{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:07:05Z","timestamp":1767262025287,"version":"3.41.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T00:00:00Z","timestamp":1749945600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T00:00:00Z","timestamp":1749945600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-07546-7","type":"journal-article","created":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T03:50:42Z","timestamp":1749959442000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ECDOAGM: an elephant collective defense optimization algorithm with a gray model for managing distributed massive data streams in IoT architectures"],"prefix":"10.1007","volume":"81","author":[{"given":"Mohammad Farrokhzadeh","family":"Ajirlou","sequence":"first","affiliation":[]},{"given":"Abbas","family":"Jalilvand","sequence":"additional","affiliation":[]},{"given":"Madjid","family":"Khalilian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,15]]},"reference":[{"key":"7546_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2024.02.007","author":"I Ullah","year":"2024","unstructured":"Ullah I, Adhikari D, Su X, Palmieri F, Wu C, Choi C (2024) Integration of data science with the intelligent IoT (IIoT): current challenges and future perspectives. Digit Commun Netw. https:\/\/doi.org\/10.1016\/j.dcan.2024.02.007","journal-title":"Digit Commun Netw"},{"issue":"2","key":"7546_CR2","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/JIOT.2018.2802704","volume":"5","author":"G Bedi","year":"2018","unstructured":"Bedi G, Venayagamoorthy GK, Singh R, Brooks RR, Wang KC (2018) Review of IoT (IoT) in electric power and energy systems. IEEE Internet Things J 5(2):847\u2013870. https:\/\/doi.org\/10.1109\/JIOT.2018.2802704","journal-title":"IEEE Internet Things J"},{"key":"7546_CR3","doi-asserted-by":"publisher","DOI":"10.3390\/s21062049","author":"YS Jeong","year":"2021","unstructured":"Jeong YS, Sim SH (2021) Hierarchical multipath blockchain based IoT information management techniques for efficient distributed processing of intelligent IoT information. Sensors. https:\/\/doi.org\/10.3390\/s21062049","journal-title":"Sensors"},{"issue":"2","key":"7546_CR4","doi-asserted-by":"publisher","first-page":"597","DOI":"10.2298\/CSIS200330012S","volume":"18","author":"SK Singh","year":"2021","unstructured":"Singh SK, Cha J, Kim TW, Park JH (2021) Machine learning based distributed big data analysis framework for next generation web in IoT. Comput Sci Inf Syst 18(2):597\u2013618","journal-title":"Comput Sci Inf Syst"},{"key":"7546_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-26987-5","author":"H Yao","year":"2023","unstructured":"Yao H, Guizani M (2023) Intelligent IoT Networks. Wirel Netw. https:\/\/doi.org\/10.1007\/978-3-031-26987-5","journal-title":"Wirel Netw"},{"key":"7546_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100626","author":"TD Bola\u00f1o","year":"2022","unstructured":"Bola\u00f1o TD, Campos O, Barral V, Escudero CJ, Naya JAG (2022) An overview of IoT architectures, technologies, and existing open-source projects. Internet of Things. https:\/\/doi.org\/10.1016\/j.iot.2022.100626","journal-title":"Internet of Things"},{"key":"7546_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s11356-023-26780-1","author":"A Shah","year":"2023","unstructured":"Shah A, Ali B, Wahab F, Ullah I, Amesho KT, Shafiq M (2023) Entropy based grid approach for handling outliers: a case study to environmental monitoring data. Environ Sci Pollut Res Int. https:\/\/doi.org\/10.1007\/s11356-023-26780-1","journal-title":"Environ Sci Pollut Res Int"},{"key":"7546_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107330","volume":"177","author":"ALR Madureira","year":"2020","unstructured":"Madureira ALR, Ara\u00fajo FRC, Sampaio LN (2020) On supporting IoT data aggregation through