{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T01:59:00Z","timestamp":1773107940598,"version":"3.50.1"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Korea Agency for Technology and Standards in 2022","award":["1415180835"],"award-info":[{"award-number":["1415180835"]}]},{"name":"Korea Agency for Technology and Standards in 2022","award":["1415181629"],"award-info":[{"award-number":["1415181629"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3422999","type":"journal-article","created":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T17:35:03Z","timestamp":1720114503000},"page":"117761-117786","source":"Crossref","is-referenced-by-count":19,"title":["Optimizing Smart Home Intrusion Detection With Harmony-Enhanced Extra Trees"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5923-8695","authenticated-orcid":false,"given":"Akmalbek","family":"Abdusalomov","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Gachon University, Seongnam, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8284-8109","authenticated-orcid":false,"given":"Dusmurod","family":"Kilichev","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Gachon University, Seongnam, South Korea"}]},{"given":"Rashid","family":"Nasimov","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Technologies, Tashkent State University of Economics, Tashkent, Uzbekistan"}]},{"given":"Ilkhom","family":"Rakhmatullayev","sequence":"additional","affiliation":[{"name":"Department of Information Security, Tashkent University of Information Technologies, Samarkand, Uzbekistan"}]},{"given":"Young","family":"Im Cho","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Gachon University, Seongnam, South Korea"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"2023 Was a Big Year for Cybercrime\u2014Here\u2019s How We Can Make Our Systems Safer","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3148140"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3367113"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3366493"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3141942"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2926365"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3359442"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3042049"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3303087"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3276863"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3250235"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3349287"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05764-5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3238874"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2023.3303919"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3382539"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3380014"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3368392"},{"issue":"17","key":"ref19","doi-asserted-by":"crossref","first-page":"3724","DOI":"10.3390\/math11173724","article-title":"Hyperparameter optimization for 1D-CNN-based network intrusion detection using GA and PSO","volume":"11","author":"Kilichev","year":"2023","journal-title":"Mathematics"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3191669"},{"issue":"19","key":"ref21","doi-asserted-by":"crossref","first-page":"4080","DOI":"10.3390\/math11194080","article-title":"Optimal deep-learning-based cyberattack detection in a blockchain-assisted IoT environment","volume":"11","author":"Assiri","year":"2023","journal-title":"Mathematics"},{"issue":"7","key":"ref22","doi-asserted-by":"crossref","first-page":"344","DOI":"10.3390\/info11070344","article-title":"Ensemble-based spam detection in smart home IoT devices time series data using machine learning techniques","volume":"11","author":"Zainab","year":"2020","journal-title":"Information"},{"key":"ref23","first-page":"277","article-title":"Machine learning-based intrusion detection for IoT devices in smart home","volume-title":"Proc. IEEE 16th Int. Conf. Control Autom. (ICCA)","author":"Li"},{"key":"ref24","first-page":"319","article-title":"A hybrid intrusion detection system for smart home security","volume-title":"Proc. IEEE Int. Conf. Electro Inf. Technol. (EIT)","author":"Alghayadh"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2021.107536","article-title":"Three-layer hybrid intrusion detection model for smart home malicious attacks","volume":"96","author":"Shi","year":"2021","journal-title":"Comput. Electr. Eng."},{"key":"ref26","article-title":"Multi-tiered artificial neural networks model for intrusion detection in smart homes","volume":"16","author":"Sohail","year":"2022","journal-title":"Intell. Syst. With Appl."},{"issue":"15","key":"ref27","doi-asserted-by":"crossref","first-page":"3304","DOI":"10.3390\/electronics12153304","article-title":"An enhancement method in few-shot scenarios for intrusion detection in smart home environments","volume":"12","author":"Chen","year":"2023","journal-title":"Electronics"},{"issue":"9","key":"ref28","doi-asserted-by":"crossref","first-page":"2100","DOI":"10.3390\/electronics12092100","article-title":"Securing a smart home with a transformer-based IoT intrusion detection system","volume":"12","author":"Wang","year":"2023","journal-title":"Electronics"},{"key":"ref29","first-page":"1","article-title":"Intrusion detection for smart home security based on data augmentation with edge computing","volume-title":"Proc. IEEE Int. Conf. Commun. (ICC)","author":"Yuan"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2021.107039","article-title":"Stacked recurrent neural network for botnet detection in smart homes","volume":"92","author":"Popoola","year":"2021","journal-title":"Comput. Electr. Eng."