{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T03:31:12Z","timestamp":1777951872520,"version":"3.51.4"},"reference-count":44,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T00:00:00Z","timestamp":1769817600000},"content-version":"vor","delay-in-days":30,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.01.062","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:30:19Z","timestamp":1774035019000},"page":"532-540","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Enhancing IoT Security Using Machine Learning for Port Scan Attack Detection"],"prefix":"10.1016","volume":"275","author":[{"given":"Omar","family":"Almomani","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ammar","family":"Almomani","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shahzad","family":"Memon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"7","key":"10.1016\/j.procs.2026.01.062_bib1","doi-asserted-by":"crossref","first-page":"2197","DOI":"10.3390\/s25072197","article-title":"\"Federated Reinforcement Learning-Based Dynamic Resource Allocation and Task Scheduling in Edge for IoT Applications,\"","volume":"25","author":"Mali","year":"2025","journal-title":"Sensors (Basel, Switzerland)"},{"key":"10.1016\/j.procs.2026.01.062_bib2","doi-asserted-by":"crossref","first-page":"101536","DOI":"10.1016\/j.iot.2025.101536","article-title":"\"A crossover-integrated Marine Predator Algorithm for feature selection in intrusion detection systems within IoT environments,\"","volume":"31","author":"Makhadmeh","year":"2025","journal-title":"Internet of Things"},{"key":"10.1016\/j.procs.2026.01.062_bib3","doi-asserted-by":"crossref","unstructured":"M. J. Alenazi, M. A. Al\u2010Khasawneh, S. Rahman, and Z. B. Faheem, \"Deep Reinforcement Learning Based Flow Aware\u2010QoS Provisioning in SD\u2010IoT for Precision Agriculture,\" Computational Intelligence, vol. 41, no. 1, p. e70023, 2025.","DOI":"10.1111\/coin.70023"},{"key":"10.1016\/j.procs.2026.01.062_bib4","first-page":"73","article-title":"\"Advancements in 5G-IoT Technology-Based Healthcare: A Focus on Healthcare Monitoring for Smart Cities,\"","author":"Sharma","year":"2024","journal-title":"Mobile Crowdsensing and Remote Sensing in Smart Cities: Springer"},{"issue":"1","key":"10.1016\/j.procs.2026.01.062_bib5","doi-asserted-by":"crossref","first-page":"319","DOI":"10.30880\/jscdm.2025.06.01.021","article-title":"\"An IoT-Based Active Learning Convolutional Neural Networks Model for Predicting River Water Quality,\"","volume":"6","author":"Ghazal","year":"2025","journal-title":"Journal of Soft Computing and Data Mining"},{"issue":"2","key":"10.1016\/j.procs.2026.01.062_bib6","doi-asserted-by":"crossref","DOI":"10.32604\/cmc.2024.057673","article-title":"\"Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems,\"","volume":"81","author":"Almaiah","year":"2024","journal-title":"Computers, Materials & Continua"},{"issue":"1","key":"10.1016\/j.procs.2026.01.062_bib7","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1186\/s13638-025-02524-2","article-title":"\"Balanced inter-relay charging buffer-aided IOT networks,\"","volume":"2025","author":"Alkhawatrah","year":"2025","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"8","key":"10.1016\/j.procs.2026.01.062_bib8","first-page":"184","article-title":"\"An efficient design of RPL objective function for routing in internet of things using fuzzy logic,\"","volume":"10","author":"Saaidah","year":"2019","journal-title":"Int. J. Adv. Comput. Sci. Appl"},{"issue":"1","key":"10.1016\/j.procs.2026.01.062_bib9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.63180\/jcsra.thestap.2025.1.1","article-title":"\"Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions,\"","volume":"1","author":"Almuqren","year":"2025","journal-title":"Journal of Cyber Security and Risk Auditing"},{"issue":"1","key":"10.1016\/j.procs.2026.01.062_bib10","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1186\/s42162-025-00563-z","article-title":"\"Sensorless real-time solar irradiance