{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T18:10:33Z","timestamp":1772647833721,"version":"3.50.1"},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003356","name":"Gazi University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003356","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>In light of rapid technological developments, a marked rise in global internet usage has contributed to increased sensitive data flow across networks. This increase leads to the diversification of malicious attacks and makes cyber security requirements more evident. In order to ensure network security, intrusion detection systems stand out as an essential component. Intrusion detection systems detect suspicious and malicious activities over network traffic, allowing network administrators and experts to monitor current threats continuously. In anomaly-based systems, machine learning approaches are applied to identify abnormal attempts in network traffic. This study presents a feature selection framework for anomaly-based attack detection systems by combining machine learning and heuristic algorithms. This proposed study aims to improve the performance of IDSs in terms of both time and attack detection by selecting features with heuristic approaches. In the proposed approach, PSO, FPA, DE feature selection methods and LR, DT, RF, KNN, NB, GB, LDA, QDA, AdaBoost, and NN machine learning algorithms are used to perform anomaly-based comparative analyses on KDDCup99, NSL-KDD, UNSW-NB15, CSE-CIS-IDS2018 datasets. Analyses conducted on these datasets with various features demonstrated that models employing feature selection achieved an approximate two-hundred-percent improvement in time efficiency compared to models that did not utilize feature selection. It has been determined that DE, PSO, and FPA, which are used for feature selection, provide high-accuracy outputs when combined with different classifiers. When the analysis results are assessed according to the specified criteria, the highest F1-Score values achieved are as follows: 0.9972 for the DE method in GB, 0.9969 for the PSO method in GB, and 0.9948 for the FPA method in GB, on the KDD CUP 99 dataset. In the NSL-KDD, used as the second dataset, the DE method achieved a score of 0.9713 in GB, the PSO method reached 0.9112 in DT, and the FPA method obtained 0.9894 in RF, respectively. In the third dataset, UNSW-NB15, the DE method achieved a score of 0.9507 in DT, the PSO method reached 0.9068 in DT, and the FPA method obtained 0.8924 in NN. Finally, in the CSE-CIC-IDS2018 dataset, the highest scores achieved using the RF algorithm were 0.99986 for the DE method, 0.99989 for the PSO method, and 0.99987 for the FPA method, based on feature selection. The obtained results underscore the critical role of dataset generation processes and network traffic dynamics in enhancing the performance of intrusion detection systems. Additionally, the significance of feature selection was highlighted. These findings offer valuable insights and present opportunities for further advancements in future research.<\/jats:p>","DOI":"10.1007\/s12083-025-01947-4","type":"journal-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T02:06:50Z","timestamp":1745806010000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A feature selection-driven machine learning framework for anomaly-based intrusion detection systems"],"prefix":"10.1007","volume":"18","author":[{"given":"Emre","family":"Emirmahmuto\u011flu","sequence":"first","affiliation":[]},{"given":"Y\u0131lmaz","family":"Atay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,28]]},"reference":[{"key":"1947_CR1","unstructured":"Cisco Visual Networking Index (VNI) Global mobile data traffic forecast update, 2017. Available online: https:\/\/newsroom.cisco.com\/c\/r\/newsroom\/en\/us\/a\/y2017\/m02\/cisco-mobile-visual-networking-index-vni-forecast-projects-7-fold-increase-in-global-mobile-data-traffic-from-2016-2021.html.