{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T02:29:28Z","timestamp":1773714568555,"version":"3.50.1"},"reference-count":96,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Because Internet of Things (IoT) networks are widely deployed, they have become attractive targets for botnet and distributed denial of service (DDoS) attacks, which require effective intrusion detection. Convolutional neural networks (CNNs) can achieve strong detection performance, but their many hyperparameters are usually tuned manually, which is costly and time-consuming. This paper proposes a new hybrid metaheuristic optimizer, FW-CNN, that combines Grey Wolf Optimization and Red Fox Optimization to automatically tune the key hyperparameters of a one-dimensional CNN for IoT intrusion detection. The Red Fox component enhances exploration and helps the search escape local optima, while the Grey Wolf component strengthens exploitation and guides convergence toward high-quality solutions. The proposed model is evaluated using the N-BaIoT dataset and compared with a feedforward neural network as well as a metaheuristic-optimized model based on the Adaptive Particle Swarm Optimization\u2013Whale Optimization Algorithm-CNN. It achieves a final accuracy of 95.56%, improving on the feedforward network by 12.56 percentage points and outperforming the Adaptive Particle Swarm Optimization\u2013Whale Optimization Algorithm-based CNN model by 1.02 percentage points. It also yields higher average precision, Kappa coefficient, and Jaccard similarity, and significantly reduces Hamming loss. These results indicate that the proposed hybrid optimizer is stable and effective for multi-class IoT intrusion detection in real environments.<\/jats:p>","DOI":"10.3390\/info16121103","type":"journal-article","created":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T10:11:23Z","timestamp":1765793483000},"page":"1103","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Hybrid GWO-RFO Metaheuristic Algorithm for Optimizing 1D-CNN Hyperparameters in IoT Intrusion Detection Systems"],"prefix":"10.3390","volume":"16","author":[{"given":"Eslam Bokhory","family":"Elsayed","sequence":"first","affiliation":[{"name":"Higher Institute of Computers and Information Technology, El-Shorouk Academy, Cairo 11837, Egypt"},{"name":"Department of Information Systems, Faculty of Computers and Artificial Intelligence, Capital University (Formerly Helwan University), Helwan 11795, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0549-7493","authenticated-orcid":false,"given":"Abdalla Sayed","family":"Yassin","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Faculty of Computers and Artificial Intelligence, Capital University (Formerly Helwan University), Helwan 11795, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7247-4825","authenticated-orcid":false,"given":"Hanan","family":"Fahmy","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Faculty of Computers and Artificial Intelligence, Capital University (Formerly Helwan University), Helwan 11795, Egypt"}]}],"member":"1968","published-online":{"date-parts":[[2025,12,15]]},"reference":[{"key":"ref_1","unstructured":"(2025, September 04). Fourth Industrial Revolution. World Economic Forum. Available online: https:\/\/www.weforum.org\/focus\/fourth-industrial-revolution\/."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Fallahpour, A., Wong, K.Y., Rajoo, S., Fathollahi-Fard, A.M., Antucheviciene, J., and Nayeri, S. (2021). An integrated approach for a sustainable supplier selection based on Industry 4.0 concept. Environ. Sci. Pollut. Res., ahead of print.","DOI":"10.1007\/s11356-021-17445-y"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ghonge, M.M., Pramanik, S., Mangrulkar, R., and Le, D. (2022). 4S Framework: A Practical CPS Design Security Assessment & Benchmarking Framework. Cyber Security and Digital Forensics, Wiley. [1st ed.].","DOI":"10.1002\/9781119795667"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1016\/j.bushor.2017.07.009","article-title":"The Internet Of Things: Limitless Opportunities For Business And Society","volume":"60","author":"Attaran","year":"2017","journal-title":"Bus. Horiz."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Ortega, F., Gonz\u00e1lez-Prieto, \u00c1., Bobadilla, J., and Guti\u00e9rrez, A. (2020). Collaborative Filtering to Predict Sensor Array Values in Large IoT Networks. Sensors, 20.","DOI":"10.3390\/s20164628"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/IOTM.001.2100183","article-title":"Evolution of IoT Security: The Era of Smart Attacks","volume":"5","author":"Bout","year":"2022","journal-title":"IEEE Internet Things M."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/IOTM.001.2100175","article-title":"NFV-Based Scheme for Effective Protection against Bot Attacks in AI-Enabled IoT","volume":"5","author":"Memos","year":"2022","journal-title":"IEEE Internet Things M."