prediction in grid-connected PV systems using PSO-MPPT and IoT-enabled monitoring,\"","volume":"8","author":"Mohammed Nafa","year":"2025","journal-title":"Energy Informatics"},{"issue":"8938","key":"10.1016\/j.procs.2026.01.062_bib11","first-page":"8938","article-title":"\"Artificial intelligence-driven method for the discovery and prevention of distributed denial of service attacks,\"","volume":"2252","author":"ALDabbas","year":"2025","journal-title":"Int J Artif Intell ISSN"},{"issue":"1","key":"10.1016\/j.procs.2026.01.062_bib12","doi-asserted-by":"crossref","first-page":"3","DOI":"10.63180\/jcsra.thestap.2023.1.2","article-title":"\"Towards Trustworthy IoT Systems: Cybersecurity Threats, Frameworks, and Future Directions,\"","volume":"2023","author":"Alsalem","year":"2023","journal-title":"Journal of Cyber Security and Risk Auditing"},{"issue":"4","key":"10.1016\/j.procs.2026.01.062_bib13","doi-asserted-by":"crossref","first-page":"222","DOI":"10.63180\/jcsra.thestap.2025.4.3","article-title":"\"A Novel Permissioned Blockchain Approach for Scalable and Privacy-Preserving IoT Authentication,\"","volume":"2025","author":"Addula","year":"2025","journal-title":"Journal of Cyber Security and Risk Auditing"},{"key":"10.1016\/j.procs.2026.01.062_bib14","doi-asserted-by":"crossref","DOI":"10.1201\/9781003516385-19","article-title":"\"The Intersection of AI and the Internet of Things (IoT): Transforming Data into Intelligence,\"","volume":"149","author":"Al-Okbi","year":"2025","journal-title":"Mastering the Minds of Machines: A Journey into Deep Learning and AI"},{"issue":"8","key":"10.1016\/j.procs.2026.01.062_bib15","article-title":"\"Android Malware Detection Using a Modified Dwarf Mongoose Algorithm,\"","volume":"18","author":"Alabdallat","year":"2025","journal-title":"International Journal of Intelligent Engineering & Systems"},{"key":"10.1016\/j.procs.2026.01.062_bib16","doi-asserted-by":"crossref","first-page":"248","DOI":"10.28924\/2291-8639-23-2025-248","article-title":"\"Enhanced Multiclass Android Malware Detection Using a Modified Dwarf Mongoose Algorithm,\"","volume":"23","author":"Alabdallat","year":"2025","journal-title":"International Journal of Analysis and Applications"},{"key":"10.1016\/j.procs.2026.01.062_bib17","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1201\/9781003516385-25","article-title":"\"Future Directions in Artificial Intelligence: Trends, Challenges, and Human Implications,\"","author":"Abualigah","year":"2025","journal-title":"Mastering the Minds of Machines: CRC Press"},{"issue":"6","key":"10.1016\/j.procs.2026.01.062_bib18","doi-asserted-by":"crossref","first-page":"317","DOI":"10.3390\/a18060317","article-title":"\"AI for Data Quality Auditing: Detecting Mislabeled Work Zone Crashes Using Large Language Models,\"","volume":"18","author":"Jaradat","year":"2025","journal-title":"Algorithms"},{"issue":"3","key":"10.1016\/j.procs.2026.01.062_bib19","doi-asserted-by":"crossref","first-page":"2055","DOI":"10.11591\/eei.v14i3.9095","article-title":"\"Driving behavior analytics: an intelligent system based on machine learning and data mining techniques,\"","volume":"14","author":"Arabiat","year":"2025","journal-title":"Bulletin of Electrical Engineering and Informatics"},{"key":"10.1016\/j.procs.2026.01.062_bib20","doi-asserted-by":"crossref","unstructured":"S. Abuowaida et al., \"Evidence Detection in Cloud Forensics: Classifying Cyber-Attacks in IaaS Environments using machine learning,\" 2025.","DOI":"10.56294\/dm2025699"},{"key":"10.1016\/j.procs.2026.01.062_bib21","doi-asserted-by":"crossref","first-page":"261","DOI":"10.58496\/MJBD\/2025\/017","article-title":"\"A Robust Model for Android Malware Detection via ML and DL classifiers,\"","volume":"2025","author":"Almomani","year":"2025","journal-title":"Mesopotamian Journal of Big Data"},{"issue":"3","key":"10.1016\/j.procs.2026.01.062_bib22","doi-asserted-by":"crossref","DOI":"10.47852\/bonviewJCCE52024668","article-title":"\"Enhance URL Defacement Attack Detection