\u00a0Accessed 21 June 2024"},{"issue":"1","key":"1947_CR2","doi-asserted-by":"publisher","first-page":"57","DOI":"10.24012\/dumf.449059","volume":"10","author":"R Da\u015f","year":"2019","unstructured":"Da\u015f R, Baykara M (2019) Sald\u0131r\u0131 tespit ve engelleme ara\u00e7lar\u0131n\u0131n incelenmesi. Dicle \u00dcniversitesi M\u00fchendislik Fak\u00fcltesi M\u00fchendislik Dergisi 10(1):57\u201375. https:\/\/doi.org\/10.24012\/dumf.449059","journal-title":"Dicle \u00dcniversitesi M\u00fchendislik Fak\u00fcltesi M\u00fchendislik Dergisi"},{"issue":"1","key":"1947_CR3","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1109\/COMST.2022.3233793","volume":"25","author":"K He","year":"2023","unstructured":"He K, Kim DD, Asghar MR (2023) Adversarial machine learning for network intrusion detection systems: a comprehensive survey. IEEE Commun Surv Tutorials 25(1):538\u2013566. https:\/\/doi.org\/10.1109\/COMST.2022.3233793","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1947_CR4","doi-asserted-by":"publisher","unstructured":"Rao UH, Nayak U (2014) Intrusion detection and prevention systems. In: The InfoSec Handbook: An Introduction to Information Security (pp. 225\u2013243). Apress. https:\/\/doi.org\/10.1007\/978-1-4302-6383-8_11","DOI":"10.1007\/978-1-4302-6383-8_11"},{"issue":"5","key":"1947_CR5","doi-asserted-by":"publisher","first-page":"12917","DOI":"10.1007\/s11042-023-15977-8","volume":"83","author":"Y Akhiat","year":"2024","unstructured":"Akhiat Y, Touchanti K, Zinedine A, Chahhou M (2024) IDS-EFS: Ensemble feature selection-based method for intrusion detection system. Multimedia Tools Appl 83(5):12917\u201312937. https:\/\/doi.org\/10.1007\/s11042-023-15977-8","journal-title":"Multimedia Tools Appl"},{"issue":"3","key":"1947_CR6","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s10462-024-11082-w","volume":"58","author":"N Latif","year":"2025","unstructured":"Latif N, Ma W, Ahmad HB (2025) Advancements in securing federated learning with IDS: a comprehensive review of neural networks and feature engineering techniques for malicious client detection. Artif Intell Rev 58(3):91. https:\/\/doi.org\/10.1007\/s10462-024-11082-w","journal-title":"Artif Intell Rev"},{"key":"1947_CR7","doi-asserted-by":"publisher","first-page":"8846","DOI":"10.1109\/ACCESS.2024.3353055","volume":"12","author":"M Bakro","year":"2024","unstructured":"Bakro M, Kumar RR, Husain M, Ashraf Z, Ali A, Yaqoob SI, Ahmed MN, Parveen N (2024) Building a Cloud-IDS by hybrid bio-inspired feature selection algorithms along with random forest model. IEEE Access 12:8846\u20138874. https:\/\/doi.org\/10.1109\/ACCESS.2024.3353055","journal-title":"IEEE Access"},{"issue":"5","key":"1947_CR8","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1007\/s42979-023-02006-6","volume":"4","author":"B Deore","year":"2023","unstructured":"Deore B, Bhosale S (2023) Adaptive dolphin atom search optimization-based DRNN for network intrusion detection system. SN Computer Science 4(5):578. https:\/\/doi.org\/10.1007\/s42979-023-02006-6","journal-title":"SN Computer Science"},{"key":"1947_CR9","doi-asserted-by":"publisher","unstructured":"Salek Z, Madani FM, Azmi R (2013) Intrusion detection using neuarl networks trained by differential evaluation algorithm. 