{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:19:28Z","timestamp":1768339168677,"version":"3.49.0"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T00:00:00Z","timestamp":1735344000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T00:00:00Z","timestamp":1735344000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s12083-024-01867-9","type":"journal-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T01:58:35Z","timestamp":1735783115000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An enhanced whale optimizer based feature selection technique with effective ensemble classifier for network intrusion detection system"],"prefix":"10.1007","volume":"18","author":[{"given":"Nandhini","family":"U","sequence":"first","affiliation":[]},{"given":"S. V. N. Santhosh","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,28]]},"reference":[{"key":"1867_CR1","doi-asserted-by":"publisher","unstructured":"Khraisat A, Gondal I, Vamplew P, Kamruzzaman J (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1). https:\/\/doi.org\/10.1186\/s42400-019-0038-7","DOI":"10.1186\/s42400-019-0038-7"},{"issue":"3","key":"1867_CR2","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","volume":"21","author":"N Chaabouni","year":"2019","unstructured":"Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutorials 21(3):2671\u20132701. https:\/\/doi.org\/10.1109\/COMST.2019.2896380","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1867_CR3","doi-asserted-by":"publisher","first-page":"1238","DOI":"10.1016\/j.procs.2023.01.102","volume":"218","author":"L Narengbam","year":"2023","unstructured":"Narengbam L, Dey S (2023) WIFI intrusion detection using artificial neurons with bio-inspired optimization algorithm. Procedia Comput Sci 218:1238\u20131246. https:\/\/doi.org\/10.1016\/j.procs.2023.01.102","journal-title":"Procedia Comput Sci"},{"key":"1867_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107399","volume":"128","author":"GS Kumar","year":"2024","unstructured":"Kumar GS, Premalatha K, Maheshwari GU, Kanna PR, Vijaya G, Nivaashini M (2024) Differential privacy scheme using Laplace mechanism and statistical method computation in deep neural network for privacy preservation. Eng Appl Artif Intell 128:107399","journal-title":"Eng Appl Artif Intell"},{"key":"1867_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2023.105688","volume":"88","author":"TM Nithya","year":"2024","unstructured":"Nithya TM, Dhivya P, Sangeethaa SN, Kanna PR (2024) TB-MFCC multifuse feature for emergency vehicle sound classification using multistacked CNN\u2013Attention BiLSTM. Biomed Signal Process Control 88:105688","journal-title":"Biomed Signal Process Control"},{"key":"1867_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121071","volume":"234","author":"GS Kumar","year":"2023","unstructured":"Kumar GS, Premalatha K, Maheshwari GU, Kanna PR (2023) No more privacy concern: a privacy-chain based homomorphic encryption scheme and statistical method for privacy preservation of user\u2019s private and sensitive data. Expert Syst Appl 234:121071","journal-title":"Expert Syst Appl"},{"key":"1867_CR7","doi-asserted-by":"crossref","unstructured":"Karthika S, Priyanka T, Indirapriyadharshini J, Sadesh S, Rajeshkumar G (2023) Prediction of weather forecasting with long short-term memory using deep learning. In: 2023 4th International Conference on Smart Electronics and Communication (ICOSEC). IEEE, pp 1161\u20131168","DOI":"10.1109\/ICOSEC58147.2023.10276273"},{"key":"1867_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2023.105296","volume":"86","author":"TM Nithya","year":"2023","unstructured":"Nithya TM, Kanna PR, Vanithamani S, Santhi P (2023) An efficient PM-multisampling image filtering with enhanced CNN architecture for pneumonia classfication. Biomed Signal Process Control 86:105296","journal-title":"Biomed Signal Process Control"},{"key":"1867_CR9","doi-asserted-by":"crossref","unstructured":"Mythili E, Vanithamani S, Rajeshkumar G, Gayathri K, Harsha R (2023) AMLPDS: an automatic multi-regional license plate detection system based on EasyOCR and CNN Algorithm. In: 2023 2nd International Conference on Edge Computing and Applications (ICECAA). IEEE, pp 667\u2013673","DOI":"10.1109\/ICECAA58104.2023.10212354"},{"key":"1867_CR10","doi-asserted-by":"crossref","unstructured":"Gayathiri B, Brindha P, Karthika I, Saranya E, Rajeshkumar G, Kanna PR (2023) Machine learning based crop suitability prediction and fertiliser