programmable data planes. Comput Netw 177:107330","journal-title":"Comput Netw"},{"issue":"1","key":"7546_CR9","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.jksuci.2022.12.006","volume":"35","author":"M Zare","year":"2023","unstructured":"Zare M, Sola YE, Hasanpour H (2023) Towards distributed and autonomous IoT service placement in fog computing using asynchronous advantage actor-critic algorithm J. King Saud Univ-Comput Inf Sci 35(1):368\u2013381. https:\/\/doi.org\/10.1016\/j.jksuci.2022.12.006","journal-title":"King Saud Univ-Comput Inf Sci"},{"key":"7546_CR10","volume":"18","author":"N Janbi","year":"2023","unstructured":"Janbi N, Katib I, Mehmood R (2023) Distributed artificial intelligence: taxonomy, review, framework, and reference architecture. Intell Syst Appl 18:200231","journal-title":"Intell Syst Appl"},{"issue":"5","key":"7546_CR11","doi-asserted-by":"publisher","first-page":"977","DOI":"10.3390\/s17050977","volume":"17","author":"RQ Huacarpuma","year":"2017","unstructured":"Huacarpuma RQ, Junior RTS, Holanda MT, Albuquerque RO, Villalba LJG, Kim TH (2017) Distributed data service for data management in IoT middleware. Sensors 17(5):977","journal-title":"Sensors"},{"issue":"2","key":"7546_CR12","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s12652-019-01288-0","volume":"11","author":"Y Jin","year":"2020","unstructured":"Jin Y, Liu Y, Si W (2020) Editorial for the special issue on intelligent agent distributed signal processing for IoT. J Ambient Intell Human Comput 11(2):447\u2013449. https:\/\/doi.org\/10.1007\/s12652-019-01288-0","journal-title":"J Ambient Intell Human Comput"},{"key":"7546_CR13","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/bs.adcom.2022.02.015","volume":"127","author":"S Nigam","year":"2022","unstructured":"Nigam S, Sugandh U, Khari M (2022) Chapter Eighteen - The integration of blockchain and IoT edge devices for smart agriculture: challenges and use cases. Adv Comput 127:507\u2013537","journal-title":"Adv Comput"},{"key":"7546_CR14","doi-asserted-by":"publisher","first-page":"54258","DOI":"10.1109\/ACCESS.2018.2871475","volume":"6","author":"S Deng","year":"2018","unstructured":"Deng S, Xiang Z, Yin J, Taheri J, Zomaya AY (2018) Composition-driven IoT service provisioning in distributed edges. IEEE Access 6:54258\u201354269","journal-title":"IEEE Access"},{"issue":"1","key":"7546_CR15","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1186\/s40537-019-0215-2","volume":"6","author":"H Nasiri","year":"2019","unstructured":"Nasiri H, Nasehi S, Goudarzi M (2019) Evaluation of distributed stream processing frameworks for IoT applications in Smart Cities. J Big Data 6(1):52. https:\/\/doi.org\/10.1186\/s40537-019-0215-2","journal-title":"J Big Data"},{"key":"7546_CR16","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.future.2019.04.020","volume":"99","author":"MH Rehman","year":"2019","unstructured":"Rehman MH, Yaqoob I, Salah K, Imran M, Jayaraman PP, Perera C (2019) The role of big data analytics in industrial IoT. Future Gener Comput Syst 99:247\u2013259","journal-title":"Future Gener Comput Syst"},{"key":"7546_CR17","doi-asserted-by":"publisher","first-page":"161080","DOI":"10.1109\/ACCESS.2020.3020744","volume":"8","author":"BA Yosuf","year":"2020","unstructured":"Yosuf BA, Musa M, Elgorashi T, Elmirghani J (2020) Energy efficient distributed processing for IoT. IEEE Access 8:161080\u2013161108. https:\/\/doi.org\/10.1109\/ACCESS.2020.3020744","journal-title":"IEEE Access"},{"issue":"1","key":"7546_CR18","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/JSAC.2020.3036968","volume":"39","author":"H Xie","year":"2021","unstructured":"Xie H, Qin Z (2021) A lite distributed semantic communication system for IoT. IEEE J Sel Areas Commun 39(1):142\u2013153","journal-title":"IEEE J Sel Areas Commun"},{"issue":"15","key":"7546_CR19","doi-asserted-by":"publisher","first-page":"e6959","DOI":"10.1002\/cpe.6959","volume":"34","author":"B Pourghebleh","year":"2022","unstructured":"Pourghebleh B, Hekmati N, Davoudnia Z, Sadeghi M (2022) A roadmap towards energy-efficient data fusion methods in the IoT. Concurr Comput. 