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC), 1\u20136. https:\/\/doi.org\/10.1109\/ISCISC.2013.6767341","DOI":"10.1109\/ISCISC.2013.6767341"},{"issue":"5","key":"1947_CR10","first-page":"660","volume":"19","author":"E Popoola","year":"2017","unstructured":"Popoola E, Adewumi AO (2017) Efficient feature selection technique for network intrusion detection system using discrete differential evolution and decision. Int J Netw Secur 19(5):660\u2013669","journal-title":"Int J Netw Secur"},{"key":"1947_CR11","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.comnet.2018.02.028","volume":"136","author":"V Hajisalem","year":"2018","unstructured":"Hajisalem V, Babaie S (2018) A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput Netw 136:37\u201350. https:\/\/doi.org\/10.1016\/j.comnet.2018.02.028","journal-title":"Comput Netw"},{"key":"1947_CR12","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.cose.2018.11.005","volume":"81","author":"B Selvakumar","year":"2018","unstructured":"Selvakumar B, Muneeswaran K (2018) Firefly algorithm based feature selection for network intrusion detection. Comput Secur 81:148\u2013155. https:\/\/doi.org\/10.1016\/j.cose.2018.11.005","journal-title":"Comput Secur"},{"key":"1947_CR13","doi-asserted-by":"publisher","unstructured":"Mazini M, Shirazi B, Mahdavi I (2018) Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. https:\/\/doi.org\/10.1016\/j.jksuci.2018.03.011","DOI":"10.1016\/j.jksuci.2018.03.011"},{"key":"1947_CR14","doi-asserted-by":"publisher","unstructured":"Tama BA, Comuzzi M, Rhee K (2019) TSE-IDS: A Two-Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System. https:\/\/doi.org\/10.1109\/ACCESS.2019.2928048","DOI":"10.1109\/ACCESS.2019.2928048"},{"issue":"5","key":"1947_CR15","doi-asserted-by":"publisher","first-page":"2210","DOI":"10.12785\/ijcds\/080505","volume":"8","author":"S Meftah","year":"2019","unstructured":"Meftah S, Rachidi T, Assem N (2019) Network based intrusion detection using the UNSW-NB15 dataset. Int J Comput Digital Syst 8(5):2210\u2013142. https:\/\/doi.org\/10.12785\/ijcds\/080505","journal-title":"Int J Comput Digital Syst"},{"issue":"3","key":"1947_CR16","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/J.ICTE.2019.03.003","volume":"5","author":"V Kanimozhi","year":"2019","unstructured":"Kanimozhi V, Jacob TP (2019) Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. ICT Express 5(3):211\u2013214. https:\/\/doi.org\/10.1016\/J.ICTE.2019.03.003","journal-title":"ICT Express"},{"key":"1947_CR17","doi-asserted-by":"publisher","first-page":"82512","DOI":"10.1109\/ACCESS.2019.2923640","volume":"7","author":"X Gao","year":"2019","unstructured":"Gao X, Shan C, Hu C, Niu Z, Liu Z (2019) An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7:82512\u201382521. https:\/\/doi.org\/10.1109\/ACCESS.2019.2923640","journal-title":"IEEE Access"},{"key":"1947_CR18","doi-asserted-by":"publisher","first-page":"107247","DOI":"10.1016\/j.comnet.2020.107247","volume":"174","author":"Y Zhou","year":"2020","unstructured":"Zhou Y, Cheng G, Jiang S, Dai M (2020) Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Netw 174:107247. https:\/\/doi.org\/10.1016\/j.comnet.2020.107247","journal-title":"Comput Netw"},{"key":"1947_CR19","doi-asserted-by":"publisher","unstructured":"Kim J, Kim J, Kim H, Shim M, Choi E (2020) CNN-based network intrusion detection against denial-of-service attacks. https:\/\/doi.org\/10.3390\/electronics9060916","DOI":"10.3390\/electronics9060916"},{"key":"1947_CR20","doi-asserted-by":"publisher","first-page":"113249","DOI":"10.1016\/j.eswa.2020.113249","volume":"148","author":"H Alazzam","year":"2020","unstructured":"Alazzam H, Sharieh A, Sabri KE (2020) A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer. Expert Syst Appl 148:113249. https:\/\/doi.org\/10.1016\/j.eswa.2020.113249","journal-title":"Expert Syst Appl"},{"key":"1947_CR21","doi-asserted-by":"publisher","unstructured":"Devan P, Khare N (2020) An efficient XGBoost-DNN-based classification model for network intrusion detection system. Neural Comput Appl 