{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:01:04Z","timestamp":1774368064126,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T00:00:00Z","timestamp":1653955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T00:00:00Z","timestamp":1653955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2020YFB1406902"],"award-info":[{"award-number":["2020YFB1406902"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Key-Area Research and Development Program of Guangdong Province","award":["2020B0101360001"],"award-info":[{"award-number":["2020B0101360001"]}]},{"name":"Peng Cheng Laboratory Project","award":["PCL2021A02"],"award-info":[{"award-number":["PCL2021A02"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61872110"],"award-info":[{"award-number":["61872110"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s10586-022-03629-9","type":"journal-article","created":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T20:02:50Z","timestamp":1654027370000},"page":"599-612","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":48,"title":["A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things"],"prefix":"10.1007","volume":"26","author":[{"given":"Arun Kumar","family":"Sangaiah","sequence":"first","affiliation":[]},{"given":"Amir","family":"Javadpour","sequence":"additional","affiliation":[]},{"given":"Forough","family":"Ja\u2019fari","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Weizhe","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Sudha","family":"Balasubramanian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,31]]},"reference":[{"issue":"2","key":"3629_CR1","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s11277-019-06176-6","volume":"106","author":"A Javadpour","year":"2019","unstructured":"Javadpour, A.: Improving resources management in network virtualization by utilizing a software-based network. Wirel. Personal Commun. 106(2), 505\u2013519 (2019)","journal-title":"Wirel. Personal Commun."},{"key":"3629_CR2","doi-asserted-by":"crossref","unstructured":"Javadpour, A., Wang, G., Rezaei, S., Chend, S.: Power curtailment in cloud environment utilising load balancing machine allocation. In: 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI). IEEE, pp. 1364\u20131370 (2018)","DOI":"10.1109\/SmartWorld.2018.00237"},{"issue":"4","key":"3629_CR3","doi-asserted-by":"publisher","first-page":"2521","DOI":"10.1109\/COMST.2020.3020092","volume":"22","author":"DC Nguyen","year":"2020","unstructured":"Nguyen, D.C., Pathirana, P.N., Ding, M., Seneviratne, A.: Integration of blockchain and cloud of things: architecture, applications and challenges. IEEE Commun. Surv. Tutor. 22(4), 2521\u20132549 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3629_CR4","doi-asserted-by":"crossref","unstructured":"Sangaiah, A.K., Javadpour, A., J\u00e1fari, F., Pinto, P., Ahmadi, H., Zhang, W.: CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities. Microprocess Microsyst. 90, 104504 (2022)","DOI":"10.1016\/j.micpro.2022.104504"},{"key":"3629_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/5575129","volume":"2021","author":"SM Mirmohseni","year":"2021","unstructured":"Mirmohseni, S.M., Javadpour, A., Tang, C.: Lbpsgora: create load balancing with particle swarm genetic optimization algorithm to improve resource allocation and energy consumption in clouds networks. Math. Problems Eng. 2021, 1 (2021)","journal-title":"Math. Problems Eng."},{"key":"3629_CR6","doi-asserted-by":"crossref","unstructured":"Javadpour, A., Wang, G., Xing, X.: Managing heterogeneous substrate resources by mapping and visualization based on software-defined network. In: 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA\/IUCC\/BDCloud\/SocialCom\/SustainCom), 316\u2013321 Dec 2018 (2018)","DOI":"10.1109\/BDCloud.2018.00057"},{"key":"3629_CR7","doi-asserted-by":"crossref","unstructured":"Mirmohseni, S.M., Tang, C., Javadpour, A.: Using markov learning utilization model for resource allocation in cloud of thing network. Wirel. Pers. Commun. 