{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T05:34:26Z","timestamp":1777095266809,"version":"3.51.4"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T00:00:00Z","timestamp":1772841600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T00:00:00Z","timestamp":1772841600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s12065-026-01157-8","type":"journal-article","created":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T04:42:27Z","timestamp":1772858547000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure-IoT: an optimized ensemble feature selection framework for enhanced network security in IoT systems"],"prefix":"10.1007","volume":"19","author":[{"given":"Faraj","family":"Chishti","sequence":"first","affiliation":[]},{"given":"Geetanjali","family":"Rathee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,7]]},"reference":[{"issue":"5","key":"1157_CR1","doi-asserted-by":"publisher","first-page":"9042","DOI":"10.1109\/JIOT.2019.2926365","volume":"6","author":"E Anthi","year":"2019","unstructured":"Anthi E, Williams L, Slowinska M, Theodorakopoulos G, Burnap P (2019) A supervised intrusion detection system for smart home iot devices. IEEE Internet Things J 6(5):9042\u20139053","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"1157_CR2","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1109\/COMST.2024.3355168","volume":"26","author":"A Cirne","year":"2024","unstructured":"Cirne A, Sousa PR, Resende JS, Antunes L (2024) Hardware security for internet of things identity assurance. IEEE Commun Surv Tutor 26(2):1041\u20131079","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"1157_CR3","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22\u201332","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"1157_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3417987","volume":"53","author":"N Waheed","year":"2020","unstructured":"Waheed N, He X, Ikram M, Usman M, Hashmi SS, Usman M (2020) Security and privacy in iot using machine learning and blockchain: threats and countermeasures. ACM Comput Surv (csur) 53(6):1\u201337","journal-title":"ACM Comput Surv (csur)"},{"issue":"4","key":"1157_CR5","doi-asserted-by":"publisher","first-page":"2456","DOI":"10.1109\/COMST.2017.2736886","volume":"19","author":"A Gharaibeh","year":"2017","unstructured":"Gharaibeh A, Salahuddin MA, Hussini SJ, Khreishah A, Khalil I, Guizani M, Al-Fuqaha A (2017) Smart cities: a survey on data management, security, and enabling technologies. IEEE Commun Surv Tutor 19(4):2456\u20132501","journal-title":"IEEE Commun Surv Tutor"},{"key":"1157_CR6","doi-asserted-by":"publisher","first-page":"221612","DOI":"10.1109\/ACCESS.2020.3043082","volume":"8","author":"J Bhayo","year":"2020","unstructured":"Bhayo J, Hameed S, Shah SA (2020) An efficient counter-based ddos attack detection framework leveraging software defined iot (sd-iot). IEEE Access 8:221612\u2013221631","journal-title":"IEEE Access"},{"issue":"1","key":"1157_CR7","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/TR.2018.2864536","volume":"68","author":"S Siboni","year":"2018","unstructured":"Siboni S, Sachidananda V, Meidan Y, Bohadana M, Mathov Y, Bhairav S, Shabtai A, Elovici Y (2018) Security testbed for internet-of-things devices. IEEE Trans Reliab 68(1):23\u201344","journal-title":"IEEE Trans Reliab"},{"key":"1157_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101827","volume":"109","author":"F Hategekimana","year":"2020","unstructured":"Hategekimana F, Whitaker TJL, Pantho MJH, Bobda C (2020) Iot device security through dynamic hardware isolation with cloud-based update. J Syst Architect 109:101827","journal-title":"J Syst Architect"},{"issue":"7","key":"1157_CR9","doi-asserted-by":"publisher","first-page":"9986","DOI":"10.1007\/s11227-023-05843-7","volume":"80","author":"C Praveen Shukla","year":"2024","unstructured":"Praveen Shukla C, Krishna R, Patil NV (2024) Iot traffic-based ddos attacks detection mechanisms: A comprehensive review. J Supercomput 80(7):9986\u201310043","journal-title":"J