recommendation system. In: 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, pp 1023\u20131028","DOI":"10.1109\/ICESC57686.2023.10193542"},{"key":"1867_CR11","doi-asserted-by":"crossref","unstructured":"Dhivya P, Rajesh Kanna P, Deepa K, Santhiya S (2023) Square static\u2013deep hyper optimization and genetic meta-learning approach for disease classification. IETE J Res 1\u201310","DOI":"10.1080\/03772063.2023.2206367"},{"key":"1867_CR12","doi-asserted-by":"crossref","unstructured":"Harsha R, Karthika S, Mohana PD, Rajesh KP, Rajeshkumar G, Mythili E (2023) Folla disease detection using in-depth learning. In: 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC). IEEE, pp 547\u2013552","DOI":"10.1109\/ICAAIC56838.2023.10141305"},{"key":"1867_CR13","doi-asserted-by":"crossref","unstructured":"Sriram S, Santhiya S, Rajeshkumar G, Gayathri S, Vijaya K (2023) Predict the quality of freshwater using support vector machines. In: 2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC). IEEE, pp 370\u2013377","DOI":"10.1109\/ICAAIC56838.2023.10140956"},{"key":"1867_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.102983","volume":"178","author":"M Mohammadi","year":"2021","unstructured":"Mohammadi M et al (2021) A comprehensive survey and taxonomy of the SVM-based intrusion detection systems. J Netw Comput Appl 178:102983. https:\/\/doi.org\/10.1016\/j.jnca.2021.102983","journal-title":"J Netw Comput Appl"},{"key":"1867_CR15","doi-asserted-by":"crossref","unstructured":"Pandiaraj A, Prakash SL, Gopal R, Kanna PR (2022) Generating art and music using deep neural networks. In: Artificial intelligent techniques for wireless communication and networking, pp 91\u2013103","DOI":"10.1002\/9781119821809.ch7"},{"key":"1867_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116545","volume":"194","author":"PR Kanna","year":"2022","unstructured":"Kanna PR, Santhi P (2022) Hybrid intrusion detection using mapreduce based black widow optimized convolutional long short-term memory neural networks. Expert Syst Appl 194:116545","journal-title":"Expert Syst Appl"},{"key":"1867_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107132","volume":"226","author":"PR Kanna","year":"2021","unstructured":"Kanna PR, Santhi P (2021) Unified deep learning approach for efficient intrusion detection system using integrated spatial\u2013temporal features. Knowl-Based Syst 226:107132","journal-title":"Knowl-Based Syst"},{"key":"1867_CR18","doi-asserted-by":"publisher","first-page":"81542","DOI":"10.1109\/ACCESS.2019.2923707","volume":"7","author":"S Mohan","year":"2019","unstructured":"Mohan S, Thirumalai C, Srivastava G (2019) Effective heart disease prediction using hybrid machine learning techniques. IEEE access 7:81542\u201381554","journal-title":"IEEE access"},{"issue":"1","key":"1867_CR19","first-page":"71","volume":"11","author":"PR Kanna","year":"2017","unstructured":"Kanna PR, Sindhanaiselvan K, Vijaymeena MK (2017) A defensive mechanism based on PCA to defend denial of-service attack. Int J Secur Appl 11(1):71\u201382","journal-title":"Int J Secur Appl"},{"key":"1867_CR20","doi-asserted-by":"publisher","first-page":"82512","DOI":"10.1109\/access.2019.2923640","volume":"7","author":"X Gao","year":"2019","unstructured":"Gao X et al (2019) An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7:82512\u201382521. https:\/\/doi.org\/10.1109\/access.2019.2923640","journal-title":"IEEE Access"},{"key":"1867_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108250","volume":"197","author":"K SureshKumar","year":"2021","unstructured":"SureshKumar K, Vimala P (2021) Energy efficient routing protocol using exponentially-ant lion whale optimization algorithm in wireless sensor networks. Comput Netw 197:108250. https:\/\/doi.org\/10.1016\/j.comnet.2021.108250","journal-title":"Comput Netw"},{"key":"1867_CR22","doi-asserted-by":"publisher","first-page":"56847","DOI":"10.1109\/access.2020.2978035","volume":"8","author":"R Vijayanand","year":"2020","unstructured":"Vijayanand R, Devaraj D (2020) A novel feature selection method using whale optimization algorithm and genetic operators for intrusion detection system in wireless mesh network. IEEE Access 8:56847\u201356854. https:\/\/doi.org\/10.1109\/access.2020.2978035","journal-title":"IEEE Access"},{"key":"1867_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118476","volume":"210","author":"SV Pingale","year":"2022","unstructured":"Pingale SV, Sutar SR (2022) Remora whale