{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T05:56:50Z","timestamp":1777874210552,"version":"3.51.4"},"reference-count":49,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.neucom.2026.133664","type":"journal-article","created":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T08:53:30Z","timestamp":1776243210000},"page":"133664","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Adaptive PSO-optimized hybrid intrusion detection system for high-density networks (A-PSO-HIDS)"],"prefix":"10.1016","volume":"685","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4311-9610","authenticated-orcid":false,"given":"Dharmendra","family":"Kumar","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neucom.2026.133664_bib0005","article-title":"Intrusion detection in high-density IOT networks using adaptive learning optimization","volume":"642","author":"Abd","year":"2023","journal-title":"Inf. Sci."},{"issue":"1","key":"10.1016\/j.neucom.2026.133664_bib0010","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","article-title":"Survey of intrusion detection systems: techniques, datasets and challenges","volume":"2","author":"Khraisat","year":"2019","journal-title":"Cybersecurity"},{"key":"10.1016\/j.neucom.2026.133664_bib0015","article-title":"An enhanced pso\u2013ga\u2013rf ensemble model for adaptive intrusion detection in heterogeneous networks","volume":"239","author":"Gao","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.neucom.2026.133664_bib0020","first-page":"1","article-title":"Bridging the gap: combining expert guidance and self-learned knowledge for efficient and robust autonomous navigation in complex settings","author":"Kumar","year":"2025","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"issue":"1","key":"10.1016\/j.neucom.2026.133664_bib0025","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","article-title":"Intrusion detection system: a comprehensive review","volume":"36","author":"Liao","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"issue":"6","key":"10.1016\/j.neucom.2026.133664_bib0030","doi-asserted-by":"crossref","first-page":"3753","DOI":"10.1007\/s10586-022-03776-z","article-title":"Internet of Things intrusion detection systems: a comprehensive review and future directions","volume":"26","author":"Heidari","year":"2023","journal-title":"Clust. Comput."},{"issue":"7","key":"10.1016\/j.neucom.2026.133664_bib0035","doi-asserted-by":"crossref","first-page":"751","DOI":"10.3390\/math9070751","article-title":"A consolidated decision tree-based intrusion detection system for binary and multiclass imbalanced datasets","volume":"9","author":"Panigrahi","year":"2021","journal-title":"Mathematics"},{"key":"10.1016\/j.neucom.2026.133664_bib0040","article-title":"Pso-tuned xgboost model for scalable anomaly detection in 5g-enabled IOT networks","volume":"140","author":"Singh","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.neucom.2026.133664_bib0045","article-title":"Adaptive-coefficient pso-based random forest for IOT intrusion detection","volume":"272","author":"Chen","year":"2023","journal-title":"Knowl.-based Syst."},{"key":"10.1016\/j.neucom.2026.133664_bib0050","article-title":"Adaptive particle swarm optimization with inertia weight scheduling for efficient network intrusion detection","volume":"129","author":"Zhang","year":"2022","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.neucom.2026.133664_bib0055","series-title":"Applications of Robotics in Industry Using Advanced Mechanisms: Proceedings of International Conference on Robotics and Its Industrial Applications 2019 1","first-page":"187","article-title":"Significance of particle swarm optimization in intrusion detection: crossing a decade","author":"Nayak","year":"2020"},{"key":"10.1016\/j.neucom.2026.133664_bib0060","first-page":"88234","article-title":"A hybrid pso\u2013svm intrusion detection system for high-speed network traffic","volume":"11","author":"Reddy","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.neucom.2026.133664_bib0065","article-title":"Ensemble learning-based intrusion detection framework for cloud computing environments","volume":"167","author":"Tama","year":"2021","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.neucom.2026.133664_bib0070","first-page":"1","article-title":"Reinforcement imitation learning for reliable and efficient autonomous navigation in complex environments","author":"Kumar","year":"2024","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.neucom.2026.133664_bib0075","article-title":"EvoAAE: evolutionary autoencoders for anomaly detection in non-stationary network traffic","volume":"238","author":"Zeng","year":"2025","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.neucom.2026.133664_bib0080","article-title":"MoARNN-AM: multi-objective adaptive recurrent neural network with attention mechanism for intrusion detection in dynamic network environments","volume":"172","author":"Lu","year":"2025","journal-title":"Neural Netw."