Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization

High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network’s external foreign entities through the Inte...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Sensors (Basel, Switzerland) Ročník 22; číslo 16; s. 6117
Hlavní autori: Alterazi, Hassan A., Kshirsagar, Pravin R., Manoharan, Hariprasath, Selvarajan, Shitharth, Alhebaishi, Nawaf, Srivastava, Gautam, Lin, Jerry Chun-Wei
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Basel MDPI AG 01.08.2022
MDPI
Predmet:
ISSN:1424-8220, 1424-8220
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network’s external foreign entities through the Internet (IP). IoT devices are in danger of security issues due to the surge in hacker attacks during Internet data exchange. If such strong attacks are to create a reliable security system, attack detection is essential. Attacks and abnormalities such as user-to-root (U2R), denial-of-service, and data-type probing could have an impact on an IoT system. This article examines various performance-based AI models to predict attacks and problems with IoT devices with accuracy. Particle Swarm Optimization (PSO), genetic algorithms, and ant colony optimization were used to demonstrate the effectiveness of the suggested technique concerning four different parameters. The results of the proposed method employing PSO outperformed those of the existing systems by roughly 73 percent.
AbstractList High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network’s external foreign entities through the Internet (IP). IoT devices are in danger of security issues due to the surge in hacker attacks during Internet data exchange. If such strong attacks are to create a reliable security system, attack detection is essential. Attacks and abnormalities such as user-to-root (U2R), denial-of-service, and data-type probing could have an impact on an IoT system. This article examines various performance-based AI models to predict attacks and problems with IoT devices with accuracy. Particle Swarm Optimization (PSO), genetic algorithms, and ant colony optimization were used to demonstrate the effectiveness of the suggested technique concerning four different parameters. The results of the proposed method employing PSO outperformed those of the existing systems by roughly 73 percent.
High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network's external foreign entities through the Internet (IP). IoT devices are in danger of security issues due to the surge in hacker attacks during Internet data exchange. If such strong attacks are to create a reliable security system, attack detection is essential. Attacks and abnormalities such as user-to-root (U2R), denial-of-service, and data-type probing could have an impact on an IoT system. This article examines various performance-based AI models to predict attacks and problems with IoT devices with accuracy. Particle Swarm Optimization (PSO), genetic algorithms, and ant colony optimization were used to demonstrate the effectiveness of the suggested technique concerning four different parameters. The results of the proposed method employing PSO outperformed those of the existing systems by roughly 73 percent.High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network's external foreign entities through the Internet (IP). IoT devices are in danger of security issues due to the surge in hacker attacks during Internet data exchange. If such strong attacks are to create a reliable security system, attack detection is essential. Attacks and abnormalities such as user-to-root (U2R), denial-of-service, and data-type probing could have an impact on an IoT system. This article examines various performance-based AI models to predict attacks and problems with IoT devices with accuracy. Particle Swarm Optimization (PSO), genetic algorithms, and ant colony optimization were used to demonstrate the effectiveness of the suggested technique concerning four different parameters. The results of the proposed method employing PSO outperformed those of the existing systems by roughly 73 percent.
Audience Academic
Author Selvarajan, Shitharth
Srivastava, Gautam
Alhebaishi, Nawaf
Alterazi, Hassan A.
Lin, Jerry Chun-Wei
Manoharan, Hariprasath
Kshirsagar, Pravin R.
