{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T03:22:29Z","timestamp":1774236149222,"version":"3.50.1"},"reference-count":69,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T00:00:00Z","timestamp":1655078400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The Internet of Things (IoT) has become one of the most important concepts in various aspects of our modern life in recent years. However, the most critical challenge for the world-wide use of the IoT is to address its security issues. One of the most important tasks to address the security challenges in the IoT is to detect intrusion in the network. Although the machine\/deep learning-based solutions have been repeatedly used to detect network intrusion through recent years, there is still considerable potential to improve the accuracy and performance of the classifier (intrusion detector). In this paper, we develop a novel training algorithm to better tune the parameters of the used deep architecture. To specifically do so, we first introduce a novel neighborhood search-based particle swarm optimization (NSBPSO) algorithm to improve the exploitation\/exploration of the PSO algorithm. Next, we use the advantage of NSBPSO to optimally train the deep architecture as our network intrusion detector in order to obtain better accuracy and performance. For evaluating the performance of the proposed classifier, we use two network intrusion detection datasets named UNSW-NB15 and Bot-IoT to rate the accuracy and performance of the proposed classifier.<\/jats:p>","DOI":"10.3390\/s22124459","type":"journal-article","created":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T06:31:59Z","timestamp":1655101919000},"page":"4459","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["A Novel Deep Supervised Learning-Based Approach for Intrusion Detection in IoT Systems"],"prefix":"10.3390","volume":"22","author":[{"given":"Sahba","family":"Baniasadi","sequence":"first","affiliation":[{"name":"Department of Industrial Engineering, University of Houston, Houston, TX 77204, USA"}]},{"given":"Omid","family":"Rostami","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering, University of Houston, Houston, TX 77204, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8810-0695","authenticated-orcid":false,"given":"Diego","family":"Mart\u00edn","sequence":"additional","affiliation":[{"name":"ETSI Telecomunicaci\u00f3n, Universidad Polit\u00e9cnica de Madrid, 28040 Madrid, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2660-4158","authenticated-orcid":false,"given":"Mehrdad","family":"Kaveh","sequence":"additional","affiliation":[{"name":"ETSI Telecomunicaci\u00f3n, Universidad Polit\u00e9cnica de Madrid, 28040 Madrid, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2022,6,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Lee, S.K., Bae, M., and Kim, H. (2017). Future of IoT Networks: A Survey. Appl. Sci., 7.","DOI":"10.3390\/app7101072"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of things in industries: A survey","volume":"10","author":"He","year":"2014","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"8076","DOI":"10.1109\/JIOT.2019.2920987","article-title":"Blockchain for Internet of Things: A Survey","volume":"6","author":"Dai","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MC.2015.253","article-title":"Design and Deployment of an IoT Application-Oriented Testbed","volume":"48","author":"Belli","year":"2015","journal-title":"Computer"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2063","DOI":"10.1109\/TII.2021.3082907","article-title":"Intelligent Security Performance Prediction for IoT-Enabled Healthcare Networks Using an Improved CNN","volume":"18","author":"Xu","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1109\/TNSM.2021.3077276","article-title":"Trust-based blockchain authorization for iot","volume":"18","author":"Putra","year":"2021","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Agarwal, V., Sharma, S., and Agarwal, P. (2021). IoT Based Smart Transport Management and Vehicle-to-Vehicle Communication System. Computer Networks, Big Data and IoT, Springer.","DOI":"10.1007\/978-981-16-0965-7_55"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"24920","DOI":"10.1109\/JSEN.2021.3055618","article-title":"Artificial Intelligence-Based Sensors for Next Generation IoT Applications: A Review","volume":"21","author":"Mukhopadhyay","year":"2021","journal-title":"IEEE Sens. J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"102517","DOI":"10.1016\/j.scs.2020.102517","article-title":"Demand side management through load shifting in IoT based HEMS: Overview, challenges and opportunities","volume":"65","author":"Sharda","year":"2021","journal-title":"Sustain. Cities Soc."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Vadera, M.P., and Marlin, B.M. (2021). Challenges and Opportunities in Approximate Bayesian Deep Learning for Intelligent IoT Systems. arXiv.","DOI":"10.1109\/CogMI52975.2021.00040"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"100198","DOI":"10.1016\/j.fsir.2021.100198","article-title":"Challenges and opportunities for wearable IoT forensics: TomTom Spark 3 as a case study","volume":"3","author":"Dawson","year":"2021","journal-title":"Forensic Sci. Int. Rep."