{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:33:20Z","timestamp":1775666000132,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,8,10]],"date-time":"2022-08-10T00:00:00Z","timestamp":1660089600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,10]],"date-time":"2022-08-10T00:00:00Z","timestamp":1660089600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-022-01325-4","type":"journal-article","created":{"date-parts":[[2022,8,10]],"date-time":"2022-08-10T11:06:42Z","timestamp":1660129602000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Optimal Feature Selection Based on Evolutionary Algorithm for Intrusion Detection"],"prefix":"10.1007","volume":"3","author":[{"given":"S. K.","family":"Prashanth","sequence":"first","affiliation":[]},{"given":"S.","family":"Shitharth","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1561-1376","authenticated-orcid":false,"given":"B.","family":"Praveen Kumar","sequence":"additional","affiliation":[]},{"given":"V.","family":"Subedha","sequence":"additional","affiliation":[]},{"given":"K.","family":"Sangeetha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,10]]},"reference":[{"issue":"4","key":"1325_CR1","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1002\/int.20203","volume":"22","author":"YH Chen","year":"2007","unstructured":"Chen YH, Abraham A, Yang B. Hybrid flexible neural-tree based intrusion detection systems. Int J Intell Syst. 2007;22(4):337\u201352.","journal-title":"Int J Intell Syst"},{"issue":"9","key":"1325_CR2","doi-asserted-by":"publisher","first-page":"6225","DOI":"10.1016\/j.eswa.2010.02.102","volume":"37","author":"G Wang","year":"2010","unstructured":"Wang G, Hao J, Ma J, Huang L. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Syst Appl. 2010;37(9):6225\u201332.","journal-title":"Expert Syst Appl"},{"key":"1325_CR3","unstructured":". Xiao T, Qu G, Hariri S, Yousif M. An efficient network intrusion detection method based on information theory and genetic algorithm. In: Proceedings of the 24th IEEE international performance computing and communications conference (IPCCC 2005), Hoenix, AZ, USA, 2005"},{"key":"1325_CR4","doi-asserted-by":"crossref","unstructured":"Kruegel TC, Toth T. Using decision trees to improve signature based intrusion detection. In: Proceedings of the 6th international workshop on the recent advances in intrusion detection (RAID 2003), vol 2820, 2003, pp. 173\u2013191.","DOI":"10.1007\/978-3-540-45248-5_10"},{"key":"1325_CR5","unstructured":"Ambusaidi MA, Tan Z. Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans Comput. 2014"},{"key":"1325_CR6","doi-asserted-by":"crossref","unstructured":"Tama BA, Rhee KH. A combination of pso-based feature selection and tree-based classifiers ensemble for intrusion detection systems. In: Park et al. D-S (eds) Advances in computer science and ubiquitous computing, lecture notes in electrical engineering 373. Springer Science+Business Media, Singapore (2015)","DOI":"10.1007\/978-981-10-0281-6_71"},{"key":"1325_CR7","unstructured":"Rathi B, Jadhav DV. Network intrusion detection using PSO based on adaptive mutation and genetic algorithm. Int J Sci Eng Res 2014;5(8)."},{"key":"1325_CR8","doi-asserted-by":"crossref","unstructured":"Amudha P, Karthik S. A hybrid swarm intelligence algorithm for intrusion detection using significant features. Sci World J. 2015","DOI":"10.1155\/2015\/574589"},{"key":"1325_CR9","doi-asserted-by":"crossref","unstructured":"Ma J, Liu X, Liu S. A new intrusion detection method based on BPSO-SVM. In: Proceedings of the international symposium on computational intelligence and design (ISCID2008), vol 1, 2008, pp. 473\u2013477.","DOI":"10.1109\/ISCID.2008.65"},{"key":"1325_CR10","volume-title":"A novel SVM-kNN-PSO ensemble method for intrusion detection system. Applied Soft computing","author":"DA Aburomman","year":"2015","unstructured":"Aburomman DA, Mamun. A novel SVM-kNN-PSO ensemble method for intrusion detection system. Applied Soft computing. Amsterdam: Elsevier; 2015."},{"key":"1325_CR11","volume-title":"Binary bat algorithm. Neural computer and applications","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Yang X-S. Binary bat algorithm. Neural computer and applications. Berlin: Springer; 2014."