{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:12:50Z","timestamp":1772043170451,"version":"3.50.1"},"reference-count":96,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T00:00:00Z","timestamp":1763683200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T00:00:00Z","timestamp":1763683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00237-y","type":"journal-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T14:42:23Z","timestamp":1763736143000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A harris hawks optimized SVM framework for securing IoT networks through attack detection and feature analysis"],"prefix":"10.1007","volume":"5","author":[{"given":"Dana A.","family":"Al-Qudah","sequence":"first","affiliation":[]},{"given":"Ala\u2019 M.","family":"Al-Zoubi","sequence":"additional","affiliation":[]},{"given":"Bashar","family":"Al-Shboul","sequence":"additional","affiliation":[]},{"given":"Bilal","family":"Abu-Salih","sequence":"additional","affiliation":[]},{"given":"Raneem","family":"Qaddoura","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Hijjawi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,21]]},"reference":[{"key":"237_CR1","doi-asserted-by":"crossref","unstructured":"Abomhara M, Geir M, K\u00f8ien. \u201cSecurity and privacy in the Internet of Things: Current status and open issues\u201d. In: international conference on privacy and security in mobile systems (PRISMS). IEEE. 2014;2014:1\u20138.","DOI":"10.1109\/PRISMS.2014.6970594"},{"key":"237_CR2","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.857","volume":"8","author":"BilalI Al-Ahmad","year":"2022","unstructured":"Al-Ahmad BilalI, et al. Swarm intelligence-based model for improving prediction performance of low-expectation teams in educational software engineering projects. PeerJ Comput Sci. 2022;8:e857.","journal-title":"PeerJ Comput Sci"},{"key":"237_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"Mohiuddin Ahmed","year":"2016","unstructured":"Ahmed Mohiuddin, Mahmood AbdunNaser, Jiankun Hu. A survey of network anomaly detection techniques. J Netw Comput Appl. 2016;60:19\u201331.","journal-title":"J Netw Comput Appl"},{"key":"237_CR4","doi-asserted-by":"crossref","unstructured":"Al-Zoubi Ala\u2019M et al. \u201cA Hybrid TwinSVM-HHO Model for Multilingual Spam Review Detection Using Sentiment Features and Pre-trained Embeddings\u201d. In: Expert Systems with Applications 2025;128160.","DOI":"10.1016\/j.eswa.2025.128160"},{"key":"237_CR5","doi-asserted-by":"publisher","first-page":"100009","DOI":"10.1109\/ACCESS.2021.3097206","volume":"9","author":"I Aljarah","year":"2021","unstructured":"Aljarah I, et al. A robust multi-objective feature selection model based on local neighborhood multi-verse optimization. IEEE Access. 2021;9:100009\u201328.","journal-title":"IEEE Access"},{"key":"237_CR6","unstructured":"Mohammad Husien Almajali et al. \u201cTechnical Service Error as a Pillar of Administrative Responsibility for Artificial Intelligence (AI) Operations.\u201d In: International Journal of Advances in Soft Computing & Its Applications 2023;15(3):"},{"issue":"6","key":"237_CR7","doi-asserted-by":"publisher","first-page":"1046","DOI":"10.3390\/sym12061046","volume":"12","author":"Omar Almomani","year":"2020","unstructured":"Almomani Omar. A feature selection model for network intrusion detection system based on PSO, GWO, FFA and GA algorithms. Symmetry. 2020;12(6):1046.","journal-title":"Symmetry"},{"issue":"1","key":"237_CR8","doi-asserted-by":"publisher","first-page":"409","DOI":"10.32604\/cmc.2021.016113","volume":"68","author":"Omar Almomani","year":"2021","unstructured":"Almomani Omar. A hybrid model using bio-inspired metaheuristic algorithms for network intrusion detection system. Comput Mater Continua. 2021;68(1):409\u201329. https:\/\/doi.org\/10.32604\/cmc.2021.016113.","journal-title":"Comput Mater Continua"},{"key":"237_CR9","doi-asserted-by":"publisher","unstructured":"Almomani Omar et al. \u201cMachine Learning Classifiers for Network Intrusion Detection System: Comparative Study\u201d. In: 2021 International Conference on Information Technology (ICIT). 