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","article-title":"On blockchain and its integration with IoT. Challenges and opportunities","volume":"88","author":"Reyna","year":"2018","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42452-019-1925-y","article-title":"Challenges and opportunities in IoT healthcare systems: A systematic review","volume":"2","author":"Selvaraj","year":"2020","journal-title":"SN Appl. Sci."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/MCOM.2017.1600604CM","article-title":"First Mile Challenges for Large-Scale IoT","volume":"55","author":"Bader","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"9036","DOI":"10.1109\/JSEN.2019.2922409","article-title":"Sensing, Controlling, and IoT Infrastructure in Smart Building: A Review","volume":"19","author":"Verma","year":"2019","journal-title":"IEEE Sens. J."},{"key":"ref_16","unstructured":"McGuire, D. (2017). Security Challenges with the Commercialization of the Internet of Things. [Ph.D. Thesis, Cardiff Metropolitan University]."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"74562","DOI":"10.1109\/ACCESS.2021.3080835","article-title":"An Ultra-Lightweight Mutual Authentication Scheme for Smart Grid Two-Way Communications","volume":"9","author":"Aghapour","year":"2021","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","article-title":"Current research on Internet of Things (IoT) security: A survey","volume":"148","author":"Hassan","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1631\/FITEE.2000043","article-title":"An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication","volume":"22","author":"Kaveh","year":"2021","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MSP.2018.2825478","article-title":"IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?","volume":"35","author":"Xiao","year":"2018","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Najafi, F., Kaveh, M., Mart\u00edn, D., and Reza Mosavi, M. (2021). Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks. Sensors, 21.","DOI":"10.3390\/s21062009"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Kaveh, M., Mart\u00edn, D., and Mosavi, M.R. (2020). A Lightweight Authentication Scheme for V2G Communications: A PUF-Based Approach Ensuring Cyber\/Physical Security and Identity\/Location Privacy. Electronics, 9.","DOI":"10.3390\/electronics9091479"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"125477","DOI":"10.1109\/ACCESS.2020.3007623","article-title":"An Ultra-Lightweight and Provably Secure Broadcast Authentication Protocol for Smart Grid Communications","volume":"8","author":"Aghapour","year":"2020","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Kaveh, M., Aghapour, S., Martin, D., and Mosavi, M.R. (2020, January 9\u201312). A secure lightweight signcryption scheme for smart grid communications using reliable physically unclonable function. Proceedings of the 2020 IEEE International Conference on Environment and Electrical Engineering and 2020 IEEE Industrial and Commercial Power Systems Europe (EEEIC\/I&CPS Europe), Madrid, Spain.","DOI":"10.1109\/EEEIC\/ICPSEurope49358.2020.9160596"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"4535","DOI":"10.1109\/JSYST.2019.2963235","article-title":"A Lightweight Mutual Authentication for Smart Grid Neighborhood Area Network Communications Based on Physically Unclonable Function","volume":"14","author":"Kaveh","year":"2020","journal-title":"IEEE Syst. J."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","article-title":"A survey of intrusion detection in Internet of Things","volume":"84","author":"Miani","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","article-title":"Network Intrusion Detection for IoT Security Based on Learning Techniques","volume":"21","author":"Chaabouni","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1186\/s13677-018-0123-6","article-title":"Intrusion detection systems for IoT-based smart environments: A survey","volume":"7","author":"Elrawy","year":"2018","journal-title":"J. Cloud Comput."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Suo, H., Wan, J., Zou, C., and Liu, J. (2012, January 23\u201325). Security in the internet of things: A review. Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering, Hangzhou, China.","DOI":"10.1109\/ICCSEE.2012.373"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"34131","DOI":"10.1109\/ACCESS.2021.3061257","article-title":"An Accelerated End-to-End Probing Protocol for Narrowband IoT Medical Devices","volume":"9","author":"Ghoumid","year":"2021","journal-title":"IEEE Access"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"5320","DOI":"10.1007\/s11227-019-02945-z","article-title":"Distributed denial of service attacks and its defenses in IoT: A survey","volume":"76","author":"Salim","year":"2020","journal-title":"J. Supercomput."