{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T03:31:12Z","timestamp":1777951872529,"version":"3.51.4"},"reference-count":49,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T00:00:00Z","timestamp":1769817600000},"content-version":"vor","delay-in-days":30,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.01.061","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:30:19Z","timestamp":1774035019000},"page":"523-531","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["ML-Based Detection of ARP Spoofing Attacks in Internet-of-Things Environments: Comparative Study"],"prefix":"10.1016","volume":"275","author":[{"given":"Omar","family":"Almomani","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tariq","family":"Alwada\u2019n","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Omar Husain","family":"Al-Tarawneh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"16","key":"10.1016\/j.procs.2026.01.061_bib1","doi-asserted-by":"crossref","first-page":"7194","DOI":"10.3390\/s23167194","article-title":"\"Unleashing the power of IoT: A comprehensive review of IoT applications and future prospects in healthcare, agriculture, smart homes, smart cities, and industry 4.0,\"","volume":"23","author":"Chataut","year":"2023","journal-title":"Sensors"},{"issue":"8","key":"10.1016\/j.procs.2026.01.061_bib2","first-page":"184","article-title":"\"An efficient design of RPL objective function for routing in internet of things using fuzzy logic,\"","volume":"10","author":"Saaidah","year":"2019","journal-title":"Int. J. Adv. Comput. Sci. Appl"},{"issue":"3","key":"10.1016\/j.procs.2026.01.061_bib3","article-title":"\"Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics,\"","volume":"22","author":"Al-Mousa","year":"2025","journal-title":"International Arab Journal of Information Technology (IAJIT)"},{"issue":"2","key":"10.1016\/j.procs.2026.01.061_bib4","doi-asserted-by":"crossref","DOI":"10.32604\/cmc.2024.057673","article-title":"\"Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems,\"","volume":"81","author":"Almaiah","year":"2024","journal-title":"Computers, Materials & Continua"},{"key":"10.1016\/j.procs.2026.01.061_bib5","series-title":"\"Utilizing Deep Learning, Ensemble Learning, and Transfer Learning for Enhancing Security in Internet of Things Networks through Intrusion Detection Systems,\" in 2025 12th International Conference on Information Technology (ICIT)","first-page":"73","author":"Maz","year":"2025"},{"key":"10.1016\/j.procs.2026.01.061_bib6","doi-asserted-by":"crossref","DOI":"10.1002\/9781119905202.ch15","article-title":"\"Securing IoT Devices Against MITM and DoS Attacks: An Analysis,\"","volume":"237-249","author":"Tyagi","year":"2024","journal-title":"Reshaping Intelligent Business and Industry: Convergence of AI and IoT at the Cutting Edge"},{"issue":"6","key":"10.1016\/j.procs.2026.01.061_bib7","doi-asserted-by":"crossref","first-page":"3036","DOI":"10.3390\/app15063036","article-title":"\"Comprehensive Study of IoT Vulnerabilities and Countermeasures,\"","volume":"15","author":"Coston","year":"2025","journal-title":"Applied Sciences"},{"issue":"1","key":"10.1016\/j.procs.2026.01.061_bib8","doi-asserted-by":"crossref","DOI":"10.14569\/IJACSA.2024.0150125","article-title":"\"Performance Evaluation of Machine Learning Classifiers for Predicting Denial-of-Service Attack in Internet of Things,\"","volume":"15","author":"Almomani","year":"2024","journal-title":"International Journal of Advanced Computer Science & Applications"},{"issue":"6","key":"10.1016\/j.procs.2026.01.061_bib9","doi-asserted-by":"crossref","first-page":"3753","DOI":"10.1007\/s10586-022-03776-z","article-title":"\"Internet of Things intrusion detection systems: a comprehensive review and future directions,\"","volume":"26","author":"Heidari","year":"2023","journal-title":"Cluster Computing"},{"key":"10.1016\/j.procs.2026.01.061_bib10","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1201\/9781003516385-6","article-title":"\"Reinforcement Learning: Machines that Learn by Doing,\"","volume":"7","author":"Almomani","year":"2025","journal-title":"Mastering the Minds of Machines: A Journey into Deep Learning and AI"},{"issue":"6","key":"10.1016\/j.procs.2026.01.061_bib11","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1007\/s42979-025-04158-z","article-title":"\"Enhancing Requirements Classification Using