{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T03:23:44Z","timestamp":1772421824562,"version":"3.50.1"},"reference-count":99,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T00:00:00Z","timestamp":1630627200000},"content-version":"vor","delay-in-days":245,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>The Industrial Internet of Things (IIoT) is a recent research area that links digital equipment and services to physical systems. The IIoT has been used to generate large quantities of data from multiple sensors, and the device has encountered several issues. The IIoT has faced various forms of cyberattacks that jeopardize its capacity to supply organizations with seamless operations. Such risks result in financial and reputational damages for businesses, as well as the theft of sensitive information. Hence, several Network Intrusion Detection Systems (NIDSs) have been developed to fight and protect IIoT systems, but the collections of information that can be used in the development of an intelligent NIDS are a difficult task; thus, there are serious challenges in detecting existing and new attacks. Therefore, the study provides a deep learning\u2010based intrusion detection paradigm for IIoT with hybrid rule\u2010based feature selection to train and verify information captured from TCP\/IP packets. The training process was implemented using a hybrid rule\u2010based feature selection and deep feedforward neural network model. The proposed scheme was tested utilizing two well\u2010known network datasets, NSL\u2010KDD and UNSW\u2010NB15. The suggested method beats other relevant methods in terms of accuracy, detection rate, and FPR by 99.0%, 99.0%, and 1.0%, respectively, for the NSL\u2010KDD dataset, and 98.9%, 99.9%, and 1.1%, respectively, for the UNSW\u2010NB15 dataset, according to the results of the performance comparison. Finally, simulation experiments using various evaluation metrics revealed that the suggested method is appropriate for IIOT intrusion network attack classification.<\/jats:p>","DOI":"10.1155\/2021\/7154587","type":"journal-article","created":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T02:50:14Z","timestamp":1630723814000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":151,"title":["Intrusion Detection in Industrial Internet of Things Network\u2010Based on Deep Learning Model with Rule\u2010Based Feature Selection"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1020-4432","authenticated-orcid":false,"given":"Joseph Bamidele","family":"Awotunde","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4385-0975","authenticated-orcid":false,"given":"Chinmay","family":"Chakraborty","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2728-0116","authenticated-orcid":false,"given":"Abidemi Emmanuel","family":"Adeniyi","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,9,3]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2019.10.007"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.01.583"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01968-2"},{"key":"e_1_2_10_4_2","first-page":"91","article-title":"A survey: intrusion detection system for internet of things","volume":"5","author":"Sherasiya T.","year":"2016","journal-title":"International Journal of Computer Science and Engineering (IJCSE)"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75220-0_6"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9897-5_6"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08708-5"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2020.1767240"},{"key":"e_1_2_10_9_2","first-page":"444","volume-title":"Communications in Computer and Information Science","author":"Abdulraheem M.","year":"2021"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-021-01596-3"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.05.002"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39377-8_9"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3094658"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2015.060731"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/mspec.2013.6471059"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.3390\/e22020175"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081075"},{"key":"e_1_2_10_18_2","doi-asserted-by":"crossref","unstructured":"EnacheA. C.andSg\u00e2rciuV. Anomaly intrusions detection based on support vector machines with an improved bat algorithm 2015 20th International Conference on Control Systems and Computer Science May 2015 Bucharest Romania 317\u2013321 https:\/\/doi.org\/10.1109\/cscs.2015.12 