32. https:\/\/doi.org\/10.1007\/s00521-020-04708-x","DOI":"10.1007\/s00521-020-04708-x"},{"key":"1947_CR22","doi-asserted-by":"publisher","unstructured":"Nazir A, Ahmed Khan R (2021) A novel combinatorial optimization based feature selection method for network intrusion detection. https:\/\/doi.org\/10.1016\/j.cose.2020.102164","DOI":"10.1016\/j.cose.2020.102164"},{"key":"1947_CR23","doi-asserted-by":"publisher","first-page":"102289","DOI":"10.1016\/j.cose.2021.102289","volume":"106","author":"J Liu","year":"2021","unstructured":"Liu J, Gao Y, Hu F (2021) A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM. Comput Secur 106:102289. https:\/\/doi.org\/10.1016\/j.cose.2021.102289","journal-title":"Comput Secur"},{"key":"1947_CR24","doi-asserted-by":"publisher","unstructured":"Thilagam T, Aruna R (2021) Intrusion detection for network based cloud computing by custom RC-NN and optimization-NC-ND license. https:\/\/doi.org\/10.1016\/j.icte.2021.04.006. http:\/\/creativecommons.org\/licenses\/bync-nd\/4.0\/.\u00a0Accessed 24 Jul 2024","DOI":"10.1016\/j.icte.2021.04.006"},{"key":"1947_CR25","doi-asserted-by":"publisher","unstructured":"Disha RA, Waheed S (2022) Performance analysis of machine learning models for intrusion detection system using Gini Impurity-based Weighted Random Forest (GIWRF) feature selection technique 5(1). https:\/\/doi.org\/10.1186\/s42400-021-00103-8","DOI":"10.1186\/s42400-021-00103-8"},{"issue":"3","key":"1947_CR26","doi-asserted-by":"publisher","first-page":"530","DOI":"10.3390\/MATH10030530","volume":"10","author":"I Ahmad","year":"2022","unstructured":"Ahmad I, Haq QEU, Imran M, Alassafi MO, Alghamdi RA (2022) An efficient network intrusion detection and classification system. Mathematics 10(3):530. https:\/\/doi.org\/10.3390\/MATH10030530","journal-title":"Mathematics"},{"key":"1947_CR27","doi-asserted-by":"publisher","unstructured":"Qureshi A-U-H, Larijani H, Ahmad J, Mtetwa N (2018) A novel random neural network based approach for intrusion detection systems. In: 2018 10th Computer science and electronic engineering (CEEC). Colchester, UK, pp 50\u201355. https:\/\/doi.org\/10.1109\/CEEC.2018.8674228","DOI":"10.1109\/CEEC.2018.8674228"},{"issue":"3","key":"1947_CR28","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.3390\/APP14031044","volume":"14","author":"H NajafiMohsenabad","year":"2024","unstructured":"NajafiMohsenabad H, Tut MA (2024) Optimizing cybersecurity attack detection in computer networks: a comparative analysis of bio-inspired optimization algorithms using the CSE-CIC-IDS 2018 dataset. Applied Sciences 14(3):1044. https:\/\/doi.org\/10.3390\/APP14031044","journal-title":"Applied Sciences"},{"key":"1947_CR29","doi-asserted-by":"publisher","first-page":"100676","DOI":"10.1016\/j.ijcip.2024.100676","volume":"45","author":"F Zare","year":"2024","unstructured":"Zare F, Mahmoudi-Nasr P, Yousefpour R (2024) A real-time network based anomaly detection in industrial control systems. Int J Crit Infrastruct Prot 45:100676. https:\/\/doi.org\/10.1016\/j.ijcip.2024.100676","journal-title":"Int J Crit Infrastruct Prot"},{"key":"1947_CR30","doi-asserted-by":"publisher","first-page":"100674","DOI":"10.1016\/j.ijcip.2024.100674","volume":"45","author":"YK Saheed","year":"2024","unstructured":"Saheed YK, Abdulganiyu OH, Majikumna KU, Mustapha M, Workneh AD (2024) ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems. Int J Crit Infrastruct Prot 45:100674. https:\/\/doi.org\/10.1016\/j.ijcip.2024.100674","journal-title":"Int J Crit Infrastruct Prot"},{"key":"1947_CR31","doi-asserted-by":"publisher","unstructured":"Habeeb MS, Babu TR (2024) Coarse and fine feature selection for Network Intrusion Detection Systems (IDS) in IoT networks. Transactions on Emerging Telecommunications Technologies, 