Machine Learning Techniques,\"","volume":"6","author":"Qaddara","year":"2025","journal-title":"SN Computer Science"},{"key":"10.1016\/j.procs.2026.01.061_bib12","doi-asserted-by":"crossref","first-page":"261","DOI":"10.58496\/MJBD\/2025\/017","article-title":"\"A Robust Model for Android Malware Detection via ML and DL classifiers,\"","volume":"2025","author":"Almomani","year":"2025","journal-title":"Mesopotamian Journal of Big Data"},{"key":"10.1016\/j.procs.2026.01.061_bib13","doi-asserted-by":"crossref","unstructured":"Y. Sanjalawe, S. Fraihat, S. Al-E\u2019mari, M. Abualhaj, S. Makhadmeh, and E. Alzubi, \"Smart load balancing in cloud computing: Integrating feature selection with advanced deep learning models,\" Plos one, vol. 20, no. 9, p. e0329765, 2025.","DOI":"10.1371\/journal.pone.0329765"},{"key":"10.1016\/j.procs.2026.01.061_bib14","doi-asserted-by":"crossref","DOI":"10.1201\/9781003516385-4","article-title":"\"Supervised Learning: Teaching Machines with Labeled Data,\"","volume":"26","author":"Alomari","year":"2025","journal-title":"Mastering the Minds of Machines: A Journey into Deep Learning and AI"},{"issue":"2","key":"10.1016\/j.procs.2026.01.061_bib15","doi-asserted-by":"crossref","first-page":"570","DOI":"10.18196\/jrc.v6i2.23645","article-title":"\"Adaptive Intrusion Detection for IoT Networks using Artificial Immune System Techniques: A Comparative Study,\"","volume":"6","author":"Shorman","year":"2025","journal-title":"Journal of Robotics and Control (JRC)"},{"issue":"11","key":"10.1016\/j.procs.2026.01.061_bib16","doi-asserted-by":"crossref","first-page":"3341","DOI":"10.3390\/s25113341","article-title":"\"Machine Learning-Based Security Solutions for IoT Networks: A Comprehensive Survey,\"","volume":"25","author":"Alfahaid","year":"2025","journal-title":"Sensors"},{"issue":"2","key":"10.1016\/j.procs.2026.01.061_bib17","article-title":"\"A Comprehensive Machine Learning Approach for Email and URL Threat Detection: Using Feature Importance Analysis,\"","volume":"17","author":"Kharabsheh","year":"2025","journal-title":"International Journal of Advances in Soft Computing & Its Applications"},{"key":"10.1016\/j.procs.2026.01.061_bib18","series-title":"\"Forensic Analysis of an IoT ARP Spoofing Attack,\" in 2024 12th International Symposium on Digital Forensics and Security (ISDFS)","first-page":"1","author":"Friedl","year":"2024"},{"issue":"7","key":"10.1016\/j.procs.2026.01.061_bib19","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/s10462-025-11176-z","article-title":"\"Challenges in detecting security threats in WoT: a systematic literature review,\"","volume":"58","author":"Sardar","year":"2025","journal-title":"Artificial Intelligence Review"},{"key":"10.1016\/j.procs.2026.01.061_bib20","series-title":"\"Optimized Feature Selection for Enhanced Network Attack Detection Using Bat Algorithm,\" in 2025 15th International Conference on Electrical Engineering (ICEENG)","first-page":"1","author":"Abualhaj","year":"2025"},{"key":"10.1016\/j.procs.2026.01.061_bib21","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2025.3570901","article-title":"\"A New Hybrid PSO-HHO Wrapper Based Optimization For Feature Selection,\"","author":"Azeem","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2026.01.061_bib22","series-title":"\"Spam Feature Selection Using Harris Hawks Optimization Algorithm,\" in 2025 5th International Conference on Emerging Smart Technologies and Applications (eSmarTA)","first-page":"1","author":"Alsaaidah","year":"2025"},{"issue":"10","key":"10.1016\/j.procs.2026.01.061_bib23","doi-asserted-by":"crossref","first-page":"1716","DOI":"10.3390\/sym17101716","article-title":"\"Quantum-Inspired Hybrid Metaheuristic Feature Selection with SHAP for Optimized and Explainable Spam Detection,\"","volume":"17","author":"Shambour","year":"2025","journal-title":"Symmetry"},{"issue":"3","key":"10.1016\/j.procs.2026.01.061_bib24","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s12065-025-01054-6","article-title":"\"Recent advances in secretary bird optimization algorithm, its variants and applications,\"","volume":"18","author":"Sanjalawe","year":"2025","journal-title":"Evolutionary Intelligence"},{"issue":"11","key":"10.1016\/j.procs.2026.01.061_bib25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10462-025-11360-1","article-title":"\"Ameliorated elk herd optimizer for global