2-s2.0-84947080481.","DOI":"10.1109\/CSCS.2015.12"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2016.1257680"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.01.002"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2017913992"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718794615"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2599841"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.02.008"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2016.03.007"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.04.002"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11125-2"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.01.012"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.05.002"},{"key":"e_1_2_10_30_2","doi-asserted-by":"crossref","unstructured":"AazamM.andHuhE. N. Fog computing microdata center-based dynamic resource estimation and pricing model for IoT 2015 IEEE 29th International Conference on Advanced Information Networking and Applications March 2015 Gwangju Korea 687\u2013694 https:\/\/doi.org\/10.1109\/aina.2015.254 2-s2.0-84946201873.","DOI":"10.1109\/AINA.2015.254"},{"key":"e_1_2_10_31_2","doi-asserted-by":"crossref","unstructured":"CecchinelC. JimenezM. MosserS. andRiveillM. An architecture to support the collection of big data in the internet of things 2014 IEEE World Congress on Services June 2014 Anchorage AK USA 442\u2013449 https:\/\/doi.org\/10.1109\/services.2014.83.","DOI":"10.1109\/SERVICES.2014.83"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.12.006"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.008"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1125974"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1398"},{"key":"e_1_2_10_36_2","doi-asserted-by":"crossref","unstructured":"MaglarasL. A.andJiangJ. Intrusion detection in SCADA systems using machine learning techniques 2014 Science and Information Conference August 2014 London UK 626\u2013631.","DOI":"10.1109\/SAI.2014.6918252"},{"key":"e_1_2_10_37_2","unstructured":"SilvaP.andSchukatM. On the use of k-nn in intrusion detection for industrial control systems Proceedings of The IT&T 13th International Conference on Information Technology and Telecommunication August 2014 Dublin Ireland 103\u2013106."},{"key":"e_1_2_10_38_2","doi-asserted-by":"publisher","DOI":"10.4108\/eai.1-2-2017.152155"},{"key":"e_1_2_10_39_2","doi-asserted-by":"crossref","unstructured":"ShangW. CuiJ. WanM. AnP. andZengP. Modbus communication behavior modeling and SVM intrusion detection method Proceedings of the 6th International Conference on Communication and Network Security November 2016 Singapore 80\u201385 https:\/\/doi.org\/10.1145\/3017971.3017978 2-s2.0-85014836449.","DOI":"10.1145\/3017971.3017978"},{"key":"e_1_2_10_40_2","doi-asserted-by":"crossref","unstructured":"MaglarasL. A.andJiangJ. Ocsvm model combined with k-means recursive clustering for intrusion detection in scada systems 10th International Conference on Heterogeneous Networking for Quality Reliability Security and Robustness August 2014 Rhodes Greece 133\u2013134 https:\/\/doi.org\/10.1109\/qshine.2014.6928673 2-s2.0-84912068802.","DOI":"10.1109\/QSHINE.2014.6928673"},{"key":"e_1_2_10_41_2","doi-asserted-by":"crossref","unstructured":"LindaO. VollmerT. andManicM. Neural network-based intrusion detection system for critical infrastructures 2009 International Joint Conference on Neural Networks June 2009 Atlanta GA USA 1827\u20131834 https:\/\/doi.org\/10.1109\/ijcnn.2009.5178592 2-s2.0-70449371464.","DOI":"10.1109\/IJCNN.2009.5178592"},{"key":"e_1_2_10_42_2","doi-asserted-by":"crossref","unstructured":"HodoE. BellekensX. HamiltonA. DubouilhP. L. IorkyaseE. TachtatzisC. andAtkinsonR. Threat analysis of IoT networks using artificial neural network intrusion detection system 2016 International Symposium on Networks Computers and Communications (ISNCC) May 2016 Yasmine Hammamet Tunisia 1\u20136 https:\/\/doi.org\/10.1109\/isncc.2016.7746067 2-s2.0-85006054848.","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"e_1_2_10_43_2","first-page":"165","volume-title":"Advanced materials research","author":"Chen R.","year":"2012"},{"key":"e_1_2_10_44_2","first-page":"353","volume-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","author":"Marsden T.","year":"2017"},{"key":"e_1_2_10_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/tia.2020.3011397"},{"key":"e_1_2_10_46_2","doi-asserted-by":"crossref","unstructured":"GaoN. GaoL. GaoQ. andWangH. An intrusion detection model based on deep belief networks 2014 Second International Conference on Advanced Cloud and Big Data November 2014 Huangshan China 247\u2013252 https:\/\/doi.org\/10.1109\/cbd.2014.41 2-s2.0-84959539300.","DOI":"10.1109\/CBD.2014.41"},{"key":"e_1_2_10_47_2","doi-asserted-by":"crossref","unstructured":"AbolhasanzadehB. Nonlinear dimensionality reduction for intrusion detection using auto-encoder bottleneck features 2015 7th Conference on Information and Knowledge Technology (IKT) May 2015 Urmia Iran 1\u20135 https:\/\/doi.org\/10.1109\/ikt.2015.7288799 