{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T17:10:27Z","timestamp":1768410627614,"version":"3.49.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T00:00:00Z","timestamp":1657670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T00:00:00Z","timestamp":1657670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100010002","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007446","name":"King Khalid University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007446","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,13]]},"DOI":"10.1109\/cits55221.2022.9832976","type":"proceedings-article","created":{"date-parts":[[2022,7,21]],"date-time":"2022-07-21T19:37:12Z","timestamp":1658432232000},"page":"1-7","source":"Crossref","is-referenced-by-count":10,"title":["Deep Reinforcement Learning based Intrusion Detection System with Feature Selections Method and Optimal Hyper-parameter in IoT Environment"],"prefix":"10.1109","author":[{"given":"Said","family":"Bakhshad","sequence":"first","affiliation":[{"name":"Universiti Tunku Abdul Rahman,Faculty of Information and Communication Technology,Bandar Barat,Malaysia,31900"}]},{"given":"Vasaki","family":"Ponnusamy","sequence":"additional","affiliation":[{"name":"Universiti Tunku Abdul Rahman,Faculty of Information and Communication Technology,Bandar Barat,Malaysia,31900"}]},{"given":"Robithoh","family":"Annur","sequence":"additional","affiliation":[{"name":"Universiti Tunku Abdul Rahman,Faculty of Information and Communication Technology,Bandar Barat,Malaysia,31900"}]},{"given":"Muhammad","family":"Waqasyz","sequence":"additional","affiliation":[{"name":"University of Bahrain,College of Information Technology,Computer Engineering Department,Bahrain,32038"}]},{"given":"Hisham","family":"Alasmary","sequence":"additional","affiliation":[{"name":"King Khalid University,College of Computer Science,Department of Computer Science,Abha,Kingdom of Saudi Arabia"}]},{"given":"Shanshan","family":"Tux","sequence":"additional","affiliation":[{"name":"Beijing University of Technology,Faculty of Information Technology,Beijing,China,100124"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10143-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78612-0_51"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108459"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-03734-y"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3040957"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3053015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2884672"},{"issue":"19","key":"ref8","first-page":"975","article-title":"Intrusion Detection System using Log Files and Reinforcement Learning","volume":"45","author":"Deokar","year":"2012","journal-title":"International Journal of Computer Applications"},{"issue":"1","key":"ref9","first-page":"657","article-title":"A Context-aware Robust Intrusion Detection System: A Reinforcement Learning-based Approach","volume":"19","author":"Sethi","year":"2019","journal-title":"International Journal of Information Security"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112963"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP48568.2020.9182216"},{"issue":"4","key":"ref12","article-title":"Improving Intrusion Detection System by Developing Feature Selection Model Based on Firefly Algorithm and Support Vector Machine","volume":"46","author":"Al-yaseen","year":"2019","journal-title":"International Journal of Computer Science"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/sym12061046"},{"key":"ref14","article-title":"Hyperparameter Tuning for Deep Reinforcement Learning Applications","author":"Kiran","year":"2022","journal-title":"arXiv preprint arXiv"},{"key":"ref15","article-title":"Hyper-parameter Optimization: A Review of Algorithms and Applications","author":"Yu","year":"2020","journal-title":"arXiv preprint arXiv"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0258279"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108196"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3082022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422684"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.08.030"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-10013-3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2018.8586840"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647343"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2817607"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1049\/itr2.12046"}],"event":{"name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","location":"Piraeus, Greece","start":{"date-parts":[[2022,7,13]]},"end":{"date-parts":[[2022,7,15]]}},"container-title":["2022 International Conference on Computer, Information and Telecommunication Systems (CITS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9832908\/9832911\/09832976.pdf?arnumber=9832976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T02:42:28Z","timestamp":1706064148000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9832976\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,13]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/cits55221.2022.9832976","relation":{},"subject":[],"published":{"date-parts":[[2022,7,13]]}}}