115(1), 653\u2013677 (2020)","DOI":"10.1007\/s11277-020-07591-w"},{"issue":"9","key":"3629_CR8","doi-asserted-by":"publisher","first-page":"6969","DOI":"10.1007\/s11227-019-03136-6","volume":"76","author":"A Javadpour","year":"2020","unstructured":"Javadpour, A., Wang, G., Rezaei, S., Li, K.-C.: Detecting straggler map reduce tasks in big data processing infrastructure by neural network. J. Supercomput. 76(9), 6969\u20136993 (2020)","journal-title":"J. Supercomput."},{"key":"3629_CR9","doi-asserted-by":"crossref","unstructured":"Musa, U.S., Chhabra, M., Ali, A., Kaur, M.: Intrusion detection system using machine learning techniques: a review. In: 2020 International Conference on Smart Electronics and Communication (ICOSEC). IEEE, pp. 149\u2013155 (2020)","DOI":"10.1109\/ICOSEC49089.2020.9215333"},{"key":"3629_CR10","first-page":"21","volume":"2","author":"SR Alkhaldi","year":"2021","unstructured":"Alkhaldi, S.R., Alzahrani, S.M.: Intrusion detection systems based on artificial intelligence techniques. Acad. J. Res. Sci. Publish. 2, 21 (2021)","journal-title":"Acad. J. Res. Sci. Publish."},{"issue":"3","key":"3629_CR11","doi-asserted-by":"publisher","first-page":"2471","DOI":"10.1007\/s11277-020-07691-7","volume":"115","author":"A Javadpour","year":"2020","unstructured":"Javadpour, A., Wang, G., Rezaei, S.: Resource management in a peer to peer cloud network for iot. Wirel. Personal Commun. 115(3), 2471\u20132488 (2020)","journal-title":"Wirel. Personal Commun."},{"key":"3629_CR12","doi-asserted-by":"crossref","unstructured":"Kumar, M., Singh, A.K.: Distributed intrusion detection system using blockchain and cloud computing infrastructure. In: 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI) (48184). IEEE, pp. 248\u2013252 (2020)","DOI":"10.1109\/ICOEI48184.2020.9142954"},{"key":"3629_CR13","doi-asserted-by":"publisher","unstructured":"Javadpour, A., Pinto, P., Ja\u2019fari, F. et al. DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments. Cluster Comput (2022). https:\/\/doi.org\/10.1007\/s10586-022-03621-3","DOI":"10.1007\/s10586-022-03621-3"},{"issue":"2","key":"3629_CR14","doi-asserted-by":"publisher","first-page":"2993","DOI":"10.1007\/s12652-020-02461-6","volume":"12","author":"F Ja\u2019fari","year":"2021","unstructured":"Ja\u2019fari, F., Mostafavi, S., Mizanian, K., Jafari, E.: An intelligent botnet blocking approach in software defined networks using honeypots. J. Ambient Intell. Hum. Comput. 12(2), 2993\u20133016 (2021)","journal-title":"J. Ambient Intell. Hum. Comput."},{"issue":"10","key":"3629_CR15","doi-asserted-by":"publisher","first-page":"1764","DOI":"10.3390\/sym13101764","volume":"13","author":"E Jaw","year":"2021","unstructured":"Jaw, E., Wang, X.: Feature selection and ensemble-based intrusion detection system: an efficient and comprehensive approach. Symmetry 13(10), 1764 (2021)","journal-title":"Symmetry"},{"key":"3629_CR16","doi-asserted-by":"crossref","unstructured":"Javadpour, A., Rezaei, S., Li, K.-C., Wang, G.: A scalable feature selection and opinion miner using whale optimization algorithm. In: International Symposium on Signal Processing and Intelligent Recognition Systems, pp. 237\u2013247. Springer, Berlin (2019)","DOI":"10.1007\/978-981-15-4828-4_20"},{"issue":"5","key":"3629_CR17","doi-asserted-by":"publisher","first-page":"111","DOI":"10.3390\/fi13050111","volume":"13","author":"AO Alzahrani","year":"2021","unstructured":"Alzahrani, A.O., Alenazi, M.J.: Designing a network intrusion detection system based on machine learning for software defined networks. Future Internet 13(5), 111 (2021)","journal-title":"Future Internet"},{"key":"3629_CR18","doi-asserted-by":"crossref","unstructured":"Toshniwal, A., Mahesh, K., Jayashree, R.: Overview of anomaly detection techniques in machine learning. In: 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, pp. 808\u2013815 (2020)","DOI":"10.1109\/I-SMAC49090.2020.9243329"},{"issue":"5","key":"3629_CR19","doi-asserted-by":"publisher","first-page":"834","DOI":"10.3390\/pr9050834","volume":"9","author":"MA Khan","year":"2021","unstructured":"Khan, M.A.: Hcrnnids: hybrid convolutional recurrent neural network-based network intrusion detection system. Processes 