{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:12:36Z","timestamp":1761894756930,"version":"build-2065373602"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04480-6","type":"journal-article","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T05:35:11Z","timestamp":1761888911000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Review on Feature Selection Techniques and its Significance on IoT IDS"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5840-9429","authenticated-orcid":false,"given":"Supongmen","family":"Walling","sequence":"first","affiliation":[]},{"given":"Sibesh","family":"Lodh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,31]]},"reference":[{"issue":"1","key":"4480_CR1","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s10115-006-0040-8","volume":"12","author":"A Kalousis","year":"2007","unstructured":"Kalousis A, Prados J, Hilario M. Stability of feature selection algorithms: a study on high dimensional spaces. Knowl Inf Syst. 2007;12(1):95\u2013116.","journal-title":"Knowl Inf Syst"},{"key":"4480_CR2","doi-asserted-by":"publisher","DOI":"10.3390\/s23198153","volume":"23","author":"A Nazir","year":"2023","unstructured":"Nazir A, Memon Z, Sadiq T, Rahman H, Khan IU. A novel feature-selection algorithm in IoT networks for intrusion detection. Sensors. 2023;23:8153. https:\/\/doi.org\/10.3390\/s23198153.","journal-title":"Sensors"},{"key":"4480_CR3","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2018.10.024","author":"S Maza","year":"2018","unstructured":"Maza S, Touahria M. Feature selection algorithms in intrusion detection system: a survey. KSII Trans Internet Inform Syst. 2018. https:\/\/doi.org\/10.3837\/tiis.2018.10.024.","journal-title":"KSII Trans Internet Inform Syst"},{"key":"4480_CR4","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/MCOM.2017.1700048","volume":"56","author":"J Mi","year":"2018","unstructured":"Mi J, Wang K, Li P, Guo S, Sun Y. Software-defined green 5 g system for big data. IEEE Commun Mag. 2018;56:116\u201323. https:\/\/doi.org\/10.1109\/MCOM.2017.1700048.","journal-title":"IEEE Commun Mag"},{"key":"4480_CR5","doi-asserted-by":"publisher","DOI":"10.2478\/cait-2019-0001","author":"B Venkatesh","year":"2019","unstructured":"Venkatesh B, Anuradha J. A review of feature selection and its methods. Cybern Inf Technol. 2019. https:\/\/doi.org\/10.2478\/cait-2019-0001.","journal-title":"Cybern Inf Technol"},{"key":"4480_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99007-1_57","volume-title":"Recent trends in data science and soft computing. IRICT 2018. Advances in intelligent systems and computing","author":"TA Alamiedy","year":"2019","unstructured":"Alamiedy TA, Anbar M, Al-Ani AK, Al-Tamimi BN, Faleh N. Review on feature selection algorithms for Anomaly-Based intrusion detection system. In: Saeed F, Gazem N, Mohammed F, Busalim A, editors. Recent trends in data science and soft computing. IRICT 2018. Advances in intelligent systems and computing. Volume 843. Cham: Springer; 2019. https:\/\/doi.org\/10.1007\/978-3-319-99007-1_57."},{"key":"4480_CR7","doi-asserted-by":"publisher","unstructured":"Hashmi SK, Dubey GP, Himthani, Puneet A (2022) Review on Feature Selection Techniques For Intrusion Detection System. In: 4th International Conference on Communication & Information Processing (ICCIP) 2022, Available at SSRN: https:\/\/ssrn.com\/abstract=4289276 or https:\/\/doi.org\/10.2139\/ssrn.4289276","DOI":"10.2139\/ssrn.4289276"},{"key":"4480_CR8","doi-asserted-by":"publisher","first-page":"15091","DOI":"10.1007\/s00521-021-06406-8","volume":"33","author":"EO Abiodun","year":"2021","unstructured":"Abiodun EO, Alabdulatif A, Abiodun OI, et al. A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities. Neural Comput Appl. 2021;33:15091\u2013118. https:\/\/doi.org\/10.1007\/s00521-021-06406-8.","journal-title":"Neural Comput Appl"},{"key":"4480_CR9","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.cose.2017.06.005","volume":"70","author":"C Khammassi","year":"2017","unstructured":"Khammassi C, Krichen S. A ga-lr wrapper approach for feature selection in network intrusion detection. Computers & Security. 