optimization-based hybrid deep learning for network intrusion detection using CNN features. Expert Syst Appl 210:118476. https:\/\/doi.org\/10.1016\/j.eswa.2022.118476","journal-title":"Expert Syst Appl"},{"issue":"2","key":"1867_CR24","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1007\/s41870-019-00346-2","volume":"14","author":"S Bansal","year":"2019","unstructured":"Bansal S, Rattan M (2019) Design of cognitive radio system and comparison of modified whale optimization algorithm with whale optimization algorithm. Int J Inf Technol 14(2):999\u20131010. https:\/\/doi.org\/10.1007\/s41870-019-00346-2","journal-title":"Int J Inf Technol"},{"key":"1867_CR25","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1016\/j.procs.2020.04.133","volume":"171","author":"T Saranya","year":"2020","unstructured":"Saranya T et al (2020) Performance analysis of machine learning algorithms in Intrusion detection system: a review. Procedia Comput Sci 171:1251\u20131260. https:\/\/doi.org\/10.1016\/j.procs.2020.04.133","journal-title":"Procedia Comput Sci"},{"issue":"5\u20136","key":"1867_CR26","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s12243-021-00852-0","volume":"77","author":"A Rosay","year":"2021","unstructured":"Rosay A et al (2021) Multi-layer perceptron for network intrusion detection. Ann Telecommun 77(5\u20136):371\u2013394. https:\/\/doi.org\/10.1007\/s12243-021-00852-0","journal-title":"Ann Telecommun"},{"key":"1867_CR27","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1016\/j.procs.2023.03.106","volume":"220","author":"O Lifandali","year":"2023","unstructured":"Lifandali O, Abghour N, Chiba Z (2023) Feature selection using a combination of ant colony optimization and random forest algorithms applied to isolation forest based intrusion detection system. Procedia Comput Sci 220:796\u2013805. https:\/\/doi.org\/10.1016\/j.procs.2023.03.106","journal-title":"Procedia Comput Sci"},{"key":"1867_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100819","volume":"22","author":"S Fraihat","year":"2023","unstructured":"Fraihat S et al (2023) Intrusion detection system for large-scale IOT NetFlow networks using machine learning with modified arithmetic optimization algorithm. Internet of Things 22:100819. https:\/\/doi.org\/10.1016\/j.iot.2023.100819","journal-title":"Internet of Things"},{"key":"1867_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.iswa.2022.200114","volume":"16","author":"IH Hassan","year":"2022","unstructured":"Hassan IH et al (2022) An improved binary manta ray foraging optimization algorithm based feature selection and random forest classifier for network intrusion detection. Intell Syst Appl 16:200114. https:\/\/doi.org\/10.1016\/j.iswa.2022.200114","journal-title":"Intell Syst Appl"},{"issue":"1","key":"1867_CR30","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/s11277-021-08357-8","volume":"127","author":"M Raja","year":"2021","unstructured":"Raja M, Dhanasekaran S, Vasudevan V (2021) Opposition based joint grey wolf-whale optimization algorithm based attribute based encryption in secure wireless communication. Wireless Pers Commun 127(1):635\u2013655. https:\/\/doi.org\/10.1007\/s11277-021-08357-8","journal-title":"Wireless Pers Commun"},{"key":"1867_CR31","doi-asserted-by":"publisher","first-page":"24120","DOI":"10.1109\/access.2020.2969428","volume":"8","author":"BA Tama","year":"2020","unstructured":"Tama BA et al (2020) An enhanced anomaly detection in web traffic using a stack of classifier ensemble. IEEE Access 8:24120\u201324134. https:\/\/doi.org\/10.1109\/access.2020.2969428","journal-title":"IEEE Access"},{"key":"1867_CR32","doi-asserted-by":"publisher","unstructured":"L D, Chitra R (2023) A novel Autoencoder based feature independent Ga optimised Xgboost classifier for Iomt malware detection\u00a0[Preprint]. https:\/\/doi.org\/10.2139\/ssrn.4395576","DOI":"10.2139\/ssrn.4395576"},{"key":"1867_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120596","volume":"232","author":"G Mohiuddin","year":"2023","unstructured":"Mohiuddin G et al (2023) Intrusion detection using hybridized meta-heuristic techniques with weighted XGBoost classifier. Expert Syst Appl 232:120596. https:\/\/doi.org\/10.1016\/j.eswa.2023.120596","journal-title":"Expert Syst Appl"},{"key":"1867_CR34","doi-asserted-by":"publisher","first-page":"144575","DOI":"10.1109\/access.2020.3014644","volume":"8","author":"W Xue","year":"2020","unstructured":"Xue W, Wu T (2020) Active learning-based XGBoost