Supercomput"},{"issue":"13","key":"1157_CR10","doi-asserted-by":"publisher","first-page":"6955","DOI":"10.1007\/s00521-024-09439-x","volume":"36","author":"AM Eid","year":"2024","unstructured":"Eid AM, Soudan B, Nassif AB, Injadat MN (2024) Comparative study of ml models for iiot intrusion detection: impact of data preprocessing and balancing. Neural Comput Appl 36(13):6955\u20136972","journal-title":"Neural Comput Appl"},{"key":"1157_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101162","volume":"26","author":"MM Inuwa","year":"2024","unstructured":"Inuwa MM, Das R (2024) A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on iot networks. Internet of Things 26:101162","journal-title":"Internet of Things"},{"issue":"2","key":"1157_CR12","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.1007\/s00500-023-09452-7","volume":"28","author":"M Al-Ambusaidi","year":"2024","unstructured":"Al-Ambusaidi M, Yinjun Z, Muhammad Y, Yahya A (2024) Ml-ids: an efficient ml-enabled intrusion detection system for securing iot networks and applications. Soft Comput 28(2):1765\u20131784","journal-title":"Soft Comput"},{"issue":"3","key":"1157_CR13","doi-asserted-by":"publisher","first-page":"3738","DOI":"10.1007\/s11227-023-05616-2","volume":"80","author":"S Cherbal","year":"2024","unstructured":"Cherbal S, Zier A, Hebal S, Louail L, Annane B (2024) Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing. J Supercomput 80(3):3738\u20133816","journal-title":"J Supercomput"},{"issue":"4","key":"1157_CR14","first-page":"2647","volume":"16","author":"N Yasmin","year":"2024","unstructured":"Yasmin N, Gupta R (2024) Modified lightweight gift cipher for security enhancement in resource-constrained iot devices. Int J Inf Technol 16(4):2647\u20132659","journal-title":"Int J Inf Technol"},{"key":"1157_CR15","volume":"55","author":"G Kaur","year":"2020","unstructured":"Kaur G (2020) A comparison of two hybrid ensemble techniques for network anomaly detection in spark distributed environment. J Inf Secur Appl 55:102601","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"1157_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.497","volume":"8","author":"R Ji","year":"2025","unstructured":"Ji R, Selwal A, Kumar N, Padha D (2025) Cascading bagging and boosting ensemble methods for intrusion detection in cyber-physical systems. Secur Priv 8(1):e497","journal-title":"Secur Priv"},{"issue":"3","key":"1157_CR17","doi-asserted-by":"publisher","first-page":"4815","DOI":"10.1109\/JIOT.2018.2871719","volume":"6","author":"N Moustafa","year":"2018","unstructured":"Moustafa N, Turnbull B, Choo K-KR (2018) An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J 6(3):4815\u20134830","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"1157_CR18","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.70031","volume":"8","author":"R Ji","year":"2025","unstructured":"Ji R, Kumar N, Padha D (2025) Optimized intrusion detection approach for cyber-physical system using meta-learning with stacked generalization: An ensemble learning inspired approach. Secur Priv 8(3):e70031","journal-title":"Secur Priv"},{"issue":"24","key":"1157_CR19","doi-asserted-by":"publisher","first-page":"9347","DOI":"10.3390\/ijerph17249347","volume":"17","author":"MM Rashid","year":"2020","unstructured":"Rashid MM, Kamruzzaman J, Hassan MM, Imam T, Gordon S (2020) Cyberattacks detection in iot-based smart city applications using machine learning techniques. Int J Environ Res Public Health 17(24):9347","journal-title":"Int J Environ Res Public Health"},{"key":"1157_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113249","volume":"148","author":"H Alazzam","year":"2020","unstructured":"Alazzam H, Sharieh A, Sabri KE (2020) A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Syst Appl 148:113249","journal-title":"Expert Syst Appl"},{"key":"1157_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107247","volume":"174","author":"Y Zhou","year":"2020","unstructured":"Zhou Y, Cheng G, Jiang S, Dai M (2020) Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Netw 174:107247","journal-title":"Comput