{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:42:29Z","timestamp":1767066149081,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T00:00:00Z","timestamp":1625788800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T00:00:00Z","timestamp":1625788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s11277-021-08721-8","type":"journal-article","created":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T17:03:27Z","timestamp":1625850207000},"page":"1763-1785","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Biological Feature Selection and Classification Techniques for Intrusion Detection on BAT"],"prefix":"10.1007","volume":"127","author":[{"given":"Satheesh","family":"Narayanasami","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4901-1432","authenticated-orcid":false,"given":"Sudhakar","family":"Sengan","sequence":"additional","affiliation":[]},{"given":"Saira","family":"Khurram","sequence":"additional","affiliation":[]},{"given":"Farrukh","family":"Arslan","sequence":"additional","affiliation":[]},{"given":"Suresh Kumar","family":"Murugaiyan","sequence":"additional","affiliation":[]},{"given":"Regin","family":"Rajan","sequence":"additional","affiliation":[]},{"given":"Vijayakumar","family":"Peroumal","sequence":"additional","affiliation":[]},{"given":"Anil Kumar","family":"Dubey","sequence":"additional","affiliation":[]},{"given":"Sujatha","family":"Srinivasan","sequence":"additional","affiliation":[]},{"given":"Dilip Kumar","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,9]]},"reference":[{"issue":"3","key":"8721_CR1","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1504\/IJBIC.2013.055093","volume":"5","author":"X-S Yang","year":"2013","unstructured":"Yang, X.-S. and He, X. (2013). Bat algorithm: Literature review and applications. International Journal of Bio-Inspired Computation, 5(3):141\u201314","journal-title":"International Journal of Bio-Inspired Computation"},{"key":"8721_CR2","doi-asserted-by":"crossref","unstructured":"Yang, X.-S. and Deb, S. (2009). Cuckoo search via l\u00b4evy flights. In Proceedings of the World Congress on Nature & Biologically Inspired Computing, pages 210\u2013 214. IEEE","DOI":"10.1109\/NABIC.2009.5393690"},{"key":"8721_CR3","unstructured":"Wang, J., Li, T., and Ren, R. (2010). A real-time IDSs based on artificial bee colony-support vector machine algorithm. In Proceedings in the International Workshop on Advanced Computational Intelligence, pages 91\u201396. IEEE."},{"key":"8721_CR4","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jocs.2017.03.006","volume":"25","author":"Monther Shadi Aljawarneh","year":"2018","unstructured":"Shadi Aljawarneh, Monther Aldwairi, and Muneer Bani Yassein. (2018). \u201cAnomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model.\u201d Journal of Computational Science, 25, 152\u2013160","journal-title":"Journal of Computational Science"},{"issue":"1","key":"8721_CR5","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.eswa.2010.06.066","volume":"38","author":"Shi-Jinn Horng","year":"2011","unstructured":"Shi-Jinn Horng, Ming-Yang Su, Yuan-Hsin Chen, Tzong-Wann Kao, Rong-Jian Chen, Jui-Lin Lai, and Citra Dwi Perkasa. (2011). \u201cA novel intrusion detection system based on hierarchical clustering and support vector machines.\u201d Expert systems with Applications, 38(1), 306\u2013313.","journal-title":"Expert systems with Applications"},{"key":"8721_CR6","doi-asserted-by":"crossref","unstructured":"X Zhu, Z Huang, H Zhoul, Design of a Multi-agent Based Intelligent Intrusion Detection System. IEEE International Symposium on Pervasive Computing and Applications (IEEE, Amsterdam, 2006), pp.\u00a0290\u2013295","DOI":"10.1109\/SPCA.2006.297585"},{"key":"8721_CR7","doi-asserted-by":"crossref","unstructured":"G Bourkache, M Mezghiche, K Tamine, A Distributed Intrusion Detection Model Based on a Society of Intelligent Mobile Agents for Ad Hoc Network, in the 2011 Sixth IEEE International Conference on Availability, Reliability, and Security, Vienna, August 2011 (IEEE, Amsterdam, 2011), pp.\u00a0569\u2013572","DOI":"10.1109\/ARES.2011.131"},{"key":"8721_CR8","first-page":"232","volume":"19","author":"C-h Fonk","year":"2011","unstructured":"C-h Fonk, GP Parr, PJ Morrow, Security schemes for Mobile Agent-based Network and System Management Framework. J. Networks Syst. Manag. Springer 19, 232\u2013256 (2011)","journal-title":"J. Networks Syst. Manag. Springer"},{"key":"8721_CR9","doi-asserted-by":"crossref","unstructured":"L Zadeh, Role of soft computing and fuzzy logic in the conception, design, and development of information\/intelligent systems, in Computational Intelligence: Soft Computing and Fuzzy-neuro Integration with Applications, ed. by O Kaynak, L Zadeh, B Turksen, I Rudas. Proceedings of the NATO Advanced Study Institute on Soft Computing and its Applications held at Manavgat, Antalya, Turkey, 21\u201331 August 1996, volume\u00a0162 of NATO ASI Series (Springer, Berlin, 1998), pp.