2021;440\u2013445. https:\/\/doi.org\/10.1109\/ICIT52682.2021.9491770.","DOI":"10.1109\/ICIT52682.2021.9491770"},{"key":"237_CR10","doi-asserted-by":"crossref","unstructured":"Alrashdi I et al. \u201cAd-iot: Anomaly detection of iot cyberattacks in smart city using machine learning\u201d. IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). IEEE. 2019;2019:0305\u201310.","DOI":"10.1109\/CCWC.2019.8666450"},{"key":"237_CR11","doi-asserted-by":"crossref","unstructured":"AlZu\u2019bi Shadi, Zraiqat Amjed, Hendawi Samar. Sustainable Development: A Semantics-aware Trends for Movies Recommendation System using Modern NLP. International Journal of Advances in Soft Computing & Its Applications. 2022;14(3):","DOI":"10.15849\/IJASCA.221128.11"},{"key":"237_CR12","doi-asserted-by":"crossref","unstructured":"Omar A Alzubi et al. \u201cAn efficient malware detection approach with feature weighting based on Harris Hawks optimization\u201d. In: Cluster Computing (2021), pp.1\u201319.","DOI":"10.1007\/s10586-021-03459-1"},{"key":"237_CR13","doi-asserted-by":"crossref","unstructured":"Alzyadat Wael, et al. A Recruitment Big Data Approach to interplay of the Target Drugs. International Journal of Advances in Soft Computing & Its Applications. 2022;14(1):","DOI":"10.15849\/ZUJIJASACA.220328.01"},{"key":"237_CR14","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.comnet.2018.12.008","volume":"148","author":"Parvaneh Asghari","year":"2019","unstructured":"Asghari Parvaneh, Rahmani AmirMasoud, Javadi HamidHajSeyyed. Internet of Things applications: a systematic review. Comput Netw. 2019;148:241\u201361.","journal-title":"Comput Netw"},{"key":"237_CR15","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9071177","author":"Javed Asharf","year":"2020","unstructured":"Asharf Javed, et al. A review of intrusion detection systems using machine and deep learning in internet of things: challenges, solutions and future directions. Electronics. 2020. https:\/\/doi.org\/10.3390\/electronics9071177.","journal-title":"Electronics"},{"key":"237_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103741","volume":"82","author":"Dhanke Jyoti Atul","year":"2021","unstructured":"Atul Dhanke Jyoti, et al. A machine learning based IoT for providing an intrusion detection system for security. Microprocessors Microsyst. 2021;82:103741.","journal-title":"Microprocessors Microsyst"},{"key":"237_CR17","doi-asserted-by":"crossref","unstructured":"Ed B.Claise. Cisco Systems NetFlow Services Export Version 9. 2004. https:\/\/www.hjp.at\/doc\/rfc\/rfc3954.html. Accessed 19 Dec 2021.","DOI":"10.17487\/rfc3954"},{"key":"237_CR18","doi-asserted-by":"publisher","first-page":"6974","DOI":"10.1109\/ACCESS.2016.2615181","volume":"4","author":"ZoranB Babovic","year":"2016","unstructured":"Babovic ZoranB, Protic Jelica, Milutinovic Veljko. Web performance evaluation for internet of things applications. In IEEE Access. 2016;4:6974\u201392.","journal-title":"In IEEE Access"},{"issue":"1","key":"237_CR19","doi-asserted-by":"publisher","first-page":"1922","DOI":"10.1038\/s41598-022-05963-9","volume":"12","author":"JiYeon Baek","year":"2022","unstructured":"Baek JiYeon, et al. Implementation of an integrated home internet of things system for vulnerable older adults using a frailty-centered approach. In Scientific reports. 2022;12(1):1922.","journal-title":"In Scientific reports"},{"issue":"03","key":"237_CR20","first-page":"161","volume":"2","author":"E Baraneetharan","year":"2020","unstructured":"Baraneetharan E. Role of machine learning algorithms intrusion detection in WSNs: a survey. J Inf Technol. 2020;2(03):161\u201373.","journal-title":"J Inf Technol"},{"issue":"15\u201316","key":"237_CR21","doi-asserted-by":"publisher","first-page":"4719","DOI":"10.1080\/00207543.2017.1402140","volume":"57","author":"Mohamed Ben-Daya","year":"2019","unstructured":"Ben-Daya Mohamed, Hassini Elkafi, Bahroun Zied. Internet of things and supply chain management: a literature review. Int J Prod Res. 2019;57(15\u201316):4719\u201342.","journal-title":"Int J Prod Res"},{"issue":"4","key":"237_CR22","doi-asserted-by":"publisher","first-page":"3496","DOI":"10.1109\/COMST.2018.2844742","volume":"20","author":"Elhadj Benkhelifa","year":"2018","unstructured":"Benkhelifa Elhadj, Welsh Thomas, Hamouda Walaa. A critical review of practices and challenges in intrusion detection systems for IoT: toward universal and resilient systems. IEEE Commun Surv & Tutor. 