35(4). https:\/\/doi.org\/10.1002\/ETT.4961","DOI":"10.1002\/ETT.4961"},{"key":"1947_CR32","doi-asserted-by":"publisher","first-page":"103644","DOI":"10.1016\/J.COSE.2023.103644","volume":"137","author":"X Yuan","year":"2024","unstructured":"Yuan X, Han S, Huang W, Ye H, Kong X, Zhang F (2024) A simple framework to enhance the adversarial robustness of deep learning-based intrusion detection system. Comput Secur 137:103644. https:\/\/doi.org\/10.1016\/J.COSE.2023.103644","journal-title":"Comput Secur"},{"key":"1947_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3351882","author":"VT Truong","year":"2024","unstructured":"Truong VT, Le LB (2024) Security for the metaverse: blockchain and machine learning techniques for intrusion detection. IEEE Network. https:\/\/doi.org\/10.1109\/MNET.2024.3351882","journal-title":"IEEE Network"},{"key":"1947_CR34","doi-asserted-by":"publisher","unstructured":"Gupta B, Agrawal DP, Yamaguchi S (eds) (2016) Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global. https:\/\/doi.org\/10.4018\/978-1-5225-0105-3","DOI":"10.4018\/978-1-5225-0105-3"},{"key":"1947_CR35","doi-asserted-by":"publisher","unstructured":"Vasilomanolakis E, Karuppayah S, Muhlhauser M, Fischer M (2015) Taxonomy and survey of collaborative intrusion detection. ACM Computing Surveys (CSUR) 47(4). https:\/\/doi.org\/10.1145\/2716260","DOI":"10.1145\/2716260"},{"key":"1947_CR36","unstructured":"Hugh JM (2000) Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory."},{"key":"1947_CR37","doi-asserted-by":"publisher","unstructured":"Brown C, Cowperthwaite A, Hijazi A, Somayaji A (2009) Analysis of the 1999 DARPA\/Lincoln Laboratory IDS evaluation data with NetADHICT; Analysis of the 1999 DARPA\/Lincoln Laboratory IDS evaluation data with NetADHICT. https:\/\/doi.org\/10.1109\/CISDA.2009.5356522","DOI":"10.1109\/CISDA.2009.5356522"},{"key":"1947_CR38","unstructured":"KDD Cup 1999 Data (n.d.).\u00a0https:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99. Accessed 21 May 2024"},{"key":"1947_CR39","unstructured":"Stolfo SJ, Fan W, Lee W, Prodromidis A, Chan PK (2000) Cost-based modeling for fraud and intrusion detection: results from the JAM Project. http:\/\/www.cs.columbia.edu\/.\u00a0Accessed 14 Sept 2024"},{"key":"1947_CR40","doi-asserted-by":"crossref","unstructured":"Gogoi P, Bhuyan MH,\u00a0Bhattacharyya DK, Kalita JK\u00a0(2012) Packet and flow based network intrusion dataset. In: Parashar M, Kaushik D, Rana OF, Samtaney R, Yang Y, Zomaya A\u00a0(eds) Contemporary computing. Springer Berlin Heidelberg,\u00a0pp 322\u2013334","DOI":"10.1007\/978-3-642-32129-0_34"},{"key":"1947_CR41","unstructured":"The UNSW-NB15 Dataset | UNSW Research (2024).\u00a0https:\/\/research.unsw.edu.au\/projects\/unsw-nb15-dataset.\u00a0Accessed 28 May 2024"},{"key":"1947_CR42","unstructured":"IDS 2018 | Datasets | Research | Canadian Institute for Cybersecurity | UNB (n.d.).\u00a0https:\/\/www.unb.ca\/cic\/datasets\/ids-2018.html.\u00a0Accessed 28 May 2024"},{"key":"1947_CR43","doi-asserted-by":"publisher","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization. https:\/\/doi.org\/10.5220\/0006639801080116","DOI":"10.5220\/0006639801080116"},{"key":"1947_CR44","unstructured":"NSL-KDD | Datasets | Research | Canadian Institute for Cybersecurity | UNB. (n.d.). from https:\/\/www.unb.ca\/cic\/datasets\/nsl.html.