10.1109\/TVT.2020.2995133","volume":"69","author":"X Li","year":"2020","unstructured":"Li X, Xu M, Vijayakumar P, Kumar N, Liu X (2020) Detection of low-frequency and multi-stage attacks in industrial Internet of Things. IEEE Trans Veh Technol 69(8):8820\u20138831","journal-title":"IEEE Trans Veh Technol"},{"key":"4284_CR43","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51\u201367","journal-title":"Adv Eng Softw"},{"issue":"6","key":"4284_CR44","doi-asserted-by":"publisher","first-page":"1656","DOI":"10.1109\/TSMCB.2012.2227469","volume":"43","author":"B Xue","year":"2012","unstructured":"Xue B, Zhang M, Browne WN (2012) Particle swarm optimization for feature selection in classification: a multi-objective approach. IEEE Trans Cybern 43(6):1656\u20131671","journal-title":"IEEE Trans Cybern"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04284-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04284-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04284-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T07:24:30Z","timestamp":1700119470000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04284-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,25]]},"references-count":44,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["4284"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04284-4","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,25]]},"assertion":[{"value":"21 December 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}