2018;20(4):3496\u2013509.","journal-title":"IEEE Commun Surv & Tutor"},{"issue":"4","key":"237_CR23","doi-asserted-by":"publisher","first-page":"2371","DOI":"10.1007\/s13369-019-03970-z","volume":"45","author":"BhoopeshSingh Bhati","year":"2020","unstructured":"Bhati BhoopeshSingh, Rai CS. Analysis of support vector machine-based intrusion detection techniques. Arab J Sci Eng. 2020;45(4):2371\u201383.","journal-title":"Arab J Sci Eng"},{"issue":"2","key":"237_CR24","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AnnaL Buczak","year":"2015","unstructured":"Buczak AnnaL, Guven Erhan. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv & Tutor. 2015;18(2):1153\u201376.","journal-title":"IEEE Commun Surv & Tutor"},{"issue":"9","key":"237_CR25","doi-asserted-by":"publisher","first-page":"2796","DOI":"10.3390\/s18092796","volume":"18","author":"Muhammad Burhan","year":"2018","unstructured":"Burhan Muhammad, et al. IoT elements, layered architectures and security issues: a comprehensive survey. Sensors. 2018;18(9):2796.","journal-title":"Sensors"},{"key":"237_CR26","doi-asserted-by":"crossref","unstructured":"Yi Chen et al. \u201cEvolutionary Convolutional Neural Network: An Application to Intrusion Detection\u201d. In: 2021 13th International Conference on Advanced Computational Intelligence (ICACI). IEEE. 2021, pp.245\u2013252.","DOI":"10.1109\/ICACI52617.2021.9435859"},{"issue":"9","key":"237_CR27","doi-asserted-by":"publisher","first-page":"2043","DOI":"10.3390\/electronics12092043","volume":"12","author":"Bogdan-Iulian Ciubotaru","year":"2023","unstructured":"Ciubotaru Bogdan-Iulian, et al. Architecture of a non-intrusive IoT system for frailty detection in older people. Electronics. 2023;12(9):2043.","journal-title":"Electronics"},{"key":"237_CR28","doi-asserted-by":"crossref","unstructured":"Mauro Conti et al. Internet of Things security and forensics: Challenges and opportunities. 2018.","DOI":"10.1016\/j.future.2017.07.060"},{"issue":"3","key":"237_CR29","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1023\/A:1022627411411","volume":"20","author":"Corinna Cortes","year":"1995","unstructured":"Cortes Corinna, Vapnik Vladimir. Support-vector networks. Mach Learn. 1995;20(3):273\u201397.","journal-title":"Mach Learn"},{"issue":"5","key":"237_CR30","doi-asserted-by":"publisher","first-page":"800","DOI":"10.3390\/electronics9050800","volume":"9","author":"Robertas Damasevicius","year":"2020","unstructured":"Damasevicius Robertas, et al. LITNET-2020: an annotated real-world network flow dataset for network intrusion detection. Electronics. 2020;9(5):800.","journal-title":"Electronics"},{"issue":"11","key":"237_CR31","doi-asserted-by":"publisher","first-page":"5581","DOI":"10.1007\/s12652-020-01919-x","volume":"11","author":"Azam Davahli","year":"2020","unstructured":"Davahli Azam, Shamsi Mahboubeh, Abaei Golnoush. Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks. J Ambient Intell Humaniz Comput. 2020;11(11):5581\u2013609.","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"11","key":"237_CR32","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.2514\/3.10834","volume":"29","author":"Kalyanmoy Deb","year":"1991","unstructured":"Deb Kalyanmoy. Optimal design of a welded beam via genetic algorithms. AIAA J. 1991;29(11):2013\u20135.","journal-title":"AIAA J"},{"key":"237_CR33","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.comnet.2019.03.006","volume":"153","author":"Mrinai M Dhanvijay","year":"2019","unstructured":"Dhanvijay Mrinai M, Patil Shailaja C. Internet of Things: a survey of enabling technologies in healthcare and its applications. Comput Netw. 2019;153:113\u201331.","journal-title":"Comput Netw"},{"issue":"5","key":"237_CR34","first-page":"6537","volume":"38","author":"Anne Dickson","year":"2020","unstructured":"Dickson Anne, Thomas Ciza. Improved PSO for optimizing the performance of intrusion detection systems. J Intell & Fuzzy Syst. 2020;38(5):6537\u201347.","journal-title":"J Intell & Fuzzy Syst"},{"key":"237_CR35","doi-asserted-by":"crossref","unstructured":"Shubhra Dwivedi, Manu Vardhan, and Sarsij Tripathi. \u201cBuilding an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection\u201d. In: Cluster Computing (2021), pp.1\u201320.","DOI":"10.1007\/s10586-020-03229-5"},{"issue":"5","key":"237_CR36","doi-asserted-by":"publisher","first-page":"3758","DOI":"10.1109\/JIOT.2018.2844296","volume":"5","author":"Olakunle Elijah","year":"2018","unstructured":"Elijah Olakunle, et al. An overview of Internet of Things (IoT) and data analytics in agriculture: benefits and challenges. IEEE Internet of Things J. 2018;5(5):3758\u201373.","journal-title":"IEEE Internet of Things J"},{"key":"237_CR37","doi-asserted-by":"publisher","first-page":"32979","DOI":"10.1109\/ACCESS.2018.2842685","volume":"6","author":"Tiago M Fern\u00e1ndez-Caram\u00e9s","year":"2018","unstructured":"Fern\u00e1ndez-Caram\u00e9s Tiago M, Fraga-Lamas Paula. A review on the use of blockchain for the Internet of Things. IEEE Access. 2018;6:32979\u20133001.","journal-title":"IEEE Access"},{"issue":"3","key":"237_CR38","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","volume":"22","author":"Mohammed Ali Al-Garadi","year":"2020","unstructured":"Al-Garadi Mohammed Ali, et al. A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun Surv & Tutor. 2020;22(3):1646\u201385.","journal-title":"IEEE Commun Surv & Tutor"},{"key":"237_CR39","doi-asserted-by":"publisher","unstructured":"Garg Umang et al. \u201cAnalysis of Machine Learning Algorithms for IoT Botnet\u201d. In: 2021 2nd International Conference for Emerging Technology (INCET). 2021, pp.1\u20135. https:\/\/doi.org\/10.1109\/INCET51464.2021.9456246.","DOI":"10.1109\/INCET51464.2021.9456246"},{"key":"237_CR40","doi-asserted-by":"crossref","unstructured":"Gatsis Konstantinos, Pappas George J. \u201cWireless control for the IOT: Power, spectrum, and security challenges\u201d. In: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation. 2017;341\u2013342.","DOI":"10.1145\/3054977.3057313"},{"key":"237_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102158","volume":"103","author":"Gu Jie","year":"2021","unstructured":"Jie Gu, Shan Lu. An effective intrusion detection approach using SVM with na\u0131ve Bayes feature embedding. Comput & Secur. 2021;103:102158.","journal-title":"Comput & Secur"},{"key":"237_CR42","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/CTIT.2018.8649534","volume":"2018","author":"M Habib","year":"2018","unstructured":"Habib M, et al. Automatic email spam detection using genetic programming with SMOTE. Fifth HCT Inf Technol Trends (ITT) IEEE. 2018;2018:185\u201390.","journal-title":"Fifth HCT Inf Technol Trends (ITT) IEEE"},{"issue":"2","key":"237_CR43","first-page":"1407","volume":"186","author":"Qie He","year":"2007","unstructured":"He Qie, Wang Ling. A hybrid particle swarm optimization with a feasibility-based rule for constrained optimization. Appl Math Comput. 2007;186(2):1407\u201322.","journal-title":"Appl Math Comput"},{"key":"237_CR44","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/j.future.2019.02.028","volume":"97","author":"Ali Asghar Heidari","year":"2019","unstructured":"Heidari Ali Asghar, et al. Harris hawks optimization: algorithm and applications. Future Gener Comput Syst. 2019;97:849\u201372.","journal-title":"Future Gener Comput Syst"},{"key":"237_CR45","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1109\/TASLP.2023.3294699","volume":"32","author":"T Kanan","year":"2023","unstructured":"Kanan T, et al. An intelligent health care system for detecting drug abuse in social media platforms based on low resource language. IEEE\/ACM Trans Audio Speech Lang Process. 2023;32:691\u2013703.","journal-title":"IEEE\/ACM Trans Audio Speech Lang Process"},{"issue":"3","key":"237_CR46","first-page":"404","volume":"15","author":"Tarek Kanan","year":"2022","unstructured":"Kanan Tarek, et al. Improving Arabic text classification using p-stemmer. Recent Adv Comput Sci Commun (Former Recent Patents Comput Sci). 2022;15(3):404\u201311.","journal-title":"Recent Adv Comput Sci Commun (Former Recent Patents Comput Sci)"},{"key":"237_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101701","author":"Khalid Khan","year":"2020","unstructured":"Khan Khalid, et al. A survey on intrusion detection and prevention in wireless ad-hoc networks. J Syst Archit. 