{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T15:57:14Z","timestamp":1771516634882,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11277-024-11505-5","type":"journal-article","created":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T08:49:17Z","timestamp":1722934157000},"page":"2409-2440","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["An Intrusion Detection System Using the Artificial Neural Network-based Approach and Firefly Algorithm"],"prefix":"10.1007","volume":"137","author":[{"given":"Samira","family":"Rajabi","sequence":"first","affiliation":[]},{"given":"Samane","family":"Asgari","sequence":"additional","affiliation":[]},{"given":"Shahram","family":"Jamali","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1848-0220","authenticated-orcid":false,"given":"Reza","family":"Fotohi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"11505_CR1","doi-asserted-by":"crossref","unstructured":"Saxena, A. K., Sinha, S., & Shukla, P. (2017). A review on intrusion detection system in mobile ad-hoc network. In 2017 International conference on recent innovations in signal processing and embedded systems (RISE) (pp. 549-554). IEEE.","DOI":"10.1109\/RISE.2017.8378216"},{"issue":"4","key":"11505_CR2","doi-asserted-by":"publisher","first-page":"81","DOI":"10.22266\/ijies2017.0831.09","volume":"10","author":"SV Yeruru","year":"2017","unstructured":"Yeruru, S. V., & Rangaswamy, T. R. (2017). An anomaly-based intrusion detection system with multi-dimensional trust parameters for mobile Ad Hoc network. International Journal of Intelligence Engineering and Syatems, 10(4), 81\u201390.","journal-title":"International Journal of Intelligence Engineering and Syatems"},{"issue":"10","key":"11505_CR3","first-page":"99","volume":"8","author":"D Rajalakshmi","year":"2017","unstructured":"Rajalakshmi, D., & Meena, K. (2017). A Survey of intrusion detection with higher malicious misbehavior detection in Manet. International Journal of Civil Engineering and Technology, 8(10), 99\u2013110.","journal-title":"International Journal of Civil Engineering and Technology"},{"key":"11505_CR4","doi-asserted-by":"crossref","unstructured":"Babasaheb, D. R., & Raman, I. (2018). Survey on fault tolerance and security in mobile ad hoc networks (manets). In 2018 3rd international conference for convergence in technology (I2CT) (pp. 1-5). IEEE.","DOI":"10.1109\/I2CT.2018.8529328"},{"key":"11505_CR5","doi-asserted-by":"crossref","unstructured":"Verma, N., & Jain, A. (2017). Trust management in mobile ad hoc network: A survey. In 2017 International conference of electronics, communication and aerospace technology (ICECA) (Vol. 2, pp. 455-460). IEEE.","DOI":"10.1109\/ICECA.2017.8212856"},{"key":"11505_CR6","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-981-15-0184-5_27","volume-title":"Ponnambalam Pathipooranam, Rani Chinnappa Naidu Soft computing for problem solving","author":"S Sindhuja","year":"2020","unstructured":"Sindhuja, S., & Vadivel, R. (2020). A study on intrusion detection system of mobile ad-hoc networks. In K. N. Das, J. C. Bansal, K. Deep, & A. K. Nagar (Eds.), Ponnambalam Pathipooranam, Rani Chinnappa Naidu Soft computing for problem solving (pp. 307\u2013316). Springer."},{"key":"11505_CR7","doi-asserted-by":"crossref","unstructured":"Singh, V., Singh, D., & Hassan, M. M. (2019). Survey: Black hole attack detection in MANET. In Proceedings of 2nd international conference on advanced computing and software engineering (ICACSE).","DOI":"10.2139\/ssrn.3351016"},{"issue":"1","key":"11505_CR8","first-page":"1","volume":"5","author":"A Gupta","year":"2018","unstructured":"Gupta, A., & Dubey, A. (2018). A survey on various applications and blackhole attack in mobile ad hoc network. Recent Trends in Parallel Computing, 5(1), 1\u20136.","journal-title":"Recent Trends in Parallel Computing"},{"issue":"2","key":"11505_CR9","doi-asserted-by":"publisher","first-page":"01","DOI":"10.9756\/BIJIEMS.10491","volume":"7","author":"PS Prasad","year":"2017","unstructured":"Prasad, P. S., & Rao, S. K. M. (2017). HIASA: Hybrid improved artificial bee colony and simulated annealing based attack detection algorithm in mobile ad-hoc networks (MANETs). Bonfring International Journal of Industrial Engineering and Management Science, 7(2), 01\u201312.","journal-title":"Bonfring International Journal of Industrial Engineering and Management Science"},{"key":"11505_CR10","unstructured":"Soms, N., & Malathi, P. (2017). Evolution of intrusion detection system in MANETs\u2013A Survey. International Journal Of Innovations & Advancement In Computer Science (IJIACS), 6(5)."