2-s2.0-84962265601.","DOI":"10.1109\/IKT.2015.7288799"},{"key":"e_1_2_10_48_2","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.5.21"},{"key":"e_1_2_10_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"e_1_2_10_50_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-12474-9_3"},{"key":"e_1_2_10_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.002"},{"key":"e_1_2_10_52_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.12.016"},{"key":"e_1_2_10_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.10.006"},{"key":"e_1_2_10_54_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2181-4"},{"key":"e_1_2_10_55_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.09.041"},{"key":"e_1_2_10_56_2","first-page":"1","volume-title":"Advances in Computers","author":"Leonard L. C.","year":"2017"},{"key":"e_1_2_10_57_2","first-page":"429","volume-title":"In Encyclopedia of Machine Learning Edited by Claude Sammut, Geoffrey I. Webb","author":"Sammut C.","year":"2010"},{"key":"e_1_2_10_58_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.01.044"},{"key":"e_1_2_10_59_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.007"},{"key":"e_1_2_10_60_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.06.005"},{"key":"e_1_2_10_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3079916"},{"key":"e_1_2_10_62_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.11.041"},{"key":"e_1_2_10_63_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.019"},{"key":"e_1_2_10_64_2","first-page":"1453","article-title":"Classification, detection and prevention of network attacks using rule based approach","volume":"4","author":"Kirnapure W. K.","year":"2017","journal-title":"International Research Journal of Engineering and Technology"},{"key":"e_1_2_10_65_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.06.013"},{"key":"e_1_2_10_66_2","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2018.1423792"},{"key":"e_1_2_10_67_2","doi-asserted-by":"crossref","unstructured":"SteinG. ChenB. WuA. S. andHuaK. A. Decision tree classifier for network intrusion detection with GA-based feature selection Proceedings of the 43rd annual southeast regional conference on - ACM-SE 43 2005 Kennesaw Georgia 136\u2013141 https:\/\/doi.org\/10.1145\/1167253.1167288 2-s2.0-77953759247.","DOI":"10.1145\/1167253.1167288"},{"key":"e_1_2_10_68_2","first-page":"746","article-title":"Intrusion detection system using fuzzy rough set feature selection and modified KNN classifier","volume":"16","author":"Senthilnayaki B.","year":"2019","journal-title":"International Arab Journal of Information Technology"},{"key":"e_1_2_10_69_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.01.024"},{"key":"e_1_2_10_70_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.03.015"},{"key":"e_1_2_10_71_2","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2019.07.023"},{"key":"e_1_2_10_72_2","doi-asserted-by":"crossref","unstructured":"KalashM. RochanM. MohammedN. BruceN. D. WangY. andIqbalF. Malware classification with deep convolutional neural networks 2018 9th IFIP International Conference on New Technologies Mobility and Security (NTMS) February 2018 Paris France 1\u20135.","DOI":"10.1109\/NTMS.2018.8328749"},{"key":"e_1_2_10_73_2","doi-asserted-by":"crossref","unstructured":"KumarR. XiaosongZ. KhanR. U. AhadI. andKumarJ. Malicious code detection based on image processing using deep learning Proceedings of the 2018 International Conference on Computing and Artificial Intelligence - ICCAI 2018 March 2018 Chengdu China 81\u201385 https:\/\/doi.org\/10.1145\/3194452.3194459 2-s2.0-85048365249.","DOI":"10.1145\/3194452.3194459"},{"key":"e_1_2_10_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2822680"},{"key":"e_1_2_10_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937347"},{"key":"e_1_2_10_76_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101989"},{"key":"e_1_2_10_77_2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3677"},{"key":"e_1_2_10_78_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.102022"},{"key":"e_1_2_10_79_2","doi-asserted-by":"crossref","unstructured":"SrivastavaG. Thippa ReddyG. DeepaN. PrabadeviB. andPraveen Kumar ReddyM. An ensemble model for intrusion detection on the Internet of Softwarized Things Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking January 2021 Nara Japan 25\u201330 https:\/\/doi.org\/10.1145\/3427477.3429987.","DOI":"10.1145\/3427477.3429987"},{"key":"e_1_2_10_80_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9020219"},{"key":"e_1_2_10_81_2","doi-asserted-by":"crossref","unstructured":"TangT. A. MhamdiL. McLernonD. ZaidiS. A. R. andGhoghoM. Deep learning approach for network intrusion detection in software-defined networking 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM) 2016 October Fez Morocco 258\u2013263 https:\/\/doi.org\/10.1109\/wincom.2016.7777224 2-s2.0-85010301146.","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"e_1_2_10_82_2","doi-asserted-by":"crossref","unstructured":"LiM. ZhangT. ChenY. andSmolaA. J. Efficient mini-batch training for stochastic optimization 2014 In proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining New York USA 661\u2013670.","DOI":"10.1145\/2623330.2623612"},{"key":"e_1_2_10_83_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7439(97)00061-0"},{"key":"e_1_2_10_84_2","unstructured":"ErhanD. CourvilleA. BengioY. andVincentP. Why does unsupervised pre-training help deep learning? In proceedings of the thirteenth international conference on artificial intelligence and statistics March 2010 Sardinia Italy 201\u2013208."