2017;70:255\u201377.","journal-title":"Computers & Security"},{"key":"4480_CR10","doi-asserted-by":"crossref","unstructured":"Vaca FD, Niyaz Q (2018) An Ensemble Learning BasedWi-Fi Network Intrusion Detection System(WNIDS). In: Proceedings of the 2018 IEEE 17th International Symposiumon Network Computing and Applications (NCA), Cambridge, MA, USA","DOI":"10.1109\/NCA.2018.8548315"},{"key":"4480_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2024.101806","volume":"37","author":"MP Raghunath","year":"2025","unstructured":"Raghunath MP, Deshmukh S, Chaudhari P, Bangare SL, Kasat K, Awasthy M, et al. PCA and PSO based optimized support vector machine for efficient intrusion detection in internet of things. measurement: Sensors. 2025;37:101806. https:\/\/doi.org\/10.1016\/j.measen.2024.101806.","journal-title":"measurement: Sensors"},{"key":"4480_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104216","volume":"101","author":"M Di Mauro","year":"2021","unstructured":"Di Mauro M, Galatro G, Fortino G, Liotta A. Supervised feature selection techniques in network intrusion detection: a critical review. Eng Appl Artif Intell. 2021;101:104216.","journal-title":"Eng Appl Artif Intell"},{"key":"4480_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105745","volume":"195","author":"R Alaiz-Rodriguez","year":"2020","unstructured":"Alaiz-Rodriguez R, Parnell AC. An information theoretic approach to quantify the stability of feature selection and ranking algorithms. Knowledge-Based Systems. 2020;195:105745.","journal-title":"Knowledge-Based Systems"},{"key":"4480_CR14","doi-asserted-by":"publisher","unstructured":"De Sousa MS, Veiga CEL, Albuquerque CEL, Giozza WF (2022) Information Gain applied to reduce model-building time in decision-tree-based intrusion detection system. In: 2022 17th Iberian Conference on Information Systems and Technologies (CISTI), Madrid, Spain, pp. 1\u20136. https:\/\/doi.org\/10.23919\/CISTI54924.2022.9820579","DOI":"10.23919\/CISTI54924.2022.9820579"},{"issue":"1","key":"4480_CR15","doi-asserted-by":"publisher","DOI":"10.3390\/sym12010007","volume":"12","author":"SK Dey","year":"2020","unstructured":"Dey SK, Rahman M. Effects of machine learning approach in flow-based anomaly detection on software-defined networking. Symmetry. 2020;12(1):7.","journal-title":"Symmetry"},{"key":"4480_CR16","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1057\/jt.2009.5","volume":"17","author":"B Ratner","year":"2009","unstructured":"Ratner B. The correlation coefficient: its values range between + 1\/\u20131, or do they? J Target Meas Anal Mark. 2009;17:139\u201342. https:\/\/doi.org\/10.1057\/jt.2009.5.","journal-title":"J Target Meas Anal Mark"},{"key":"4480_CR17","doi-asserted-by":"publisher","unstructured":"Sugianela Y, Ahmad T (2020) Pearson Correlation Attribute Evaluation-based Feature Selection for Intrusion Detection System. In: 2020 International Conference on Smart Technology and Applications (ICoSTA), Surabaya, Indonesia, pp. 1\u20135. https:\/\/doi.org\/10.1109\/ICoSTA48221.2020.1570613717","DOI":"10.1109\/ICoSTA48221.2020.1570613717"},{"key":"4480_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101752","volume":"92","author":"SM Kasongo","year":"2020","unstructured":"Kasongo SM, Sun Y. A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Comput Secur. 2020;92:101752.","journal-title":"Comput Secur"},{"key":"4480_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5725-8","volume-title":"Feature Extraction, construction selection: A data mining perspective","author":"H Liu","year":"1998","unstructured":"Liu H, Motoda H. Feature Extraction, construction selection: A data mining perspective, vol. Volume 453. USA: Springer; 1998."