{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:46:17Z","timestamp":1774539977587,"version":"3.50.1"},"reference-count":40,"publisher":"Informa UK Limited","issue":"2","license":[{"start":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:00:00Z","timestamp":1699228800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information and Telecommunication"],"published-print":{"date-parts":[[2024,4,2]]},"DOI":"10.1080\/24751839.2023.2272484","type":"journal-article","created":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T17:51:46Z","timestamp":1699293106000},"page":"189-207","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":29,"title":["Feature selection in intrusion detection systems: a new hybrid fusion of Bat algorithm and Residue Number System"],"prefix":"10.1080","volume":"8","author":[{"given":"Yakub Kayode","family":"Saheed","sequence":"first","affiliation":[{"name":"School of IT &amp; Computing, American University of Nigeria, Adamawa, Nigeria"}]},{"given":"Temitope Olubanjo","family":"Kehinde","sequence":"additional","affiliation":[{"name":"Department of Industrial and Systems Engineering, The Hong Kong Polytechnic University, Hong-Kong, Hong-Kong"}]},{"given":"Mustafa","family":"Ayobami Raji","sequence":"additional","affiliation":[{"name":"Department of Marketing, University of Texas Rio Grande Valley, Edinburg, USA"}]},{"given":"Usman Ahmad","family":"Baba","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Pen Resource University, Gombe, Nigeria"}]}],"member":"301","published-online":{"date-parts":[[2023,11,6]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8030322"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2519914"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2018.8466537"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.33166\/AETiC.2021.05.025"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-01408-x"},{"issue":"2","key":"e_1_3_2_7_1","first-page":"5","article-title":"Hybridized Huffman algorithm with block truncate coding For image compression","volume":"12","author":"Christiana A. O.","year":"2019","unstructured":"Christiana, A. O., Oluwatimilehin, F. R., & Yakub, S. (2019). Hybridized Huffman algorithm with block truncate coding For image compression. Journal of Computer Science and Control Systems, 12(2), 5\u20138. [Online]. Available: http:\/\/electroinf.uoradea.ro\/images\/articles\/CERCETARE\/Reviste\/JCSCS\/JCSC_V12_N2_oct2019\/JCSCS VOL 12 NO 2 OCTOBER 2019 Abikoye_Hybridized.pdf","journal-title":"Journal of Computer Science and Control Systems"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.01.014"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.09.004"},{"issue":"1","key":"e_1_3_2_10_1","first-page":"127","article-title":"A study on intrusion detection system in wireless sensor networks","volume":"12","author":"Godala S.","year":"2020","unstructured":"Godala, S., & Vaddella, R. P. V. (2020). A study on intrusion detection system in wireless sensor networks. International Journal of Communication Networks and Information Security, 12(1), 127\u2013141.","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102158"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.022"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.9781\/ijimai.2017.05.002"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.03.031"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3011477"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2017.8238171"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.01.001"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59439-2_5"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.4225\/75\/57a84d4fbefbb"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.3141\/1822-05"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2810267"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105980"},{"issue":"1","key":"e_1_3_2_23_1","first-page":"15","article-title":"Optimal capacitor placement for loss reduction in distribution systems using fuzzy and harmony search algorithm","volume":"7","author":"Reddy M. D.","year":"2012","unstructured":"Reddy, M. D., & Vijaya Kumar, N. V. (2012). Optimal capacitor placement for loss reduction in distribution systems using fuzzy and harmony search algorithm. ARPN Journal of Engineering and Applied Sciences, 7(1), 15\u201319.","journal-title":"ARPN Journal of Engineering and Applied Sciences"},{"key":"e_1_3_2_24_1","doi-asserted-by":"crossref","unstructured":"Saheed Y. K. (2022). Machine learning-based blockchain technology for protection and privacy against intrusion attacks in intelligent transportation systems. In Machine Learning Blockchain Technologies and Big Data Analytics for IoTs: Methods Technologies and Applications IET.","DOI":"10.1049\/PBSE016E_ch15"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-93453-8_12"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89546-4_10"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1108\/978-1-80262-637-720221003"},{"key":"e_1_3_2_28_1","first-page":"15","article-title":"Efficient image encryption scheme based on the moduli Set {2n - 1, 2n, 2n +1}","volume":"3","author":"Saheed Y. K.","year":"2016","unstructured":"Saheed, Y. K., & Gbolagade, K. A. (2016). Efficient image encryption scheme based on the moduli Set {2n - 1, 2n, 2n +1}. Al-Hikmah Journal of Pure & Applied Sciences, 3, 15\u201321.","journal-title":"Al-Hikmah Journal of Pure & Applied Sciences"},{"issue":"2","key":"e_1_3_2_29_1","first-page":"1","article-title":"Efficient RSA cryptosystem decryption based on Chinese remainder theorem and strong prime","author":"Saheed Y. K.","year":"2017","unstructured":"Saheed, Y. K., & Gbolagade, K. A. (2017). Efficient RSA cryptosystem decryption based on Chinese remainder theorem and strong prime. Anale SeriaInformatic\u0103, XV(2), 1\u20135.","journal-title":"Anale SeriaInformatic\u0103"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASA54658.2022.9765181"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOASE.2019.8723671"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-8664-1_30"},{"issue":"1","key":"e_1_3_2_33_1","first-page":"3","article-title":"Identifying important features for intrusion detection using support vector machines and neural networks department of computer science New Mexico institute of mining and technology","volume":"1822","author":"Sung A. H.","year":"2003","unstructured":"Sung, A. H., & Mukkamala, S. (2003). Identifying important features for intrusion detection using support vector machines and neural networks department of computer science New Mexico institute of mining and technology. Symp A Q J Mod Foreign Lit, 1822(1), 3\u201310.","journal-title":"Symp A Q J Mod Foreign Lit"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/10962247.2015.1019652"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matcom.2020.04.031"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.09.014"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12538-6_6"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11766-019-3714-1"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3271866"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2960526"}],"container-title":["Journal of Information and Telecommunication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/24751839.2023.2272484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T20:03:08Z","timestamp":1727208188000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2023.2272484"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,6]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4,2]]}},"alternative-id":["10.1080\/24751839.2023.2272484"],"URL":"https:\/\/doi.org\/10.1080\/24751839.2023.2272484","relation":{},"ISSN":["2475-1839","2475-1847"],"issn-type":[{"value":"2475-1839","type":"print"},{"value":"2475-1847","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,6]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-07-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-10-14","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}