{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:57:09Z","timestamp":1773086229576,"version":"3.50.1"},"reference-count":26,"publisher":"World Scientific Pub Co Pte Ltd","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Info. Know. Mgmt."],"published-print":{"date-parts":[[2023,8]]},"abstract":"<jats:p> At present, ensuring the security of MANET is a highly challenging chore due to the dynamic topology of the network. Hence, most of the existing Frameworks for Intrusion Detection Systems (IDS) seek to predict the attacks by utilising the clustering and classification mechanisms. Still, they face the major problems of reduced convergence speed, high error rate and increased complexity in the algorithm design. Therefore, this paper intends to utilise integrated optimisation and classification methods for accurately predicting the classified label. This framework comprises the working modules of preprocessing, feature extraction, optimisation and classification. Initially, the input datasets are preprocessed by filling the missing values, and normalising the redundant contents. After that, the Principal Component Analysis (PCA) technique is employed for selecting the set of features used for improving the classification performance. Consequently, the Grey Wolf Optimisation (GWO) technique is utilised for selecting the most optimal features based on the best fitness value, which reduces the overall complexity of IDS. Finally, the Deterministic Convolutional Neural Network (DCNN) technique is utilised for predicting whether the classified outcomes are normal or attacks. For validating the results, various performance metrics have been assessed during the analysis, and the obtained results are compared with the recent state-of-the-art models. <\/jats:p>","DOI":"10.1142\/s0219649223500107","type":"journal-article","created":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T08:32:15Z","timestamp":1680251535000},"source":"Crossref","is-referenced-by-count":9,"title":["An Enhanced Grey Wolf Optimisation\u2013Deterministic Convolutional Neural Network (GWO\u2013DCNN) Model-Based IDS in MANET"],"prefix":"10.1142","volume":"22","author":[{"given":"S.\u00a0K.","family":"Prashanth","sequence":"first","affiliation":[{"name":"Vasavi College of Engineering, Ibrahimbagh, Hyderabad 500031, Telangana, India"}]},{"given":"Hena","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Ajman University, Ajman, UAE"}]},{"given":"Babu","family":"Illuri","sequence":"additional","affiliation":[{"name":"Vardhaman College of Engineering, Shamshabad, Hyderabad 501218, Telangana, India"}]}],"member":"219","published-online":{"date-parts":[[2023,3,31]]},"reference":[{"issue":"3","key":"S0219649223500107BIB001","doi-asserted-by":"crossref","first-page":"61","DOI":"10.3390\/fi11030061","volume":"11","author":"Ali Zardari Z","year":"2019","journal-title":"Future Internet"},{"issue":"1","key":"S0219649223500107BIB002","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s40009-017-0602-1","volume":"41","author":"Bisen D","year":"2018","journal-title":"National Academy Science Letters"},{"key":"S0219649223500107BIB003","author":"Dilipkumar S","year":"2021","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"1","key":"S0219649223500107BIB004","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s11235-018-0499-0","volume":"71","author":"Dou Z","year":"2019","journal-title":"Telecommunication Systems"},{"key":"S0219649223500107BIB005","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/978-981-16-5529-6_14","volume-title":"Inventive Communication and Computational Technologies","volume":"311","author":"Illuri B","year":"2022"},{"key":"S0219649223500107BIB006","doi-asserted-by":"crossref","first-page":"102538","DOI":"10.1016\/j.cose.2021.102538","volume":"113","author":"Jim LE","year":"2022","journal-title":"Computers & Security"},{"issue":"20","key":"S0219649223500107BIB007","doi-asserted-by":"crossref","first-page":"1622","DOI":"10.17485\/IJST\/v14i20.601","volume":"14","author":"Kaur J","year":"2021","journal-title":"Indian Journal of Science and Technology"},{"issue":"1","key":"S0219649223500107BIB009","first-page":"13","volume":"10","author":"Kondaiah R","year":"2018","journal-title":"International Journal of Computer Sciences and Engineering"},{"issue":"2","key":"S0219649223500107BIB010","doi-asserted-by":"crossref","first-page":"1275","DOI":"10.1007\/s11276-019-02151-y","volume":"26","author":"Krishnan