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Vaccari, I., Aiello, M., and Cambiaso, E. (2020). SlowTT: A Slow Denial of Service against IoT Networks. Information, 11.","DOI":"10.3390\/info11090452"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"100471","DOI":"10.1016\/j.sste.2021.100471","article-title":"Spatio-temporal modeling of COVID-19 prevalence and mortality using artificial neural network algorithms","volume":"40","author":"Kianfar","year":"2022","journal-title":"Spat. Spatio-Temporal Epidemiol."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"23025","DOI":"10.1109\/ACCESS.2021.3056291","article-title":"An Efficient Design of Anderson PUF by Utilization of the Xilinx Primitives in the SLICEM","volume":"9","author":"Lotfy","year":"2021","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"e3803","DOI":"10.1002\/ett.3803","article-title":"DL-IDS: A deep learning\u2013based intrusion detection framework for securing IoT","volume":"33","author":"Otoum","year":"2019","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Churcher, A., Ullah, R., Ahmad, J., Rehman, S.U., Masood, F., Gogate, M., Alqahtani, F., Nour, B., and Buchanan, W. (2021). An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks. Sensors, 21.","DOI":"10.3390\/s21020446"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s10922-021-09589-6","article-title":"AS-IDS: Anomaly and Signature Based IDS for the Internet of Things","volume":"29","author":"Otoum","year":"2021","journal-title":"J. Netw. Syst. Manag."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1109\/TETC.2016.2633228","article-title":"A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks","volume":"7","author":"Pajouh","year":"2016","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1109\/TSMCC.2010.2048428","article-title":"Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods","volume":"40","author":"Tavallaee","year":"2010","journal-title":"IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)"},{"key":"ref_40","first-page":"012049","article-title":"A Survey on anomaly based host intrusion detection system","volume":"Volume 1000","author":"Jose","year":"2018","journal-title":"Journal of Physics: Conference Series"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"e4150","DOI":"10.1002\/ett.4150","article-title":"Network intrusion detection system: A systematic study of machine learning and deep learning approaches","volume":"32","author":"Ahmad","year":"2021","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"104216","DOI":"10.1016\/j.engappai.2021.104216","article-title":"Supervised feature selection techniques in network intrusion detection: A critical review","volume":"101","author":"Galatro","year":"2021","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_43","first-page":"70","article-title":"A Survey of Distance and Similarity Measures Used Within Network Intrusion Anomaly Detection","volume":"17","author":"Borghetti","year":"2014","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.cose.2010.12.004","article-title":"HMMPayl: An intrusion detection system based on Hidden Markov Models","volume":"30","author":"Ariu","year":"2011","journal-title":"Comput. Secur."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"13492","DOI":"10.1016\/j.eswa.2012.07.009","article-title":"A network intrusion detection system based on a Hidden Na\u00efve Bayes multiclass classifier","volume":"39","author":"Koc","year":"2012","journal-title":"Expert Syst. Appl."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.knosys.2015.01.009","article-title":"CANN: An intrusion detection system based on combining cluster centers and nearest neighbors","volume":"78","author":"Lin","year":"2015","journal-title":"Knowl.-Based Syst."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1109\/TSP.2003.814797","article-title":"Anomaly detection in IP networks","volume":"51","author":"Thottan","year":"2003","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Thaseen, I.S., and Kumar, C.A. (2014, January 27\u201329). Intrusion detection model using fusion of PCA and optimized SVM. Proceedings of the IEEE International Conference on Contemporary Computing and Informatics (IC3I), Mysuru, India.","DOI":"10.1109\/IC3I.2014.7019692"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","article-title":"Intrusion detection by machine learning: A review","volume":"36","author":"Tsai","year":"2009","journal-title":"Expert Syst. Appl."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"4815","DOI":"10.1109\/JIOT.2018.2871719","article-title":"An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things","volume":"6","author":"Moustafa","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Lee, S., Kim, D., and Park, J. (2007, January 15\u201319). A hybrid approach for real-time network intrusion detection systems. Proceedings of the International Conference on Computational Intelligence and Security, Harbin, China.","DOI":"10.1109\/CIS.2007.10"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"9960","DOI":"10.1109\/JIOT.2021.3119055","article-title":"A Novel Intrusion Detection Method Based on Lightweight Neural Network for Internet of Things","volume":"9","author":"Zhao","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.knosys.2017.09.014","article-title":"An effective intrusion detection framework based on SVM with feature augmentation","volume":"136","author":"Wang","year":"2017","journal-title":"Knowl.