{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:08:52Z","timestamp":1753884532905,"version":"3.30.2"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,4]]},"DOI":"10.1109\/commnet63022.2024.10793331","type":"proceedings-article","created":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T19:09:17Z","timestamp":1734462557000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing Industrial IoT Intrusion Detection with Hyperparameter Optimization"],"prefix":"10.1109","author":[{"given":"Imane","family":"Laassar","sequence":"first","affiliation":[{"name":"Ibn Tofail University,Kenitra,Morocco"}]},{"given":"Moulay Youssef","family":"Hadi","sequence":"additional","affiliation":[{"name":"Ibn Tofail University,Kenitra,Morocco"}]},{"given":"Amine","family":"Mrhari","sequence":"additional","affiliation":[{"name":"Ibn Tofail University,Kenitra,Morocco"}]},{"given":"Soukaina","family":"Ouhame","sequence":"additional","affiliation":[{"name":"Ibn Tofail University,Kenitra,Morocco"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ACCESS.2018.2885639"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.11591\/ijres.v12.i1.pp87-96"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1557\/s43581-024-00092-4"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.28991\/HIJ-2024-05-02-012"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.11591\/ijaas.v13.i1.pp24-32"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.11591\/ijaas.v11.i4.pp287-295"},{"key":"ref7","first-page":"102563","article-title":"Host-based intrusion detection using CNN and GRU","volume":"153","author":"Chawla","year":"2020","journal-title":"Journal of Network and Computer Applications"},{"key":"ref8","first-page":"329","article-title":"SDN-based IDS using GRU-RNN","volume":"8","author":"Chawla","year":"2020","journal-title":"IEEE Access"},{"issue":"38","key":"ref9","first-page":"12","article-title":"Intrusion detection system using artificial neural networks and fuzzy logic","volume":"182","author":"Dias","year":"2019","journal-title":"International Journal of Computer Applications"},{"issue":"9","key":"ref10","first-page":"2312","article-title":"Machine learning-based intrusion detection: A comparative study","volume":"13","author":"Mishra","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref11","first-page":"1110","article-title":"Depth-First Search Based Artificial Bee Colony Algorithm for Optimization Problems","volume":"70","author":"Karaboga","year":"2018","journal-title":"Applied Soft Computing"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TII.2018.2881543"},{"key":"ref13","first-page":"359","article-title":"Anomaly detection in network traffic using RNN","volume-title":"Proceedings of the IEEE International Conference on Big Data (Big Data)","author":"Radford"},{"key":"ref14","first-page":"183","article-title":"Multi-Strategy Ensemble Artificial Bee Colony Algorithm for Continuous Optimization","volume":"294","author":"Wang","year":"2016","journal-title":"Information Sciences"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1038\/nature14539"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-3-642-24797-2"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.cor.2011.06.007"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.compgeo.2011.02.011"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1561\/2200000006"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/cisda.2009.5356528"},{"key":"ref21","first-page":"37","article-title":"NSL-KDD: A new dataset for intrusion detection","volume-title":"Proceedings of the IEEE AINA Workshops","author":"Tavallaee"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1016\/j.amc.2009.03.090"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/j.enconman.2008.08.033"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/s10898-007-9149-x"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.11591\/ijeecs.v33.i2.pp1140-1149"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.11591\/ijict.v12i1.pp62-71"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1162\/neco.1997.9.8.1735"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.11591\/ijaas.v13.i3.pp507-514"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/ICNN.1995.488968"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1038\/323533a0"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1007\/BF02478259"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.11591\/ijaas.v11.i3.pp187-193"}],"event":{"name":"2024 7th International Conference on Advanced Communication Technologies and Networking (CommNet)","start":{"date-parts":[[2024,12,4]]},"location":"Rabat, Morocco","end":{"date-parts":[[2024,12,6]]}},"container-title":["2024 7th International Conference on Advanced Communication Technologies and Networking (CommNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10793106\/10793244\/10793331.pdf?arnumber=10793331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T07:17:55Z","timestamp":1734506275000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10793331\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/commnet63022.2024.10793331","relation":{},"subject":[],"published":{"date-parts":[[2024,12,4]]}}}