Netw"},{"issue":"10","key":"1157_CR22","doi-asserted-by":"publisher","first-page":"9555","DOI":"10.1007\/s12652-020-02696-3","volume":"12","author":"P Kumar","year":"2021","unstructured":"Kumar P, Gupta GP, Tripathi R (2021) A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks. J Ambient Intell Humaniz Comput 12(10):9555\u20139572","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1157_CR23","doi-asserted-by":"crossref","unstructured":"Ji R, Kumar N, Padha D (2024) Cnn-gwo-voting & hybrid: ensemble learning inspired intrusion detection approaches for cyber-physical systems. Proceedings of the Indian National Science Academy, pp 1\u201315","DOI":"10.1007\/s43538-024-00372-0"},{"key":"1157_CR24","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.comnet.2018.02.028","volume":"136","author":"V Hajisalem","year":"2018","unstructured":"Hajisalem V, Babaie S (2018) A hybrid intrusion detection system based on abc-afs algorithm for misuse and anomaly detection. Comput Netw 136:37\u201350","journal-title":"Comput Netw"},{"key":"1157_CR25","doi-asserted-by":"publisher","first-page":"94497","DOI":"10.1109\/ACCESS.2019.2928048","volume":"7","author":"BA Tama","year":"2019","unstructured":"Tama BA, Comuzzi M, Rhee K-H (2019) Tse-ids: a two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access 7:94497\u201394507","journal-title":"IEEE Access"},{"key":"1157_CR26","doi-asserted-by":"crossref","unstructured":"Dwivedi S, Vardhan M, Tripathi S (2021) Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection. Cluster Computing, pp 1\u201320","DOI":"10.1007\/s10586-020-03229-5"},{"issue":"30","key":"1157_CR27","doi-asserted-by":"publisher","first-page":"3069","DOI":"10.17485\/IJST\/v17i30.1794","volume":"17","author":"R Ji","year":"2024","unstructured":"Ji R, Kumar N, Padha D (2024) Hybrid enhanced intrusion detection frameworks for cyber-physical systems via optimal features selection. Indian J Sci Technol 17(30):3069\u20133079","journal-title":"Indian J Sci Technol"},{"issue":"1","key":"1157_CR28","doi-asserted-by":"publisher","first-page":"53","DOI":"10.21928\/uhdjst.v7n1y2023.pp53-65","volume":"7","author":"AR Abdulla","year":"2023","unstructured":"Abdulla AR, Jameel GMN (2023) A review on iot intrusion detection systems using supervised machine learning: techniques, datasets, and algorithms. UHD J Sci Technol 7(1):53\u201365","journal-title":"UHD J Sci Technol"},{"issue":"2","key":"1157_CR29","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/s10207-023-00767-y","volume":"23","author":"H Zouhri","year":"2024","unstructured":"Zouhri H, Idri A, Ratnani A (2024) Evaluating the impact of filter-based feature selection in intrusion detection systems. Int J Inf Secur 23(2):759\u2013785","journal-title":"Int J Inf Secur"},{"key":"1157_CR30","doi-asserted-by":"publisher","first-page":"24120","DOI":"10.1109\/ACCESS.2020.2969428","volume":"8","author":"BA Tama","year":"2020","unstructured":"Tama BA, Rhee K-H, Jung J-W (2020) An enhanced anomaly detection in web traffic using a stack of classifier ensemble. IEEE Access 8:24120\u201324134","journal-title":"IEEE Access"},{"key":"1157_CR31","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.future.2021.09.027","volume":"127","author":"Md Souradip Roy","year":"2022","unstructured":"Souradip Roy Md, Hossain AR, Islam MA, Kim Y-C (2022) A lightweight supervised intrusion detection mechanism for iot networks. Futur Gener Comput Syst 127:276\u2013285","journal-title":"Futur Gener Comput Syst"},{"issue":"5","key":"1157_CR32","doi-asserted-by":"publisher","first-page":"5693","DOI":"10.1007\/s40747-023-01013-7","volume":"9","author":"N Thockchom","year":"2023","unstructured":"Thockchom N, Singh MM, Nandi U (2023) A novel ensemble learning-based model for network intrusion detection. Complex Intell Syst 9(5):5693\u20135714","journal-title":"Complex Intell Syst"},{"issue":"3","key":"1157_CR33","doi-asserted-by":"publisher","first-page":"1575","DOI":"10.1007\/s10115-023-02010-5","volume":"66","author":"D Theng","year":"2024","unstructured":"Theng D, Bhoyar KK (2024) Feature selection techniques for machine learning: a survey of more than two decades