-Based Syst."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","article-title":"A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks","volume":"5","author":"Yin","year":"2017","journal-title":"IEEE Access"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"183207","DOI":"10.1109\/ACCESS.2019.2959131","article-title":"A Novel Multimodal-Sequential Approach Based on Multi-View Features for Network Intrusion Detection","volume":"7","author":"He","year":"2019","journal-title":"IEEE Access"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1109\/TNSM.2019.2927886","article-title":"A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks","volume":"16","author":"Garg","year":"2019","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"6187","DOI":"10.1109\/JIOT.2020.3034621","article-title":"Toward Effective Intrusion Detection Using Log-Cosh Conditional Variational Autoencoder","volume":"8","author":"Xu","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1007\/s10596-020-10030-1","article-title":"Optimal feature selection for SAR image classification using biogeography-based optimization (BBO), artificial bee colony (ABC) and support vector machine (SVM): A combined approach of optimization and machine learning","volume":"25","author":"Rostami","year":"2021","journal-title":"Comput. Geosci."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.apacoust.2016.11.012","article-title":"Improved migration models of biogeography-based optimization for sonar dataset classification by using neural network","volume":"118","author":"Khishe","year":"2017","journal-title":"Appl. Acoust."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s10470-018-1366-3","article-title":"Design and implementation of a neighborhood search biogeography-based optimization trainer for classifying sonar dataset using multi-layer perceptron neural network","volume":"100","author":"Kaveh","year":"2019","journal-title":"Analog Integr. Circuits Signal Process."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/s12518-020-00297-5","article-title":"Multiple criteria decision-making for hospital location-allocation based on improved genetic algorithm","volume":"12","author":"Kaveh","year":"2020","journal-title":"Appl. Geomat."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s10470-020-01599-9","article-title":"An enhanced fuzzy controller based on improved genetic algorithm for speed control of DC motors","volume":"105","author":"Lotfy","year":"2020","journal-title":"Analog Integr. Circuits Signal Process."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1016\/j.cie.2019.06.058","article-title":"Improved biogeography-based optimization using migration process adjustment: An approach for location-allocation of ambulances","volume":"135","author":"Kaveh","year":"2019","journal-title":"Comput. Ind. Eng."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Moustafa, N., and Slay, J. (2015, January 10\u201312). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). Proceedings of the IEEE Military Communications and Information Systems Conference (MilCIS), Canberra, Australia.","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"103674","DOI":"10.1016\/j.engappai.2020.103674","article-title":"An iterated greedy algorithm for the obnoxious p-median problem","volume":"92","author":"Gokalp","year":"2020","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"4591","DOI":"10.1007\/s10462-021-10006-2","article-title":"Application of an improved discrete crow search algorithm with local search and elitism on a humanitarian relief case","volume":"54","year":"2021","journal-title":"Artif. Intell. Rev."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"103249","DOI":"10.1016\/j.engappai.2019.103249","article-title":"Black Widow Optimization Algorithm: A novel meta-heuristic approach for solving engineering optimization problems","volume":"87","author":"Hayyolalam","year":"2020","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.swevo.2011.02.002","article-title":"A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms","volume":"1","author":"Derrac","year":"2011","journal-title":"Swarm Evol. Comput."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/12\/4459\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:28:37Z","timestamp":1760138917000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/12\/4459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,13]]},"references-count":69,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2022,6]]}},"alternative-id":["s22124459"],"URL":"https:\/\/doi.org\/10.3390\/s22124459","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,13]]}}}