2020. https:\/\/doi.org\/10.1016\/j.sysarc.2019.101701.","journal-title":"J Syst Archit"},{"issue":"1","key":"237_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00077-7","volume":"4","author":"Ansam Khraisat","year":"2021","unstructured":"Khraisat Ansam, Alazab Ammar. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity. 2021;4(1):1\u201327.","journal-title":"Cybersecurity"},{"issue":"1","key":"237_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"Ansam Khraisat","year":"2019","unstructured":"Khraisat Ansam, et al. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019;2(1):1\u201322.","journal-title":"Cybersecurity"},{"key":"237_CR50","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7","author":"Ansam Khraisat","year":"2019","unstructured":"Khraisat Ansam, et al. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019. https:\/\/doi.org\/10.1186\/s42400-019-0038-7.","journal-title":"Cybersecurity"},{"key":"237_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107840","volume":"188","author":"Ilhan Firat Kilincer","year":"2021","unstructured":"Kilincer Ilhan Firat, Ertam Fatih, Sengur Abdulkadir. Machine learning methods for cyber security intrusion detection: datasets and comparative study. Comput Netw. 2021;188:107840.","journal-title":"Comput Netw"},{"key":"237_CR52","doi-asserted-by":"publisher","first-page":"2372","DOI":"10.1016\/j.procs.2020.04.257","volume":"171","author":"KVVNL Sai Kiran","year":"2020","unstructured":"Kiran KVVNL Sai, et al. Building a intrusion detection system for IOT environment using machine learning techniques. Procedia Comput Sci. 2020;171:2372\u20139.","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"237_CR53","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MSP.2016.4","volume":"14","author":"Constantinos Kolias","year":"2016","unstructured":"Kolias Constantinos, et al. Learning Internet-of-Things security\u201c hands-on\u2019\u2019. IEEE Secur & Privacy. 2016;14(1):37\u201346.","journal-title":"IEEE Secur & Privacy"},{"key":"237_CR54","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","volume":"141","author":"Djamel Eddine Kouicem","year":"2018","unstructured":"Kouicem Djamel Eddine, Bouabdallah Abdelmadjid, Lakhlef Hicham. Internet of things security: a top-down survey. Comput Netw. 2018;141:199\u2013221.","journal-title":"Comput Netw"},{"issue":"2","key":"237_CR55","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1109\/JIOT.2018.2883344","volume":"6","author":"Jiaqi Li","year":"2019","unstructured":"Li Jiaqi, et al. AI-based two-stage intrusion detection for software defined IoT networks. IEEE Internet of Things J. 2019;6(2):2093\u2013102. https:\/\/doi.org\/10.1109\/JIOT.2018.2883344.","journal-title":"IEEE Internet of Things J"},{"key":"237_CR56","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102631","volume":"161","author":"Wenjuan Li","year":"2020","unstructured":"Li Wenjuan, Meng Weizhi, Man Ho Au. Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments. J Netw Comput Appl. 2020;161:102631.","journal-title":"J Netw Comput Appl"},{"key":"237_CR57","doi-asserted-by":"crossref","unstructured":"Ya Li, Seyed-mohsen Ghoreishi, and Alibek Issakhov. \u201cImproving the Accuracy of Network Intrusion Detection System in Medical IoT Systems through Butterfly Optimization Algorithm\u201d. In: Wireless Personal Communications (2021), pp.1\u201319.","DOI":"10.1007\/s11277-021-08756-x"},{"key":"237_CR58","doi-asserted-by":"publisher","unstructured":"Zhipeng Liu et al. \u201cAnomaly Detection on IoT Network Intrusion Using Machine Learning\u201d. In: 2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD). 2020, pp.1\u20135. https:\/\/doi.org\/10.1109\/icABCD49160.2020.9183842.","DOI":"10.1109\/icABCD49160.2020.9183842"},{"key":"237_CR59","doi-asserted-by":"crossref","unstructured":"Mahmoud R, Internet of things (IoT) security: Current status, challenges and prospective measures. In, et al. 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE. 2015;2015:336\u201341.","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"237_CR60","doi-asserted-by":"crossref","unstructured":"Denis Makoshenko and Ilya Enkovich. \u201cIoT development: Discovering, enabling and validation of real life IoT scenarios\u201d. In: 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC). IEEE. 2017, pp.159\u2013164.","DOI":"10.1109\/FMEC.2017.7946424"},{"key":"237_CR61","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.comcom.2020.11.016","volume":"166","author":"PraveenKumar Malik","year":"2021","unstructured":"Malik PraveenKumar, et al. Industrial Internet of Things and its applications in industry 4.0: State of the art. Comput Commun. 