},{"key":"11505_CR11","unstructured":"Scholar, M. T., GORAKHPUR, S., & Choubey, I. C. (2016). A survey on malicious nodes in mobile ad hoc network. Journal of Network Communications And Emerging Technologies (JNCET) www. jncet. org, 6(3)."},{"issue":"1","key":"11505_CR12","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.icte.2018.01.014","volume":"5","author":"B Hajimirzaei","year":"2019","unstructured":"Hajimirzaei, B., & Navimipour, N. J. (2019). Intrusion detection for cloud computing using neural networks and artificial bee colony optimization algorithm. ICT Express, 5(1), 56\u201359.","journal-title":"ICT Express"},{"key":"11505_CR13","volume-title":"Predictive analytics and data mining: Concepts and practice with rapidminer","author":"V Kotu","year":"2014","unstructured":"Kotu, V., & Deshpande, B. (2014). Predictive analytics and data mining: Concepts and practice with rapidminer. Morgan Kaufmann."},{"key":"11505_CR14","doi-asserted-by":"publisher","first-page":"20255","DOI":"10.1109\/ACCESS.2018.2820092","volume":"6","author":"MH Ali","year":"2018","unstructured":"Ali, M. H., Al Mohammed, B. A. D., Ismail, A., & Zolkipli, M. F. (2018). A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access, 6, 20255\u201320261.","journal-title":"IEEE Access"},{"issue":"3","key":"11505_CR15","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/s10462-017-9568-0","volume":"51","author":"SL Tilahun","year":"2019","unstructured":"Tilahun, S. L., Ngnotchouye, J. M. T., & Hamadneh, N. N. (2019). Continuous versions of firefly algorithm: A review. Artificial Intelligence Review, 51(3), 445\u2013492.","journal-title":"Artificial Intelligence Review"},{"issue":"3","key":"11505_CR16","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1080\/19361610.2017.1315760","volume":"12","author":"KS Dhanalakshmi","year":"2017","unstructured":"Dhanalakshmi, K. S., & Kannapiran, B. (2017). Analysis of KDD CUP dataset using multi-agent methodology with effective fuzzy based intrusion detection system. Journal of Applied Security Research, 12(3), 424\u2013439.","journal-title":"Journal of Applied Security Research"},{"key":"11505_CR17","doi-asserted-by":"crossref","unstructured":"Bashir, U., & Chachoo, M. (2014). Intrusion detection and prevention system: Challenges & opportunities. In 2014 International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 806-809). IEEE.","DOI":"10.1109\/IndiaCom.2014.6828073"},{"key":"11505_CR18","unstructured":"Hindy, H., Brosset, D., Bayne, E., Seeam, A., Tachtatzis, C., Atkinson, R., & Bellekens, X. (2018). A taxonomy and survey of intrusion detection system design techniques, network threats and datasets."},{"key":"11505_CR19","doi-asserted-by":"crossref","unstructured":"Abedin, M. Z., Siddiquee, K. N. E. A., Bhuyan, M. S., Karim, R., Hossain, M. S., & Andersson, K. (2018). Performance analysis of anomaly based network intrusion detection systems. In 43nd IEEE Conference on Local Computer Networks Workshops (LCN Workshops), Chicago, October 1-4, 2018 (pp. 1-7). IEEE Computer Society.","DOI":"10.1109\/LCNW.2018.8628599"},{"key":"11505_CR20","doi-asserted-by":"crossref","unstructured":"Vigneswaran, R. K., Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018). Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security. In 2018 9th International conference on computing, communication and networking technologies (ICCCNT) (pp. 1-6). IEEE.","DOI":"10.1109\/ICCCNT.2018.8494096"},{"issue":"1","key":"11505_CR21","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41\u201350.","journal-title":"IEEE Transactions on Emerging Topics in Computational Intelligence"},{"issue":"11","key":"11505_CR22","first-page":"11","volume":"2","author":"G Kumar","year":"2014","unstructured":"Kumar, G. (2014). Evaluation metrics for intrusion detection systems-a study. Evaluation, 2(11), 11\u201317.","journal-title":"Evaluation"},{"key":"11505_CR23","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.cose.2018.01.023","volume":"75","author":"Z Chiba","year":"2018","unstructured":"Chiba, Z., Abghour, N., Moussaid, K., El Omri, A., & Rida, M. (2018). A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection. Computers & Security, 75, 36\u201358.","journal-title":"Computers & Security"},{"issue":"8","key":"11505_CR24","first-page":"2009","volume":"14","author":"AMV Gupta","year":"2019","unstructured":"Gupta, A. M. V. (2019). Comprehensive survey on blackhole attack with various detection\/prevention techniques in Ad-hoc network. International Journal of Applied Engineering Research, 14(8), 2009\u20132017.","journal-title":"International Journal of Applied Engineering Research"},{"key":"11505_CR25","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1016\/j.procs.2018.05.108","volume":"132","author":"A Chellam","year":"2018","unstructured":"Chellam, A., Ramanathan, L., & Ramani, S. (2018). Intrusion detection in computer networks using lazy learning algorithm. Procedia Computer Science, 132, 928\u2013936.","journal-title":"Procedia Computer Science"},{"key":"11505_CR26","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1016\/j.ins.2016.04.019","volume":"378","author":"RAR Ashfaq","year":"2017","unstructured":"Ashfaq, R. A. R., Wang, X. Z., Huang, J. Z., Abbas, H., & He, Y. L. (2017). Fuzziness based semi-supervised learning approach for intrusion detection system. Information Sciences, 378, 484\u2013497.","journal-title":"Information Sciences"},{"issue":"1","key":"11505_CR27","first-page":"50","volume":"3","author":"S Rajabi","year":"2020","unstructured":"Rajabi, S., Jamali, S., & Javidan, J. (2020). An intrusion detection system in computer networks using the firefly algorithm and the fast learning network. International Journal of Web Research, 3(1), 50\u201356.","journal-title":"International Journal of Web Research"},{"issue":"8","key":"11505_CR28","first-page":"45","volume":"2","author":"YK Jain","year":"2011","unstructured":"Jain, Y. K., & Bhandare, S. K. (2011). Min max normalization based data perturbation method for privacy protection. International Journal of Computer & Communication Technology, 2(8), 45\u201350.","journal-title":"International Journal of Computer & Communication Technology"},{"issue":"3","key":"11505_CR29","doi-asserted-by":"publisher","first-page":"8","DOI":"10.5815\/ijcnis.2019.03.02","volume":"11","author":"S Gurung","year":"2019","unstructured":"Gurung, S., Ghose, M. K., & Subedi, A. (2019). Deep learning approach on network intrusion detection system using NSL-KDD dataset. International Journal of Computer Network and Information Security, 11(3), 8\u201314.","journal-title":"International Journal of Computer Network and Information Security"},{"key":"11505_CR30","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.knosys.2018.02.015","volume":"147","author":"CR Wang","year":"2018","unstructured":"Wang, C. R., Xu, R. F., Lee, S. J., & Lee, C. H. (2018). Network intrusion detection using equality constrained-optimization-based extreme learning machines. Knowledge-Based Systems, 147, 68\u201380.","journal-title":"Knowledge-Based Systems"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11505-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11505-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11505-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T12:16:40Z","timestamp":1724069800000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11505-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["11505"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11505-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"16 July 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All code for data analysis associated with the current submission is available from the corresponding author upon reasonable request.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code Availability"}},{"value":"This paper does not contain any studies with human participants or animals performed by any authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}]}}