{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T03:31:14Z","timestamp":1777951874671,"version":"3.51.4"},"reference-count":35,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":31,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.01.074","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:30:19Z","timestamp":1774035019000},"page":"637-644","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A Metaheuristic-Driven Intrusion Detection Model: Dragonfly Algorithm for Feature Selection and XGBoost Classification"],"prefix":"10.1016","volume":"275","author":[{"given":"Ali","family":"Al-allawee","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Awos Kh.","family":"Ali","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marwan S.M.","family":"Al-Dabbagh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sultan","family":"Aldossary","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Neny","family":"Rosmawarni","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.procs.2026.01.074_bib1","doi-asserted-by":"crossref","first-page":"247","DOI":"10.30880\/jscdm.2025.06.01.016","article-title":"Enhancing intrusion detection using hybrid long short-term memory and XGBoost","volume":"6","author":"Alraba\u2019nah","year":"2025","journal-title":"Journal of Soft Computing and Data Mining"},{"key":"10.1016\/j.procs.2026.01.074_bib2","series-title":"Unsupervised learning: Discovering patterns without labels: Health care, e-commerce, and cybersecurity, in: L. Abualigah (Ed.), Mastering the Minds of Machines: A Journey into Deep Learning and AI, 1st Edition, CRC Press, Boca Raton, FL","first-page":"34","author":"Al-Okbi","year":"2025"},{"issue":"4","key":"10.1016\/j.procs.2026.01.074_bib3","doi-asserted-by":"crossref","first-page":"2839","DOI":"10.11591\/ijai.v14.i4.pp2839-2848","article-title":"Improving firewall performance using hybrid of optimization algorithms and decision trees classifier","volume":"14","author":"Abualhaj","year":"2025","journal-title":"IAES International Journal of Artificial Intelligence"},{"issue":"2","key":"10.1016\/j.procs.2026.01.074_bib4","doi-asserted-by":"crossref","first-page":"570","DOI":"10.18196\/jrc.v6i2.23645","article-title":"Adaptive intrusion detection for IoT networks using artificial immune system techniques:A comparative study","volume":"6","author":"Shorman","year":"2025","journal-title":"Journal of Robotics and Control (JRC)"},{"issue":"4","key":"10.1016\/j.procs.2026.01.074_bib5","doi-asserted-by":"crossref","first-page":"25627","DOI":"10.48084\/etasr.11499","article-title":"A deep learning-based intrusion detection system using refined LSTM for DoS attack detection","volume":"15","author":"Hiari","year":"2025","journal-title":"Engineering, Technology and Applied Science Research"},{"issue":"1","key":"10.1016\/j.procs.2026.01.074_bib6","doi-asserted-by":"crossref","first-page":"e70029","DOI":"10.1049\/cmu2.70029","article-title":"Optimizing intrusion detection in wireless sensor networks via the improved chameleon swarm algorithm for feature selection","volume":"19","author":"Abualigah","year":"2025","journal-title":"IET Communications"},{"key":"10.1016\/j.procs.2026.01.074_bib7","doi-asserted-by":"crossref","unstructured":"O. Almomani, A. Alsaaidah, A. A. Abu-Shareha, A. Alzaqebah, M. A. Almaiah, Q. Shambour, Enhance URL defacement attack detection using particle swarm optimization and machine learning, Journal of Computational and Cognitive Engineering (2025).","DOI":"10.47852\/bonviewJCCE52024668"},{"key":"10.1016\/j.procs.2026.01.074_bib8","series-title":"Towards smarter supply chains: Machine learning methodologies for delivery risk assessment, in: Proc. 2025 1st Int. Conf. Computational Intelligence Approaches and Applications (ICCIAA)","first-page":"1","author":"Khaldy","year":"2025"},{"issue":"2","key":"10.1016\/j.procs.2026.01.074_bib9","doi-asserted-by":"crossref","first-page":"3189","DOI":"10.32604\/cmc.2024.057673","article-title":"Classification of cybersecurity threats","volume":"81","author":"Almaiah","year":"2024","journal-title":"vulnerabilities and countermeasures in database systems, Computers, Materials and Continua"},{"key":"10.1016\/j.procs.2026.01.074_bib10","doi-asserted-by":"crossref","first-page":"699","DOI":"10.56294\/dm2025699","article-title":"Evidence detection in cloud forensics: Classifying cyber-attacks in IaaS environments using machine learning","volume":"4","author":"Abuowaida","year":"2025","journal-title":"Data and Metadata"},{"key":"10.1016\/j.procs.2026.01.074_bib11","doi-asserted-by":"crossref","unstructured":"S. A. Alomari, K. Aldiabat, F. A. Hashim, R. A. Zitar, Z. Liu, H. Migdady, G. Hu, A. Smerat, L. Abualigah, Supervised