2021;166:125\u201339.","journal-title":"Comput Commun"},{"key":"237_CR62","doi-asserted-by":"crossref","unstructured":"K Mandal et al. \u201cImproved security using machine learning for IoT intrusion detection system\u201d. Materials Today: Proceedings. 2020.","DOI":"10.1016\/j.matpr.2020.10.187"},{"issue":"2","key":"237_CR63","doi-asserted-by":"publisher","first-page":"1353","DOI":"10.1007\/s10586-022-03655-7","volume":"26","author":"AymanM Mansour","year":"2023","unstructured":"Mansour AymanM, Obeidat MohammadA, Hawashin Bilal. A novel multi agent recommender system for user interests extraction. Cluster Comput. 2023;26(2):1353\u201362.","journal-title":"Cluster Comput"},{"key":"237_CR64","doi-asserted-by":"crossref","unstructured":"Tahir Mehmood and Helmi B Md Rais. \u201cMachine learning algorithms in context of intrusion detection\u201d. In: 2016 3rd International Conference on Computer and Information Sciences (ICCOINS). IEEE. 2016, pp.369\u2013373.","DOI":"10.1109\/ICCOINS.2016.7783243"},{"key":"237_CR65","doi-asserted-by":"crossref","unstructured":"Seyedali Mirjalili. \u201cGenetic algorithm\u201d. In: Evolutionary algorithms and neural networks. Springer, 2019, pp.43\u201355.","DOI":"10.1007\/978-3-319-93025-1_4"},{"key":"237_CR66","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"Seyedali Mirjalili","year":"2014","unstructured":"Mirjalili Seyedali, Mirjalili Seyed Mohammad, Lewis Andrew. Grey wolf optimizer. Adv Eng Softw. 2014;69:46\u201361.","journal-title":"Adv Eng Softw"},{"key":"237_CR67","doi-asserted-by":"crossref","unstructured":"Seyedali Mirjalili et al. \u201cParticle swarm optimization: theory, literature review, and application in airfoil design\u201d. Nature-inspired optimizers (2020), pp.167\u2013184.","DOI":"10.1007\/978-3-030-12127-3_10"},{"key":"237_CR68","doi-asserted-by":"publisher","first-page":"59353","DOI":"10.1109\/ACCESS.2021.3073408","volume":"9","author":"N Mishra","year":"2021","unstructured":"Mishra N, Pandya S. Internet of things applications, security challenges, attacks, intrusion detection, and future visions: a systematic review. IEEE Access. 2021;9:59353\u201377.","journal-title":"IEEE Access"},{"issue":"1","key":"237_CR69","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s00366-019-00828-8","volume":"37","author":"Hossein Moayedi","year":"2021","unstructured":"Moayedi Hossein, et al. A novel Harris hawks\u2019 optimization and k-fold cross-validation predicting slope stability. Eng Comput. 2021;37(1):369\u201379.","journal-title":"Eng Comput"},{"key":"237_CR70","doi-asserted-by":"crossref","unstructured":"Mokhtar Mohammadi et al. \u201cA comprehensive survey and taxonomy of the SVM-based intrusion detection systems\u201d. Journal of Network and Computer Applications. 2021, p.102983.","DOI":"10.1016\/j.jnca.2021.102983"},{"issue":"2","key":"237_CR71","first-page":"77","volume":"9","author":"RadouanAit Mouha","year":"2021","unstructured":"Mouha RadouanAit. Internet of things (IoT). J Data Anal Inf Process. 2021;9(2):77\u2013101.","journal-title":"J Data Anal Inf Process"},{"key":"237_CR72","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.eswa.2019.05.014","volume":"133","author":"JerettaHorn Nord","year":"2019","unstructured":"Nord JerettaHorn, Koohang Alex, Paliszkiewicz Joanna. The Internet of Things: review and theoretical framework. Expert Syst Appl. 2019;133:97\u2013108.","journal-title":"Expert Syst Appl"},{"issue":"19","key":"237_CR73","doi-asserted-by":"publisher","first-page":"9080","DOI":"10.3390\/app11199080","volume":"11","author":"Ruba Obiedat","year":"2021","unstructured":"Obiedat Ruba, et al. An evolutionary-based sentiment analysis approach for enhancing government decisions during COVID-19 pandemic: the case of Jordan. Appl Sci. 2021;11(19):9080.","journal-title":"Appl Sci"},{"issue":"9","key":"237_CR74","doi-asserted-by":"publisher","first-page":"2987","DOI":"10.3390\/s21092987","volume":"21","author":"Raneem Qaddoura","year":"2021","unstructured":"Qaddoura Raneem, et al. A multi-layer classification approach for intrusion detection in IoT networks based on deep learning. Sensors. 