{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T21:56:28Z","timestamp":1772315788786,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,6,26]],"date-time":"2020-06-26T00:00:00Z","timestamp":1593129600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,26]],"date-time":"2020-06-26T00:00:00Z","timestamp":1593129600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s12652-020-02228-z","type":"journal-article","created":{"date-parts":[[2020,6,26]],"date-time":"2020-06-26T14:16:05Z","timestamp":1593180965000},"page":"1559-1576","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":219,"title":["Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks"],"prefix":"10.1007","volume":"12","author":[{"given":"Mukaram","family":"Safaldin","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Otair","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2203-4549","authenticated-orcid":false,"given":"Laith","family":"Abualigah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,26]]},"reference":[{"key":"2228_CR1000","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2016.06.003","volume":"91","author":"S Abdollahzadeh","year":"2016","unstructured":"Abdollahzadeh S, Navimipour NJ (2016) Deployment strategies in the wireless sensor network: a comprehensive review. Comput Commun 91:1\u201316","journal-title":"Comput Commun"},{"key":"2228_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10674-4","volume-title":"Feature selection and enhanced krill herd algorithm for text document clustering","author":"LMQ Abualigah","year":"2019","unstructured":"Abualigah LMQ (2019) Feature selection and enhanced krill herd algorithm for text document clustering. Springer, Berlin"},{"key":"2228_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04839-1","author":"L Abualigah","year":"2020","unstructured":"Abualigah L (2020) Multi-verse optimizer algorithm: a comprehensive survey of its results, variants, and applications. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-020-04839-1","journal-title":"Neural Comput Appl"},{"key":"2228_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03075-5","author":"L Abualigah","year":"2020","unstructured":"Abualigah L, Diabat A (2020) A novel hybrid antlion optimization algorithm for multi-objective task scheduling problems in cloud computing environments. Cluster Comput. https:\/\/doi.org\/10.1007\/s10586-020-03075-5","journal-title":"Cluster Comput"},{"issue":"11","key":"2228_CR2","doi-asserted-by":"publisher","first-page":"4773","DOI":"10.1007\/s11227-017-2046-2","volume":"73","author":"LM Abualigah","year":"2017","unstructured":"Abualigah LM, Khader AT (2017) Unsupervised text feature selection technique based on hybrid particle swarm optimization algorithm with genetic operators for the text clustering. J Supercomput 73(11):4773\u20134795","journal-title":"J Supercomput"},{"issue":"11","key":"2228_CR3","doi-asserted-by":"publisher","first-page":"4047","DOI":"10.1007\/s10489-018-1190-6","volume":"48","author":"LM Abualigah","year":"2018","unstructured":"Abualigah LM, Khader AT, Hanandeh ES (2018) Hybrid clustering analysis using improved krill herd algorithm. Appl Intell 48(11):4047\u20134071","journal-title":"Appl Intell"},{"issue":"10","key":"2228_CR6","first-page":"806954","volume":"11","author":"I Ahmad","year":"2015","unstructured":"Ahmad I (2015) Feature selection using particle swarm optimization in intrusion detection. Int J Distrib Sens Netw 11(10):806954","journal-title":"Int J Distrib Sens Netw"},{"key":"2228_CR7","doi-asserted-by":"crossref","unstructured":"Al-Tashi Q, Rais HM, Abdulkadir SJ, Mirjalili S, Alhussian H (2020) A review of grey wolf optimizer-based feature selection methods for classification. In: Evolutionary machine learning techniques. Springer, Singapore, pp 273\u2013286","DOI":"10.1007\/978-981-32-9990-0_13"},{"key":"2228_CR8","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jocs.2017.03.006","volume":"25","author":"S