learning: Teaching machines with labeled data, in: L. Abualigah (Ed.), Mastering the Minds of Machines: A Journey into Deep Learning and AI, 1st Edition, CRC Press, Boca Raton, FL, USA, 2025, p. 26.","DOI":"10.1201\/9781003516385-4"},{"key":"10.1016\/j.procs.2026.01.074_bib12","doi-asserted-by":"crossref","first-page":"1594372","DOI":"10.3389\/frai.2025.1594372","article-title":"Deep learning-based feature selection for detection of autism spectrum disorder","volume":"8","author":"Nafisah","year":"2025","journal-title":"Frontiers in Artificial Intelligence"},{"issue":"1","key":"10.1016\/j.procs.2026.01.074_bib13","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/s10791-025-09716-w","article-title":"Enhancing energy efficiency in cloud computing through task scheduling with hybrid cuckoo search and transformer models","volume":"28","author":"Nandagopal","year":"2025","journal-title":"Discover Computing"},{"key":"10.1016\/j.procs.2026.01.074_bib14","doi-asserted-by":"crossref","unstructured":"T. Hamadneh, B. Batiha, O. Al-Refai, I. K. Ibraheem, A. Smerat, Z. Montazeri, M. Dehghani, R. K. Jawad, A. M. Zalzala, A. S. Madhloom, M. A. Ahmed, Farmer and seasons algorithm (FSA): A parameter-free seasonal metaheuristic for global optimization, International Journal of Intelligent Engineering and Systems 18 (6) (2025).","DOI":"10.22266\/ijies2025.0731.59"},{"key":"10.1016\/j.procs.2026.01.074_bib15","doi-asserted-by":"crossref","unstructured":"T. Hamadneh, B. Batiha, O. Al-Refai, A. Smerat, Z. Montazeri, M. Dehghani, W. Aribowo, E. Abdalhussein, R. K. Jawad, A. A. M. M. Al-Salih, M. A. Ahmed, Negotiators algorithm: A novel parameter-free metaheuristic inspired by human negotiation behaviour, International Journal of Intelligent Engineering and Systems 18 (6) (2025).","DOI":"10.22266\/ijies2025.0731.08"},{"issue":"3","key":"10.1016\/j.procs.2026.01.074_bib16","first-page":"1","article-title":"Spam detection boosted by firefly-based feature selection and optimized classifiers","volume":"17","author":"Abualhaj","year":"2025","journal-title":"International Journal of Advances in Soft Computing and Its Applications (IJASCA)"},{"issue":"3","key":"10.1016\/j.procs.2026.01.074_bib17","first-page":"229","article-title":"A paradigm for DoS attack disclosure using machine learning techniques","volume":"13","author":"Mosleh","year":"2022","journal-title":"International Journal of Advanced Computer Science and Applications (IJACSA)"},{"key":"10.1016\/j.procs.2026.01.074_bib18","doi-asserted-by":"crossref","unstructured":"G. Kocher, G. Kumar, Analysis of machine learning algorithms with feature selection for intrusion detection using UNSW-NB15 dataset, SSRN (2021) 3784406doi: 10.2139\/ssrn.3784406.","DOI":"10.2139\/ssrn.3784406"},{"issue":"21","key":"10.1016\/j.procs.2026.01.074_bib19","doi-asserted-by":"crossref","first-page":"3571","DOI":"10.3390\/electronics11213571","article-title":"Performance investigation of principal component analysis for intrusion detection system using different support vector machine kernels","volume":"11","author":"Almaiah","year":"2022","journal-title":"Electronics"},{"key":"10.1016\/j.procs.2026.01.074_bib20","doi-asserted-by":"crossref","first-page":"2227","DOI":"10.1016\/j.procs.2024.04.211","article-title":"Network anomaly detection and performance evaluation of convolutional neural networks on UNSW-NB15 dataset","volume":"235","author":"Vibhute","year":"2024","journal-title":"Procedia Computer Science"},{"key":"10.1016\/j.procs.2026.01.074_bib21","first-page":"1","article-title":"Hybrid decision tree and logistic regression classifier for email spam detection, in: Proc","author":"Wijaya","year":"2016","journal-title":"2016 8th Int. Conf. Information Technology and Electrical Engineering (ICITEE), Yogyakarta, Indonesia"},{"issue":"5","key":"10.1016\/j.procs.2026.01.074_bib22","doi-asserted-by":"crossref","first-page":"607","DOI":"10.12720\/jcm.20.5.607-618","article-title":"Enhanced network communication security through hybrid dragonfly-bat feature selection for intrusion detection","volume":"20","author":"Abualhaj","year":"2025","journal-title":"Journal of Communications"},{"issue":"9","key":"10.1016\/j.procs.2026.01.074_bib23","doi-asserted-by":"crossref","first-page":"3460","DOI":"10.1109\/TFUZZ.2021.3117441","article-title":"Network intrusion detection based on dynamic intuitionistic fuzzy sets","volume":"30","author":"Xie","year":"2022","journal-title":"IEEE Transactions on Fuzzy Systems"},{"issue":"1","key":"10.1016\/j.procs.2026.01.074_bib24","doi-asserted-by":"crossref","first-page":"1940","DOI":"10.1109\/TCE.2023.3319439","article-title":"Leveraging gametic heredity in