},{"key":"10.1016\/j.neucom.2026.133664_bib0085","first-page":"280","article-title":"Pso-driven deep learning framework for network intrusion detection in iot-based environments","volume":"144","author":"Alharbi","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"10.1016\/j.neucom.2026.133664_bib0090","first-page":"78","article-title":"An innovative intrusion detection system for high-density communication networks using artificial intelligence","volume":"59","author":"Sirisha","year":"2023","journal-title":"Eng. Proc."},{"key":"10.1016\/j.neucom.2026.133664_bib0095","doi-asserted-by":"crossref","first-page":"95368","DOI":"10.1109\/ACCESS.2020.2994578","article-title":"Research on anomaly detection in massive multimedia data transmission network based on improved PSO algorithm","volume":"8","author":"Guo","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.neucom.2026.133664_bib0100","doi-asserted-by":"crossref","first-page":"336","DOI":"10.3103\/S1060992X20040104","article-title":"An effective and secure data sharing in p2p network using biased contribution index based rumour riding protocol (bcirr)","volume":"29","author":"Kumar","year":"2020","journal-title":"Opt. Mem. Neural Netw."},{"issue":"32","key":"10.1016\/j.neucom.2026.133664_bib0105","doi-asserted-by":"crossref","first-page":"27381","DOI":"10.1007\/s00521-025-11681-w","article-title":"Advanced detection of cardiac arrhythmias using machine learning algorithms on ECG data","volume":"37","author":"Pandey","year":"2025","journal-title":"Neural Comput. Appl."},{"issue":"3","key":"10.1016\/j.neucom.2026.133664_bib0110","first-page":"808","article-title":"Intrusion detection system using support vector machine (SVM) and particle swarm optimization (PSO)","volume":"4","author":"Manekar","year":"2014","journal-title":"Int. J. Adv. Comput. Res."},{"key":"10.1016\/j.neucom.2026.133664_bib0115","series-title":"2025 IEEE Pune Section International Conference (PuneCon)","first-page":"1","article-title":"Disentangling LLM predictions: a framework for transparent decision-making in NLP","author":"Mishra","year":"2025"},{"issue":"19","key":"10.1016\/j.neucom.2026.133664_bib0120","doi-asserted-by":"crossref","DOI":"10.3390\/su141912828","article-title":"A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things","volume":"14","author":"Chaganti","year":"2022","journal-title":"Sustainability"},{"key":"10.1016\/j.neucom.2026.133664_bib0125","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12046-020-1308-5","article-title":"Particle swarm optimization and feature selection for intrusion detection system","volume":"45","author":"Kunhare","year":"2020","journal-title":"S\u0101dhan\u0101"},{"issue":"3","key":"10.1016\/j.neucom.2026.133664_bib0130","first-page":"1033","article-title":"Optimized feature selection using particle swarm optimization for anomaly detection in cloud computing","volume":"9","author":"Alhayali","year":"2021","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"13","key":"10.1016\/j.neucom.2026.133664_bib0135","doi-asserted-by":"crossref","first-page":"14988","DOI":"10.1007\/s10489-022-03291-z","article-title":"An optimal and secure resource searching algorithm for unstructured mobile peer-to-peer network using particle swarm optimization","volume":"52","author":"Kumar","year":"2022","journal-title":"Appl. Intell."},{"key":"10.1016\/j.neucom.2026.133664_bib0140","first-page":"1","article-title":"An optimal load balancing strategy for p2p network using chicken swarm optimization","author":"Kumar","year":"2022","journal-title":"Peer-to-peer Netw. Appl."},{"issue":"4","key":"10.1016\/j.neucom.2026.133664_bib0145","first-page":"3992","article-title":"A hybrid pso\u2013na\u00efve Bayes model for lightweight intrusion detection in edge computing","volume":"11","author":"Hammood","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.neucom.2026.133664_bib0150","first-page":"18","article-title":"Hybrid pso\u2013svm model for anomaly detection with adaptive feature weighting","volume":"157","author":"Balyan","year":"2022","journal-title":"Pattern Recognit. Lett."},{"key":"10.1016\/j.neucom.2026.133664_bib0155","article-title":"Optimization-driven hybrid IDS based on PSO and decision tree for smart grid security","volume":"40","author":"Donkol","year":"2023","journal-title":"Sustain. Comput. Inform. Syst."},{"key":"10.1016\/j.neucom.2026.133664_bib0160","first-page":"1","article-title":"Applying machine learning models on blockchain platform selection","author":"Dubey","year":"2024","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"10.1016\/j.neucom.2026.133664_bib0165","article-title":"Swarm-intelligence-inspired PSO framework for adaptive IOT intrusion detection","volume":"132","author":"Nasir","year":"2022","journal-title":"Ad Hoc Netw."