RS","year":"2020","journal-title":"Wireless Networks"},{"key":"S0219649223500107BIB011","first-page":"43:1","volume-title":"Proceedings of the 4th International Conference on Smart City Applications","author":"Laqtib S","year":"2019"},{"issue":"3","key":"S0219649223500107BIB012","first-page":"2701","volume":"10","author":"Laqtib S","year":"2020","journal-title":"International Journal of Electrical and Computer Engineering"},{"key":"S0219649223500107BIB013","doi-asserted-by":"crossref","first-page":"2569","DOI":"10.1109\/ICEEOT.2016.7755156","volume-title":"Proceedings of the 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT 2016)","author":"Prashanth SK","year":"2016"},{"key":"S0219649223500107BIB014","doi-asserted-by":"crossref","first-page":"19","DOI":"10.4018\/978-1-5225-4100-4.ch002","volume-title":"Handbook of Research on Network Forensics and Analysis Techniques","author":"Rath M","year":"2018"},{"issue":"1","key":"S0219649223500107BIB015","doi-asserted-by":"crossref","first-page":"46","DOI":"10.4018\/IJISP.2019010104","volume":"13","author":"Rath M","year":"2019","journal-title":"International Journal of Information Security and Privacy"},{"key":"S0219649223500107BIB016","first-page":"168","volume-title":"Proceedings of the 2018 4th International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT)","author":"Saifuddin KM","year":"2018"},{"issue":"1","key":"S0219649223500107BIB017","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s11277-019-06724-0","volume":"110","author":"Sarbhukan VV","year":"2020","journal-title":"Wireless Personal Communications"},{"key":"S0219649223500107BIB018","first-page":"46:1","volume-title":"Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications","author":"Sbai O","year":"2020"},{"key":"S0219649223500107BIB019","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.ins.2019.05.040","volume":"497","author":"Selvakumar K","year":"2019","journal-title":"Information Sciences"},{"issue":"5","key":"S0219649223500107BIB020","doi-asserted-by":"crossref","first-page":"1821","DOI":"10.1007\/s11276-016-1439-0","volume":"24","author":"Shams EA","year":"2018","journal-title":"Wireless Networks"},{"issue":"3","key":"S0219649223500107BIB021","first-page":"278","volume":"16","author":"Shitharth S","year":"2016","journal-title":"Journal of Electrical Engineering"},{"key":"S0219649223500107BIB022","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.cose.2017.04.012","volume":"70","author":"Shitharth S","year":"2017","journal-title":"Computers & Security"},{"issue":"4","key":"S0219649223500107BIB023","doi-asserted-by":"crossref","first-page":"1696","DOI":"10.1007\/s11036-019-01505-2","volume":"26","author":"Sivanesh S","year":"2021","journal-title":"Mobile Networks and Applications"},{"key":"S0219649223500107BIB024","first-page":"16","volume":"10","author":"Suma R","year":"2021","journal-title":"International Journal of Latest Transactions in Engineering and Science"},{"issue":"2","key":"S0219649223500107BIB025","doi-asserted-by":"crossref","first-page":"1691","DOI":"10.3233\/JIFS-182881","volume":"38","author":"Visalakshi P","year":"2020","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"7","key":"S0219649223500107BIB026","doi-asserted-by":"crossref","first-page":"4021","DOI":"10.1007\/s11276-018-01933-0","volume":"25","author":"Veeraiah N","year":"2019","journal-title":"Wireless Networks"},{"key":"S0219649223500107BIB027","doi-asserted-by":"crossref","first-page":"120996","DOI":"10.1109\/ACCESS.2021.3108807","volume":"9","author":"Veeraiah N","year":"2021","journal-title":"IEEE Access"}],"container-title":["Journal of Information &amp; Knowledge Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219649223500107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T05:53:02Z","timestamp":1693893182000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219649223500107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,31]]},"references-count":26,"journal-issue":{"issue":"04","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["10.1142\/S0219649223500107"],"URL":"https:\/\/doi.org\/10.1142\/s0219649223500107","relation":{},"ISSN":["0219-6492","1793-6926"],"issn-type":[{"value":"0219-6492","type":"print"},{"value":"1793-6926","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,31]]},"article-number":"2350010"}}