2021;21(9):2987.","journal-title":"Sensors"},{"issue":"7","key":"237_CR75","doi-asserted-by":"publisher","first-page":"3022","DOI":"10.3390\/app11073022","volume":"11","author":"Raneem Qaddoura","year":"2021","unstructured":"Qaddoura Raneem, et al. A multi-stage classification approach for IoT intrusion detection based on clustering with oversampling. Appl Sci. 2021;11(7):3022.","journal-title":"Appl Sci"},{"key":"237_CR76","doi-asserted-by":"crossref","unstructured":"Raneem Qaddoura et al. \u201cPredicting Different Types of Imbalanced Intrusion Activities Based on a Multi-Stage Deep Learning Approach\u201d. In: 2021 International Conference on Information Technology (ICIT). IEEE. 2021, pp.858\u2013863.","DOI":"10.1109\/ICIT52682.2021.9491634"},{"issue":"2","key":"237_CR77","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1109\/COMST.2020.2973314","volume":"22","author":"Yazdan Ahmad Qadri","year":"2020","unstructured":"Qadri Yazdan Ahmad, et al. The future of healthcare internet of things: a survey of emerging technologies. IEEE Commun Surv & Tutor. 2020;22(2):1121\u201367.","journal-title":"IEEE Commun Surv & Tutor"},{"issue":"2","key":"237_CR78","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1109\/COMST.2020.2973314","volume":"22","author":"YazdanAhmad Qadri","year":"2020","unstructured":"Qadri YazdanAhmad, et al. The future of healthcare internet of things: a survey of emerging technologies. IEEE Commun Surv & Tutor. 2020;22(2):1121\u201367.","journal-title":"IEEE Commun Surv & Tutor"},{"key":"237_CR79","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102324","volume":"61","author":"Md Arafatur Rahman","year":"2020","unstructured":"Rahman Md Arafatur, et al. Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustain Cities Soc. 2020;61:102324.","journal-title":"Sustain Cities Soc"},{"key":"237_CR80","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.comcom.2020.05.048","volume":"160","author":"RM Swarna Priya","year":"2020","unstructured":"Swarna Priya RM, et al. An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Comput Commun. 2020;160:139\u201349.","journal-title":"Comput Commun"},{"issue":"2","key":"237_CR81","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MITP.2020.2992710","volume":"23","author":"Tanzila Saba","year":"2021","unstructured":"Saba Tanzila, et al. intrusion detection system through advance machine learning for the Internet of Things networks. IT Professional. 2021;23(2):58\u201364. https:\/\/doi.org\/10.1109\/MITP.2020.2992710.","journal-title":"IT Professional"},{"issue":"2","key":"237_CR82","doi-asserted-by":"publisher","first-page":"1559","DOI":"10.1007\/s12652-020-02228-z","volume":"12","author":"Mukaram Safaldin","year":"2021","unstructured":"Safaldin Mukaram, Otair Mohammed, Abualigah Laith. Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J Ambient Intell Humaniz Comput. 2021;12(2):1559\u201376.","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"5","key":"237_CR83","doi-asserted-by":"publisher","first-page":"754","DOI":"10.3390\/sym12050754","volume":"12","author":"IqbalH Sarker","year":"2020","unstructured":"Sarker IqbalH, et al. Intrudtree: a machine learning based cyber security intrusion detection model. Symmetry. 2020;12(5):754.","journal-title":"Symmetry"},{"key":"237_CR84","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2020.102173","volume":"98","author":"Andrea Sestino","year":"2020","unstructured":"Sestino Andrea, et al. Internet of Things and Big Data as enablers for business digitalization strategies. Technovation. 2020;98:102173.","journal-title":"Technovation"},{"issue":"2","key":"237_CR85","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1109\/COMST.2019.2962586","volume":"22","author":"Maria Stoyanova","year":"2020","unstructured":"Stoyanova Maria, et al. A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues. IEEE Commun Surv & Tutor. 2020;22(2):1191\u2013221.","journal-title":"IEEE Commun Surv & Tutor"},{"issue":"5","key":"237_CR86","doi-asserted-by":"publisher","first-page":"279","DOI":"10.3390\/info11050279","volume":"11","author":"Bambang Susilo","year":"2020","unstructured":"Susilo Bambang, Sari RiriFitri. Intrusion detection in IoT networks using deep learning algorithm. Information. 