{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T22:20:46Z","timestamp":1769293246521,"version":"3.49.0"},"reference-count":32,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.053721","type":"journal-article","created":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T06:53:10Z","timestamp":1726210390000},"page":"625-642","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["GRU Enabled Intrusion Detection System for IoT Environment with Swarm Optimization and Gaussian Random Forest Classification"],"prefix":"10.32604","volume":"81","author":[{"given":"Mohammad","family":"Shoab","sequence":"first","affiliation":[]},{"given":"Loiy","family":"Alsbatin","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"94497","DOI":"10.1109\/ACCESS.2019.2928048","article-title":"TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system","volume":"7","author":"Tama","year":"2019","journal-title":"IEEE Access"},{"key":"ref2","article-title":"Network intrusion detection system: A systematic study of machine learning and deep learning approaches","volume":"32","author":"Ahmad","year":"2021","journal-title":"Trans. Emerg. Telecom. Tech."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.1016\/j.procs.2020.04.133","article-title":"Performance analysis of machine learning algorithms in intrusion detection system: A review","volume":"171","author":"Saranya","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref4","first-page":"203","article-title":"Machine learning-based lightweight intrusion detection system for the internet of things","volume":"33","author":"Fenanir","year":"2019","journal-title":"Rev. Intell. Artif."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"41238","DOI":"10.1109\/ACCESS.2018.2858277","article-title":"Effective feature extraction via stacked sparse autoencoder to improve intrusion detection system","volume":"6","author":"Yan","year":"2018","journal-title":"IEEE Access"},{"key":"ref6","series-title":"2021 Comp., Comm. IoT Appl. (ComComAp)","first-page":"101","article-title":"Intrusion prediction using LSTM and GRU with UNSW-NB15","author":"Kim","year":"Nov. 2021"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"42169","DOI":"10.1109\/ACCESS.2020.2977007","article-title":"Network intrusion detection based on supervised adversarial variational auto-encoder with regularization","volume":"8","author":"Yang","year":"2020","journal-title":"IEEE Access"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2020.113249","article-title":"A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer","volume":"148","author":"Alazzam","year":"2020","journal-title":"Expert Syst. Appl."},{"key":"ref9","first-page":"11","article-title":"Cuckoo search algorithm and BF Tree used for anomaly detection in data mining","volume":"9","author":"Kulshrestha","year":"2019","journal-title":"Int. J. Comp. Org. Trends"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s40860-020-00126-x","article-title":"A smart anomaly-based intrusion detection system for the internet of things (IoT) network using GWO\u2013PSO\u2013RF model","volume":"7","author":"Keserwani","year":"2021","journal-title":"J. Reliab. Intell. Environ."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"e147","DOI":"10.1002\/spy2.147","article-title":"Introduced a new method for enhancement of intrusion detection with random forest and PSO algorithm","volume":"4","author":"Ajdani","year":"2021","journal-title":"Secur. Priv."},{"key":"ref12","doi-asserted-by":"crossref","first-page":"5156","DOI":"10.1007\/s11227-018-2413-7","article-title":"NBC-MAIDS: Na\u00efve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks","volume":"74","author":"Mehmood","year":"2018","journal-title":"J. Supercomput."},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2020.101851","article-title":"Building auto-encoder intrusion detection system based on random forest feature selection","volume":"95","author":"Li","year":"2020","journal-title":"Comput. Secur."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"75729","DOI":"10.1109\/ACCESS.2021.3082147","article-title":"A hybrid intrusion detection system based on scalable k-means+ random forest and deep learning","volume":"9","author":"Liu","year":"2021","journal-title":"IEEE Access"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"82512","DOI":"10.1109\/ACCESS.2019.2923640","article-title":"An adaptive ensemble machine learning model for intrusion detection","volume":"7","author":"Gao","year":"2019","journal-title":"IEEE Access"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","article-title":"Deep learning approach for intelligent intrusion detection system","volume":"7","author":"Vinayakumar","year":"2019","journal-title":"IEEE Access"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/j.future.2021.09.040","article-title":"GRU-based deep learning approach for network intrusion alert prediction","volume":"128","author":"Ansari","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref18","first-page":"13","article-title":"Features extraction for network intrusion detection using genetic algorithm (GA)","volume":"885","author":"Ghosh","year":"2020","journal-title":"Modern Appr. Mach. Learn. Cogn. Sci.: A Walkthrough"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1016\/j.procs.2021.10.052","article-title":"An enhanced intrusion detection system using particle swarm optimization feature extraction technique","volume":"193","author":"Ogundokun","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1007\/s12046-020-1308-5","article-title":"Particle swarm optimization and feature selection for intrusion detection system","volume":"45","author":"Kunhare","year":"2020","journal-title":"S\u0101dhan\u0101"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"70651","DOI":"10.1109\/ACCESS.2020.2986217","article-title":"An efficient anomaly intrusion detection method with feature selection and evolutionary neural network","volume":"8","author":"Sarvari","year":"2020","journal-title":"IEEE Access"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"6293","DOI":"10.1109\/JIOT.2020.3041656","article-title":"Distributed variational bayes-based in-network security for the internet of things","volume":"8","author":"He","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref23","first-page":"341","article-title":"Network intrusion detection system based experimental study of combined classifiers using random forest classifiers for feature selection","volume":"6","author":"Nanda","year":"2018","journal-title":"Int. J. Res. Electron Comput. Eng."},{"key":"ref24","first-page":"38","article-title":"An effective way of cloud intrusion detection system using decision tree, support vector machine and Na\u00efve Bayes algorithm","volume":"7","author":"Nathiya","year":"2018","journal-title":"Int. J. Recent Technol. Eng."},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2019.106458","article-title":"Real-time anomaly detection based on long short-term memory and Gaussian Mixture Model","volume":"79","author":"Ding","year":"2019","journal-title":"Comput. Electr. Eng."},{"key":"ref26","doi-asserted-by":"crossref","first-page":"3211","DOI":"10.1007\/s11831-020-09496-0","article-title":"A review on machine learning and deep learning perspectives of IDS for IoT: Recent updates, security issues, and challenges","volume":"28","author":"Thakkar","year":"2021","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref27","doi-asserted-by":"crossref","first-page":"29575","DOI":"10.1109\/ACCESS.2020.2972627","article-title":"BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset","volume":"8","author":"Su","year":"2020","journal-title":"IEEE Access"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1016\/j.neucom.2020.07.138","article-title":"Intrusion detection approach based on optimised artificial neural network","volume":"452","author":"Chora\u015b","year":"2021","journal-title":"Neurocomputing"},{"key":"ref29","article-title":"DL-IDS: A deep learning-based intrusion detection framework for securing IoT","volume":"33","author":"Otoum","year":"2022","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref30","doi-asserted-by":"crossref","first-page":"12499","DOI":"10.1007\/s00521-020-04708-x","article-title":"An efficient XGBoost\u2013DNN-based classification model for network intrusion detection system","volume":"32","author":"Devan","year":"2020","journal-title":"Neural Comput. Appl."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1559","DOI":"10.1007\/s12652-020-02228-z","article-title":"Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks","volume":"12","author":"Safaldin","year":"2021","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref32","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1007\/s13198-023-01883-7","article-title":"Feature engineering based performance analysis of ML and DL algorithms for Botnet attack detection in IoMT","volume":"14","author":"Saif","year":"2023","journal-title":"Int. J. Syts. Assur. Eng. Manag."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_53721\/TSP_CMC_53721.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:30:48Z","timestamp":1741314648000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58304"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":32,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.053721","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-05-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-20","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}