oversampling techniques to handle class imbalance for efficient cyberthreat detection in IIoT","volume":"70","author":"Verma","year":"2024","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"10.1016\/j.procs.2026.01.074_bib25","doi-asserted-by":"crossref","unstructured":"O. Almomani, A. Arabiat, M. A. Tayeb, M. A. Almaiah, M. Obeidat, T. H. Aldhyani, R. Shehab, M. Rowad, A robust model for android malware detection via ML and DL classifiers, Mesopotamian Journal of Big Data (2025) 261\u2013277 doi: 10.58496\/MJBD\/2025\/017.","DOI":"10.58496\/MJBD\/2025\/017"},{"issue":"0","key":"10.1016\/j.procs.2026.01.074_bib26","first-page":"1","article-title":"Transfer learning-based approach with an ensemble classifier for detecting keylogging attack on the internet of things","volume":"0","author":"Maz","year":"2025","journal-title":"Computers, Materials and Continua\/Computers, Materials and Continua (Print)"},{"key":"10.1016\/j.procs.2026.01.074_bib27","unstructured":"AI-powered autism screening: Leveraging gain ratio feature selection for improved machine learning models (2025)."},{"key":"10.1016\/j.procs.2026.01.074_bib28","doi-asserted-by":"crossref","unstructured":"S. Azeem, S. Javed, I. Naseer, O. Ali, T. M. Ghazal, A new hybrid PSO-HHO wrapper based optimization for feature selection, IEEE Access (2025).","DOI":"10.1109\/ACCESS.2025.3570901"},{"key":"10.1016\/j.procs.2026.01.074_bib29","doi-asserted-by":"crossref","unstructured":"G. Bektemyssova, Z. Montazeri, M. Dehghani, I. K. Ibraheem, A. Smerat, O. P. Malik, A. S. Madhloom, M. A. Ahmed, Antarctic ice worm algorithm: A novel nature-inspired metaheuristic for optimization tasks, International Journal of Intelligent Engineering and Systems 18 (10) (2025).","DOI":"10.22266\/ijies2025.1130.21"},{"key":"10.1016\/j.procs.2026.01.074_bib30","doi-asserted-by":"crossref","unstructured":"G. Bektemyssova, Z. Montazeri, M. Dehghani, I. K. Ibraheem, A. Smerat, F. Werner, A. A. M. M. AL-Salih, M. A. Ahmed, K. Eguchi, Search and rescue algorithm (SRA): A metaheuristic approach for efficient constrained engineering optimization, International Journal of Intelligent Engineering and Systems 18 (10) (2025).","DOI":"10.22266\/ijies2025.1130.39"},{"issue":"11","key":"10.1016\/j.procs.2026.01.074_bib31","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.12720\/jait.16.11.1529-1539","article-title":"Smart firewall for phishing detection powered by bio-inspired algorithms","volume":"16","author":"Abualhaj","year":"2025","journal-title":"Journal of Advances in Information Technology"},{"issue":"4","key":"10.1016\/j.procs.2026.01.074_bib32","doi-asserted-by":"crossref","first-page":"849","DOI":"10.18576\/amis\/190411","article-title":"Fuzzy linear programming in real-world applications: A comparative study of agricultural and financial optimization","volume":"19","author":"Al-Daoud","year":"2025","journal-title":"Applied Mathematics and Information Sciences"},{"key":"10.1016\/j.procs.2026.01.074_bib33","doi-asserted-by":"crossref","unstructured":"R. Alabdallat, M. Hamza, A. Abu-Shareha, Android malware detection using a modified dwarf mongoose algorithm, International Journal of Intelligent Engineering and Systems 18 (8) (2025). doi: 10.22266\/ijies2025.0930.21.","DOI":"10.22266\/ijies2025.0930.21"},{"key":"10.1016\/j.procs.2026.01.074_bib34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.28924\/2291-8639-23-2025-248","article-title":"Enhanced multiclass android malware detection using a modified dwarf mongoose algorithm","volume":"23","author":"Alabdallat","year":"2025","journal-title":"International Journal of Analysis and Applications"},{"issue":"9","key":"10.1016\/j.procs.2026.01.074_bib35","doi-asserted-by":"crossref","first-page":"Art","DOI":"10.1371\/journal.pone.0329765","article-title":"Smart load balancing in cloud computing: Integrating feature selection with advanced deep learning models","volume":"20","author":"Sanjalawe","year":"2025","journal-title":"PLOS One"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000748?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000748?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:15:01Z","timestamp":1777893301000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926000748"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":35,"alternative-id":["S1877050926000748"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.074","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A Metaheuristic-Driven Intrusion Detection Model: Dragonfly Algorithm for Feature Selection and XGBoost Classification","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.074","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}