AuthorAffiliation 2 Department of Artificial Intelligence, G. H Raisoni College of Engineering, Nagpur 440016, India
5 Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 22254, Saudi Arabia
8 Department of Computer Science, Electrical Engineering and Mathematical Sciences, Western Norway University of Applied Sciences, 5063 Bergen, Norway
4 Department of Computer Science, Kebri Dehar University, Kebri Dehar 001, Ethiopia
7 Research Center for Interneural Computing, China Medical University, Taichung 406040, Taiwan
1 Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 22254, Saudi Arabia
3 Department of Electronics and Communication Engineering, Panimalar Engineering College, Poonamallee, Chennai 600123, India
6 Department of Mathematics and Computer Science, Brandon University, Brandon, MB R7A 6A9, Canada
AuthorAffiliation_xml – name: 7 Research Center for Interneural Computing, China Medical University, Taichung 406040, Taiwan
– name: 8 Department of Computer Science, Electrical Engineering and Mathematical Sciences, Western Norway University of Applied Sciences, 5063 Bergen, Norway
– name: 2 Department of Artificial Intelligence, G. H Raisoni College of Engineering, Nagpur 440016, India
– name: 1 Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 22254, Saudi Arabia
– name: 6 Department of Mathematics and Computer Science, Brandon University, Brandon, MB R7A 6A9, Canada
– name: 3 Department of Electronics and Communication Engineering, Panimalar Engineering College, Poonamallee, Chennai 600123, India
– name: 4 Department of Computer Science, Kebri Dehar University, Kebri Dehar 001, Ethiopia
– name: 5 Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 22254, Saudi Arabia
Author_xml – sequence: 1
  givenname: Hassan A.
  orcidid: 0000-0003-0137-9422
  surname: Alterazi
  fullname: Alterazi, Hassan A.
– sequence: 2
  givenname: Pravin R.
  surname: Kshirsagar
  fullname: Kshirsagar, Pravin R.
– sequence: 3
  givenname: Hariprasath
  orcidid: 0000-0001-5034-3034
  surname: Manoharan
  fullname: Manoharan, Hariprasath
– sequence: 4
  givenname: Shitharth
  orcidid: 0000-0002-4931-724X
  surname: Selvarajan
  fullname: Selvarajan, Shitharth
– sequence: 5
  givenname: Nawaf
  orcidid: 0000-0003-0438-4243
  surname: Alhebaishi
  fullname: Alhebaishi, Nawaf
– sequence: 6
  givenname: Gautam
  orcidid: 0000-0001-9851-4103
  surname: Srivastava
  fullname: Srivastava, Gautam
– sequence: 7
  givenname: Jerry Chun-Wei
  orcidid: 0000-0001-8768-9709
  surname: Lin
  fullname: Lin, Jerry Chun-Wei
BookMark eNplkk1rGzEQhpeS0ny0h_6DhV7agxN9rnYvhWD6YQgkkOTSi5C0I1tmV3IlbYL76yvHbmlSdBgxet9HM9KcVkc-eKiq9xidU9qhi0QIbhqMxavqBDPCZi0h6Oif_XF1mtIaIUIpbd9Ux7RBmLeiPal-3ER4AJ9d8HWw9XyrIda3YKbo8rZ-dHlV5xXUC58hesg7zd3K-WWq71MJ9Y2K2ZkB6ttHFcf6epPd6H6pHe9t9dqqIcG7Qzyr7r9-uZt_n11df1vML69mhrU8z3pdiukQ5bgVBkRDGDK00wRra7kWYHtOOtMSQ4BQwFZrBp2iWNBWay0oPasWe24f1FpuohtV3MqgnHxKhLiUhyKlpYw0jaECgDFMWYu6gutoz3hjO9ixPu9Zm0mP0JvyMlENz6DPT7xbyWV4kF3BYYwK4OMBEMPPCVKWo0sGhkF5CFOSRCDRYMS4KNIPL6TrMEVfnmqnahhnvMNFdb5XLVVpwHkbyr2mrB5GZ8ocWFfyl4I1vBSAeTFc7A0mhpQiWGlcfvqQYnSDxEjuhkb-HZri-PTC8aff_7W_ARpiwNg
CitedBy_id crossref_primary_10_20525_ijrbs_v12i4_2473
crossref_primary_10_3390_biomimetics9060307
crossref_primary_10_3389_fcomp_2023_997159
crossref_primary_10_2174_0123520965276302240115075612
crossref_primary_10_1007_s11760_024_03142_z