for cyber physical system against generic AC false data injection attacks. IEEE Access 8:144575\u2013144584. https:\/\/doi.org\/10.1109\/access.2020.3014644","journal-title":"IEEE Access"},{"key":"1867_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.mex.2024.102597","volume":"12","author":"P Mahadevappa","year":"2024","unstructured":"Mahadevappa P, Murugesan RK, Al-Amri R, Thabit R, Al-Ghushami AH, Alkawsi G (2024) A secure edge computing model using machine learning and IDS to detect and isolate intruders. MethodsX 12:102597","journal-title":"MethodsX"},{"key":"1867_CR36","doi-asserted-by":"crossref","unstructured":"Hosny KM, Awad AI, Khashaba MM, Fouda MM, Guizani M, Mohamed ER (2023) Optimized multi-user dependent tasks offloading in edge-cloud computing using refined whale optimization algorithm. IEEE Trans Sustain Comput 9:14\u201330","DOI":"10.1109\/TSUSC.2023.3294447"},{"key":"1867_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103560","volume":"212","author":"MA Khan","year":"2023","unstructured":"Khan MA, Iqbal N, Jamil H, Kim DH (2023) An optimized ensemble prediction model using AutoML based on soft voting classifier for network intrusion detection. J Netw Comput Appl 212:103560","journal-title":"J Netw Comput Appl"},{"key":"1867_CR38","doi-asserted-by":"crossref","unstructured":"Aborokbah M (2024) A novel intrusion detection model for enhancing security in Smart City. IEEE Access","DOI":"10.1109\/ACCESS.2024.3438619"},{"key":"1867_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111384","volume":"286","author":"X Wang","year":"2024","unstructured":"Wang X, Hou B, Teng Y, Yang Y, Zhang X, Sun L, Chen F (2024) Reformative ROCOSD\u2013ORESTE\u2013LDA model with an MLP neural network to enhance decision reliability. Knowl-Based Syst 286:111384","journal-title":"Knowl-Based Syst"},{"key":"1867_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110227","volume":"140","author":"A Si-Ahmed","year":"2023","unstructured":"Si-Ahmed A, Al-Garadi MA, Boustia N (2023) Survey of machine learning based intrusion detection methods for internet of medical things. Appl Soft Comput 140:110227. https:\/\/doi.org\/10.1016\/j.asoc.2023.110227","journal-title":"Appl Soft Comput"},{"issue":"12","key":"1867_CR41","doi-asserted-by":"publisher","first-page":"9444","DOI":"10.1109\/jiot.2021.3126811","volume":"9","author":"A Jamalipour","year":"2022","unstructured":"Jamalipour A, Murali S (2022) A taxonomy of machine-learning-based intrusion detection systems for the internet of things: a survey. IEEE Internet Things J 9(12):9444\u20139466. https:\/\/doi.org\/10.1109\/jiot.2021.3126811","journal-title":"IEEE Internet Things J"},{"key":"1867_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119600","volume":"648","author":"D Yu","year":"2023","unstructured":"Yu D, Fang A, Xu Z (2023) Topic research in fuzzy domain: based on lda topic modelling. Inf Sci 648:119600. https:\/\/doi.org\/10.1016\/j.ins.2023.119600","journal-title":"Inf Sci"},{"key":"1867_CR43","doi-asserted-by":"publisher","unstructured":"Srikanth Yadav M, Kalpana R (2019) Data preprocessing for intrusion detection system using encoding and normalization approaches. 2019 11th International Conference on Advanced Computing (ICoAC) [Preprint]. https:\/\/doi.org\/10.1109\/icoac48765.2019.246851","DOI":"10.1109\/icoac48765.2019.246851"},{"key":"1867_CR44","doi-asserted-by":"publisher","unstructured":"Yao K et al (2022) Finding associations between natural and computer languages: a case-study of bilingual LDA applied to the Bleeping Computer Forum posts. SSRN Electronic Journal [Preprint]. https:\/\/doi.org\/10.2139\/ssrn.4029619","DOI":"10.2139\/ssrn.4029619"},{"key":"1867_CR45","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.matcom.2022.12.022","volume":"207","author":"J Zhang","year":"2023","unstructured":"Zhang J et al (2023) CWOA: A novel complex-valued encoding whale optimization algorithm. Math Comput Simul 207:151\u2013188. https:\/\/doi.org\/10.1016\/j.matcom.2022.12.022","journal-title":"Math Comput Simul"},{"key":"1867_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.swevo.2019.03.004","volume":"48","author":"FS Gharehchopogh","year":"2019","unstructured":"Gharehchopogh FS, Gholizadeh H (2019) A comprehensive survey: whale optimization algorithm and its applications. Swarm Evol Comput 48:1\u201324. https:\/\/doi.org\/10.1016\/j.swevo.2019.03.004","journal-title":"Swarm Evol