},{"key":"e_1_2_10_85_2","doi-asserted-by":"publisher","DOI":"10.3390\/info7020020"},{"key":"e_1_2_10_86_2","unstructured":"HardyW. ChenL. HouS. YeY. andLiX. DL4MD: a deep learning framework for intelligent malware detection Proceedings of the International Conference on Data Science (ICDATA). The Steering Committee of The World Congress in Computer Science Computer Engineering and Applied Computing (WorldComp). 2016 Las Vegas USA."},{"key":"e_1_2_10_87_2","first-page":"865","article-title":"Traffic flow prediction with big data: a deep learning approach","volume":"16","author":"Lv Y.","year":"2014","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"e_1_2_10_88_2","doi-asserted-by":"crossref","unstructured":"Yousefi-AzarM. VaradharajanV. HameyL. andTupakulaU. Autoencoder-based feature learning for cybersecurity applications 2017 International Joint Conference on Neural Networks (IJCNN) May 2017 Anchorage AK USA 3854\u20133861 https:\/\/doi.org\/10.1109\/ijcnn.2017.7966342 2-s2.0-85030984896.","DOI":"10.1109\/IJCNN.2017.7966342"},{"key":"e_1_2_10_89_2","article-title":"Intrusion detection system on KDDCup99 dataset: a survey","volume":"6","author":"Rathore S.","year":"2015","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"e_1_2_10_90_2","doi-asserted-by":"crossref","unstructured":"TavallaeeM. BagheriE. LuW. andGhorbaniA. A. A detailed analysis of the KDD CUP 99 data set 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications July 2009 Ottawa ON Canada 1\u20136 https:\/\/doi.org\/10.1109\/cisda.2009.5356528 2-s2.0-77950575061.","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"e_1_2_10_91_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59439-2_5"},{"key":"e_1_2_10_92_2","doi-asserted-by":"crossref","unstructured":"MoustafaN.andSlayJ. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) 2015 Military Communications and Information Systems Conference (MilCIS) November 2015 Canberra ACT Australia 1\u20136 https:\/\/doi.org\/10.1109\/milcis.2015.7348942 2-s2.0-84969651789.","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"e_1_2_10_93_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-015-1964-2"},{"key":"e_1_2_10_94_2","doi-asserted-by":"crossref","unstructured":"HsuC. M. HsiehH. Y. PrakosaS. W. AzhariM. Z. andLeuJ. S. Using long-short-term memory-based convolutional neural networks for network intrusion detection International Wireless Internet Conference 2018 Taipei Taiwan 86\u201394.","DOI":"10.1007\/978-3-030-06158-6_9"},{"key":"e_1_2_10_95_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2519914"},{"key":"e_1_2_10_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2375218"},{"key":"e_1_2_10_97_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.05.017"},{"key":"e_1_2_10_98_2","doi-asserted-by":"crossref","unstructured":"AlomM. Z. BontupalliV. andTahaT. M. Intrusion detection using deep belief networks 2015 National Aerospace and Electronics Conference (NAECON) 2015 Dayton OH USA 339\u2013344 https:\/\/doi.org\/10.1109\/naecon.2015.7443094 2-s2.0-84964963566.","DOI":"10.1109\/NAECON.2015.7443094"},{"key":"e_1_2_10_99_2","doi-asserted-by":"crossref","unstructured":"LudwigS. A. Intrusion detection of multiple attack classes using a deep neural net ensemble 2015 National Aerospace and Electronics Conference (NAECON) November 2017 Dayton OH USA 1\u20137 https:\/\/doi.org\/10.1109\/naecon.2015.7443094 2-s2.0-84964963566.","DOI":"10.1109\/NAECON.2015.7443094"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/7154587.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/7154587.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/7154587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T12:14:15Z","timestamp":1723032855000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/7154587"}},"subtitle":[],"editor":[{"given":"Alireza","family":"Jolfaei","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":99,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/7154587"],"URL":"https:\/\/doi.org\/10.1155\/2021\/7154587","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-05-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-04","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"7154587"}}