{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T05:14:28Z","timestamp":1735622068257,"version":"3.32.0"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s11277-024-11669-0","type":"journal-article","created":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T14:15:53Z","timestamp":1734963353000},"page":"1451-1475","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Optimized Multi-kernel Based Extreme Learning Machine for Authentication Threat Detection with Feature Reduction Scheme in IoT"],"prefix":"10.1007","volume":"139","author":[{"given":"Prachi","family":"Dahiya","sequence":"first","affiliation":[]},{"given":"Vinod","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,23]]},"reference":[{"issue":"1","key":"11669_CR1","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/JIOT.2017.2647881","volume":"4","author":"D Minoli","year":"2017","unstructured":"Minoli, D., Sohraby, K., & Occhiogrosso, B. (2017). IoT considerations, requirements, and architectures for smart buildings\u2014Energy optimization and next-generation building management systems. IEEE Internet of Things Journal, 4(1), 269\u2013283.","journal-title":"IEEE Internet of Things Journal"},{"key":"11669_CR2","doi-asserted-by":"crossref","unstructured":"Alrashdi, I., Alqazzaz, A., Alharthi, R., Aloufi, E., Zohdy, M.A., and Ming, H., (2019). FBAD: Fog-based attack detection for IoT healthcare in smart cities. In\u00a02019 IEEE 10th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)\u00a0(pp. 0515\u20130522).","DOI":"10.1109\/UEMCON47517.2019.8992963"},{"key":"11669_CR3","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.comcom.2022.09.012","volume":"195","author":"S Agrawal","year":"2022","unstructured":"Agrawal, S., Sarkar, S., Aouedi, O., Yenduri, G., Piamrat, K., Alazab, M., Bhattacharya, S., Maddikunta, P. K. R., & Gadekallu, T. R. (2022). Federated learning for intrusion detection system: Concepts, challenges and future directions. Computer Communications, 195, 346\u2013361.","journal-title":"Computer Communications"},{"issue":"7","key":"11669_CR4","doi-asserted-by":"publisher","first-page":"768","DOI":"10.3390\/electronics8070768","volume":"8","author":"LM Dang","year":"2019","unstructured":"Dang, L. M., Piran, M. J., Han, D., Min, K., & Moon, H. (2019). A survey on internet of things and cloud computing for healthcare. Electronics, 8(7), 768.","journal-title":"Electronics"},{"issue":"4","key":"11669_CR5","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/s11761-017-0219-8","volume":"11","author":"O Skarlat","year":"2017","unstructured":"Skarlat, O., Nardelli, M., Schulte, S., Borkowski, M., & Leitner, P. (2017). Optimized IoT service placement in the fog. Service Oriented Computing and Applications, 11(4), 427\u2013443.","journal-title":"Service Oriented Computing and Applications"},{"key":"11669_CR6","doi-asserted-by":"crossref","unstructured":"Ustundag, A., Cevikcan, E., Ervural, B.C. and Ervural, B. (2018). Overview of cyber security in the industry 4.0 era. In Industry 4.0: Managing the digital transformation, pp. 267\u2013284.","DOI":"10.1007\/978-3-319-57870-5_16"},{"key":"11669_CR7","doi-asserted-by":"publisher","first-page":"106576","DOI":"10.1109\/ACCESS.2020.3000421","volume":"8","author":"AA Hady","year":"2020","unstructured":"Hady, A. A., Ghubaish, A., Salman, T., Unal, D., & Jain, R. (2020). Intrusion detection system for healthcare systems using medical and network data: A comparison study. IEEE Access, 8, 106576\u2013106584.","journal-title":"IEEE Access"},{"key":"11669_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103106","volume":"189","author":"T Zoppi","year":"2021","unstructured":"Zoppi, T., & Ceccarelli, A. (2021). Prepare for trouble and make it double! Supervised-unsupervised stacking for anomaly-based intrusion detection. Journal of Network and Computer Applications, 189, 103106.","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"11669_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3390\/a10020039","volume":"10","author":"S Anwar","year":"2017","unstructured":"Anwar, S., Mohamad