Aljawarneh","year":"2018","unstructured":"Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152\u2013160","journal-title":"J Comput Sci"},{"issue":"10","key":"2228_CR9","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TC.2016.2519914","volume":"65","author":"MA Ambusaidi","year":"2016","unstructured":"Ambusaidi MA, He X, Nanda P, Tan Z (2016) Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput 65(10):2986\u20132998","journal-title":"IEEE Trans Comput"},{"issue":"4","key":"2228_CR10","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1016\/j.jnca.2011.01.002","volume":"34","author":"F Amiri","year":"2011","unstructured":"Amiri F, Yousefi MR, Lucas C, Shakery A, Yazdani N (2011) Mutual information-based feature selection for intrusion detection systems. J Netw Comput Appl 34(4):1184\u20131199","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"2228_CR11","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1023\/A:1007612503587","volume":"41","author":"DA Bell","year":"2000","unstructured":"Bell DA, Wang H (2000) A formalism for relevance and its application in feature subset selection. Mach Learn 41(2):175\u2013195","journal-title":"Mach Learn"},{"issue":"8","key":"2228_CR12","doi-asserted-by":"publisher","first-page":"2315","DOI":"10.1007\/s10489-017-1085-y","volume":"48","author":"I Benmessahel","year":"2018","unstructured":"Benmessahel I, Xie K, Chellal M (2018) A new evolutionary neural networks based on intrusion detection systems using multiverse optimization. Appl Intell 48(8):2315\u20132327","journal-title":"Appl Intell"},{"key":"2228_CR13","doi-asserted-by":"crossref","unstructured":"Bins J, Draper BA (2001) Feature selection from huge feature sets. In: Proceedings eighth IEEE international conference on computer vision, vol 2. ICCV 2001, IEEE, pp 159\u2013165","DOI":"10.1109\/ICCV.2001.937619"},{"issue":"7","key":"2228_CR43","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1007\/s10489-018-01408-x","volume":"49","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2019","unstructured":"\u00c7avu\u015fo\u011flu \u00dc (2019) A new hybrid approach for intrusion detection using machine learning methods. Appl Intell 49(7):2735\u20132761","journal-title":"Appl Intell"},{"issue":"1","key":"2228_CR14","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.compeleceng.2013.11.024","volume":"40","author":"G Chandrashekar","year":"2014","unstructured":"Chandrashekar G, Sahin F (2014) A survey on feature selection methods. Comput Electr Eng 40(1):16\u201328","journal-title":"Comput Electr Eng"},{"key":"2228_CR15","unstructured":"Chelli K (2015) Security issues in wireless sensor networks: attacks and countermeasures. In: Proceedings of the world congress on engineering, vol 1, issue 20"},{"key":"2228_CR16","doi-asserted-by":"crossref","unstructured":"Chizi B, Rokach L, Maimon O (2009) A survey of feature selection techniques. In: Encyclopedia of data warehousing and mining, second edition. IGI Global, pp 1888\u20131895","DOI":"10.4018\/978-1-60566-010-3.ch289"},{"issue":"4","key":"2228_CR17","doi-asserted-by":"publisher","first-page":"488","DOI":"10.3390\/s16040488","volume":"16","author":"DI Curiac","year":"2016","unstructured":"Curiac DI (2016) Wireless sensor network security enhancement using directional antennas: state of the art and research challenges. Sensors 16(4):488","journal-title":"Sensors"},{"issue":"3","key":"2228_CR18","first-page":"671","volume":"7","author":"EM Devi","year":"2017","unstructured":"Devi EM, Suganthe RC (2017) Feature selection in intrusion detection grey wolf optimizer. Asian J Res Soc Sci Human 7(3):671\u2013682","journal-title":"Asian J Res Soc Sci Human"},{"key":"2228_CR19","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.neucom.2015.06.083","volume":"172","author":"E Emary","year":"2016","unstructured":"Emary E, Zawbaa HM, Hassanien AE (2016) Binary grey wolf optimization approaches for feature