{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T06:25:17Z","timestamp":1768285517850,"version":"3.49.0"},"reference-count":32,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"vor","delay-in-days":363,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.056476","type":"journal-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T02:31:58Z","timestamp":1733970718000},"page":"4109-4124","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":4,"title":["Cuckoo Search-Optimized Deep CNN for Enhanced Cyber Security in IoT Networks"],"prefix":"10.32604","volume":"81","author":[{"given":"Brij B.","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Alhomoud","sequence":"additional","affiliation":[]},{"given":"Kwok","family":"Tai Chui","sequence":"additional","affiliation":[]},{"given":"Akshat","family":"Gaurav","sequence":"additional","affiliation":[]},{"given":"Varsha","family":"Arya","sequence":"additional","affiliation":[]},{"given":"Razaz Waheeb","family":"Attar","sequence":"additional","affiliation":[]},{"given":"Shavi","family":"Bansal","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"112809","DOI":"10.1109\/ACCESS.2019.2932870","article-title":"Analysis of the effect of the reliability of the NB-IoT network on the intelligent system","volume":"7","author":"Jia","year":"2019","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJSWIS.297032","article-title":"Phishing website detection with semantic features based on machine learning classifiers: A comparative study","volume":"18","author":"Almomani","year":"2022","journal-title":"Int. J. Semant. Web Inform. Syst. (IJSWIS)"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1155\/2017\/5421046","article-title":"Phishing detection: Analysis of visual similarity based approaches","volume":"2017","author":"Jain","year":"2017","journal-title":"Secur. Commun. Netw."},{"key":"ref4","first-page":"48","article-title":"Phishing attacks: Detection and prevention techniques","volume":"2","author":"Li","year":"2024","journal-title":"J. Ind. Eng. Appl. Sci."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"53","DOI":"10.21928\/uhdjst.v7n1y2023.pp53-65","article-title":"A review on iot intrusion detection systems using supervised machine learning: Techniques, datasets, and algorithms","volume":"7","author":"Abdulla","year":"2023","journal-title":"UHD J. Sci. Technol."},{"key":"ref6","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s11235-017-0334-z","article-title":"Defending against phishing attacks: Taxonomy of methods, current issues and future directions","volume":"67","author":"Gupta","year":"2018","journal-title":"Telecommun. Syst."},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJSWIS.313190","article-title":"False alert detection based on deep learning and machine learning","volume":"18","author":"Li","year":"2022","journal-title":"Int. J. Semant. Web Inform. Syst."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"2015","DOI":"10.1007\/s12652-018-0798-z","article-title":"A machine learning based approach for phishing detection using hyperlinks information","volume":"10","author":"Jain","year":"2019","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1007\/s11235-017-0414-0","article-title":"Towards detection of phishing websites on client-side using machine learning based approach","volume":"68","author":"Jain","year":"2018","journal-title":"Telecommun. Syst."},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1016\/j.dss.2023.114102","article-title":"A hybrid framework using explainable AI (XAI) in cyber-risk management for defence and recovery against phishing attacks","volume":"177","author":"Biswas","year":"2024","journal-title":"Decis. Support Syst."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"33584","DOI":"10.1109\/ACCESS.2023.3262614","article-title":"Malware threat on edge\/fog computing environments from internet of things devices perspective","volume":"11","author":"Gulatas","year":"2023","journal-title":"IEEE Access"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.comcom.2021.04.023","article-title":"A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment","volume":"175","author":"Gupta","year":"2021","journal-title":"Comput. Commun."},{"key":"ref13","series-title":"Cyber Security","first-page":"467","article-title":"PHISH-SAFE: URL features-based phishing detection system using machine learning","author":"Jain","year":"2018"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.aej.2024.06.070","article-title":"Hybrid stacked autoencoder with dwarf mongoose optimization for Phishing attack detection in internet of things environment","volume":"106","author":"Aljabri","year":"2024","journal-title":"Alexandria Eng. J."