},{"issue":"1","key":"4480_CR20","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1007\/s12652-020-02167-9","volume":"12","author":"A Thakkar","year":"2020","unstructured":"Thakkar A, Lohiya R. Attack classification using feature selection techniques: a comparative study. J Ambient Intell Humaniz Comput. 2020;12(1):1249\u201366.","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"4480_CR21","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/2835023","volume":"2020","author":"W Lian","year":"2020","unstructured":"Lian W, Nie G, Jia B, Shi D, Fan Q, Liang Y. An intrusion detection method based on decision tree-recursive feature elimination in ensemble learning. Math Probl Eng. 2020;2020:2835023. https:\/\/doi.org\/10.1155\/2020\/2835023.","journal-title":"Math Probl Eng"},{"key":"4480_CR22","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.tcs.2022.07.030","volume":"931","author":"PR Kannari","year":"2022","unstructured":"Kannari PR, Chowdary NS, Biradar RL. An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection. Theor Comput Sci. 2022;931:56\u201364. https:\/\/doi.org\/10.1016\/j.tcs.2022.07.030.","journal-title":"Theor Comput Sci"},{"key":"4480_CR23","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1016\/j.eswa.2018.11.006","volume":"119","author":"M Lu","year":"2019","unstructured":"Lu M. Embedded feature selection accounting for unknown data heterogeneity. Expert Syst Appl. 2019;119:350\u201361.","journal-title":"Expert Syst Appl"},{"key":"4480_CR24","doi-asserted-by":"crossref","unstructured":"Osman H, Ghafari M, Nierstrasz O (2017) Automatic feature selection by regularization to improve bug prediction accuracy. In: Proceedings of the 2017 IEEE Workshop on Machine Learning Techniques for Software Quality Evaluation (MaLTeSQuE), Klagenfurt, Austria","DOI":"10.1109\/MALTESQUE.2017.7882013"},{"key":"4480_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101851","author":"X Li","year":"2020","unstructured":"Li X, Chen W, Zhang Q, Wu L. Building auto-encoder intrusion detection system based on random forest feature selection. Computers & Security. 2020. https:\/\/doi.org\/10.1016\/j.cose.2020.101851.","journal-title":"Computers & Security"},{"issue":"1","key":"4480_CR26","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1109\/TNSM.2020.3032618","volume":"18","author":"D Upadhyay","year":"2021","unstructured":"Upadhyay D, Manero J, Zaman M, Sampalli S. Gradient boosting feature selection with machine learning classifiers for intrusion detection on power grids. IEEE Trans Netw Serv Manage. 2021;18(1):1104\u201316. https:\/\/doi.org\/10.1109\/TNSM.2020.3032618.","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"4480_CR27","doi-asserted-by":"publisher","unstructured":"Agrawal P, Abutarboush HF, Ganesh T, Mohamed AM (2021) Metaheuristic Algorithms on Feature Selection: A Survey of One Decade of Research (2009\u20132019). In:\u00a0IEEE Access, 9: 26766\u201326791, Doi:\u00a0https:\/\/doi.org\/10.1109\/ACCESS.2021.3056407","DOI":"10.1109\/ACCESS.2021.3056407"},{"key":"4480_CR28","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Lewis A. Grey wolf optimizer. Adv Eng Softw. 