2020;11(5):279.","journal-title":"Information"},{"key":"237_CR87","doi-asserted-by":"publisher","unstructured":"S.Shinly Swarna Sugi and S.Raja Ratna. \u201cInvestigation of Machine Learning Techniques in Intrusion Detection System for IoT Network\u201d. In: 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS). 2020, pp.1164\u20131167. https:\/\/doi.org\/10.1109\/ICISS49785.2020.9315900.","DOI":"10.1109\/ICISS49785.2020.9315900"},{"key":"237_CR88","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2019.100631","volume":"53","author":"Ankit Thakkar","year":"2020","unstructured":"Thakkar Ankit, Lohiya Ritika. Role of swarm and evolutionary algorithms for intrusion detection system: a survey. Swarm Evol Comput. 2020;53:100631.","journal-title":"Swarm Evol Comput"},{"issue":"9","key":"237_CR89","doi-asserted-by":"publisher","first-page":"1977","DOI":"10.3390\/s19091977","volume":"19","author":"Geethapriya Thamilarasu","year":"2019","unstructured":"Thamilarasu Geethapriya, Chawla Shiven. Towards deep-learning-driven intrusion detection for the internet of things. Sensors. 2019;19(9):1977.","journal-title":"Sensors"},{"key":"237_CR90","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2025.113436","volume":"317","author":"Mohammad Tubishat","year":"2025","unstructured":"Tubishat Mohammad, et al. Leveraging evolutionary algorithms with a dynamic weighted search space approach for fraud detection in healthcare insurance claims. Knowl-Based Syst. 2025;317:113436.","journal-title":"Knowl-Based Syst"},{"key":"237_CR91","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.biosystemseng.2017.09.007","volume":"164","author":"A Tzounis","year":"2017","unstructured":"Tzounis A, et al. Internet of Things in agriculture, recent advances and future challenges. Biosys Eng. 2017;164:31\u201348.","journal-title":"Biosys Eng"},{"key":"237_CR92","doi-asserted-by":"crossref","unstructured":"Ryan Williams et al. \u201cIdentifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach\u201d. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE. 2017, pp.179\u2013181.","DOI":"10.1109\/ISI.2017.8004904"},{"key":"237_CR93","doi-asserted-by":"publisher","first-page":"98600","DOI":"10.1109\/ACCESS.2020.2994947","volume":"8","author":"W Yukun","year":"2020","unstructured":"Yukun W, et al. Large-scale and robust intrusion detection model combining improved deep belief network with feature-weighted SVM. IEEE Access. 2020;8:98600\u201311.","journal-title":"IEEE Access"},{"issue":"3","key":"237_CR94","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MWC.2017.1600421","volume":"24","author":"Ibrar Yaqoob","year":"2017","unstructured":"Yaqoob Ibrar, et al. Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE Wireless Commun. 2017;24(3):10\u20136.","journal-title":"IEEE Wireless Commun"},{"key":"237_CR95","doi-asserted-by":"publisher","first-page":"31711","DOI":"10.1109\/ACCESS.2019.2903723","volume":"7","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Li P, Wang X. Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access. 2019;7:31711\u201322. https:\/\/doi.org\/10.1109\/ACCESS.2019.2903723.","journal-title":"IEEE Access"},{"issue":"4","key":"237_CR96","doi-asserted-by":"publisher","first-page":"3335","DOI":"10.1007\/s00500-020-05439-w","volume":"25","author":"Ala\u2019M Al-Zoubi","year":"2021","unstructured":"Al-Zoubi Ala\u2019M, et al. Evolutionary competitive swarm exploring optimal support vector machines and feature weighting. Soft Comput. 2021;25(4):3335\u201352.","journal-title":"Soft Comput"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00237-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00237-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00237-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T16:04:42Z","timestamp":1763741082000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00237-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,21]]},"references-count":96,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["237"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00237-y","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,21]]},"assertion":[{"value":"24 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"140"}}