\u00a01\u20139","DOI":"10.1007\/978-3-642-58930-0_1"},{"issue":"2","key":"8721_CR10","doi-asserted-by":"publisher","first-page":"109","DOI":"10.5121\/ijnsa.2012.4208","volume":"4","author":"MS Hoque","year":"2012","unstructured":"M. S. Hoque, Md.A. Mukit, and Md.A. N. Bikas, \u201cAn implementation of intrusion detection system using genetic algorithm,\u201d International Journal of Network Security & Its Applications, vol.\u00a04, no. 2, pp.\u00a0109\u2013120, 2012.","journal-title":"International Journal of Network Security & Its Applications"},{"issue":"1392","key":"8721_CR11","first-page":"1","volume":"9","author":"TTH Le","year":"2019","unstructured":"T. T. H. Le, Y. Kim, and H. Kim, \u201cNetwork intrusion detection based on novel feature selection model and various recurrent neural networks,\u201d Applied Science, vol.\u00a09, no. 1392, pp.\u00a01\u201329, 2019","journal-title":"Applied Science"},{"issue":"1","key":"8721_CR12","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/S0167-4048(03)00112-3","volume":"22","author":"S-B Cho","year":"2003","unstructured":"S.-B. Cho and H.-J. Park, \u201cEfficient anomaly detection by modeling privilege flows using hidden Markov model,\u201d Computers & Security, vol.\u00a022, no. 1, pp.\u00a045\u201355, 2003.","journal-title":"Computers & Security"},{"key":"8721_CR13","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.neucom.2019.08.047","volume":"368","author":"W Wei","year":"2019","unstructured":"W. Wei and C. Guo, \u201cA text semantic topic discovery method based on the conditional co-occurrence degree,\u201d Neurocomputing, vol.\u00a0368, pp.\u00a011\u201324, 2019.","journal-title":"Neurocomputing"},{"key":"8721_CR14","doi-asserted-by":"crossref","unstructured":"P. Sun, P. Liu, Q. Li et al., \u201cDL-IDS: Extracting features using CNN-LSTM hybrid network for intrusion detection system,\u201d Security and Communication Networks, vol. 2020, Article ID 8890306, 11 pages, 2020.","DOI":"10.1155\/2020\/8890306"},{"key":"8721_CR15","doi-asserted-by":"crossref","unstructured":"G. Farahani, \u201cFeature selection based on cross-correlation for the intrusion detection system,\u201d Security & Communication Networks, vol. 2020, Article ID 8875404, 17 pages, 2020.","DOI":"10.1155\/2020\/8875404"},{"key":"8721_CR16","doi-asserted-by":"crossref","unstructured":"D. Smith, Q. Guan, and S. Fu, \u201cAn anomaly detection framework for autonomic management of compute cloud systems,\u201d in Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, pp.\u00a0376\u2013381, IEEE, Seoul, South Korea, July 2010","DOI":"10.1109\/COMPSACW.2010.72"},{"key":"8721_CR17","doi-asserted-by":"crossref","unstructured":"H. B. Nguyen, B. Xue, P. Andreae, et al., \u201cParticle swarm optimization with genetic operators for feature selection,\u201d in Proceedings of the 17 IEEE Congress on Evolutionary Computation (CEC), pp.\u00a0286\u2013293, IEEE, San Sebastian, Spain, June 2017.","DOI":"10.1109\/CEC.2017.7969325"},{"issue":"3","key":"8721_CR18","first-page":"420","volume":"18","author":"MH Aghdam","year":"2016","unstructured":"M. H. Aghdam and P. Kabiri, \u201cFeature selection for intrusion detection system using ant colony optimization,\u201d International Journal of Network Security, vol.\u00a018, no. 3, pp.\u00a0420\u2013432, 2016.","journal-title":"International Journal of Network Security"},{"key":"8721_CR19","doi-asserted-by":"crossref","unstructured":"B. Alsalibi, L. Abualigah and A.T. Khader\u00a02021 \u201cA novel bat algorithm with dynamic membrane structure for optimization problems\u201d, Electronics, vol.\u00a010, pp.\u00a01992\u20132017.","DOI":"10.1007\/s10489-020-01898-8"},{"issue":"2","key":"8721_CR20","doi-asserted-by":"publisher","first-page":"81","DOI":"10.48161\/qaj.v1n2a50","volume":"1","author":"DMustafa Abdullah","year":"2021","unstructured":"D. Mustafa Abdullah and A. Mohsin Abdulazeez, \u201cMachine Learning Applications based on SVM Classification A Review\u201d, Qubahan Academic Journal, vol.\u00a01, no. 2, pp.\u00a081\u201390, 2021.","journal-title":"Qubahan Academic Journal"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08721-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08721-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08721-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,25]],"date-time":"2022-11-25T12:21:18Z","timestamp":1669378878000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08721-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,9]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["8721"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08721-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2021,7,9]]},"assertion":[{"value":"29 June 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares their is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}