optimization and engineering problems,\"","volume":"58","author":"Al-Betar","year":"2025","journal-title":"Artificial Intelligence Review"},{"issue":"2","key":"10.1016\/j.procs.2026.01.061_bib26","article-title":"\"Hybrid Supervised Machine Learning-based Intrusion Detection System of Internet of Things,\"","volume":"16","author":"Shenify","year":"2024","journal-title":"International Journal of Advances in Soft Computing & Its Applications"},{"issue":"3","key":"10.1016\/j.procs.2026.01.061_bib27","article-title":"\"An Optimized Network Intrusion Detection System for Attack Detection based on Supervised Machine Learning Models in an Internet-of-Things Environment,\"","volume":"15","author":"Alhomoud","year":"2023","journal-title":"International Journal of Advances in Soft Computing & Its Applications"},{"key":"10.1016\/j.procs.2026.01.061_bib28","doi-asserted-by":"crossref","unstructured":"L. Abualigah et al., \"Optimizing Intrusion Detection in Wireless Sensor Networks via the Improved Chameleon Swarm Algorithm for Feature Selection,\" IET Communications, vol. 19, no. 1, p. e70029, 2025.","DOI":"10.1049\/cmu2.70029"},{"issue":"8","key":"10.1016\/j.procs.2026.01.061_bib29","article-title":"\"Android Malware Detection Using a Modified Dwarf Mongoose Algorithm,\"","volume":"18","author":"Alabdallat","year":"2025","journal-title":"International Journal of Intelligent Engineering & Systems"},{"issue":"1","key":"10.1016\/j.procs.2026.01.061_bib30","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1177\/09266801241295886","article-title":"\"Identify spoofing attacks in Internet of Things (IoT) environments using machine learning algorithms,\"","volume":"31","author":"Vajrobol","year":"2025","journal-title":"Journal of High Speed Networks"},{"key":"10.1016\/j.procs.2026.01.061_bib31","doi-asserted-by":"crossref","DOI":"10.1201\/9781003516385-2","article-title":"\"The Evolution of Machine Learning: From Traditional Algorithms to Deep Learning Paradigms,\"","volume":"9","author":"Alomari","year":"2025","journal-title":"Mastering the Minds of Machines: A Journey into Deep Learning and AI"},{"key":"10.1016\/j.procs.2026.01.061_bib32","series-title":"\"Predicting ARP spoofing with machine learning,\" in 2022 international conference on emerging trends in smart technologies (ICETST)","first-page":"1","author":"Usmani","year":"2022"},{"key":"10.1016\/j.procs.2026.01.061_bib33","series-title":"\"Defending ARP spoofing-based MitM attack using machine learning and device profiling,\" in 2022 international conference on computing, communication, and intelligent systems (ICCCIS)","first-page":"978","author":"Prasad","year":"2022"},{"issue":"4","key":"10.1016\/j.procs.2026.01.061_bib34","doi-asserted-by":"crossref","first-page":"1850","DOI":"10.47738\/jads.v5i4.374","article-title":"\"ARP spoofing attack detection model in IoT network using machine learning: Complexity vs. accuracy,\"","volume":"5","author":"Alsaaidah","year":"2024","journal-title":"Journal of Applied Data Sciences"},{"issue":"2","key":"10.1016\/j.procs.2026.01.061_bib35","doi-asserted-by":"crossref","first-page":"3709--3737","DOI":"10.32604\/cmc.2025.066797","article-title":"\"Narwhal Optimizer: A Nature-Inspired Optimization Algorithm for Solving Complex Optimization Problems,\"","volume":"85","author":"Masadeh","year":"2025","journal-title":"Computers, Materials & Continua"},{"issue":"5","key":"10.1016\/j.procs.2026.01.061_bib36","article-title":"\"Detecting and preventing arp spoofing attacks using real-time data analysis and machine learning,\"","volume":"12","author":"Kumar","year":"2024","journal-title":"International Journal of Innovative Research in Computer Science and Technology"},{"key":"10.1016\/j.procs.2026.01.061_bib37","series-title":"\"Machine Learning-Based Detection of ARP Spoofing Attacks Using Behavioral Analysis,\" in 2025 International Research Conference on Smart Computing and Systems Engineering (SCSE)","first-page":"1","author":"Sumanasekara","year":"2022"},{"key":"10.1016\/j.procs.2026.01.061_bib38","doi-asserted-by":"crossref","unstructured":"I. Ullah and Q. H. Mahmoud, \"A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks,\" Cham, 2020: Springer International Publishing, in Advances in Artificial Intelligence, pp. 508-520, doi: https:\/\/doi.org\/10.1007\/978-3-030-47358-7_52.","DOI":"10.1007\/978-3-030-47358-7_52"},{"issue":"3","key":"10.1016\/j.procs.2026.01.061_bib39","article-title":"\"Investigation