{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:24:05Z","timestamp":1761402245837},"reference-count":35,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cybernetics and Systems"],"published-print":{"date-parts":[[2024,1,2]]},"DOI":"10.1080\/01969722.2022.2088450","type":"journal-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T11:31:05Z","timestamp":1657193465000},"page":"107-123","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["Network Intrusion Detection and Mitigation Using Hybrid Optimization Integrated Deep Q Network"],"prefix":"10.1080","volume":"55","author":[{"given":"G. S. R.","family":"Emil Selvan","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Thiagarajar College of Engineering, Madurai, India"}]},{"given":"T.","family":"Daniya","sequence":"additional","affiliation":[{"name":"Department of Information Technology, GMR Institute of Technology, Rajam, India"}]},{"given":"J. P.","family":"Ananth","sequence":"additional","affiliation":[{"name":"Department of CSE, Sri Krishna College of Engineering and Technology, Coimbatore, India"}]},{"given":"K.","family":"Suresh Kumar","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Saveetha Engineering College, Chennai, India"}]}],"member":"301","published-online":{"date-parts":[[2022,7,7]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/computers11030041"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym12061046"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.016113"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/math10060999"},{"key":"e_1_3_2_6_1","first-page":"4","article-title":"Intrusion detection system for wireless mesh networks via improved whale optimization","volume":"3","author":"Anand S.","year":"2020","unstructured":"Anand, S. 2020. Intrusion detection system for wireless mesh networks via improved whale optimization. Journal of Networking and Communication Systems 3:4.","journal-title":"Journal of Networking and Communication Systems"},{"key":"e_1_3_2_7_1","doi-asserted-by":"crossref","unstructured":"Bahashwan A. A. M. Anbar and S. M. Hanshi. 2019. Overview of IPv6 based DDoS and DoS attacks detection mechanisms. International Conference on Advances in Cyber Security 153\u201367.","DOI":"10.1007\/978-981-15-2693-0_11"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12293-013-0128-0"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.031912.110179"},{"key":"e_1_3_2_10_1","doi-asserted-by":"crossref","unstructured":"Chang Y. W. Li and Z. Yang. 2017. Network intrusion detection based on random forest and support vector machine. Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) 1 635\u20138.","DOI":"10.1109\/CSE-EUC.2017.118"},{"key":"e_1_3_2_11_1","doi-asserted-by":"crossref","unstructured":"Choudhury S. and A. Bhowal. 2015. Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection. Proceedings of 2015 International Conference on Smart Technologies and Management for Computing Communication Controls Energy and Materials (ICSTM) 89\u201395.","DOI":"10.1109\/ICSTM.2015.7225395"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2020.11.016"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2002.1000150"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1108\/LODJ-06-2020-0256"},{"key":"e_1_3_2_15_1","unstructured":"J\u00e1n Vojt B. 2016. Deep neural networks and their implementation."},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973730"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3024219"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/2050-7038.12593"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101752"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112963"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3127689"},{"key":"e_1_3_2_22_1","unstructured":"NSL-KDD. https:\/\/www.unb.ca\/cic\/datasets\/nsl.html (accessed July 2021)."},{"key":"e_1_3_2_23_1","doi-asserted-by":"crossref","unstructured":"Roy S. S. A. Mallik R. Gulati M. S. Obaidat and P. V. Krishna. 2017. A deep learning based artificial neural network approach for intrusion detection. Proceedings of International Conference on Mathematics and Computing 44\u201353.","DOI":"10.1007\/978-981-10-4642-1_5"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02228-z"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.040"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"issue":"1","key":"e_1_3_2_27_1","first-page":"27","article-title":"Intrusion detection based on piecewise fuzzy C-means clustering and fuzzy naive Bayes rule","volume":"1","author":"Veeraiah N.","year":"2018","unstructured":"Veeraiah, N., and B. T. Krishna. 2018. Intrusion detection based on piecewise fuzzy C-means clustering and fuzzy naive Bayes rule. Multimedia Research 1 (1):27\u201332.","journal-title":"Multimedia Research"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-179833"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cageo.2017.02.001"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854599"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902846"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.21833\/ijaas.2017.01.016"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-04678-1"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSTL.2016.078686"}],"container-title":["Cybernetics and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01969722.2022.2088450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T07:46:31Z","timestamp":1702971991000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01969722.2022.2088450"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,7]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,2]]}},"alternative-id":["10.1080\/01969722.2022.2088450"],"URL":"https:\/\/doi.org\/10.1080\/01969722.2022.2088450","relation":{},"ISSN":["0196-9722","1087-6553"],"issn-type":[{"value":"0196-9722","type":"print"},{"value":"1087-6553","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,7]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucbs20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucbs20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-07-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}