},{"issue":"6","key":"10.1016\/j.neucom.2026.133664_bib0170","first-page":"621","article-title":"Time and position aware resource search algorithm for the mobile peer-to-peer network using ant colony optimisation","volume":"28","author":"Kumar","year":"2022","journal-title":"Int. J. Commun. Netw. Distrib. Syst."},{"issue":"2","key":"10.1016\/j.neucom.2026.133664_bib0175","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s12065-026-01153-y","article-title":"Etpnav: robust vision-language navigation via online topological mapping","volume":"19","author":"Kumar","year":"2026","journal-title":"Evolutionary Intelligence"},{"key":"10.1016\/j.neucom.2026.133664_bib0180","first-page":"338","article-title":"Deep convolutional neural networks for intrusion detection in networked systems","volume":"457","author":"Lansky","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2026.133664_bib0185","series-title":"Proceedings of the 5th Asian Control Conference (ASCC)","first-page":"815","article-title":"Test of Page-Hinkley, an approach for fault detection in an agro-alimentary production system","volume":"vol. 2","author":"Mouss","year":"2004"},{"key":"10.1016\/j.neucom.2026.133664_bib0190","series-title":"Proceedings of the 7th SIAM International Conference on Data Mining (SDM)","first-page":"443","article-title":"Learning from time-changing data with adaptive windowing","author":"Bifet","year":"2007"},{"key":"10.1016\/j.neucom.2026.133664_bib0195","series-title":"Particle Swarm Optimization","author":"Clerc","year":"2006"},{"key":"10.1016\/j.neucom.2026.133664_bib0200","series-title":"Proceedings of the IEEE International Conference on Evolutionary Computation (ICEC)","first-page":"69","article-title":"A modified particle swarm optimizer","author":"Shi","year":"1998"},{"issue":"6","key":"10.1016\/j.neucom.2026.133664_bib0205","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/S0020-0190(02)00447-7","article-title":"The particle swarm optimization algorithm: convergence analysis and parameter selection","volume":"85","author":"Trelea","year":"2003","journal-title":"Inf. Process. Lett."},{"key":"10.1016\/j.neucom.2026.133664_bib0210","series-title":"Proceedings of the IEEE Congress on Evolutionary Computation (CEC)","first-page":"84","article-title":"Comparing inertia weights and constriction factors in particle swarm optimization","volume":"vol. 1","author":"Eberhart","year":"2000"},{"issue":"1","key":"10.1016\/j.neucom.2026.133664_bib0215","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/4235.985692","article-title":"The particle swarm \u2014 explosion, stability, and convergence in a multidimensional complex space","volume":"6","author":"Clerc","year":"2002","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"6","key":"10.1016\/j.neucom.2026.133664_bib0220","first-page":"571","article-title":"An analysis of particle swarm optimizers using adaptive systems theory","volume":"11","author":"Van den Bergh","year":"2007","journal-title":"IEEE Trans. Evol. Comput."},{"key":"10.1016\/j.neucom.2026.133664_bib0225","series-title":"Proceedings of the IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","first-page":"1","article-title":"A detailed analysis of the KDD CUP 99 data set","author":"Tavallaee","year":"2009"},{"key":"10.1016\/j.neucom.2026.133664_bib0230","series-title":"Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP)","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","author":"Sharafaldin","year":"2018"},{"key":"10.1016\/j.neucom.2026.133664_bib0235","series-title":"Proceedings of the Military Communications and Information Systems Conference (MilCIS)","first-page":"1","article-title":"UNSW-nb15: a comprehensive data set for network intrusion detection systems (UNSW-nb15 network data set)","author":"Moustafa","year":"2015"},{"key":"10.1016\/j.neucom.2026.133664_bib0240","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","article-title":"SMOTE: synthetic minority over-sampling technique","volume":"16","author":"Chawla","year":"2002","journal-title":"J. Artif. Intell. Res."},{"issue":"6","key":"10.1016\/j.neucom.2026.133664_bib0245","doi-asserted-by":"crossref","first-page":"80","DOI":"10.2307\/3001968","article-title":"Individual comparisons by ranking methods","volume":"1","author":"Wilcoxon","year":"1945","journal-title":"Biom. Bull."}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226010611?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226010611?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T19:19:08Z","timestamp":1777576748000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231226010611"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":49,"alternative-id":["S0925231226010611"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133664","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Adaptive PSO-optimized hybrid intrusion detection system for high-density networks (A-PSO-HIDS)","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133664","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"133664"}}