Using Particle Swarm Optimization and Machine Learning,\"","volume":"4","author":"Almomani","year":"2025","journal-title":"Journal of Computational and Cognitive Engineering"},{"issue":"9","key":"10.1016\/j.procs.2026.01.062_bib23","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/s10462-025-11285-9","article-title":"\"Generative AI: a double-edged sword in the cyber threat landscape,\"","volume":"58","author":"Ibrar","year":"2025","journal-title":"Artificial Intelligence Review"},{"issue":"2","key":"10.1016\/j.procs.2026.01.062_bib24","article-title":"\"Web Phishing Detection and Awareness Utilizing Hybrid Machine Learning Algorithms,\"","volume":"17","author":"Alheyasat","year":"2025","journal-title":"International Journal of Advances in Soft Computing & Its Applications"},{"issue":"4","key":"10.1016\/j.procs.2026.01.062_bib25","doi-asserted-by":"crossref","first-page":"24354","DOI":"10.48084\/etasr.10919","article-title":"\"Enhancing Intrusion Detection System Performance Using a Hybrid of Harris Hawks and Whale Optimization Algorithms,\"","volume":"15","author":"Abualhaj","year":"2025","journal-title":"Engineering, Technology & Applied Science Research"},{"key":"10.1016\/j.procs.2026.01.062_bib26","series-title":"\"Phishing Attack Detection Using Whale Optimization Algorithm-Based Feature Selection,\" in 2025 5th International Conference on Emerging Smart Technologies and Applications (eSmarTA)","first-page":"1","author":"Abualhaj","year":"2025"},{"issue":"2","key":"10.1016\/j.procs.2026.01.062_bib27","doi-asserted-by":"crossref","first-page":"3709--3737","DOI":"10.32604\/cmc.2025.066797","article-title":"\"Narwhal Optimizer: A Nature-Inspired Optimization Algorithm for Solving Complex Optimization Problems,\"","volume":"85","author":"Masadeh","year":"2025","journal-title":"Computers, Materials & Continua"},{"issue":"2","key":"10.1016\/j.procs.2026.01.062_bib28","article-title":"\"Hybrid Supervised Machine Learning-based Intrusion Detection System of Internet of Things,\"","volume":"16","author":"Shenify","year":"2024","journal-title":"International Journal of Advances in Soft Computing & Its Applications"},{"key":"10.1016\/j.procs.2026.01.062_bib29","series-title":"\"Port-scanning attack detection using supervised machine learning classifiers,\" in 2021 1st International Conference on Emerging Smart Technologies and Applications (eSmarTA)","first-page":"1","author":"Algaolahi","year":"2021"},{"key":"10.1016\/j.procs.2026.01.062_bib30","series-title":"\"Detecting port scan attacks using logistic regression,\" in 2021 4th International symposium on advanced electrical and communication technologies (ISAECT)","first-page":"1","author":"Al-Haija","year":"2021"},{"issue":"1","key":"10.1016\/j.procs.2026.01.062_bib31","doi-asserted-by":"crossref","first-page":"215","DOI":"10.22581\/muet1982.2101.19","article-title":"\"Machine learning classification of port scanning and DDoS attacks: A comparative analysis,\"","volume":"40","author":"Aamir","year":"2021","journal-title":"Mehran University Research Journal Of Engineering & Technology"},{"key":"10.1016\/j.procs.2026.01.062_bib32","series-title":"\"Securing the internet of things using AI-enabled detection of attacks via port scans in IoT networks,\" in 2023 International Conference on Power Energy, Environment & Intelligent Control (PEEIC)","first-page":"348","author":"Kumari","year":"2023"},{"key":"10.1016\/j.procs.2026.01.062_bib33","series-title":"\"Enhancing Port Scan and DDoS attack detection using genetic and machine learning algorithms,\" in 2024 7th Conference on Cloud and Internet of Things (CIoT)","first-page":"1","author":"Altidor","year":"2024"},{"key":"10.1016\/j.procs.2026.01.062_bib34","series-title":"\"Port Scanning Detection Method Based on Ensemble Learning,\" in 2024 7th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)","first-page":"163","author":"Yan","year":"2024"},{"issue":"2","key":"10.1016\/j.procs.2026.01.062_bib35","doi-asserted-by":"crossref","first-page":"17","DOI":"10.52866\/2788-7421.1258","article-title":"\"Intrusion