2014;69:46\u201361.","journal-title":"Adv Eng Softw"},{"issue":"1","key":"4480_CR29","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0792-66","volume":"267","author":"JH Holland","year":"1992","unstructured":"Holland JH. Genetic algorithms. Sci Amer. 1992;267(1):66\u201373.","journal-title":"Sci Amer"},{"key":"4480_CR30","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1016\/j.future.2020.07.042","volume":"113","author":"MT Nguyen","year":"2020","unstructured":"Nguyen MT, Kim K. Genetic convolutional neural network for intrusion detection systems. Future Gener Comput Syst. 2020;113:418\u201327. https:\/\/doi.org\/10.1016\/j.future.2020.07.042.","journal-title":"Future Gener Comput Syst"},{"key":"4480_CR31","doi-asserted-by":"crossref","unstructured":"Kennedy J, Eberhart R (1995a) Particle swarm optimization. In:\u00a0Proc. IEEE Int. Conf. Neural Netw. (ICNN),\u00a04: 1942_1948","DOI":"10.1109\/ICNN.1995.488968"},{"key":"4480_CR32","doi-asserted-by":"publisher","unstructured":"Kennedy J, Eberhart R (1995b) Particle swarm optimization, In:\u00a0Proceedings of ICNN\u201995 - International Conference on Neural Networks, Perth, WA, Australia, 4: 1942\u20131948. Doi:\u00a0https:\/\/doi.org\/10.1109\/ICNN.1995.488968","DOI":"10.1109\/ICNN.1995.488968"},{"issue":"1","key":"4480_CR33","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/3477.484436","volume":"26","author":"M Dorigo","year":"1996","unstructured":"Dorigo M, Maniezzo V, Colorni A. Ant system: optimization by a colony of cooperating agents. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics). 1996;26(1):29\u201341.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)"},{"key":"4480_CR34","doi-asserted-by":"publisher","first-page":"94497","DOI":"10.1109\/ACCESS.2019.2928048","volume":"7","author":"BA Tama","year":"2019","unstructured":"Tama BA, Comuzzi M, Rhee KH. TSE-IDS: a two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access. 2019;7:94497\u2013507. https:\/\/doi.org\/10.1109\/ACCESS.2019.2928048.","journal-title":"IEEE Access"},{"key":"4480_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12538-6_6","volume-title":"Nature inspired cooperative strategies for optimization (NICSO 2010). Studies in computational intelligence","author":"XS Yang","year":"2010","unstructured":"Yang XS. A new metaheuristic Bat-Inspired algorithm. In: Gonz\u00e1lez JR, Pelta DA, Cruz C, Terrazas G, Krasnogor N, editors. Nature inspired cooperative strategies for optimization (NICSO 2010). Studies in computational intelligence. Volume 284. Berlin, Heidelberg: Springer; 2010. https:\/\/doi.org\/10.1007\/978-3-642-12538-6_6."},{"key":"4480_CR36","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10111341","volume":"10","author":"A Alharbi","year":"2021","unstructured":"Alharbi A, Alosaimi W, Alyami H, Rauf HT, Dama\u0161evi\u010dius R. Botnet attack detection using local global best bat algorithm for industrial internet of things. Electronics. 2021;10:1341. https:\/\/doi.org\/10.3390\/electronics10111341.","journal-title":"Electronics"},{"key":"4480_CR37","doi-asserted-by":"publisher","unstructured":"Abdo MA, Fathallah KM (2024) Intelligent Intrusion Detection System using LightGBM optimized by Firefly Algorithm for DoS Attack. In: 2024 International Conference on Machine Intelligence and Smart Innovation (ICMISI), Alexandria, Egypt, pp. 163\u2013167. https:\/\/doi.org\/10.1109\/ICMISI61517.2024.10580592","DOI":"10.1109\/ICMISI61517.2024.10580592"},{"key":"4480_CR38","doi-asserted-by":"publisher","first-page":"66","DOI":"10.22266\/ijies2021.0831.07","volume":"14","author":"E Krishna","year":"2021","unstructured":"Krishna E, Arunkumar T. Hybrid particle swarm and gray wolf optimization algorithm for IoT intrusion detection system. Int J Intell Eng Syst. 2021;14:66\u201376. https:\/\/doi.org\/10.22266\/ijies2021.0831.07.","journal-title":"Int J Intell Eng Syst"},{"key":"4480_CR39","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1007\/s10207-023-00803-x","volume":"23","author":"YK Saheed","year":"2024","unstructured":"Saheed YK, Misra S. A voting Gray Wolf optimizer-based ensemble learning models for intrusion detection in the internet of things. Int J Inf Secur. 2024;23:1557\u201381. https:\/\/doi.org\/10.1007\/s10207-023-00803-x.","journal-title":"Int J Inf Secur"},{"key":"4480_CR40","doi-asserted-by":"publisher","unstructured":"Mourad Benmalek, Abdessamed Seddiki (2025) Particle swarm optimization-enhanced machine learning and deep learning techniques for Internet of Things intrusion detection, Data Science and Management, 2025, ISSN 2666\u20137649, https:\/\/doi.org\/10.1016\/j.dsm.2025.02.005.","DOI":"10.1016\/j.dsm.2025.02.005."