selection. Neurocomputing 172:371\u2013381","journal-title":"Neurocomputing"},{"issue":"3","key":"2228_CR21","first-page":"264","volume":"7","author":"CF Garc\u00eda-Hern\u00e1ndez","year":"2007","unstructured":"Garc\u00eda-Hern\u00e1ndez CF, Ibarguengoytia-Gonzalez PH, Garc\u00eda-Hern\u00e1ndez J, P\u00e9rez-D\u00edaz JA (2007) Wireless sensor networks and applications: a survey. IJCSNS Int J Comput Sci Netw Secur 7(3):264\u2013273","journal-title":"IJCSNS Int J Comput Sci Netw Secur"},{"issue":"1","key":"2228_CR22","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s10489-013-0452-6","volume":"40","author":"C Guo","year":"2014","unstructured":"Guo C, Zhou Y, Ping Y, Zhang Z, Liu G, Yang Y (2014) A distance sum-based hybrid method for intrusion detection. Appl Intell 40(1):178\u2013188","journal-title":"Appl Intell"},{"issue":"8","key":"2228_CR23","doi-asserted-by":"publisher","first-page":"2572","DOI":"10.1109\/JSEN.2017.2672501","volume":"17","author":"M Hammoudeh","year":"2017","unstructured":"Hammoudeh M, Al-Fayez F, Lloyd H, Newman R, Adebisi B, Bounceur A, Abuarqoub A (2017) A wireless sensor network border monitoring system: deployment issues and routing protocols. IEEE Sens J 17(8):2572\u20132582","journal-title":"IEEE Sens J"},{"issue":"4","key":"2228_CR24","doi-asserted-by":"publisher","first-page":"8764","DOI":"10.3390\/s150408764","volume":"15","author":"S Haque","year":"2015","unstructured":"Haque S, Rahman M, Aziz S (2015) Sensor anomaly detection in wireless sensor networks for healthcare. Sensors 15(4):8764\u20138786","journal-title":"Sensors"},{"issue":"4","key":"2228_CR25","first-page":"1629","volume":"2","author":"V Jaiganesh","year":"2013","unstructured":"Jaiganesh V, Mangayarkarasi S, Sumathi P (2013) Intrusion detection systems: a survey and analysis of classification techniques. Int J Adv Res Comput Commun Eng 2(4):1629\u20131635","journal-title":"Int J Adv Res Comput Commun Eng"},{"issue":"8","key":"2228_CR26","first-page":"45","volume":"2","author":"YK Jain","year":"2011","unstructured":"Jain YK, Bhandare SK (2011) Min max normalization based data perturbation method for privacy protection. Int J Comput Commun Technol 2(8):45\u201350","journal-title":"Int J Comput Commun Technol"},{"key":"2228_CR27","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.compeleceng.2017.04.013","volume":"59","author":"X Jin","year":"2017","unstructured":"Jin X, Liang J, Tong W, Lu L, Li Z (2017) Multi-agent trust-based intrusion detection scheme for wireless sensor networks. Comput Electr Eng 59:262\u2013273","journal-title":"Comput Electr Eng"},{"issue":"3","key":"2228_CR100","doi-asserted-by":"publisher","first-page":"032145","DOI":"10.1088\/1742-6596\/1550\/3\/032145","volume":"1550","author":"AM Khasawneh","year":"2020","unstructured":"Khasawneh AM, Abualigah L, Al Shinwan M (2020) Void aware routing protocols in underwater wireless sensor networks: variants and challenges. J. Phys Conf Ser 1550(3):032145","journal-title":"J. Phys Conf Ser"},{"issue":"2","key":"2228_CR28","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/s10489-010-0263-y","volume":"36","author":"KC Khor","year":"2012","unstructured":"Khor KC, Ting CY, Phon-Amnuaisuk S (2012) A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection. Appl Intell 36(2):320\u2013329","journal-title":"Appl Intell"},{"key":"2228_CR29","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.comnet.2014.12.016","volume":"79","author":"MA Mahmood","year":"2015","unstructured":"Mahmood MA, Seah WK, Welch I (2015) Reliability in wireless sensor networks: a survey and challenges ahead. Comput Netw 79:166\u2013187","journal-title":"Comput Netw"},{"issue":"4","key":"2228_CR30","first-page":"347","volume":"42","author":"Y Maleh","year":"2015","unstructured":"Maleh Y, Ezzati A (2015) Lightweight intrusion detection scheme for wireless sensor networks. IAENG Int J Comput Sci 42(4):347\u2013354","journal-title":"IAENG Int J