},{"key":"ref31","first-page":"55","article-title":"Intrusion detection system in smart home network using bidirectional LSTM and convolutional neural networks hybrid model","volume-title":"Proc. IEEE Int. Midwest Symp. Circuits Syst. (MWSCAS)","author":"Elsayed"},{"key":"ref32","first-page":"836","article-title":"A deep LSTM based approach for intrusion detection IoT devices network in smart home","volume-title":"Proc. IEEE 7th World Forum Internet Things (WF-IoT)","author":"Azumah"},{"issue":"23","key":"ref33","doi-asserted-by":"crossref","first-page":"4598","DOI":"10.3390\/math10234598","article-title":"Intelligent deep learning for anomaly-based intrusion detection in IoT smart home networks","volume":"10","author":"Butt","year":"2022","journal-title":"Mathematics"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.21541\/apjess.1236912"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3013699"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.35833\/MPCE.2022.000430"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3212859"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3371996"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1177\/003754970107600201"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.23919\/CSMS.2023.0019"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893662"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015942"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917803"},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1016\/j.uclim.2023.101717","article-title":"Improving water quality modelling for green roof runoff using storm water management model","volume":"52","author":"Kim","year":"2023","journal-title":"Urban Climate"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.swevo.2019.03.012","article-title":"Review of harmony search with respect to algorithm structure","volume":"48","author":"Zhang","year":"2019","journal-title":"Swarm Evol. Comput."},{"issue":"13","key":"ref46","doi-asserted-by":"crossref","first-page":"5941","DOI":"10.3390\/s23135941","article-title":"CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment","volume":"23","author":"Neto","year":"2023","journal-title":"Sensors"},{"issue":"4","key":"ref47","doi-asserted-by":"crossref","first-page":"571","DOI":"10.3390\/math12040571","article-title":"Next\u2013Generation intrusion detection for IoT EVCS: Integrating CNN, LSTM, and GRU models","volume":"12","author":"Kilichev","year":"2024","journal-title":"Mathematics"},{"issue":"3","key":"ref48","doi-asserted-by":"crossref","first-page":"84","DOI":"10.3390\/fire7030084","article-title":"Advancing maritime safety: Early detection of ship fires through computer vision, deep learning approaches, and histogram equalization techniques","volume":"7","author":"Ergasheva","year":"2024","journal-title":"Fire"},{"issue":"16","key":"ref49","doi-asserted-by":"crossref","first-page":"4172","DOI":"10.3390\/cancers15164172","article-title":"Brain tumor detection based on deep learning approaches and magnetic resonance imaging","volume":"15","author":"Abdusalomov","year":"2023","journal-title":"Cancers"},{"key":"ref50","doi-asserted-by":"crossref","DOI":"10.7717\/peerj-cs.1569","article-title":"A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization","volume":"9","author":"Wang","year":"2023","journal-title":"PeerJ Comput. Sci."},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3336678"},{"key":"ref52","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.101046","article-title":"Detecting cyberthreats in metaverse learning platforms using an explainable DNN","volume":"25","author":"Nkoro","year":"2024","journal-title":"Internet Things"},{"issue":"1","key":"ref53","first-page":"5872","article-title":"Anomaly detection in IoT-based healthcare: Machine learning for enhanced security","volume-title":"Sci. Rep.","volume":"14","author":"Khan","year":"2024"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-024-05993-2"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1793"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-024-01727-y"},{"key":"ref57","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2024.120209","article-title":"A lightweight multi-vector DDoS detection framework for IoT-enabled mobile health informatics systems using deep learning","volume":"662","author":"Aguru","year":"2024","journal-title":"Inf. Sci."},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.3004555"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2591592"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10584486.pdf?arnumber=10584486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T04:44:09Z","timestamp":1725079449000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10584486\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3422999","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}