},{"issue":"3","key":"1325_CR12","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1504\/IJBIC.2013.055093","volume":"5","author":"X-S Yang","year":"2013","unstructured":"Yang X-S. Bat algorithm: literature review and applications. Int J Bio-Inspired Comput. 2013;5(3):141\u20139.","journal-title":"Int J Bio-Inspired Comput"},{"key":"1325_CR13","unstructured":"Yang X-S, Costa KA, Rodrigues D. A binary bat algorithm for feature selection. Researchgate puplication, 2016."},{"key":"1325_CR14","doi-asserted-by":"crossref","unstructured":"Kennedy J, Eberhart RC. Particle swarm optimization. In: IEEE international conference on neural network, 1995, pp. 1942\u2013194","DOI":"10.1109\/ICNN.1995.488968"},{"key":"1325_CR15","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCI.2006.329691","volume":"1","author":"M Darigo","year":"2006","unstructured":"Darigo M, Birattari M, Stutzle T. Ant colony optimization. IEEE Comput Intell Mag. 2006;1:28\u201339.","journal-title":"IEEE Comput Intell Mag"},{"key":"1325_CR16","first-page":"32","volume":"11","author":"LX Li","year":"2002","unstructured":"Li LX, Shao ZJ, Qian JX. An optimizing method based on autonomous animate: fish swarm algorithm. Proc Syst Eng Theory Pract. 2002;11:32\u20138.","journal-title":"Proc Syst Eng Theory Pract"},{"key":"1325_CR17","doi-asserted-by":"publisher","unstructured":"Khadidos AO, Manoharan H, Selvarajan S, Khadidos AO, et al. A classy multifacet clustering and fused optimization based classification methodologies for SCADA security. In: Energies, MDPI, 2022, https:\/\/doi.org\/10.3390\/en15103624","DOI":"10.3390\/en15103624"},{"key":"1325_CR18","doi-asserted-by":"publisher","unstructured":"Shitharth S, Kshirsagar PR, Praveen Kumar B, Khaled, Omar A. An innovative perceptual pigeon galvanized optimization (PPGO) based likelihood Na\u00efve Bayes (LNB) classification approach for network intrusion detection system. IEEE Access 2022;10: 46424\u201346441. https:\/\/doi.org\/10.1109\/ACCESS.2022.3171660","DOI":"10.1109\/ACCESS.2022.3171660"},{"key":"1325_CR19","doi-asserted-by":"publisher","first-page":"156297","DOI":"10.1109\/ACCESS.2021.3129053","volume":"9","author":"S Shitharth","year":"2021","unstructured":"Shitharth S, Prasad KM, Sangeetha K, Kshirsagar PR, Babu TS, Alhelou HH. An enriched RPCO-BCNN mechanisms for attack detection and classification in SCADA systems. IEEE Access. 2021;9:156297\u2013312. https:\/\/doi.org\/10.1109\/ACCESS.2021.3129053.","journal-title":"IEEE Access"},{"key":"1325_CR20","doi-asserted-by":"publisher","unstructured":"Shitharth S, Satheesh N, Praveen Kumar B, Sangeetha K. IDS detection based on optimization based on WI-CS and GNN algorithm in SCADA network. In: Architectural wireless networks solutions and security issues, lecture notes in network and systems, Springer, Singapore, 2021; vol. 196, no. 1, pp. 247\u2013266. https:\/\/doi.org\/10.1007\/978-981-16-0386-0_14","DOI":"10.1007\/978-981-16-0386-0_14"}],"updated-by":[{"DOI":"10.1007\/s42979-023-02168-3","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T00:00:00Z","timestamp":1695859200000}}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01325-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-022-01325-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01325-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T03:39:01Z","timestamp":1727753941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-022-01325-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,10]]},"references-count":20,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2022,11]]}},"alternative-id":["1325"],"URL":"https:\/\/doi.org\/10.1007\/s42979-022-01325-4","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s42979-023-02168-3","asserted-by":"object"}]},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,10]]},"assertion":[{"value":"13 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2023","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s42979-023-02168-3","URL":"https:\/\/doi.org\/10.1007\/s42979-023-02168-3","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"439"}}