of Data Balancing Techniques for Diabetes Prediction,\"","volume":"18","author":"Abu-Shareha","year":"2025","journal-title":"International Journal of Intelligent Engineering & Systems"},{"issue":"4","key":"10.1016\/j.procs.2026.01.061_bib40","article-title":"\"Enhancing Malware Detection through Self-Union Feature Selection Using Firefly Algorithm with Random Forest Classification,\"","volume":"17","author":"Abualhaj","year":"2024","journal-title":"International Journal of Intelligent Engineering & Systems"},{"issue":"3","key":"10.1016\/j.procs.2026.01.061_bib41","doi-asserted-by":"crossref","DOI":"10.47852\/bonviewJCCE52024668","article-title":"\"Enhance URL Defacement Attack Detection Using Particle Swarm Optimization and Machine Learning,\"","volume":"4","author":"Almomani","year":"2025","journal-title":"Journal of Computational and Cognitive Engineering"},{"key":"10.1016\/j.procs.2026.01.061_bib42","series-title":"\"Enhancing Intrusion Detection Using Dragonfly Algorithm-Based Feature Selection and Extra Trees for Classification,\" in 2025 5th International Conference on Emerging Smart Technologies and Applications (eSmarTA)","first-page":"1","author":"Abualhaj","year":"2022"},{"key":"10.1016\/j.procs.2026.01.061_bib43","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2025.3561193","article-title":"\"A Novel Hybrid Approach to Forecasting Crude Oil Prices Using Local Mean Decomposition, ARIMA, and XGBoost,\"","author":"Nasir","year":"2025","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.procs.2026.01.061_bib44","doi-asserted-by":"crossref","first-page":"247","DOI":"10.30880\/jscdm.2025.06.01.016","article-title":"\"Enhancing Intrusion Detection Using Hybrid Long Short-Term Memory and XGBoost,\"","volume":"6","author":"Alraba\u2019nah","year":"2025","journal-title":"Journal of Soft Computing and Data Mining"},{"issue":"3","key":"10.1016\/j.procs.2026.01.061_bib45","doi-asserted-by":"crossref","first-page":"5287","DOI":"10.32604\/cmc.2025.068257","article-title":"\"Transfer Learning-Based Approach with an Ensemble Classifier for Detecting Keylogging Attack on the Internet of Things,\"","volume":"85","author":"Maz","year":"2025","journal-title":"Computers, Materials and Continua"},{"issue":"12","key":"10.1016\/j.procs.2026.01.061_bib46","doi-asserted-by":"crossref","first-page":"10071","DOI":"10.1007\/s11042-024-18914-5","article-title":"\"Enhancing malware detection performance: leveraging K-nearest neighbors with firefly optimization algorithm,\"","volume":"84","author":"Al Saaidah","year":"2025","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"10.1016\/j.procs.2026.01.061_bib47","doi-asserted-by":"crossref","first-page":"1442","DOI":"10.3906\/elk-1907-84","article-title":"\"Comparative analysis of classification techniques for network fault management,\"","volume":"28","author":"Madi","year":"2020","journal-title":"Turkish Journal of Electrical Engineering and Computer Sciences"},{"key":"10.1016\/j.procs.2026.01.061_bib48","doi-asserted-by":"crossref","first-page":"248","DOI":"10.28924\/2291-8639-23-2025-248","article-title":"\"Enhanced Multiclass Android Malware Detection Using a Modified Dwarf Mongoose Algorithm,\"","volume":"23","author":"Alabdallat","year":"2025","journal-title":"International Journal of Analysis and Applications"},{"issue":"5","key":"10.1016\/j.procs.2026.01.061_bib49","article-title":"\"Enhanced Network Communication Security Through Hybrid Dragonfly-Bat Feature Selection for Intrusion Detection,\"","volume":"20","author":"Abualhaj","year":"2025","journal-title":"Journal of Communications"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S187705092600061X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S187705092600061X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:16:23Z","timestamp":1777893383000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S187705092600061X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":49,"alternative-id":["S187705092600061X"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.061","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"ML-Based Detection of ARP Spoofing Attacks in Internet-of-Things Environments: Comparative Study","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.061","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}