},{"key":"ref_8","unstructured":"(2025, September 04). Symantec Internet Security Threat Report. Volume 24: Executive Summary. Available online: https:\/\/docs.broadcom.com\/doc\/istr-24-2019-en."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/MCE.2021.3079635","article-title":"The State of IoT Security: Unequivocal Appeal to Cybercriminals, Onerous to Defenders","volume":"11","author":"Alsheikh","year":"2022","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_10","unstructured":"(2025, September 10). A Perfect Storm: The Security Challenges of Coronavirus Threats and Mass Remote Working. Check Point Blog 2020. Available online: https:\/\/blog.checkpoint.com\/security\/a-perfect-storm-the-security-challenges-of-coronavirus-threats-and-mass-remote-working\/."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/MSEC.2021.3110307","article-title":"Road Traffic Poisoning of Navigation Apps: Threats and Countermeasures","volume":"20","author":"Raponi","year":"2022","journal-title":"IEEE Secur. Priv."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Abbas, G., Mehmood, A., Carsten, M., Epiphaniou, G., and Lloret, J. (2022). Safety, Security and Privacy in Machine Learning Based Internet of Things. J. Sens. Actuator Netw., 11.","DOI":"10.3390\/jsan11030038"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"640","DOI":"10.3390\/jcp2030033","article-title":"Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis","volume":"2","author":"Hireche","year":"2022","journal-title":"J. Cybersecur. Priv."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Goudarzi, A., Ghayoor, F., Waseem, M., Fahad, S., and Traore, I. (2022). A Survey on IoT-Enabled Smart Grids: Emerging, Applications, Challenges, and Outlook. Energies, 15.","DOI":"10.3390\/en15196984"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"201","DOI":"10.23919\/JCC.2022.02.016","article-title":"Outsourced privacy-preserving anomaly detection in time series of multi-party","volume":"19","author":"Zhang","year":"2022","journal-title":"China Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"11760","DOI":"10.1109\/JIOT.2021.3131956","article-title":"An IoT-Oriented Privacy-Preserving Fingerprint Authentication System","volume":"9","author":"Yin","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MCE.2021.3061808","article-title":"BPAF: Blockchain-Enabled Reliable and Privacy-Preserving Authentication for Fog-Based IoT Devices","volume":"11","author":"Zhang","year":"2022","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Hunter, J., Huber, B., and Kandah, F. (2022, January 8\u201311). Towards feasibility of Deep-Learning based Intrusion Detection System for IoT Embedded Devices. Proceedings of the 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC49033.2022.9700706"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Awad, M., Fraihat, S., Salameh, K., and Al Redhaei, A. (2022). Examining the Suitability of NetFlow Features in Detecting IoT Network Intrusions. Sensors, 22.","DOI":"10.3390\/s22166164"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Alani, M.M., and Miri, A. (2022). Towards an Explainable Universal Feature Set for IoT Intrusion Detection. Sensors, 22.","DOI":"10.3390\/s22155690"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Al-rawashdeh, M., Keikhosrokiani, P., Belaton, B., Alawida, M., and Zwiri, A. (2022). IoT Adoption and Application for Smart Healthcare: A Systematic Review. Sensors, 22.","DOI":"10.3390\/s22145377"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"9640","DOI":"10.1109\/JIOT.2021.3135789","article-title":"HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version)","volume":"9","author":"Breitenbacher","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Dutta, V., Chora\u015b, M., Pawlicki, M., and Kozik, R. (2020). A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection. Sensors, 20.","DOI":"10.3390\/s20164583"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"22756","DOI":"10.1109\/ACCESS.2022.3153716","article-title":"Towards SDN-Enabled, Intelligent Intrusion Detection System for Internet of Things (IoT)","volume":"10","author":"Muthanna","year":"2022","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"6608","DOI":"10.1109\/TITS.2021.3058553","article-title":"An Intrusion Detection Method Based on Machine Learning and State Observer for Train-Ground Communication Systems","volume":"23","author":"Gao","year":"2022","journal-title":"IEEE Trans. Intell. Transport. Syst."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2523","DOI":"10.1109\/TITS.2021.3119968","article-title":"Federated Intrusion Detection in Blockchain-Based Smart Transportation Systems","volume":"23","author":"Moustafa","year":"2022","journal-title":"IEEE Trans. Intell. Transport. Syst."