\u00a0Accessed 16 Apr 2024"},{"key":"1947_CR45","doi-asserted-by":"publisher","unstructured":"Kennedy J (2010) Particle Swarm Optimization. In: G. I. Sammut Claude and Webb (ed) Encyclopedia of Machine Learning (pp. 760\u2013766). Springer US. https:\/\/doi.org\/10.1007\/978-0-387-30164-8_630","DOI":"10.1007\/978-0-387-30164-8_630"},{"key":"1947_CR46","doi-asserted-by":"publisher","unstructured":"Zhang Y, Wang S, Ji G (2015) A comprehensive survey on particle swarm optimization algorithm and its applications. Math Problems Eng. https:\/\/doi.org\/10.1155\/2015\/931256","DOI":"10.1155\/2015\/931256"},{"issue":"3","key":"1947_CR47","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/S12046-016-0466-Y\/TABLES\/7","volume":"41","author":"D Kumar","year":"2016","unstructured":"Kumar D, Ramakrishnan AG (2016) Binary classification posed as a quadratically constrained quadratic programming and solved using particle swarm optimization. Sadhana - Academy Proc Eng Sci 41(3):289\u2013298. https:\/\/doi.org\/10.1007\/S12046-016-0466-Y\/TABLES\/7","journal-title":"Sadhana - Academy Proc Eng Sci"},{"key":"1947_CR48","doi-asserted-by":"publisher","unstructured":"Mirjalili S, Wang GG, Coelho L dos S (2014). Binary optimization using hybrid particle swarm optimization and gravitational search algorithm. Neural Comput Appl 25(6):1423\u20131435. https:\/\/doi.org\/10.1007\/S00521-014-1629-6\/FIGURES\/13","DOI":"10.1007\/S00521-014-1629-6\/FIGURES\/13"},{"key":"1947_CR49","unstructured":"Cronquist A (1981) An integrated system of classification of flowering plants. Columbia University Press, New York, pp 248\u2013250"},{"issue":"2","key":"1947_CR50","doi-asserted-by":"publisher","first-page":"557","DOI":"10.2307\/2260732","volume":"79","author":"MJ Hutchings","year":"1991","unstructured":"Hutchings MJ, Bell AD (1991) Plant form: an illustrated guide to flowering plant morphology. J Ecol 79(2):557","journal-title":"J Ecol"},{"key":"1947_CR51","doi-asserted-by":"publisher","unstructured":"Glover B (2007) Understanding flowers and flowering: an integrated approach, 1st edn. Oxford Academic, Oxford.\u00a0https:\/\/doi.org\/10.1093\/acprof:oso\/9780198565970.001.0001","DOI":"10.1093\/acprof:oso\/9780198565970.001.0001"},{"key":"1947_CR52","doi-asserted-by":"crossref","unstructured":"Kalra S, Arora S (2016) Firefly algorithm hybridized with flower pollination algorithm for multimodal functions. In: Proceedings of the international congress on information and communication technology: ICICT 2015 1. pp 207\u2013219","DOI":"10.1007\/978-981-10-0767-5_23"},{"issue":"2","key":"1947_CR53","doi-asserted-by":"publisher","first-page":"1830","DOI":"10.1016\/j.jcp.2007.06.008","volume":"226","author":"I Pavlyukevich","year":"2007","unstructured":"Pavlyukevich I (2007) L\u00e9vy flights, non-local search and simulated annealing. J Comput Phys 226(2):1830\u20131844","journal-title":"J Comput Phys"},{"key":"1947_CR54","doi-asserted-by":"crossref","unstructured":"Yang X-S (2012) Flower pollination algorithm for global optimization. In: Durand-Lose J, Jonoska\u00a0N (eds) Unconventional computation and natural computation. Springer Berlin Heidelberg,\u00a0pp 240\u2013249","DOI":"10.1007\/978-3-642-32894-7_27"},{"issue":"4","key":"1947_CR55","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1023\/A:1008202821328\/METRICS","volume":"11","author":"R Storn","year":"1997","unstructured":"Storn R, Price K (1997) Differential evolution - a simple and efficient heuristic for global optimization over continuous spaces. J Global Optim 11(4):341\u2013359. https:\/\/doi.org\/10.1023\/A:1008202821328\/METRICS","journal-title":"J Global Optim"},{"key":"1947_CR56","doi-asserted-by":"publisher","unstructured":"Ahmad Z, Shahid Khan A, Wai Shiang C, Abdullah J, Ahmad F (2020) Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Trans Emerging Telecommun Technol 32(1). https:\/\/doi.org\/10.1002\/ETT.4150","DOI":"10.1002\/ETT.4150"},{"issue":"11","key":"1947_CR57","doi-asserted-by":"publisher","first-page":"e0165521","DOI":"10.1371\/journal.pone.0165521","volume":"11","author":"O Miguel-Hurtado","year":"2016","unstructured":"Miguel-Hurtado O, Guest R, Stevenage SV, Neil GJ, Black S (2016) Comparing machine learning classifiers and linear\/logistic regression