{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T04:01:23Z","timestamp":1774152083843,"version":"3.50.1"},"reference-count":28,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004054","name":"King Abdulaziz University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004054","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021772","name":"Deanship of Scientific Research, University of Jordan","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100021772","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.compeleceng.2026.111109","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:50:17Z","timestamp":1774025417000},"page":"111109","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Intelligent anomaly detection in medical IoT systems using Coral Reefs Optimization and Aquila enhanced CatBoost"],"prefix":"10.1016","volume":"134","author":[{"given":"Brij B.","family":"Gupta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5796-9424","authenticated-orcid":false,"given":"Akshat","family":"Gaurav","sequence":"additional","affiliation":[]},{"given":"Shin-Hung","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Varsha","family":"Arya","sequence":"additional","affiliation":[]},{"given":"Wadee","family":"Alhalabi","sequence":"additional","affiliation":[]},{"given":"Kwok Tai","family":"Chui","sequence":"additional","affiliation":[]},{"given":"Ramakrishnan","family":"Raman","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1656-6397","authenticated-orcid":false,"given":"Nadia","family":"Nedjah","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"22","key":"10.1016\/j.compeleceng.2026.111109_b1","doi-asserted-by":"crossref","first-page":"22095","DOI":"10.1109\/JIOT.2021.3081626","article-title":"Multiagent federated reinforcement learning for secure incentive mechanism in intelligent cyber\u2013physical systems","volume":"9","author":"Xu","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.compeleceng.2026.111109_b2","doi-asserted-by":"crossref","first-page":"71024","DOI":"10.1109\/ACCESS.2024.3402446","article-title":"Xai-iot: an explainable ai framework for enhancing anomaly detection in iot systems","volume":"12","author":"Gummadi","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111109_b3","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/ACCESS.2017.2775038","article-title":"A lightweight authenticated encryption scheme based on chaotic scml for railway cloud service","volume":"6","author":"Zheng","year":"2017","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111109_b4","doi-asserted-by":"crossref","first-page":"9214","DOI":"10.1109\/JIOT.2021.3094295","article-title":"Graph neural networks for anomaly detection in industrial internet of things","volume":"9","author":"Wu","year":"2022","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111109_b5","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1080\/17517575.2019.1644673","article-title":"DNS rule-based schema to botnet detection","volume":"15","author":"Alieyan","year":"2021","journal-title":"Enterp Inf Syst"},{"key":"10.1016\/j.compeleceng.2026.111109_b6","doi-asserted-by":"crossref","first-page":"192","DOI":"10.52783\/jes.700","article-title":"Realtime anomaly detection in healthcare iot: a machine learning-driven security framework","volume":"19","author":"Raje","year":"2024","journal-title":"Jes"},{"key":"10.1016\/j.compeleceng.2026.111109_b7","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2024.109944","article-title":"A hybrid ant lion optimization algorithm based lightweight deep learning framework for cyber attack detection in iot environment","volume":"122","author":"Gupta","year":"2025","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.compeleceng.2026.111109_b8","first-page":"1619","article-title":"Decentralized time-window based real-time anomaly detection mechanism (dtrad) in iot","volume":"8","author":"Sanjith","year":"2019","journal-title":"Int J Recent Technol Eng"},{"key":"10.1016\/j.compeleceng.2026.111109_b9","doi-asserted-by":"crossref","first-page":"2358","DOI":"10.3390\/s23042358","article-title":"An iot enable anomaly detection system for smart city surveillance","volume":"23","author":"Islam","year":"2023","journal-title":"Sensors"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111109_b10","first-page":"d346","article-title":"A methodical analysis of medical internet of things (mIoT) security and privacy in current and future trends","volume":"9","author":"Perwej","year":"2022","journal-title":"J Emerg Technol Innov Res"},{"issue":"21","key":"10.1016\/j.compeleceng.2026.111109_b11","doi-asserted-by":"crossref","first-page":"11645","DOI":"10.3390\/su132111645","article-title":"Security and privacy issues in medical internet of things: overview, countermeasures, challenges and future directions","volume":"13","author":"Elhoseny","year":"2021","journal-title":"Sustainability"},{"key":"10.1016\/j.compeleceng.2026.111109_b12","doi-asserted-by":"crossref","DOI":"10.1016\/j.techfore.2023.122681","article-title":"Evaluation of metaverse traffic safety implementations using fuzzy Einstein based logarithmic methodology of additive weights and topsis method","volume":"194","author":"Deveci","year":"2023","journal-title":"Technol