{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:30:33Z","timestamp":1758706233469,"version":"3.40.5"},"reference-count":74,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2022,1,2]]},"DOI":"10.1080\/19393555.2021.1883777","type":"journal-article","created":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T07:04:31Z","timestamp":1614927871000},"page":"105-124","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":9,"title":["Novel adaptive cyberattack prediction model using an enhanced genetic algorithm and deep learning (AdacDeep)"],"prefix":"10.1080","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4083-454X","authenticated-orcid":false,"given":"Ayei E.","family":"Ibor","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Calabar, Calabar, Nigeria"}]},{"given":"Florence A.","family":"Oladeji","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, University of Lagos, Lagos, Nigeria"}]},{"given":"Olusoji B.","family":"Okunoye","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, University of Lagos, Lagos, Nigeria"}]},{"given":"Charles O.","family":"Uwadia","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, University of Lagos, Lagos, Nigeria"}]}],"member":"301","published-online":{"date-parts":[[2021,3,4]]},"reference":[{"key":"cit0001","first-page":"265","volume-title":"12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16)","author":"Abadi M.","year":"2016"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.05.036"},{"key":"cit0003","first-page":"978-3","volume":"10","author":"Aggarwal C. C.","year":"2018","journal-title":"Springer"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1109\/IBIGDELFT.2018.8625370"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2018.8628685"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1142\/S2424922X19500025"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2869577"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.3390\/s17061344"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2020.1767240"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-816203-3.00004-6"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-4765-7_61"},{"volume-title":"IEEE Global Communications Conference (Globecom 2020), accepted","year":"2020","author":"Bovenzi G.","key":"cit0012"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949035"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2717439"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.3390\/info9110280"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0952-3"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2016.7586590"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1145\/3299815.3314439"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-019-0090-6"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2720679"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.03.011"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2012-1_26"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-019-10120-x"},{"volume-title":"Deep learning","year":"2016","author":"Goodfellow I.","key":"cit0024"},{"key":"cit0025","first-page":"03342","volume":"1806","author":"Goyal P.","year":"2018","journal-title":"arXiv Preprint arXiv"},{"key":"cit0026","first-page":"3059","volume-title":"International conference on machine learning","author":"Gulcehre C.","year":"2016"},{"volume-title":"Deep Learning with Keras","year":"2017","author":"Gulli A.","key":"cit0027"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2751478"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2018.2798605"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2871866"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2018.12.4.02"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-020-00053-7"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.5120\/17399-7959"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/703713"},{"key":"cit0035","first-page":"1881","author":"Janarthanan T.","year":"2017","journal-title":"IEEE. Edinburgh"},{"issue":"4","key":"cit0036","first-page":"111","volume":"1","author":"Karlik B.","year":"2011","journal-title":"International Journal of Artificial Intelligence and Expert Systems"},{"key":"cit0037","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2019.2906657"},{"key":"cit0038","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3681068"},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"cit0040","first-page":"8570","volume-title":"Advances in neural information processing systems","author":"Lee J.","year":"2019"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00572"},{"key":"cit0042","first-page":"1","volume":"2018","author":"Liang W.","year":"2018","journal-title":"Wireless Communications and Mobile Computing"},{"key":"cit0043","first-page":"00631","volume":"1801","author":"Marcus G.","year":"2018","journal-title":"arXiv Preprint arXiv"},{"key":"cit0044","first-page":"353","volume-title":"International Conference on Mobile Networks and Management","author":"Marsden T.","year":"2017"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2017.10.011"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2808430"},{"key":"cit0047","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"cit0048","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1125974"},{"key":"cit0049","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2871719"},{"key":"cit0050","first-page":"09560","volume":"1803","author":"Okutan A.","year":"2018","journal-title":"arXiv Preprint arXiv"},{"issue":"3","key":"cit0051","first-page":"479","volume":"7","author":"Panigrahi R.","year":"2018","journal-title":"International Journal of Engineering & Technology"},{"key":"cit0052","first-page":"1310","volume-title":"International conference on machine learning","author":"Pascanu R.","year":"2013"},{"volume-title":"TensorFlow for deep learning: From linear regression to reinforcement learning","year":"2018","author":"Ramsundar B.","key":"cit0053"},{"key":"cit0054","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.05.010"},{"key":"cit0055","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"cit0056","doi-asserted-by":"publisher","DOI":"10.13052\/jsn2445-9739.2017.009"},{"key":"cit0057","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"cit0058","first-page":"172","volume-title":"International Conference on Information Systems Security and Privacy","author":"Sharafaldin I.","year":"2018"},{"key":"cit0059","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243811"},{"key":"cit0060","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"issue":"3","key":"cit0061","first-page":"1264","volume":"47","author":"Sibi P.","year":"2013","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"cit0062","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.151"},{"key":"cit0063","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"cit0064","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"cit0065","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2014.79"},{"key":"cit0066","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2948658"},{"key":"cit0067","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.08.104"},{"key":"cit0068","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2744878"},{"key":"cit0069","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836950"},{"key":"cit0070","first-page":"5701","volume":"1212","author":"Zeiler M. D.","year":"2012","journal-title":"arXiv Preprint arXiv"},{"key":"cit0071","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2422261"},{"key":"cit0072","first-page":"4939","volume-title":"Advances in neural information processing systems","author":"Zhang H.","year":"2018"},{"key":"cit0073","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1111961"},{"key":"cit0074","first-page":"1","volume-title":"International Conference on Learning Representations","author":"Zong B.","year":"2018"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2021.1883777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T09:31:13Z","timestamp":1644399073000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2021.1883777"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,4]]},"references-count":74,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1,2]]}},"alternative-id":["10.1080\/19393555.2021.1883777"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2021.1883777","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"type":"print","value":"1939-3555"},{"type":"electronic","value":"1939-3547"}],"subject":[],"published":{"date-parts":[[2021,3,4]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-03-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}