to explore the relationship between hand dimensions and demographic characteristics. PLoS ONE 11(11):e0165521","journal-title":"PLoS ONE"},{"key":"1947_CR58","unstructured":"Ng A, Jordan M (2001) On discriminative vs. generative classifiers: a comparison of logistic regression and naive bayes. Adv Neural Inf Process Syst 14"},{"key":"1947_CR59","doi-asserted-by":"publisher","unstructured":"Rokach L, Maimon O (2005) Decision Trees. Data Mining and Knowledge Discovery Handbook, 165\u2013192. https:\/\/doi.org\/10.1007\/0-387-25465-X_9","DOI":"10.1007\/0-387-25465-X_9"},{"issue":"2","key":"1947_CR60","doi-asserted-by":"publisher","first-page":"130","DOI":"10.11919\/J.ISSN.1002-0829.215044","volume":"27","author":"YY Song","year":"2015","unstructured":"Song YY, Lu Y (2015) Decision tree methods: applications for classification and prediction. Shanghai Arch Psychiatry 27(2):130. https:\/\/doi.org\/10.11919\/J.ISSN.1002-0829.215044","journal-title":"Shanghai Arch Psychiatry"},{"key":"1947_CR61","doi-asserted-by":"publisher","unstructured":"Wu D, Jennings C, Terpenny J, Gao RX, Kumara S (2017) A comparative study on machine learning algorithms for smart manufacturing: tool wear prediction using random forests. J Manuf Sci Eng, Trans ASME 139(7). https:\/\/doi.org\/10.1115\/1.4036350\/454654","DOI":"10.1115\/1.4036350\/454654"},{"key":"1947_CR62","doi-asserted-by":"publisher","unstructured":"Subasi A (2020) Practical machine learning for data analysis using python. https:\/\/doi.org\/10.1016\/B978-0-12-821379-7.00008-4","DOI":"10.1016\/B978-0-12-821379-7.00008-4"},{"key":"1947_CR63","doi-asserted-by":"publisher","first-page":"102798","DOI":"10.1016\/j.ipm.2021.102798","volume":"59","author":"H Chen","year":"2022","unstructured":"Chen H, Wu L, Chen J, Lu W, Ding J (2022) A comparative study of automated legal text classification using random forests and deep learning \u2729. Inf Process Manage 59:102798. https:\/\/doi.org\/10.1016\/j.ipm.2021.102798","journal-title":"Inf Process Manage"},{"key":"1947_CR64","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9071177","author":"J Asharf","year":"2020","unstructured":"Asharf J, Moustafa N, Khurshid H, Debie E, Haider W, Wahab A (2020) Electronics a review of intrusion detection systems using machine and deep learning in internet of things: challenges. Solutions Future Dir. https:\/\/doi.org\/10.3390\/electronics9071177","journal-title":"Solutions Future Dir"},{"issue":"4","key":"1947_CR65","doi-asserted-by":"publisher","first-page":"1407","DOI":"10.3390\/S22041407","volume":"22","author":"G Liu","year":"2022","unstructured":"Liu G, Zhao H, Fan F, Liu G, Xu Q, Nazir S (2022) An enhanced intrusion detection model based on improved kNN in WSNs. Sensors 22(4):1407. https:\/\/doi.org\/10.3390\/S22041407","journal-title":"Sensors"},{"issue":"3","key":"1947_CR66","doi-asserted-by":"publisher","first-page":"261","DOI":"10.2307\/1402890","volume":"53","author":"G Shafer","year":"1985","unstructured":"Shafer G (1985) Conditional Probability. Int Stat Rev Revue Internationale de Statistique 53(3):261. https:\/\/doi.org\/10.2307\/1402890","journal-title":"Int Stat Rev Revue Internationale de Statistique"},{"key":"1947_CR67","doi-asserted-by":"publisher","unstructured":"Sharmila BS, Nagapadma R (2019) Intrusion detection system using naive bayes algorithm. 