34(15):e6959","journal-title":"Concurr Comput."},{"issue":"2","key":"7546_CR20","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.jtte.2021.10.005","volume":"9","author":"Z Ye","year":"2022","unstructured":"Ye Z, Wei Y, Li J, Yan G, Wang L (2022) A distributed pavement monitoring system based on IoT. J Traffic Transp Eng (English Edition) 9(2):305\u2013317. https:\/\/doi.org\/10.1016\/j.jtte.2021.10.005","journal-title":"J Traffic Transp Eng (English Edition)"},{"issue":"3","key":"7546_CR21","doi-asserted-by":"publisher","first-page":"1316","DOI":"10.1109\/TGCN.2022.3151716","volume":"6","author":"J Jiang","year":"2022","unstructured":"Jiang J, Liu F, Ng WWY, Tang Q, Wang W, Pham QV (2022) Dynamic incremental ensemble fuzzy classifier for data streams in green IoT. IEEE Trans Green Commun Netw 6(3):1316\u20131329","journal-title":"IEEE Trans Green Commun Netw"},{"key":"7546_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100295","volume":"8","author":"S Bebortta","year":"2023","unstructured":"Bebortta S, Tripathy SS, Modibbo UM, Ali I (2023) An optimal fog-cloud offloading framework for big data optimization in heterogeneous IoT networks. Decis Anal J 8:100295","journal-title":"Decis Anal J"},{"key":"7546_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100645","volume":"21","author":"D Fawzy","year":"2023","unstructured":"Fawzy D, Moussa SM, Badr NL (2023) An IoT-based resource utilization framework using data fusion for smart environments. IoT 21:100645. https:\/\/doi.org\/10.1016\/j.iot.2022.100645","journal-title":"IoT"},{"key":"7546_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.iswa.2024.200424","author":"R Sun","year":"2024","unstructured":"Sun R, Ren Y (2024) A multi-source heterogeneous data fusion method for intelligent systems in the IoT. Intell Syst Appl. https:\/\/doi.org\/10.1016\/j.iswa.2024.200424","journal-title":"Intell Syst Appl"},{"key":"7546_CR25","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.aej.2024.05.117","volume":"102","author":"Y Wang","year":"2024","unstructured":"Wang Y, Ma W, Song L, Cai Z (2024) HCSMBO: A hybrid cat swarm and monarch butterfly optimization algorithm for energy consumption optimization in industrial IoT. Alex Eng J 102:279\u2013289. https:\/\/doi.org\/10.1016\/j.aej.2024.05.117","journal-title":"Alex Eng J"},{"issue":"6","key":"7546_CR26","first-page":"3345","volume":"8","author":"M Kaur","year":"2019","unstructured":"Kaur M, Bansal A, Kaur R (2019) A survey on bandwidth efficiency in wireless communication. Int J Eng Adv Technol (IJEAT) 8(6):3345\u20133348","journal-title":"Int J Eng Adv Technol (IJEAT)"},{"key":"7546_CR27","first-page":"8887","volume":"975","author":"K Kaur","year":"2020","unstructured":"Kaur K, Arora A (2020) Reliability analysis of IoT systems: metrics and metrics optimization. Int J Comput Appl 975:8887","journal-title":"Int J Comput Appl"},{"key":"7546_CR28","volume-title":"Digital communications","author":"JG Proakis","year":"2001","unstructured":"Proakis JG (2001) Digital communications, 4th edn. McGraw-Hill","edition":"4"},{"key":"7546_CR29","volume-title":"Distributed and cloud computing: from parallel processing to the internet of things","author":"K Hwang","year":"2010","unstructured":"Hwang K, Briggs FA (2010) Distributed and cloud computing: from parallel processing to the internet of things. Morgan Kaufmann"},{"issue":"Suppl 2","key":"7546_CR30","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1007\/s00366-021-01293-y","volume":"38","author":"W Li","year":"2022","unstructured":"Li W, Wang GG (2022) Elephant