},{"issue":"13","key":"4480_CR41","doi-asserted-by":"publisher","first-page":"2232","DOI":"10.1016\/j.ins.2009.03.004","volume":"179","author":"E Rashedi","year":"2009","unstructured":"Rashedi E, Nezamabadi-pour H, Saryazdi S. GSA. A gravitational search algorithm. Inf Sci. 2009;179(13):2232\u201348.","journal-title":"Inf Sci"},{"key":"4480_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compchemeng.2017.01.046","volume":"103","author":"A Tabari","year":"2017","unstructured":"Tabari A, Ahmad A. A new optimization method: electro-search algorithm. Comput Chem Eng. 2017;103:1\u201311.","journal-title":"Comput Chem Eng"},{"key":"4480_CR43","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.advengsoft.2017.03.014","volume":"110","author":"A Kaveh","year":"2017","unstructured":"Kaveh A, Dadras A. A novel meta-heuristic optimization algorithm: thermal exchange optimization. Adv Eng Softw. 2017;110:69\u201384.","journal-title":"Adv Eng Softw"},{"key":"4480_CR44","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.knosys.2015.12.022","volume":"96","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S. A sine cosine algorithm for solving optimization problems. Knowl-Based Syst. 2016;96:120\u201333.","journal-title":"Knowl-Based Syst"},{"key":"4480_CR45","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/5287684","volume":"2020","author":"M Aljanabi","year":"2020","unstructured":"Aljanabi M, Ismail MA, Mezhuyev V. Improved TLBO-JAYA algorithm for subset feature selection and parameter optimisation in intrusion detection system. Complexity. 2020;2020:5287684. https:\/\/doi.org\/10.1155\/2020\/5287684.","journal-title":"Complexity"},{"key":"4480_CR46","doi-asserted-by":"publisher","unstructured":"Jahongir Azimjonov T, Kim (2024) Designing accurate lightweight intrusion detection systems for IoT networks using fine-tuned linear SVM and feature selectors. Computers & Security. 137: 103598, ISSN 0167\u20134048, Doi:\u00a0https:\/\/doi.org\/10.1016\/j.cose.2023.103598","DOI":"10.1016\/j.cose.2023.103598"},{"key":"4480_CR47","doi-asserted-by":"publisher","DOI":"10.3390\/app12105015","volume":"12","author":"K Albulayhi","year":"2022","unstructured":"Albulayhi K, Abu Al-Haija Q, Alsuhibany SA, Jillepalli AA, Ashrafuzzaman M, Sheldon FT. Iot intrusion detection using machine learning with a novel high performing feature selection method. Appl Sci. 2022;12:5015.","journal-title":"Appl Sci"},{"key":"4480_CR48","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.499","volume":"8","author":"N Ahmed","year":"2025","unstructured":"Ahmed N, Ngadi MA, Rathore MS, Mahmood A. PCM-RF a hybrid feature selection mechanism for intrusion detection system in IoT. SECURITY AND PRIVACY. 2025;8:e499. https:\/\/doi.org\/10.1002\/spy2.499.","journal-title":"SECURITY AND PRIVACY"},{"key":"4480_CR49","doi-asserted-by":"publisher","first-page":"24970","DOI":"10.1109\/ACCESS.2025.3532895","volume":"13","author":"G Logeswari","year":"2025","unstructured":"Logeswari G, Deepika Roselind J, Tamilarasi K, Nivethitha V. A comprehensive approach to intrusion detection in IoT environments using hybrid feature selection and multi-stage classification techniques. IEEE Access. 2025a;13:24970\u201387. https:\/\/doi.org\/10.1109\/ACCESS.2025.3532895.","journal-title":"IEEE Access"},{"key":"4480_CR50","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-91663-z","volume":"15","author":"G Logeswari","year":"2025","unstructured":"Logeswari G, Thangaramya K, Selvi M, et al. An improved synergistic dual-layer feature selection algorithm with two type classifier for efficient intrusion detection in IoT environment. Sci Rep. 2025b;15:8050. https:\/\/doi.org\/10.1038\/s41598-025-91663-z.","journal-title":"Sci Rep"},{"key":"4480_CR51","doi-asserted-by":"publisher","DOI":"10.1080\/21642583.2024.2321381","author":"A Almotairi","year":"2024","unstructured":"Almotairi A, Atawneh S, Khashan OA, Khafajah NM. Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models. Syst Sci Control Eng. 2024. https:\/\/doi.org\/10.1080\/21642583.2024.2321381.","journal-title":"Syst Sci Control Eng"},{"key":"4480_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.01.014","volume":"218","author":"AK Dey","year":"2023","unstructured":"Dey AK, Gupta GP, Sahu SP. Hybrid meta-heuristic based feature selection mechanism for cyber-attack detection in IoT-enabled networks. Procedia Comput Sci. 2023;218:318. https:\/\/doi.org\/10.1016\/j.procs.2023.01.014.","journal-title":"Procedia Comput Sci"},{"key":"4480_CR53","doi-asserted-by":"publisher","first-page":"26942","DOI":"10.1007\/s11227-024-06409-x","volume":"80","author":"AG Ayad","year":"2024","unstructured":"Ayad AG, Sakr NA, Hikal NA. A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks. J Supercomput. 2024;80:26942\u201384. https:\/\/doi.org\/10.1007\/s11227-024-06409-x.","journal-title":"J Supercomput"},{"key":"4480_CR54","doi-asserted-by":"publisher","first-page":"33218","DOI":"10.1109\/ACCESS.2024.3372859","volume":"12","author":"D Jayalatchumy","year":"2024","unstructured":"Jayalatchumy D, Ramalingam R, Balakrishnan A, Safran M, Alfarhood S. Improved crow search-based feature selection and ensemble learning for IoT intrusion detection. IEEE Access. 2024;12:33218\u201335. https:\/\/doi.org\/10.1109\/ACCESS.2024.3372859.","journal-title":"IEEE Access"},{"key":"4480_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100709","volume":"22","author":"A El-Ghamry","year":"2023","unstructured":"El-Ghamry A, Darwish A, Hassanien AE. An optimized CNN-based intrusion detection system for reducing risks in smart farming. Internet Things. 2023;22:100709. https:\/\/doi.org\/10.1016\/j.iot.2023.100709.","journal-title":"Internet Things"},{"key":"4480_CR56","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2025.101536","volume":"31","author":"SN Makhadmeh","year":"2025","unstructured":"Makhadmeh SN, Fraihat S, Awad M, Sanjalawe Y, Al-Betar MA, Awadallah MA. A crossover-integrated marine predator algorithm for feature selection in intrusion detection systems within IoT environments. internet of things. 2025;31:101536. https:\/\/doi.org\/10.1016\/j.iot.2025.101536.","journal-title":"internet of things"},{"key":"4480_CR57","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-85878-3","volume":"15","author":"KS Prasad","year":"2025","unstructured":"Prasad KS, Udayakumar P, Laxmi Lydia E, et al. A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security. Sci Rep. 2025;15:2235. https:\/\/doi.org\/10.1038\/s41598-025-85878-3.","journal-title":"Sci Rep"},{"issue":"6","key":"4480_CR58","doi-asserted-by":"publisher","DOI":"10.3390\/computers12060115","volume":"12","author":"S Ullah","year":"2023","unstructured":"Ullah S, Mahmood Z, Ali N, Ahmad T, Buriro A. Machine learning-based dynamic attribute selection technique for DDoS attack classification in IoT networks. Computers. 2023;12(6):115.","journal-title":"Computers"},{"key":"4480_CR59","doi-asserted-by":"publisher","DOI":"10.3390\/s24134293","volume":"24","author":"MB Musthafa","year":"2024","unstructured":"Musthafa MB, Huda S, Kodera Y, Ali MA, Araki S, Mwaura J, et al. Optimizing IoT intrusion detection using balanced class distribution, feature selection, and ensemble machine learning techniques. Sensors. 2024;24:4293. https:\/\/doi.org\/10.3390\/s24134293.","journal-title":"Sensors"},{"key":"4480_CR60","doi-asserted-by":"publisher","DOI":"10.3390\/s24175712","volume":"24","author":"G Balhareth","year":"2024","unstructured":"Balhareth G, Ilyas M. Optimized intrusion detection for IoMT networks with tree-based machine learning and filter-based feature selection. Sensors. 