Zain, J., Zolkipli, M. F., Inayat, Z., Khan, S., Anthony, B., & Chang, V. (2017). From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions. Algorithms, 10(2), 39.","journal-title":"Algorithms"},{"key":"11669_CR10","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for intelligent intrusion detection system. IEEE Access, 7, 41525\u201341550.","journal-title":"IEEE Access"},{"issue":"1","key":"11669_CR11","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/s10586-022-03607-1","volume":"26","author":"M Jeyaselvi","year":"2023","unstructured":"Jeyaselvi, M., Dhanaraj, R. K., Sathya, M., Memon, F. H., Krishnasamy, L., Dev, K., Ziyue, W., & Qureshi, N. M. F. (2023). A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks. Cluster Computing, 26(1), 559\u2013574.","journal-title":"Cluster Computing"},{"key":"11669_CR12","doi-asserted-by":"publisher","first-page":"12361","DOI":"10.1007\/s00500-020-04678-1","volume":"24","author":"W Zhang","year":"2020","unstructured":"Zhang, W., Han, D., Li, K. C., & Massetto, F. I. (2020). Wireless sensor network intrusion detection system based on MK-ELM. Soft Computing, 24, 12361\u201312374.","journal-title":"Soft Computing"},{"issue":"6","key":"11669_CR13","doi-asserted-by":"publisher","first-page":"1706","DOI":"10.3390\/s20061706","volume":"20","author":"D Zheng","year":"2020","unstructured":"Zheng, D., Hong, Z., Wang, N., & Chen, P. (2020). An improved LDA-based ELM classification for intrusion detection algorithm in IoT application. Sensors, 20(6), 1706.","journal-title":"Sensors"},{"issue":"2","key":"11669_CR14","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1109\/JIOT.2018.2883344","volume":"6","author":"J Li","year":"2018","unstructured":"Li, J., Zhao, Z., Li, R., & Zhang, H. (2018). Ai-based two-stage intrusion detection for software defined IOT networks. IEEE Internet of Things Journal, 6(2), 2093\u20132102.","journal-title":"IEEE Internet of Things Journal"},{"key":"11669_CR15","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.ijinfomgt.2019.04.006","volume":"49","author":"D Li","year":"2019","unstructured":"Li, D., Deng, L., Lee, M., & Wang, H. (2019). IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. International Journal of Information Management, 49, 533\u2013545.","journal-title":"International Journal of Information Management"},{"issue":"1","key":"11669_CR16","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.dcan.2022.09.021","volume":"9","author":"H Lin","year":"2023","unstructured":"Lin, H., Xue, Q., Feng, J., & Bai, D. (2023). Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine. Digital Communications and Networks, 9(1), 111\u2013124.","journal-title":"Digital Communications and Networks"},{"key":"11669_CR17","doi-asserted-by":"crossref","unstructured":"Hanif, S., Ilyas, T., and Zeeshan, M. (2019). Intrusion detection in IoT using artificial neural networks on UNSW-15 dataset. In\u00a02019 IEEE 16th International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT and AI (HONET-ICT)\u00a0(pp. 152\u2013156).","DOI":"10.1109\/HONET.2019.8908122"},{"issue":"19","key":"11669_CR18","doi-asserted-by":"publisher","first-page":"7430","DOI":"10.3390\/en15197430","volume":"15","author":"C Annadurai","year":"2022","unstructured":"Annadurai, C., Nelson, I., Devi, K. N., Manikandan, R., Jhanjhi, N. Z., Masud, M., & Sheikh, A. (2022). Biometric authentication-based intrusion detection using artificial intelligence internet of things in smart city. Energies, 15(19), 7430.","journal-title":"Energies"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11669-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11669-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11669-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T15:13:32Z","timestamp":1735571612000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11669-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["11669"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11669-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"1 December 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}}]}}