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"129","DOI":"10.14257\/ijast.2018.117.11","article-title":"Preemptive cyber response strategy and iot forensic evidence","volume":"117","author":"Song","year":"2018","journal-title":"Int. J. Adv. Sci. Technol."},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.3390\/s20215969","article-title":"Towards a safer internet of things-a survey of iot vulnerability data sources","volume":"20","author":"Rytel","year":"2020","journal-title":"Sensors"},{"key":"ref17","series-title":"Rising Threats in Expert Applications and Solutions","first-page":"765","article-title":"Phishing website prediction by using cuckoo search as a feature selection and random forest and BF-tree classifier as a classification method","author":"Saxena","year":"2020"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s10586-017-1615-8","article-title":"Visual and textual features based email spam classification using S-Cuckoo search and hybrid kernel support vector machine","volume":"22","author":"Kumaresan","year":"2019","journal-title":"Cluster Comput."},{"key":"ref19","article-title":"Intelligent deep learning based cybersecurity phishing email detection and classification","volume":"74","author":"Brindha","year":"2023","journal-title":"Comput. Mater. Contin."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"34677","DOI":"10.1007\/s11042-021-10678-6","article-title":"ISHO: Improved spotted hyena optimization algorithm for phishing website detection","volume":"81","author":"Sabahno","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref21","first-page":"1","article-title":"Spark-based multi-verse optimizer as wrapper features selection algorithm for phishing attack challenge","author":"Al-Sawwa","year":"2024","journal-title":"Cluster Comput."},{"key":"ref22","article-title":"Particle swarm optimization-based feature weighting for improving intelligent phishing website detection","author":"Ali","year":"2020","journal-title":"IEEE Access"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1007\/s11235-020-00739-w","article-title":"Phishing website detection using support vector machines and nature-inspired optimization algorithms","author":"Anupam","year":"2021","journal-title":"Telecommun. Syst."},{"key":"ref24","series-title":"2017 IEEE Int. Symp. Parallel Distrib. Process. Appl. 2017 IEEE Int. Conf. Ubiquitous Comput. Commun. (ISPA\/IUCC)","article-title":"Phishing emails detection using CS-SVM","author":"Niu","year":"2017"},{"key":"ref25","first-page":"3129","article-title":"SI-BBA\u2013A novel phishing website detection based on Swarm intelligence with deep learning","volume":"80","author":"Kumar","year":"2023","journal-title":"Mater. Today: Proc."},{"key":"ref26","series-title":"2009 World Congr. Nature Biol. Inspired Comput. (NaBIC)","first-page":"210","article-title":"Cuckoo search via L\u00e9vy flights","author":"Yang","year":"2009"},{"key":"ref27","volume":"1","author":"Oliphant","year":"2006","journal-title":"Guide to Numpy"},{"key":"ref28","series-title":"Programming TensorFlow: Solut. Edge Comput. Appl.","first-page":"87","article-title":"PyTorch","author":"Imambi","year":"2021"},{"key":"ref29","series-title":"Mach. Learn. Evol. Strategies","first-page":"45","article-title":"Scikit-learn","author":"Kramer","year":"2016"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2023.102871","article-title":"MEALPY: An open-source library for latest meta-heuristic algorithms in Python","author":"Van Thieu","year":"2023","journal-title":"J. Syst. Archit."},{"key":"ref31","unstructured":"E. Chand, \u201cPhishing website Detector,\u201d 2023. Accessed: Jan. 30, 2024. [Online]. Available: https:\/\/www.kaggle.com\/datasets\/eswarchandt\/phishing-website-detector"},{"key":"ref32","first-page":"1","article-title":"SMOTE for high-dimensional class-imbalanced data","volume":"14","author":"Blagus","year":"2013","journal-title":"BMC Bioinform."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59030\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T06:04:46Z","timestamp":1741327486000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59030"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":32,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.056476","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-07-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-23","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}