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Aribisala, A., Khan, M.S., and Husari, G. (2022, January 26\u201329). Feed-Forward Intrusion Detection and Classification on a Smart Grid Network. Proceedings of the 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC54503.2022.9720898"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"23","DOI":"10.18466\/cbayarfbe.832533","article-title":"Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems","volume":"18","author":"Efe","year":"2022","journal-title":"Celal Bayar \u00dcniversitesi Fen Bilim. Derg."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Bahaa, A., Abdelaziz, A., Sayed, A., Elfangary, L., and Fahmy, H. (2021). Monitoring Real Time Security Attacks for IoT Systems Using DevSecOps: A Systematic Literature Review. Information, 12.","DOI":"10.3390\/info12040154"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Bahsi, H., Nomm, S., and La Torre, F.B. (2018, January 18\u201321). Dimensionality Reduction for Machine Learning Based IoT Botnet Detection. Proceedings of the 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV), Singapore.","DOI":"10.1109\/ICARCV.2018.8581205"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","article-title":"N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders","volume":"17","author":"Meidan","year":"2018","journal-title":"IEEE Pervasive Comput."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"77039","DOI":"10.1109\/ACCESS.2022.3188635","article-title":"A Hybrid Deep Learning Approach for Bottleneck Detection in IoT","volume":"10","author":"Sattari","year":"2022","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"8298","DOI":"10.1109\/TII.2022.3152814","article-title":"An Advanced Computing Approach for IoT-Botnet Detection in Industrial Internet of Things","volume":"18","author":"Nguyen","year":"2022","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"10224","DOI":"10.1109\/JIOT.2021.3122015","article-title":"A Resilient and Hierarchical IoT-Based Solution for Stress Monitoring in Everyday Settings","volume":"9","author":"Jiang","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"9444","DOI":"10.1109\/JIOT.2021.3126811","article-title":"A Taxonomy of Machine-Learning-Based Intrusion Detection Systems for the Internet of Things: A Survey","volume":"9","author":"Jamalipour","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","article-title":"Hierarchical Adversarial Attacks Against Graph-Neural-Network-Based IoT Network Intrusion Detection System","volume":"9","author":"Zhou","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"154864","DOI":"10.1109\/ACCESS.2021.3128701","article-title":"A Hybrid Deep Learning Approach for Replay and DDoS Attack Detection in a Smart City","volume":"9","author":"Elsaeidy","year":"2021","journal-title":"IEEE Access"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/MNET.011.2000639","article-title":"Toward Decentralized and Collaborative Deep Learning Inference for Intelligent IoT Devices","volume":"36","author":"Huang","year":"2022","journal-title":"IEEE Netw."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MWC.010.2100491","article-title":"Blockchain and Federated Deep Reinforcement Learning Based Secure Cloud-Edge-End Collaboration in Power IoT","volume":"29","author":"Zhang","year":"2022","journal-title":"IEEE Wirel. Commun."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MM.2021.3112476","article-title":"PEFL: Deep Privacy-Encoding-Based Federated Learning Framework for Smart Agriculture","volume":"42","author":"Kumar","year":"2022","journal-title":"IEEE Micro"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Ahmed, A., and Tjortjis, C. (2022, January 20\u201322). Machine Learning based IoT-BotNet Attack Detection Using Real-time Heterogeneous Data. Proceedings of the 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET), Prague, Czech Republic.","DOI":"10.1109\/ICECET55527.2022.9872817"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Aslam, M., Ye, D., Tariq, A., Asad, M., Hanif, M., Ndzi, D., Chelloug, S.A., Elaziz, M.A., Al-Qaness, M.A.A., and Jilani, S.F. (2022). Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT. Sensors, 22.","DOI":"10.3390\/s22072697"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"2269","DOI":"10.1109\/ACCESS.2021.3137201","article-title":"Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets","volume":"10","author":"Zeeshan","year":"2022","journal-title":"IEEE Access"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"241","DOI":"10.3233\/JHS-200641","article-title":"An efficient approach to detect IoT botnet attacks using machine learning","volume":"26","author":"Alothman","year":"2020","journal-title":"J. High Speed Netw."