2024;24:5712. https:\/\/doi.org\/10.3390\/s24175712.","journal-title":"Sensors"},{"key":"4480_CR61","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-024-00892-y","volume":"11","author":"J Li","year":"2024","unstructured":"Li J, Othman MS, Chen H, et al. Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning. J Big Data. 2024;11:36. https:\/\/doi.org\/10.1186\/s40537-024-00892-y.","journal-title":"J Big Data"},{"key":"4480_CR62","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/s42235-023-00436-9","volume":"21","author":"A Got","year":"2024","unstructured":"Got A, Zouache D, Moussaoui A, et al. Improved manta ray foraging Optimizer-based SVM for feature selection problems: a medical case study. J Bionic Eng. 2024;21:409\u201325. https:\/\/doi.org\/10.1007\/s42235-023-00436-9.","journal-title":"J Bionic Eng"},{"key":"4480_CR63","doi-asserted-by":"publisher","first-page":"59887","DOI":"10.1007\/s11042-023-17886-2","volume":"83","author":"L Abualigah","year":"2024","unstructured":"Abualigah L, Ahmed SH, Almomani MH, et al. Modified Aquila optimizer feature selection approach and support vector machine classifier for intrusion detection system. Multimed Tools Appl. 2024;83:59887\u2013913. https:\/\/doi.org\/10.1007\/s11042-023-17886-2.","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"4480_CR64","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s10115-017-1140-3","volume":"56","author":"V Bol\u00f3n-Canedo","year":"2018","unstructured":"Bol\u00f3n-Canedo V, Rego-Fern\u00e1ndez D, Peteiro-Barral D, Alonso- Betanzos A. On the scalability of feature selection methods on high-dimensional data. Knowl Inf Syst. 2018;56(2):395\u2013442.","journal-title":"Knowl Inf Syst"},{"key":"4480_CR65","doi-asserted-by":"publisher","unstructured":"Elaziz MA, Yousri D, Aseeri AO, Abualigah L, Mohammed AA, Al-qaness AA, Ewees (2024) Fractional-order modified heterogeneous comprehensive learning particle swarm optimizer for intelligent disease detection in IoMT environment, swarm and evolutionary computation, 84: 101430, ISSN 2210\u20136502, Doi:\u00a0https:\/\/doi.org\/10.1016\/j.swevo.2023.101430","DOI":"10.1016\/j.swevo.2023.101430"},{"key":"4480_CR66","volume-title":"R.Dynamic programming, Princeton","author":"Bellman","year":"1957","unstructured":"Bellman. R.Dynamic programming, Princeton. Volume 18. NJ: Princeton UP; 1957."},{"key":"4480_CR67","doi-asserted-by":"crossref","unstructured":"Hastie T, Tibshirani R, Friedman J. The Elements of Statistical Learning, Data Mining, Inference, and Prediction, Second Edition, Springer New York, 2009","DOI":"10.1007\/978-0-387-84858-7"},{"issue":"Issues 1\u20132","key":"4480_CR68","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/S0004-3702(97)00043-X","volume":"97","author":"R Kohavi","year":"1997","unstructured":"Kohavi R, John GH. Wrappers for feature subset selection. Artif Intell. 1997;97(Issues 1\u20132):273\u2013324. https:\/\/doi.org\/10.1016\/S0004-3702(97)00043-X.","journal-title":"Artif Intell"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04480-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04480-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04480-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T05:35:14Z","timestamp":1761888914000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04480-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,31]]},"references-count":68,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["4480"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04480-6","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,31]]},"assertion":[{"value":"5 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all the authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"935"}}