of research. Knowl Inf Syst 66(3):1575\u20131637","journal-title":"Knowl Inf Syst"},{"key":"1157_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2025.111177","volume":"262","author":"D Pinto","year":"2025","unstructured":"Pinto D, Amorim I, Maia E, Pra\u00e7a I (2025) A review on intrusion detection datasets: tools, processes, and features. Comput Netw 262:111177","journal-title":"Comput Netw"},{"key":"1157_CR35","unstructured":"Canadian\u00a0Institute for Cybersecurity (2009) Nsl-kdd: A data set suggested to solve some of the inherent problems of the kdd\u201999 data set"},{"issue":"1\u20133","key":"1157_CR36","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1080\/19393555.2015.1125974","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa N, Slay J (2016) The evaluation of network anomaly detection systems: Statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Inf Secur J A Glob Perspect 25(1\u20133):18\u201331","journal-title":"Inf Secur J A Glob Perspect"},{"key":"1157_CR37","unstructured":"Canadian\u00a0Institute for Cybersecurity. Intrusion detection evaluation dataset (cic-ids2017). https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html, 2017. This dataset contains benign and up-to-date common attacks, resembling true real-world data (PCAPs). It includes labeled flows based on timestamps, source\/destination IPs, ports, protocols, and attack types (CSV files)"},{"key":"1157_CR38","doi-asserted-by":"crossref","unstructured":"Moustafa N, Keshky M, Debiez E, Janicke H (2020) Federated ton_iot windows datasets for evaluating ai-based security applications. In 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom), pp 848\u2013855. IEEE","DOI":"10.1109\/TrustCom50675.2020.00114"},{"key":"1157_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102164","volume":"102","author":"A Nazir","year":"2021","unstructured":"Nazir A, Khan RA (2021) A novel combinatorial optimization based feature selection method for network intrusion detection. Comput Securi 102:102164","journal-title":"Comput Securi"},{"issue":"9","key":"1157_CR40","doi-asserted-by":"publisher","first-page":"9768","DOI":"10.1007\/s10489-021-02968-1","volume":"52","author":"M Rashid","year":"2022","unstructured":"Rashid M, Kamruzzaman J, Imam T, Wibowo S, Gordon S (2022) A tree-based stacking ensemble technique with feature selection for network intrusion detection. Appl Intell 52(9):9768\u20139781","journal-title":"Appl Intell"},{"key":"1157_CR41","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1007\/s10586-019-03008-x","volume":"23","author":"V Kumar","year":"2020","unstructured":"Kumar V, Sinha D, Das AK, Pandey SC, Goswami RT (2020) An integrated rule based intrusion detection system: analysis on unsw-nb15 data set and the real time online dataset. Clust Comput 23:1397\u20131418","journal-title":"Clust Comput"},{"key":"1157_CR42","doi-asserted-by":"crossref","unstructured":"Abbas A, Khan MA, Latif S, Ajaz M, Shah AA, Ahmad J (2022) A new ensemble-based intrusion detection system for internet of things. Arab J Sci Eng 1\u201315","DOI":"10.1007\/s13369-021-06086-5"},{"key":"1157_CR43","unstructured":"Malik M, Dutta M, et\u00a0al (2023) Feature engineering and machine learning framework for ddos attack detection in the standardized internet of things. IEEE Internet Things J"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-026-01157-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12065-026-01157-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-026-01157-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T04:35:45Z","timestamp":1777091745000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12065-026-01157-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,7]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["1157"],"URL":"https:\/\/doi.org\/10.1007\/s12065-026-01157-8","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"value":"1864-5909","type":"print"},{"value":"1864-5917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,7]]},"assertion":[{"value":"28 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"47"}}