herding optimization using dynamic topology and biogeography-based optimization based on learning for numerical optimization. Eng Comput 38(Suppl 2):1585\u20131613. https:\/\/doi.org\/10.1007\/s00366-021-01293-y","journal-title":"Eng Comput"},{"issue":"9","key":"7546_CR31","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.3390\/math8091415","volume":"8","author":"J Li","year":"2020","unstructured":"Li J, Lei H, Alavi AH, Wang GG (2020) Elephant herding optimization: variants, hybrids, and applications. Mathematics 8(9):1415. https:\/\/doi.org\/10.3390\/math8091415","journal-title":"Mathematics"},{"issue":"3","key":"7546_CR32","doi-asserted-by":"publisher","first-page":"410","DOI":"10.4236\/ajcm.2020.103022","volume":"10","author":"H Farooq","year":"2020","unstructured":"Farooq H, Abdus S (2020) Describing fuzzy membership function and detecting the outlier by using five number summary of data. Am J Comput Math 10(3):410","journal-title":"Am J Comput Math"},{"key":"7546_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106301","volume":"92","author":"M Masdari","year":"2020","unstructured":"Masdari M, Khezri H (2020) A survey and taxonomy of the fuzzy signature-based intrusion detection systems. Appl Soft Comput 92:106301. https:\/\/doi.org\/10.1016\/j.asoc.2020.106301","journal-title":"Appl Soft Comput"},{"key":"7546_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2020.105493","volume":"93","author":"W Zhou","year":"2021","unstructured":"Zhou W, Ding S (2021) A novel discrete grey seasonal model and its applications. Commun Nonlinear Sci Numer Simul 93:105493. https:\/\/doi.org\/10.1016\/j.cnsns.2020.105493","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"8","key":"7546_CR35","doi-asserted-by":"publisher","first-page":"3038","DOI":"10.1109\/TFUZZ.2021.3099696","volume":"30","author":"W Zhang","year":"2022","unstructured":"Zhang W, Deng Z, Zhang T, Choi KS, Wang J, Wang S (2022) Incomplete multiple view fuzzy inference system with missing view imputation and cooperative learning. IEEE Trans Fuzzy Syst 30(8):3038\u20133051","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"7546_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.10326","volume":"79","author":"S Manimurugan","year":"2020","unstructured":"Manimurugan S, Majdi A, Mohmmed M, Narmatha C, Varatharajan R (2020) Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system. Microprocess Microsyst 79:103261. https:\/\/doi.org\/10.1016\/j.micpro.2020.10326","journal-title":"Microprocess Microsyst"},{"key":"7546_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2024.110496","volume":"54","author":"S Saif","year":"2024","unstructured":"Saif S, Widyawan W, Ferdiana R (2024) IoT-DH dataset for classification, identification, and detection DDoS attack in IoT. Data Brief 54:110496. https:\/\/doi.org\/10.1016\/j.dib.2024.110496","journal-title":"Data Brief"},{"issue":"4","key":"7546_CR38","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.ipm.2009.03.002","volume":"45","author":"M Sokolova","year":"2009","unstructured":"Sokolova M, Lapalme G (2009) A systematic analysis of performance measures for classification tasks. Inf Process Manage 45(4):427\u2013437","journal-title":"Inf Process Manage"},{"key":"7546_CR39","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to information retrieval","author":"CD Manning","year":"2008","unstructured":"Manning CD, Raghavan P, Sch\u00fctze H (2008) Introduction to information retrieval. Cambridge University Press"},{"key":"7546_CR40","volume-title":"Information retrieval","author":"CJ Van Rijsbergen","year":"1979","unstructured":"Van Rijsbergen CJ (1979) Information retrieval, 2nd edn. Butterworth-Heinemann","edition":"2"},{"issue":"8","key":"7546_CR41","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett T (2006) An introduction to ROC analysis. Pattern Recogn Lett 