{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:47:13Z","timestamp":1773614833599,"version":"3.50.1"},"reference-count":18,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.32604\/iasc.2023.028022","type":"journal-article","created":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T02:42:18Z","timestamp":1658198538000},"page":"1737-1751","source":"Crossref","is-referenced-by-count":13,"title":["WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services"],"prefix":"10.32604","volume":"35","author":[{"given":"C.","family":"Edwin Singh","sequence":"first","affiliation":[]},{"given":"S.","family":"Maria Celestin Vigila","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"4396","DOI":"10.3390\/app9204396","article-title":"Machine learning and deep learning methods for intrusion detection systems: A survey","volume":"9","author":"Liu","year":"2019","journal-title":"Applied Sciences"},{"key":"ref2","series-title":"Proc. ACM Southeast Conf.","first-page":"86","article-title":"Intrusion detection using big data and deep learning techniques","author":"Faker","year":"2019"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"87593","DOI":"10.1109\/ACCESS.2019.2925828","article-title":"An optimization method for intrusion detection classification model based on deep belief network","volume":"7","author":"Wei","year":"2019","journal-title":"IEEE Access"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.comcom.2020.05.048","article-title":"An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture","volume":"160","author":"Rm","year":"2020","journal-title":"Computer Communications"},{"key":"ref5","series-title":"Proc. Int. Conf. on Advanced Information Networking and Applications Workshops (WAINA)","first-page":"686","article-title":"Multilayer perceptron: An intelligent model for classification and intrusion detection","author":"Amato","year":"2017"},{"key":"ref6","series-title":"Proc. Int. Conf. on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","first-page":"1137","article-title":"Anomaly based intrusion detection of packet dropping attacks in mobile ad-hoc networks","author":"Uyyala","year":"2014"},{"key":"ref7","series-title":"Proc. Int. Conf. on Fuzzy Theory and Its Applications (iFUZZY)","first-page":"1","article-title":"Network intrusion detection using hybrid machine learning","author":"Chuang","year":"2019"},{"key":"ref8","series-title":"Proc. Annual Conf. of the IEEE Industrial Electronics Society","first-page":"3262","article-title":"Improving user trust on deep neural networks-based intrusion detection systems","author":"Amarasinghe","year":"2018"},{"key":"ref9","first-page":"012138","article-title":"Network intrusion detection system using deep neural networks","volume":"1804","author":"Maithem","year":"2021","journal-title":"Journal of Physics: Conference Series"},{"key":"ref10","series-title":"Proc. Int. Conf. on Computer Engineering and Application (ICCEA)","first-page":"273","article-title":"Intrusion detection based on convolutional neural network","author":"Zheng","year":"2020"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"103160","DOI":"10.1016\/j.jnca.2021.103160","article-title":"A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique","volume":"191","author":"Sayed","year":"2021","journal-title":"Journal of Network and Computer Applications"},{"key":"ref12","first-page":"50","article-title":"An intrusion detection system in computer networks using the firefly algorithm and the fast learning network","volume":"3","author":"Rajabi","year":"2020","journal-title":"International Journal of Web Research"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"102177","DOI":"10.1016\/j.cose.2021.102177","article-title":"Intrusion detection methods based on integrated deep learning model","volume":"103","author":"Wang","year":"2021","journal-title":"Computers & Security"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"209","DOI":"10.36872\/LEPI\/V51I2\/301089","article-title":"Hybrid cuckoo search optimization based tuning scheme for deep neural network for intrusion detection systems in cloud environment","volume":"51","author":"Thirumalairaj","year":"2020","journal-title":"Journal of Research on the Lepidoptera"},{"key":"ref15","series-title":"Proc. IEEE Int. Conf. on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","first-page":"378","article-title":"Research on network intrusion detection based on support vector machine optimized with grasshopper optimization algorithm","volume":"1","author":"Ye","year":"2019"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","article-title":"The whale optimization algorithm","volume":"95","author":"Mirjalili","year":"2016","journal-title":"Advances in Engineering Software"},{"key":"ref17","first-page":"205","article-title":"Heterogeneous relational complement for vehicle re-identification","year":"2021","journal-title":"Proc. of the IEEE\/CVF Int. Conf. on Computer Vision"},{"key":"ref18","first-page":"1","article-title":"RSOD: Real-time Small object detection algorithm in UAV-based traffic monitoring","volume":"92","author":"Sun","year":"2021","journal-title":"Applied Intelligence"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/ueditor\/files\/iasc\/TSP_IASC-35-2\/TSP_IASC_28022\/TSP_IASC_28022.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T21:29:09Z","timestamp":1733520549000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/iasc\/v35n2\/48888"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.32604\/iasc.2023.028022","relation":{},"ISSN":["1079-8587"],"issn-type":[{"value":"1079-8587","type":"print"}],"subject":[],"published":{"date-parts":[[2023]]}}}