{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T20:21:22Z","timestamp":1773001282317,"version":"3.50.1"},"reference-count":42,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T00:00:00Z","timestamp":1741910400000},"content-version":"vor","delay-in-days":72,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/100009391","name":"University of Tabuk","doi-asserted-by":"publisher","award":["0135-1444-S"],"award-info":[{"award-number":["0135-1444-S"]}],"id":[{"id":"10.13039\/100009391","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>As Smart City (SC) infrastructures evolve rapidly, securing critical systems like smart water management (SWM) becomes paramount to protecting against cyber threats. Enhancing the security, sustainability and execution of conventional schemes is considered significant in developing smart environments. Intrusion detection systems (IDS) can be effectively leveraged to realise this security objective in an Internet of Things (IoT)\u2010based smart environment. This research addresses this need by proposing a novel IDS model called TabNet architecture optimised using Sailfish Optimisation (SFO). The TabNet\u2010SFO model was specifically developed for SWM in SC applications. The proposed IDS model includes data collection, preprocessing, feature selection and classification processes. For training the model, this research used the CIC\u2010DDoS\u20102019 dataset, and for evaluation, real\u2010time data collected using an IoT\u2010based smart water metre are used. The preprocessing step eliminates unnecessary features, cleans the data, encodes labels and normalises the applied datasets. After preprocessing, the TabNet model selects significant features in the dataset. The TabNet architecture was optimised using the SFO algorithm, which allows hyperparameter tuning and model optimisation. The proposed model demonstrated improved detection accuracy and efficiency on both the simulated and real\u2010time datasets. The model attained a 98.90% accuracy, a 98.85% recall, a 98.80% precision, a 98.82% specificity and a 98.78% f1 score on the CIC\u2010DDoS dataset and a 99.21% accuracy, a 99.02% recall, a 99.05% precision, a 99.10% specificity and a 99.18% f1 score on real\u2010time data. Compared to existing models, the TabNet\u2010SFO model outperformed all existing models in terms of performance metrics and validated its efficiency in detecting attacks.<\/jats:p>","DOI":"10.1155\/int\/6281847","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T07:33:49Z","timestamp":1741937629000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["TabNet\u2010SFO: An Intrusion Detection Model for Smart Water Management in Smart Cities"],"prefix":"10.1155","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1066-7162","authenticated-orcid":false,"given":"Wahid","family":"Rajeh","sequence":"first","affiliation":[]},{"given":"Majed M.","family":"Aborokbah","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1837-6797","authenticated-orcid":false,"given":"Manimurugan","family":"S.","sequence":"additional","affiliation":[]},{"given":"Tawfiq","family":"Alashoor","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8977-5520","authenticated-orcid":false,"given":"Karthikeyan","family":"P.","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-24946-4_10"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3046442"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12753"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/msec.2020.3012353"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00077-7"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.069"},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22239271"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-82715-1_2"},{"key":"e_1_2_11_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-03707-1"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2867288"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.3390\/iot4030017"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.3390\/pr10112462"},{"key":"e_1_2_11_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2022.05.506"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.3390\/s23042358"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.027327"},{"key":"e_1_2_11_16_2","article-title":"Attentive Transformers Deep Learning Algorithms for Intrusions Detections on IoT System Using Automatic Xplainable Features Selections","volume":"18","author":"Rodriguez D. Z.","year":"2023","journal-title":"PLoS One"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2023.10.039"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4121"},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2023.05.049"},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-022-00656-w"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2023.05.082"},{"key":"e_1_2_11_22_2","doi-asserted-by":"publisher","DOI":"10.3390\/su15086902"},{"key":"e_1_2_11_23_2","doi-asserted-by":"publisher","DOI":"10.3390\/app131910977"},{"key":"e_1_2_11_24_2","first-page":"33","article-title":"IoT Based Smart Cities Applications for Detecting Cyber Attack Using Machine Learning","volume":"2","author":"Ahmad Z.","year":"2023","journal-title":"International Journal of Advanced Sciences and Computing"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04900-z"},{"key":"e_1_2_11_26_2","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1241122"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2020.3027543"},{"key":"e_1_2_11_28_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8828591"},{"key":"e_1_2_11_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.03.001"},{"key":"e_1_2_11_30_2","first-page":"187","article-title":"Intrusions Detections Systems for SYN Flood Attacks: Method and Implementations","volume":"15","author":"Almehmadi A.","year":"2017","journal-title":"International Journal of Computer Science and Information Security"},{"key":"e_1_2_11_31_2","doi-asserted-by":"publisher","DOI":"10.3390\/app11115213"},{"key":"e_1_2_11_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103251"},{"key":"e_1_2_11_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.proenv.2011.12.040"},{"key":"e_1_2_11_34_2","first-page":"13","article-title":"Comparisons of Min-Max Normalizations and Z-Score Normalizations in the K-Nearest Neighbors (kNN) Algorithms to Test the Accuracy of Type of Breast Cancers","volume":"4","author":"Henderi T. W.","year":"2021","journal-title":"International Journal of Intelligent Information Systems"},{"key":"e_1_2_11_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119543"},{"key":"e_1_2_11_36_2","first-page":"6678","article-title":"TabNet: Attentive Interpretable Tabular Learning","volume":"36","author":"Arik S. O.","year":"2021","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"e_1_2_11_37_2","first-page":"1713","article-title":"Sailfish Optimization Algorithms with Deep Convolutional Neural Networks for Nutrient Deficiency Detections in Rice Plant","volume":"14","author":"Sathyavani R.","year":"2023","journal-title":"Journal of Pharmaceutical Negative Results"},{"key":"e_1_2_11_38_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15225-z"},{"key":"e_1_2_11_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2019.01.001"},{"key":"e_1_2_11_40_2","doi-asserted-by":"publisher","DOI":"10.3390\/jsan12020029"},{"key":"e_1_2_11_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3123791"},{"key":"e_1_2_11_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103330"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/int\/6281847","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/int\/6281847","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/int\/6281847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T17:57:07Z","timestamp":1772992627000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/int\/6281847"}},"subtitle":[],"editor":[{"given":"Eugenio","family":"Vocaturo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1155\/int\/6281847"],"URL":"https:\/\/doi.org\/10.1155\/int\/6281847","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2024-04-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-27","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6281847"}}