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"3930","DOI":"10.1109\/JIOT.2021.3100755","article-title":"Federated Deep Learning for Zero-Day Botnet Attack Detection in IoT-Edge Devices","volume":"9","author":"Popoola","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1109\/JIOT.2021.3085194","article-title":"ToN_IoT: The Role of Heterogeneity and the Need for Standardization of Features and Attack Types in IoT Network Intrusion Data Sets","volume":"9","author":"Booij","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Huancayo Ramos, K.S., Sotelo Monge, M.A., and Maestre Vidal, J. (2020). Benchmark-Based Reference Model for Evaluating Botnet Detection Tools Driven by Traffic-Flow Analytics. Sensors, 20.","DOI":"10.3390\/s20164501"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Sen, S.Y., and Ozkurt, N. (2020, January 15\u201317). Convolutional Neural Network Hyperparameter Tuning with Adam Optimizer for ECG Classification. Proceedings of the 2020 Innovations in Intelligent Systems and Applications Conference (ASYU), Istanbul, Turkey.","DOI":"10.1109\/ASYU50717.2020.9259896"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"23210","DOI":"10.1109\/ACCESS.2019.2899074","article-title":"Genetic Optimization Method of Pantograph and Catenary Comprehensive Monitor Status Prediction Model Based on Adadelta Deep Neural Network","volume":"7","author":"Qu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"He, X., Zheng, Z., Chen, C., Zhou, Y., Luo, C., and Lin, Q. (2022). Distributed Evolution Strategies for Black-box Stochastic Optimization. arXiv.","DOI":"10.1109\/TPDS.2022.3168873"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","article-title":"Grey Wolf Optimizer","volume":"69","author":"Mirjalili","year":"2014","journal-title":"Adv. Eng. Softw."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","article-title":"The Whale Optimization Algorithm","volume":"95","author":"Mirjalili","year":"2016","journal-title":"Adv. Eng. Softw."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.ins.2021.03.060","article-title":"A novel IoT network intrusion detection approach based on Adaptive Particle Swarm Optimization Convolutional Neural Network","volume":"568","author":"Kan","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Bahaa, A., Sayed, A., Elfangary, L., and Fahmy, H. (2022). A novel hybrid optimization enabled robust CNN algorithm for an IoT network intrusion detection approach. PLoS ONE, 17.","DOI":"10.1371\/journal.pone.0278493"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Alzaqebah, A., Aljarah, I., Al-Kadi, O., and Dama\u0161evi\u010dius, R. (2022). A Modified Grey Wolf Optimization Algorithm for an Intrusion Detection System. Mathematics, 10.","DOI":"10.3390\/math10060999"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"108365","DOI":"10.1016\/j.asoc.2021.108365","article-title":"OPFaceNet: OPtimized Face Recognition Network for noise and occlusion affected face images using Hyperparameters tuned Convolutional Neural Network","volume":"117","author":"Lokku","year":"2022","journal-title":"Appl. Soft Comput."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"114107","DOI":"10.1016\/j.eswa.2020.114107","article-title":"Red fox optimization algorithm","volume":"166","year":"2021","journal-title":"Expert Syst. Appl."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Thapa, N., Liu, Z., Shaver, A., Esterline, A., Gokaraju, B., and Roy, K. (2021). Secure Cyber Defense: An Analysis of Network Intrusion-Based Dataset CCD-IDSv1 with Machine Learning and Deep Learning Models. Electronics, 10.","DOI":"10.3390\/electronics10151747"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Ahmed, N., Ngadi, A.B., Sharif, J.M., Hussain, S., Uddin, M., Rathore, M.S., Iqbal, J., Abdelhaq, M., Alsaqour, R., and Ullah, S.S. (2022). Network Threat Detection Using Machine\/Deep Learning in SDN-Based Platforms: A Comprehensive Analysis of State-of-the-Art Solutions, Discussion, Challenges, and Future Research Direction. Sensors, 22.","DOI":"10.3390\/s22207896"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"4280","DOI":"10.1109\/JIOT.2021.3103829","article-title":"On the Performance of Machine Learning Models for Anomaly-Based Intelligent Intrusion Detection Systems for the Internet of Things","volume":"9","author":"Abdelmoumin","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Lin, W.-H., Wang, P., Chao, K.-M., Lin, H.-C., Yang, Z.-Y., and Lai, Y.-H. (2022). Deep-Learning Model Selection and Parameter Estimation from a Wind Power Farm in Taiwan. Appl. Sci., 12.","DOI":"10.3390\/app12147067"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"21706","DOI":"10.1038\/s41598-025-04638-5","article-title":"(IoT) Network intrusion detection system using optimization algorithms","volume":"15","author":"Shan","year":"2025","journal-title":"Sci. Rep."},{"key":"ref_63","first-page":"450","article-title":"CNN-RGU Hyperparameter Tuning for Improving Cybersecurity Intrusion Detection in Industrial IOT Environment","volume":"10","author":"Wafi","year":"2025","journal-title":"J. Inf. Syst. Eng. Manag."