9(5), 834 (2021)","journal-title":"Processes"},{"key":"3629_CR20","doi-asserted-by":"crossref","unstructured":"Javadpour, A., Abharian, S.K., Wang, G.: Feature selection and intrusion detection in cloud environment based on machine learning algorithms. In: 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA\/IUCC). IEEE, pp. 1417\u20131421 (2017)","DOI":"10.1109\/ISPA\/IUCC.2017.00215"},{"issue":"2","key":"3629_CR21","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TNSM.2021.3078381","volume":"18","author":"I Siniosoglou","year":"2021","unstructured":"Siniosoglou, I., Radoglou-Grammatikis, P., Efstathopoulos, G., Fouliras, P., Sarigiannidis, P.: A unified deep learning anomaly detection and classification approach for smart grid environments. IEEE Trans. Netw. Serv. Manag. 18(2), 1137\u20131151 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"3629_CR22","volume-title":"Journal of Physics Conference Series","author":"M Maithem","year":"2021","unstructured":"Maithem, M., Al-sultany, G.A.: Network intrusion detection system using deep neural networks. In: Journal of Physics Conference Series, vol. 1804. IOP Publishing, New York (2021)"},{"key":"3629_CR23","doi-asserted-by":"publisher","first-page":"107120","DOI":"10.1016\/j.knosys.2021.107120","volume":"226","author":"M Beechey","year":"2021","unstructured":"Beechey, M., Kyriakopoulos, K.G., Lambotharan, S.: Evidential classification and feature selection for cyber-threat hunting. Knowl.-Based Syst. 226, 107120 (2021)","journal-title":"Knowl.-Based Syst."},{"key":"3629_CR24","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1007\/978-981-15-8752-8_64","volume-title":"Advances in Electronics, Communication and Computing","author":"P Sajith","year":"2021","unstructured":"Sajith, P., Nagarajan, G.: Optimized intrusion detection system using computational intelligent algorithm. In: Advances in Electronics, Communication and Computing, pp. 633\u2013639. Springer, Berlin (2021)"},{"key":"3629_CR25","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/978-981-16-4486-3_34","volume-title":"Data Science and Security","author":"R Adhao","year":"2021","unstructured":"Adhao, R., Pachghare, V.: Feature selection based on hall of fame strategy of genetic algorithm for flow-based ids. In: Data Science and Security, pp. 310\u2013316. Springer, Berlin (2021)"},{"key":"3629_CR26","doi-asserted-by":"publisher","first-page":"10421","DOI":"10.1109\/ACCESS.2018.2801792","volume":"6","author":"NR Sabar","year":"2018","unstructured":"Sabar, N.R., Yi, X., Song, A.: A bi-objective hyper-heuristic support vector machines for big data cyber-security. IEEE Access 6, 10421\u201310431 (2018)","journal-title":"IEEE Access"},{"issue":"4","key":"3629_CR27","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s12293-019-00283-4","volume":"11","author":"X Li","year":"2019","unstructured":"Li, X., Xiao, S., Wang, C., Yi, J.: Mathematical modeling and a discrete artificial bee colony algorithm for the welding shop scheduling problem. Memetic Comput. 11(4), 371\u2013389 (2019)","journal-title":"Memetic Comput."},{"issue":"4","key":"3629_CR28","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1016\/j.icte.2021.04.006","volume":"7","author":"T Thilagam","year":"2021","unstructured":"Thilagam, T., Aruna, R.: Intrusion detection for network based cloud computing by custom rc-nn and optimization. ICT Express 7(4), 512\u2013520 (2021)","journal-title":"ICT Express"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03629-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-022-03629-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03629-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T14:19:55Z","timestamp":1677507595000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-022-03629-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,31]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["3629"],"URL":"https:\/\/doi.org\/10.1007\/s10586-022-03629-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,31]]},"assertion":[{"value":"10 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human and animal rights"}}]}}