2019 5th IEEE International WIE Conference on Electrical and Computer Engineering, WIECON-ECE 2019 - Proceedings. https:\/\/doi.org\/10.1109\/WIECON-ECE48653.2019.9019921","DOI":"10.1109\/WIECON-ECE48653.2019.9019921"},{"key":"1947_CR68","doi-asserted-by":"publisher","unstructured":"Dadkhah S, Mahdikhani H, Danso PK, Zohourian A, Truong KA, Ghorbani AA (n.d.) Towards the development of a realistic multidimensional IoT profiling dataset. https:\/\/doi.org\/10.1109\/PST55820.2022.9851966","DOI":"10.1109\/PST55820.2022.9851966"},{"key":"1947_CR69","doi-asserted-by":"publisher","unstructured":"Xanthopoulos P, Pardalos PM, Trafalis TB (2013) Linear discriminant analysis. In: Robust Data Mining (pp. 27\u201333). Springer New York. https:\/\/doi.org\/10.1007\/978-1-4419-9878-1_4","DOI":"10.1007\/978-1-4419-9878-1_4"},{"key":"1947_CR70","unstructured":"Lee H (2016) Clustering and classification methods for prediction of the risk for developing disease. Doctoral Dissertation, State University of New York at Stony Brook, ProQuest Dissertations & Theses, 10165402"},{"issue":"3","key":"1947_CR71","doi-asserted-by":"publisher","first-page":"322","DOI":"10.3390\/ELECTRONICS8030322","volume":"8","author":"R Abdulhammed","year":"2019","unstructured":"Abdulhammed R, Musafer H, Alessa A, Faezipour M, Abuzneid A (2019) Features Dimensionality Reduction Approaches for Machine Learning Based Network Intrusion Detection. Electronics 8(3):322. https:\/\/doi.org\/10.3390\/ELECTRONICS8030322","journal-title":"Electronics"},{"issue":"22","key":"1947_CR72","doi-asserted-by":"publisher","first-page":"7475","DOI":"10.3390\/S21227475","volume":"21","author":"N Peppes","year":"2021","unstructured":"Peppes N, Daskalakis E, Alexakis T, Adamopoulou E, Demestichas K (2021) Performance of machine learning-based multi-model voting ensemble methods for network threat detection in agriculture 4.0. Sensors 21(22):7475. https:\/\/doi.org\/10.3390\/S21227475","journal-title":"Sensors"},{"key":"1947_CR73","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BF02478259","volume":"5","author":"WS McCulloch","year":"1943","unstructured":"McCulloch WS, Pitts W (1943) A logical calculus of the ideas immanent in nervous activity. Bull Math Biophys 5:115\u2013133","journal-title":"Bull Math Biophys"},{"key":"1947_CR74","doi-asserted-by":"publisher","unstructured":"Hodo E, Bellekens X, Hamilton A, Dubouilh PL, Iorkyase E, Tachtatzis C, Atkinson R (2016) Threat analysis of IoT networks using artificial neural network intrusion detection system. 2016 International Symposium on Networks, Computers and Communications, ISNCC 2016. https:\/\/doi.org\/10.1109\/ISNCC.2016.7746067","DOI":"10.1109\/ISNCC.2016.7746067"},{"issue":"3","key":"1947_CR75","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1109\/TII.2018.2871084","volume":"15","author":"P Li","year":"2019","unstructured":"Li P, Chen Z, Yang LT, Gao J, Zhang Q, Deen MJ (2019) An incremental deep convolutional computation model for feature learning on industrial big data. IEEE Trans Industr Inf 15(3):1341\u20131349. https:\/\/doi.org\/10.1109\/TII.2018.2871084","journal-title":"IEEE Trans Industr Inf"},{"key":"1947_CR76","unstructured":"Goodfellow I, Bengio Y, Courville A (2016) Deep learning. MIT press"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01947-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01947-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01947-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:32:51Z","timestamp":1746844371000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01947-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,28]]},"references-count":76,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1947"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01947-4","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,28]]},"assertion":[{"value":"9 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This is to confirm that this manuscript has not been published elsewhere and is not under consideration by any other journal. All the authors have approved the manuscript with full text, and numbers of figures\/tables and agree with its submission to the journal.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"161"}}