Forecast Soc Change"},{"key":"10.1016\/j.compeleceng.2026.111109_b13","series-title":"Ddos protection strategies : How to safeguard your network against massive attacks","author":"Karthik","year":"2025"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111109_b14","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s43926-024-00060-x","article-title":"Maximizing intrusion detection efficiency for IoT networks using extreme learning machine","volume":"4","author":"Altamimi","year":"2024","journal-title":"Discov Internet Things"},{"key":"10.1016\/j.compeleceng.2026.111109_b15","series-title":"2024 25th international arab conference on information technology","first-page":"1","article-title":"Detecting spam and malware using BERT and LLMs","author":"Altamimi","year":"2024"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111109_b16","first-page":"181","article-title":"A secure privacy preserving and access control scheme for medical internet of things (mIoT) using attribute-based signcryption","volume":"16","author":"Patil","year":"2024","journal-title":"Int J Inf Technol"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111109_b17","first-page":"1","article-title":"Information theory-based ddos attack detection in cloud computing: A systematic survey of approaches, challenges, and future directions","volume":"15","author":"Alarqan","year":"2025","journal-title":"Int J Cloud Appl Comput (IJCAC)"},{"key":"10.1016\/j.compeleceng.2026.111109_b18","series-title":"Botnets fuel large-scale ddos attacks: An in-depth analysis","author":"Gonipalli","year":"2025"},{"key":"10.1016\/j.compeleceng.2026.111109_b19","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101250","article-title":"MIoT-CDPS: Complete decentralized privacy-preserving scheme for medical internet of things","author":"Park","year":"2024","journal-title":"Internet Things"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111109_b20","first-page":"1","article-title":"Mitigating risks in the cloud-based metaverse access control strategies and techniques","volume":"14","author":"Upadhyay","year":"2024","journal-title":"Int J Cloud Appl Comput (IJCAC)"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111109_b21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJSSCI.334711","article-title":"A novel deep federated learning-based model to enhance privacy in critical infrastructure systems","volume":"15","author":"Sharma","year":"2023","journal-title":"Int J Softw Sci Comput Intell (IJSSCI)"},{"key":"10.1016\/j.compeleceng.2026.111109_b22","series-title":"2022 11th international conference on system modeling & advancement in research trends","first-page":"248","article-title":"Security analysis for threats to patient data in the medical internet of things","author":"Rajawat","year":"2022"},{"issue":"21","key":"10.1016\/j.compeleceng.2026.111109_b23","doi-asserted-by":"crossref","first-page":"18477","DOI":"10.1109\/JIOT.2023.3280592","article-title":"An improved AI-based secure M-trust privacy protocol for medical internet of things in smart healthcare system","volume":"10","author":"Sankaran","year":"2023","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111109_b24","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/IOTM.001.2300021","article-title":"Deep learning-based network intrusion detection system for internet of medical things","volume":"6","author":"Ravi","year":"2023","journal-title":"IEEE Internet Things Mag"},{"issue":"4","key":"10.1016\/j.compeleceng.2026.111109_b25","doi-asserted-by":"crossref","first-page":"1072","DOI":"10.3390\/pr11041072","article-title":"Enhanced cyber attack detection process for internet of health things (IoHT) devices using deep neural network","volume":"11","author":"Vijayakumar","year":"2023","journal-title":"Processes"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111109_b26","article-title":"The coral reefs optimization algorithm: a novel metaheuristic for efficiently solving optimization problems","volume":"2014","author":"Salcedo-Sanz","year":"2014","journal-title":"Sci World J"},{"key":"10.1016\/j.compeleceng.2026.111109_b27","doi-asserted-by":"crossref","DOI":"10.1016\/j.cie.2021.107250","article-title":"Aquila optimizer: a novel meta-heuristic optimization algorithm","volume":"157","author":"Abualigah","year":"2021","journal-title":"Comput Ind Eng"},{"key":"10.1016\/j.compeleceng.2026.111109_b28","series-title":"IoT healthcare security dataset","author":"Hussain","year":"2023"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626001813?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626001813?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T02:36:26Z","timestamp":1774146986000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626001813"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":28,"alternative-id":["S0045790626001813"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111109","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Intelligent anomaly detection in medical IoT systems using Coral Reefs Optimization and Aquila enhanced CatBoost","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111109","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111109"}}