27(8):861\u2013874","journal-title":"Pattern Recogn Lett"},{"key":"7546_CR42","volume-title":"Introduction to algorithms","author":"TH Cormen","year":"2009","unstructured":"Cormen TH, Leiserson CE, Rivest RL, Stein C (2009) Introduction to algorithms, 3rd edn. MIT Press","edition":"3"},{"issue":"8","key":"7546_CR43","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102\u2013114","journal-title":"IEEE Commun Mag"},{"key":"7546_CR44","unstructured":"Kurose JF, Ross KW (2017)\u00a0Computer networking: A top-down approach\u00a0(7th ed.). Pearson"},{"key":"7546_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44874-8","volume-title":"Introduction to evolutionary computing","author":"AE Eiben","year":"2015","unstructured":"Eiben AE, Smith JE (2015) Introduction to evolutionary computing, 2nd edn. Springer","edition":"2"},{"key":"7546_CR46","doi-asserted-by":"publisher","first-page":"5371","DOI":"10.1007\/s11276-020-02405-0","volume":"26","author":"B Pourghebleh","year":"2020","unstructured":"Pourghebleh B, Hayyolalam V, Aghaei Anvigh A (2020) Service discovery in the Internet of Things: review of current trends and research challenges. Wirel Netw 26:5371\u20135391. https:\/\/doi.org\/10.1007\/s11276-020-02405-0","journal-title":"Wirel Netw"},{"key":"7546_CR47","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1007\/s10586-021-03294-4","volume":"24","author":"B Pourghebleh","year":"2021","unstructured":"Pourghebleh B, Aghaei Anvigh A, Ramtin AR, Mohammadi B (2021) The importance of nature-inspired meta-heuristic algorithms for solving virtual machine consolidation problem in cloud environments. Clust Comput 24:2673\u20132696. https:\/\/doi.org\/10.1007\/s10586-021-03294-4","journal-title":"Clust Comput"},{"key":"7546_CR48","doi-asserted-by":"publisher","first-page":"1743","DOI":"10.1007\/s12065-020-00451-3","volume":"14","author":"S Harifi","year":"2021","unstructured":"Harifi S, Mohammadzadeh J, Khalilian M, Ebrahimnejad S (2021) Giza Pyramids Construction: an ancient-inspired metaheuristic algorithm for optimization. Evol Intel 14:1743\u20131761. https:\/\/doi.org\/10.1007\/s12065-020-00451-3","journal-title":"Evol Intel"},{"key":"7546_CR49","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s13748-021-00231-9","volume":"10","author":"S Harifi","year":"2021","unstructured":"Harifi S, Mohammadzadeh J, Khalilian M, Ebrahimnejad S (2021) Hybrid-EPC: an Emperor Penguins Colony algorithm with crossover and mutation operators and its application in community detection. Progr Artif Intell 10:181\u2013193. https:\/\/doi.org\/10.1007\/s13748-021-00231-9","journal-title":"Progr Artif Intell"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07546-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-07546-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07546-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T03:50:45Z","timestamp":1749959445000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-07546-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,15]]},"references-count":49,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["7546"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-07546-7","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,15]]},"assertion":[{"value":"1 June 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This study does not involve human participants or animals and, therefore, did not require ethical approval.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"We confirm that the manuscript entitled \"ECDOAGM: An Elephant Collective Defense Optimization Algorithm with a Gray Model for Managing Distributed Massive Data Streams in IoT Architectures\" is an original work and has not been published previously, in whole or in part, nor is it currently under consideration for publication elsewhere.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"1035"}}