{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T10:44:51Z","timestamp":1777632291496,"version":"3.51.4"},"reference-count":47,"publisher":"Informa UK Limited","issue":"7","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cybernetics and Systems"],"published-print":{"date-parts":[[2024,10,2]]},"DOI":"10.1080\/01969722.2022.2145660","type":"journal-article","created":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T23:59:59Z","timestamp":1670284799000},"page":"1702-1728","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":20,"title":["IoT Attack Detection and Mitigation with Optimized Deep Learning Techniques"],"prefix":"10.1080","volume":"55","author":[{"given":"V.","family":"Brindha Devi","sequence":"first","affiliation":[{"name":"Department of Information Technology, Sri Sai Ram Institute of Technology, Chennai, Tamil Nadu, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nihar M.","family":"Ranjan","sequence":"additional","affiliation":[{"name":"Department of Information Technology, JSPM'S Rajarshi Shahu College of Engineering, Pune, Maharashtra, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Himanshu","family":"Sharma","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, J B Institute of Engineering and Technology, Hyderabad, Telangana, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"301","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2991693"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3023616"},{"issue":"2","key":"e_1_3_2_4_1","first-page":"1","article-title":"Multicast routing in WSN using bat algorithm with genetic operators for IoT applications","volume":"3","author":"Anandkumar M.","year":"2020","unstructured":"Anandkumar, M. 2020. Multicast routing in WSN using bat algorithm with genetic operators for IoT applications. Journal of Networking and Communication Systems 3 (2):1\u20138.","journal-title":"Journal of Networking and Communication Systems"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02075-y"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.08.007"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/ima.22087"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3043082"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029191"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21155214"},{"issue":"1","key":"e_1_3_2_11_1","first-page":"31","article-title":"Optimal resource allocation of cluster using hybrid grey wolf and cuckoo search algorithm in cloud computing","volume":"3","author":"Devagnanam J","year":"2020","unstructured":"Devagnanam, J, and N. M. Elango. 2020. Optimal resource allocation of cluster using hybrid grey wolf and cuckoo search algorithm in cloud computing. Journal of Networking and Communication Systems 3 (1):31\u201340.","journal-title":"Journal of Networking and Communication Systems"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2956474"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100059"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matcom.2021.08.013"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2993782"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101849"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2020.07.020"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959047"},{"key":"e_1_3_2_19_1","first-page":"2","article-title":"Deep learning based optimization for detection of attacks in IoT","volume":"4","author":"Krishna Prasad A. V.","year":"2021","unstructured":"Krishna Prasad, A. V. 2021. Deep learning based optimization for detection of attacks in IoT. Journal of Networking and Communication Systems 4:2.","journal-title":"Journal of Networking and Communication Systems"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.petrol.2021.109309"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.021"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101898"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2020.06.008"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.12.034"},{"key":"e_1_3_2_25_1","first-page":"2","article-title":"\u00a0Routing protocol using optimization algorithm in delay tolerant network","volume":"4","author":"Pavan Kumar P.","year":"2021","unstructured":"Pavan Kumar, P. 2021.\u00a0Routing protocol using optimization algorithm in delay tolerant network.\u00a0Journal of Networking and Communication Systems 4:2.","journal-title":"\u00a0Journal of Networking and Communication Systems"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.05.049"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.003.2200001"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108156"},{"issue":"4","key":"e_1_3_2_29_1","first-page":"23","article-title":"Cluster head selection in IoT using enhanced self adaptive bat algorithm","volume":"2","author":"Reddy M. P. K","year":"2019","unstructured":"Reddy, M. P. K, and M. R. Babu. 2019. Cluster head selection in IoT using enhanced self adaptive bat algorithm. Journal of Networking and Communication Systems 2 (4):23\u201332.","journal-title":"Journal of Networking and Communication Systems"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2996425"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988854"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2884293"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3002255"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101863"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102177"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8669348"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.017"},{"issue":"1","key":"e_1_3_2_38_1","first-page":"26","article-title":"A hybrid learning algorithm for optimal reactive power dispatch under unbalanced conditions","volume":"1","author":"Shareef S. M","year":"2018","unstructured":"Shareef, S. M, and D. R. S. Rao. 2018. A hybrid learning algorithm for optimal reactive power dispatch under unbalanced conditions. Journal of Computational Mechanics, Power System and Control (JCMPS) 1 (1):26\u201333.","journal-title":"Journal of Computational Mechanics, Power System and Control (JCMPS)"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162668"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.08.013"},{"issue":"1","key":"e_1_3_2_41_1","first-page":"33","article-title":"Hybrid optimization based DBN for face recognition using low-resolution images","volume":"1","author":"Thomas R","year":"2018","unstructured":"Thomas, R, and M. J. S. Rangachar. 2018. Hybrid optimization based DBN for face recognition using low-resolution images. Multimedia Research 1 (1):33\u201343.","journal-title":"Multimedia Research"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2020.2971952"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000476"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2991956"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2831284"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100241"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2976141"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.04.099"}],"container-title":["Cybernetics and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01969722.2022.2145660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T12:45:59Z","timestamp":1722516359000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01969722.2022.2145660"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":47,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,10,2]]}},"alternative-id":["10.1080\/01969722.2022.2145660"],"URL":"https:\/\/doi.org\/10.1080\/01969722.2022.2145660","relation":{},"ISSN":["0196-9722","1087-6553"],"issn-type":[{"value":"0196-9722","type":"print"},{"value":"1087-6553","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucbs20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucbs20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-12-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}