Detection System for IoT Based on Modified Random Forest Algorithm,\"","volume":"6","author":"Akif","year":"2025","journal-title":"Iraqi Journal for Computer Science and Mathematics"},{"issue":"4","key":"10.1016\/j.procs.2026.01.062_bib36","doi-asserted-by":"crossref","first-page":"1850","DOI":"10.47738\/jads.v5i4.374","article-title":"\"ARP spoofing attack detection model in IoT network using machine learning: Complexity vs. accuracy,\"","volume":"5","author":"Alsaaidah","year":"2024","journal-title":"Journal of Applied Data Sciences"},{"issue":"3","key":"10.1016\/j.procs.2026.01.062_bib37","article-title":"\"An Enhanced Intrusion Detection System for Protecting HTTP Services from Attacks,\"","volume":"15","author":"Al-Mimi","year":"2023","journal-title":"International Journal of Advances in Soft Computing & Its Applications"},{"key":"10.1016\/j.procs.2026.01.062_bib38","doi-asserted-by":"crossref","unstructured":"Y. Sanjalawe, S. Fraihat, S. Al-E\u2019mari, M. Abualhaj, S. Makhadmeh, and E. Alzubi, \"Smart load balancing in cloud computing: Integrating feature selection with advanced deep learning models,\" Plos one, vol. 20, no. 9, p. e0329765, 2025.","DOI":"10.1371\/journal.pone.0329765"},{"issue":"5","key":"10.1016\/j.procs.2026.01.062_bib39","article-title":"\"Enhanced Network Communication Security Through Hybrid Dragonfly-Bat Feature Selection for Intrusion Detection,\"","volume":"20","author":"Abualhaj","year":"2025","journal-title":"Journal of Communications"},{"issue":"1","key":"10.1016\/j.procs.2026.01.062_bib40","doi-asserted-by":"crossref","first-page":"197","DOI":"10.11591\/ijeecs.v37.i1.pp197-205","article-title":"\"Enhancing malware detection through self-union feature selection using gray wolf optimizer,\"","volume":"37","author":"Abualhaj","year":"2025","journal-title":"Indonesian Journal of Electrical Engineering and Computer Science"},{"issue":"3","key":"10.1016\/j.procs.2026.01.062_bib41","doi-asserted-by":"crossref","first-page":"1442","DOI":"10.3906\/elk-1907-84","article-title":"\"Comparative analysis of classification techniques for network fault management,\"","volume":"28","author":"Madi","year":"2020","journal-title":"Turkish Journal of Electrical Engineering and Computer Sciences"},{"issue":"1","key":"10.1016\/j.procs.2026.01.062_bib42","article-title":"\"Analysis and Comparison of Raw Network Packet Datasets Using Machine Learning Classification and Grey Wolf Optimization,\"","volume":"17","author":"Al-Ofeishat","year":"2025","journal-title":"International Journal of Advances in Soft Computing & Its Applications"},{"issue":"3","key":"10.1016\/j.procs.2026.01.062_bib43","doi-asserted-by":"crossref","first-page":"5287","DOI":"10.32604\/cmc.2025.068257","article-title":"\"Transfer Learning-Based Approach with an Ensemble Classifier for Detecting Keylogging Attack on the Internet of Things,\"","volume":"85","author":"Maz","year":"2025","journal-title":"Computers, Materials and Continua"},{"issue":"10","key":"10.1016\/j.procs.2026.01.062_bib44","doi-asserted-by":"crossref","first-page":"1716","DOI":"10.3390\/sym17101716","article-title":"\"Quantum-Inspired Hybrid Metaheuristic Feature Selection with SHAP for Optimized and Explainable Spam Detection,\"","volume":"17","author":"Shambour","year":"2025","journal-title":"Symmetry"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000621?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000621?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:15:25Z","timestamp":1777893325000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926000621"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":44,"alternative-id":["S1877050926000621"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.062","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Enhancing IoT Security Using Machine Learning for Port Scan Attack Detection","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.062","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}