{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:12:47Z","timestamp":1767262367383},"reference-count":54,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Experimental &amp; Theoretical Artificial Intelligence"],"published-print":{"date-parts":[[2023,7,4]]},"DOI":"10.1080\/0952813x.2021.1970824","type":"journal-article","created":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T10:37:46Z","timestamp":1632911866000},"page":"729-753","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Threat detection in Internet of Things using Cuckoo search Chicken Swarm optimisation algorithm"],"prefix":"10.1080","volume":"35","author":[{"given":"Sivaram","family":"Rajeyyagari","sequence":"first","affiliation":[{"name":"Department of Computer Science, College of Computing and Information Technology, Shaqra University, Shaqra, Kingdome of Saudi Arabia"}]}],"member":"301","published-online":{"date-parts":[[2021,9,29]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.053"},{"key":"cit0002","unstructured":"Abliz, M. (2011). Internet denial of service attacks and defense mechanisms. University of Pittsburgh, Department of Computer Science, Technical Report, 1\u201350."},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.020"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2988293"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.3390\/s18030817"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1109\/ICSGCE.2015.7454287"},{"key":"cit0007","first-page":"4","volume":"3","author":"Anand S","year":"2020","journal-title":"Journal of Networking and Communication Systems"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-6033-6"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.07.064"},{"issue":"12","key":"cit0010","first-page":"108","volume":"7","author":"Bhambere S","year":"2017","journal-title":"International Journal of Basic and Applied Research"},{"key":"cit0011","first-page":"7","author":"Bhambere S. D","year":"2011","journal-title":"Journal of the Indian Society of Pedodontics and Preventive Dentistry"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1053\/j.jfas.2020.11.003"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039856"},{"key":"cit0015","first-page":"1","volume":"99","author":"Chattopadhyay P.","year":"2018","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"cit0016","unstructured":"CMV database. Retrieved July 2019. http:\/\/www.shaktisahislab.com\/include\/CMV"},{"key":"cit0017","volume-title":"In the proceeding of Global IoT Summit (GIoTS)","author":"Dermott \u00c1. M.","year":"2019"},{"issue":"1","key":"cit0018","first-page":"20","volume":"3","author":"Dhumane A. V.","year":"2020","journal-title":"Journal of Networking and Communication Systems"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.01.017"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.04.004"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1007\/s00366-011-0241-y"},{"key":"cit0022","first-page":"288","volume":"4","author":"George A.","year":"2013","journal-title":"AASRI Procedia - 2013 AASRI Conference on Intelligent Systems and Control (ISC 2013)"},{"issue":"3","key":"cit0023","first-page":"307","volume":"11","author":"Hancke G. P.","year":"2010","journal-title":"Journal of Internet Technology"},{"key":"cit0024","author":"Hussain F.","year":"2020","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps45667.2019.9024425"},{"issue":"8","key":"cit0026","doi-asserted-by":"crossref","first-page":"59","DOI":"10.47277\/IJCNCS\/8(8)1","volume":"8","author":"Javeed D.","year":"2020","journal-title":"International Journal of Computer Networks and Communications Security"},{"key":"cit0027","doi-asserted-by":"publisher","DOI":"10.1109\/ETSecIoT50046.2020.00009"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.4236\/ait.2011.13007"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18075-1_3"},{"issue":"3","key":"cit0030","first-page":"151","volume":"4","author":"Krishnamoorthy N.","year":"2018","journal-title":"International Journal on Future Revolution in Computer Science & Communication Engineering"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2800664"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.3390\/rs10050724"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/9673289"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11857-4_10"},{"key":"cit0035","doi-asserted-by":"publisher","DOI":"10.4236\/ait.2012.21001"},{"key":"cit0036","doi-asserted-by":"publisher","DOI":"10.3390\/computers9020044"},{"key":"cit0037","doi-asserted-by":"publisher","DOI":"10.1109\/FAS-W.2016.58"},{"key":"cit0038","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5121054"},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.1109\/ISIICT.2018.8613296"},{"key":"cit0040","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.05.049"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1145\/3384544.3384579"},{"key":"cit0042","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2011.01.009"},{"key":"cit0043","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.291"},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1063\/1.4867989"},{"issue":"1","key":"cit0045","first-page":"1","volume":"3","author":"Srinivas V.","year":"2020","journal-title":"Multimedia Research (MR)"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4434-6"},{"key":"cit0047","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937347"},{"key":"cit0048","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2781198"},{"key":"cit0049","first-page":"802","volume-title":"Advances in neural information processing systems","author":"Xingjian S. H. I.","year":"2015"},{"key":"cit0050","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2010.508944"},{"key":"cit0051","author":"Y\u0131lmaz Y.","year":"2019","journal-title":"Journal of the Franklin Institute, 358(1), 172-192"},{"issue":"10","key":"cit0052","first-page":"592","volume":"124","author":"Zhao X. R.","year":"2019","journal-title":"Journal of Geophysical Research, Atmospheres"},{"key":"cit0053","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2011.5772059"},{"key":"cit0054","doi-asserted-by":"crossref","unstructured":"Zhou, X., Xu, G., Ma, J. & Ruchkin, I. (2018). Scalable platforms and advanced algorithms for IoT and cyber-enabled applications, IEEE.","DOI":"10.1016\/j.jpdc.2018.03.002"}],"container-title":["Journal of Experimental &amp; Theoretical Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0952813X.2021.1970824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T23:01:53Z","timestamp":1686870113000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0952813X.2021.1970824"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,29]]},"references-count":54,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,7,4]]}},"alternative-id":["10.1080\/0952813X.2021.1970824"],"URL":"https:\/\/doi.org\/10.1080\/0952813x.2021.1970824","relation":{},"ISSN":["0952-813X","1362-3079"],"issn-type":[{"value":"0952-813X","type":"print"},{"value":"1362-3079","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,29]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teta20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teta20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2019-12-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-16","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}