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1007\/s43621-025-01141-9","article-title":"An adaptive hybrid framework for IIoT intrusion detection using neural networks and feature optimization using genetic algorithms","volume":"6","author":"Khan","year":"2025","journal-title":"Discov. Sustain."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"16485","DOI":"10.1038\/s41598-025-99574-9","article-title":"Advances to IoT security using a GRU-CNN deep learning model trained on SUCMO algorithm","volume":"15","author":"Sagu","year":"2025","journal-title":"Sci. Rep."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"21856","DOI":"10.1038\/s41598-025-07706-y","article-title":"Deep learning for network security: An Attention-CNN-LSTM model for accurate intrusion detection","volume":"15","author":"Alashjaee","year":"2025","journal-title":"Sci. Rep."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1007\/s42979-024-02794-5","article-title":"Optimized Convolutional Neural Network Using Hierarchical Particle Swarm Optimization for Sensor Based Human Activity Recognition","volume":"5","author":"Ankalaki","year":"2024","journal-title":"SN Comput. Sci."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., Shu, L., Djallel, H., and Choo, K.-K.R. (2021). Deep Learning-Based Intrusion Detection for Distributed Denial of Service Attack in Agriculture 4.0. Electronics, 10.","DOI":"10.3390\/electronics10111257"},{"key":"ref_69","first-page":"26","article-title":"Hyperparameter Optimization for Machine Learning Models Based on Bayesian Optimization","volume":"17","author":"Wu","year":"2019","journal-title":"J. Electron. Sci. Technol."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"107042","DOI":"10.1016\/j.comnet.2019.107042","article-title":"Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic","volume":"168","author":"Elmasry","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"8789","DOI":"10.1007\/s10586-024-04385-8","article-title":"A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud\/edge and IoT: State-of-the-art techniques, challenges, and future directions","volume":"27","author":"Hu","year":"2024","journal-title":"Clust. Comput."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Zada, I., Omran, E., Jan, S., Alfraihi, H., Alsalamah, S., Alshahrani, A., Hayat, S., and Phi, N. (2025). Enhancing IoT cybersecurity through lean-based hybrid feature selection and ensemble learning: A visual analytics approach to intrusion detection. PLoS ONE, 20.","DOI":"10.1371\/journal.pone.0328050"},{"key":"ref_73","unstructured":"Pokhrel, S., Abbas, R., and Aryal, B. (2021). IoT Security: Botnet detection in IoT using Machine learning. arXiv."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"105205","DOI":"10.1016\/j.compbiomed.2021.105205","article-title":"CNN architecture optimization using bio-inspired algorithms for breast cancer detection in infrared images","volume":"142","author":"Souza","year":"2022","journal-title":"Comput. Biol. Med."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Alharbi, A., Alosaimi, W., Alyami, H., Rauf, H.T., and Dama\u0161evi\u010dius, R. (2021). Botnet Attack Detection Using Local Global Best Bat Algorithm for Industrial Internet of Things. Electronics, 10.","DOI":"10.3390\/electronics10111341"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"107619","DOI":"10.1016\/j.compbiolchem.2021.107619","article-title":"Tuning hyperparameters of machine learning algorithms and deep neural networks using metaheuristics: A bioinformatics study on biomedical and biological cases","volume":"97","author":"Nematzadeh","year":"2022","journal-title":"Comput. Biol. Chem."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Brodzicki, A., Piekarski, M., and Jaworek-Korjakowska, J. (2021). The Whale Optimization Algorithm Approach for Deep Neural Networks. Sensors, 21.","DOI":"10.3390\/s21238003"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Ali, M.H., Jaber, M.M., Abd, S.K., Rehman, A., Awan, M.J., Dama\u0161evi\u010dius, R., and Bahaj, S.A. (2022). Threat Analysis and Distributed Denial of Service (DDoS) Attack Recognition in the Internet of Things (IoT). Electronics, 11.","DOI":"10.3390\/electronics11030494"},{"key":"ref_79","first-page":"27","article-title":"Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices","volume":"8","author":"Abbasi","year":"2021","journal-title":"J. Comput. Secur."},{"key":"ref_80","first-page":"39","article-title":"Integrating Deep Learning and Meta-Heuristics for Enhanced IoT Security and Energy Efficiency","volume":"1","author":"Daghighi","year":"2025","journal-title":"Int. J. Ind. Eng. Constr. Manag."