Comput"},{"issue":"13","key":"1867_CR47","doi-asserted-by":"publisher","first-page":"9427","DOI":"10.1007\/s00521-019-04453-w","volume":"32","author":"L Haghnegahdar","year":"2019","unstructured":"Haghnegahdar L, Wang Y (2019) A whale optimization algorithm-trained artificial neural network for smart grid cyber intrusion detection. Neural Comput Appl 32(13):9427\u20139441. https:\/\/doi.org\/10.1007\/s00521-019-04453-w","journal-title":"Neural Comput Appl"},{"key":"1867_CR48","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.aej.2022.12.019","volume":"68","author":"W-H Tan","year":"2023","unstructured":"Tan W-H, Mohamad-Saleh J (2023) A hybrid whale optimization algorithm based on equilibrium concept. Alex Eng J 68:763\u2013786. https:\/\/doi.org\/10.1016\/j.aej.2022.12.019","journal-title":"Alex Eng J"},{"key":"1867_CR49","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.trpro.2023.12.040","volume":"76","author":"S Nieland","year":"2024","unstructured":"Nieland S et al (2024) Transferability analysis of user groups in travel behaviour surveys using a random forest classification model. Transp Res Proc 76:81\u201395. https:\/\/doi.org\/10.1016\/j.trpro.2023.12.040","journal-title":"Transp Res Proc"},{"key":"1867_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2022.101833","volume":"64","author":"Kurniabudi","year":"2022","unstructured":"Kurniabudi et al (2022) Improvement of attack detection performance on the internet of things with PSO-search and random forest. J Comput Sci 64:101833. https:\/\/doi.org\/10.1016\/j.jocs.2022.101833","journal-title":"J Comput Sci"},{"key":"1867_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104660","volume":"94","author":"E Mushtaq","year":"2022","unstructured":"Mushtaq E, Zameer A, Khan A (2022) A two-stage stacked ensemble intrusion detection system using five base classifiers and MLP with optimal feature selection. Microprocess Microsyst 94:104660. https:\/\/doi.org\/10.1016\/j.micpro.2022.104660","journal-title":"Microprocess Microsyst"},{"key":"1867_CR52","doi-asserted-by":"publisher","unstructured":"Sol J et al (2023) Towards automated vocal mode classification in healthy singing voice\u2014an XGBoost decision tree-based machine learning classifier. J Voice [Preprint]. https:\/\/doi.org\/10.1016\/j.jvoice.2023.09.006","DOI":"10.1016\/j.jvoice.2023.09.006"},{"key":"1867_CR53","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.future.2022.11.001","volume":"141","author":"AHM Kamal","year":"2023","unstructured":"Kamal AHM et al (2023) Explainable indoor localization of BLE devices through RSSI using recursive continuous wavelet transformation and XGBoost classifier. Futur Gener Comput Syst 141:230\u2013242. https:\/\/doi.org\/10.1016\/j.future.2022.11.001","journal-title":"Futur Gener Comput Syst"},{"key":"1867_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2023.104935","volume":"103","author":"TR Gadekallu","year":"2023","unstructured":"Gadekallu TR et al (2023) Moth\u2013flame optimization based ensemble classification for intrusion detection in intelligent transport system for smart cities. Microprocess Microsyst 103:104935. https:\/\/doi.org\/10.1016\/j.micpro.2023.104935","journal-title":"Microprocess Microsyst"},{"key":"1867_CR55","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.jpdc.2020.06.012","volume":"145","author":"T Rose","year":"2020","unstructured":"Rose T et al (2020) A hybrid anomaly-based intrusion detection system to improve time complexity in the internet of energy environment. J Parallel Distrib Comput 145:124\u2013139. https:\/\/doi.org\/10.1016\/j.jpdc.2020.06.012","journal-title":"J Parallel Distrib Comput"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01867-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01867-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01867-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T13:56:01Z","timestamp":1746194161000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01867-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,28]]},"references-count":55,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1867"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01867-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,28]]},"assertion":[{"value":"24 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors Provide the Ethics Approval for the given manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All the authors gave permission to Consent to publish.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"4"}}