Comput Sci"},{"issue":"12","key":"2228_CR31","doi-asserted-by":"publisher","first-page":"4237","DOI":"10.1007\/s10489-019-01503-7","volume":"49","author":"S Maza","year":"2019","unstructured":"Maza S, Touahria M (2019) Feature selection for intrusion detection using new multi-objective estimation of distribution algorithms. Appl Intell 49(12):4237\u20134257","journal-title":"Appl Intell"},{"key":"2228_CR32","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46\u201361","journal-title":"Adv Eng Softw"},{"key":"2228_CR33","doi-asserted-by":"crossref","unstructured":"Nakamura RY, Pereira LA, Costa KA, Rodrigues D, Papa JP, Yang XS (2012) BBA: a binary bat algorithm for feature selection. In: 2012 25th SIBGRAPI conference on graphics, patterns and images. IEEE, pp 291\u2013297","DOI":"10.1109\/SIBGRAPI.2012.47"},{"key":"2228_CR34","doi-asserted-by":"crossref","unstructured":"Paulauskas N, Auskalnis J (2017) Analysis of data pre-processing influence on intrusion detection using NSL-KDD dataset. In: 2017 open conference of electrical, electronic and information sciences (eStream). IEEE, pp 1\u20135","DOI":"10.1109\/eStream.2017.7950325"},{"key":"2228_CR35","doi-asserted-by":"crossref","unstructured":"Pritchard SW, Hancke GP, Abu-Mahfouz AM (2017) Security in software-defined wireless sensor networks: threats, challenges and potential solutions. In: 2017 IEEE 15th international conference on industrial informatics (INDIN). IEEE, pp 168\u2013173","DOI":"10.1109\/INDIN.2017.8104765"},{"key":"2228_CR36","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.jnca.2015.09.008","volume":"60","author":"B Rashid","year":"2016","unstructured":"Rashid B, Rehmani MH (2016) Applications of wireless sensor networks for urban areas: a survey. J Netw Comput Appl 60:192\u2013219","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"2228_CR37","first-page":"95","volume":"11","author":"FNM Sabri","year":"2011","unstructured":"Sabri FNM, Norwawi NM, Seman K (2011) Identifying false alarm rates for intrusion detection system with data mining. IJCSNS Int J Comput Sci Netw Secur 11(4):95","journal-title":"IJCSNS Int J Comput Sci Netw Secur"},{"key":"2228_CR38","doi-asserted-by":"crossref","unstructured":"Sedjelmaci H, Feham M (2011) Novel hybrid intrusion detection system for clustered wireless sensor network. arXiv preprint arXiv:1108.2656","DOI":"10.1109\/ISCC.2012.6249415"},{"key":"2228_CR39","doi-asserted-by":"crossref","unstructured":"Stein G, Chen B, Wu AS, Hua KA (2005) Decision tree classifier for network intrusion detection with GA-based feature selection. In: Proceedings of the 43rd annual southeast regional conference-volume 2. ACM, pp 136\u2013141","DOI":"10.1145\/1167253.1167288"},{"key":"2228_CR40","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications. IEEE, pp 1\u20136","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"1","key":"2228_CR42","doi-asserted-by":"publisher","first-page":"9653230","DOI":"10.1155\/2016\/9653230","volume":"12","author":"Q Yu","year":"2016","unstructured":"Yu Q, Jibin L, Jiang L (2016) An improved ARIMA-based traffic anomaly detection algorithm for wireless sensor networks. Int J Distrib Sens Netw 12(1):9653230","journal-title":"Int J Distrib Sens Netw"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02228-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-020-02228-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02228-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T00:01:54Z","timestamp":1624665714000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-020-02228-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,26]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["2228"],"URL":"https:\/\/doi.org\/10.1007\/s12652-020-02228-z","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,26]]},"assertion":[{"value":"16 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 June 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}