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"3549","DOI":"10.1007\/s10115-024-02322-0","article-title":"Machine learning and metaheuristic optimization algorithms for feature selection and botnet attack detection","volume":"67","author":"Maazalahi","year":"2025","journal-title":"Knowl. Inf. Syst."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s44196-025-00774-y","article-title":"A Novel Hybrid Method Using Grey Wolf Algorithm and Genetic Algorithm for IoT Botnet DDoS Attacks Detection","volume":"18","author":"Maazalahi","year":"2025","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1038\/s41598-024-51154-z","article-title":"A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models","volume":"14","author":"Rabie","year":"2024","journal-title":"Sci. Rep."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"1916","DOI":"10.1038\/s41598-024-81147-x","article-title":"Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks","volume":"15","author":"Alqahtany","year":"2025","journal-title":"Sci. Rep."},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Doshi, R., Apthorpe, N., and Feamster, N. (2018, January 24). Machine Learning DDoS Detection for Consumer Internet of Things Devices. Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA.","DOI":"10.1109\/SPW.2018.00013"},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Anthi, E., Williams, L., and Burnap, P. (2018, January 28\u201329). Pulse: An adaptive intrusion detection for the internet of things. Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT\u20142018, London, UK.","DOI":"10.1049\/cp.2018.0035"},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Shukla, P. (2017, January 7\u20138). ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things. Proceedings of the 2017 Intelligent Systems Conference (IntelliSys), London, UK.","DOI":"10.1109\/IntelliSys.2017.8324298"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Deshmukh, A., and Ravulakollu, K. (2024). An Efficient CNN-Based Intrusion Detection System for IoT: Use Case Towards Cybersecurity. Technologies, 12.","DOI":"10.3390\/technologies12100203"},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Marques Da Silva Cardoso, A., Fernandes Lopes, R., Soares Teles, A., and Benedito Veras Magalhaes, F. (2018, January 17\u201320). Poster Abstract: Real-Time DDoS Detection Based on Complex Event Processing for IoT. Proceedings of the 2018 IEEE\/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI), Orlando, FL, USA.","DOI":"10.1109\/IoTDI.2018.00036"},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"110","DOI":"10.11591\/ijai.v10.i1.pp110-120","article-title":"Toward a deep learning-based intrusion detection system for IoT against botnet attacks","volume":"10","author":"Idrissi","year":"2021","journal-title":"IAES Int. J. Artif. Intell."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"107810","DOI":"10.1016\/j.compeleceng.2022.107810","article-title":"Anomaly-based intrusion detection system for IoT networks through deep learning model","volume":"99","author":"Saba","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"102662","DOI":"10.1016\/j.jnca.2020.102662","article-title":"Detecting Internet of Things attacks using distributed deep learning","volume":"163","author":"Rad","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"102747","DOI":"10.1016\/j.mex.2024.102747","article-title":"Towards secure IoT networks: A comprehensive study of metaheuristic algorithms in conjunction with CNN using a self-generated dataset","volume":"12","author":"Choudhary","year":"2024","journal-title":"MethodsX"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"3856","DOI":"10.1007\/s12083-024-01786-9","article-title":"Integrating deep learning and metaheuristics algorithms for blockchain-based reassurance data management in the detection of malicious IoT nodes","volume":"17","author":"Alserhani","year":"2024","journal-title":"Peer-Peer Netw. Appl."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"94889","DOI":"10.1109\/ACCESS.2021.3089376","article-title":"Fast and Robust Infrared Image Small Target Detection Based on the Convolution of Layered Gradient Kernel","volume":"9","author":"Hsieh","year":"2021","journal-title":"IEEE Access"},{"key":"ref_96","unstructured":"Hinton, G.E., Srivastava, N., Krizhevsky, A., Sutskever, I., and Salakhutdinov, R.R. (2012). Improving neural networks by preventing co-adaptation of feature detectors. arXiv."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/16\/12\/1103\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T10:28:15Z","timestamp":1765794495000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/16\/12\/1103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,15]]},"references-count":96,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["info16121103"],"URL":"https:\/\/doi.org\/10.3390\/info16121103","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,15]]}}}