crossref_primary_10_3390_s22197169
crossref_primary_10_1007_s11694_023_02294_9
crossref_primary_10_1088_2631_8695_adf942
crossref_primary_10_32604_cmc_2023_038534
crossref_primary_10_1109_ACCESS_2025_3583922
crossref_primary_10_3390_coatings13091604
crossref_primary_10_1038_s41598_025_91856_6
crossref_primary_10_1109_ACCESS_2023_3307492
crossref_primary_10_1186_s44147_025_00635_7
crossref_primary_10_3390_electronics12030747
crossref_primary_10_1016_j_neucom_2024_127427
crossref_primary_10_1080_01468030_2024_2342275
crossref_primary_10_1016_j_compeleceng_2023_108773
crossref_primary_10_1016_j_knosys_2024_112633
crossref_primary_10_1109_ACCESS_2025_3531216
Cites_doi 10.1109/ACCESS.2022.3171660
10.3390/informatics6010008
10.1109/TIFS.2022.3140687
10.1007/s43926-020-00001-4
10.3390/en15103624
10.1109/TII.2018.2836150
10.1109/WCNCW.2018.8369033
10.11591/eei.v6i2.605
10.1109/SPW.2019.00023
10.1109/COMST.2019.2896380
10.1109/TII.2019.2956474
10.1007/s11277-021-08725-4
10.1016/j.cose.2019.05.016
10.1007/s00521-014-1629-6
10.1088/1742-6596/1345/4/042075
10.1007/978-3-319-45507-5_6
10.1155/2022/8457116
10.1007/s42979-021-00557-0
10.1109/MilCIS.2017.8190421
10.1111/coin.12367
10.1016/j.iot.2019.100056
10.1007/s00521-017-3317-9
10.3390/s20030816
10.1109/ICTC.2015.7354752
10.1109/ACCESS.2018.2799306
10.1016/j.comnet.2019.107042
10.1016/j.engappai.2013.04.010
10.1109/ACCESS.2020.3013145
10.1049/cp.2015.0714
10.1016/j.compeleceng.2017.07.008
10.1007/978-3-030-49669-2
10.1109/ACCESS.2021.3129053
10.1155/2021/3329581
10.1007/s10586-017-0971-8
10.1109/ICRIS.2019.00087
ContentType Journal Article
Copyright COPYRIGHT 2022 MDPI AG
2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2022 by the authors. 2022
Copyright_xml – notice: COPYRIGHT 2022 MDPI AG
– notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2022 by the authors. 2022
DBID AAYXX
CITATION
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
7X8
5PM
DOA
DOI 10.3390/s22166117
DatabaseName CrossRef
ProQuest Central (Corporate)
Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni Edition)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
ProQuest Central Korea
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
Health & Medical Collection (Alumni Edition)
Medical Database
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList CrossRef

MEDLINE - Academic
Publicly Available Content Database


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_f34266c37ee44134809bb493d456f9e3
PMC9413110
A746531115
10_3390_s22166117
GrantInformation_xml – fundername: Western Norway University of Applied Sciences, Bergen, Norway
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFFHD
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IAO
ITC
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PJZUB
PPXIY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
3V.
7XB
8FK
AZQEC
DWQXO
K9.
PKEHL
PQEST
PQUKI
7X8
PUEGO
5PM
ID FETCH-LOGICAL-c485t-db6019035187ce76240c39b21bff5b7efd529c82c2e23e1fbb4e9a31738bbb733
IEDL.DBID BENPR
ISICitedReferencesCount 25
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000845197700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1424-8220
IngestDate Fri Oct 03 12:50:28 EDT 2025
Tue Nov 04 01:55:50 EST 2025
Fri Sep 05 10:20:23 EDT 2025
Tue Oct 07 07:47:08 EDT 2025
Tue Nov 04 18:17:01 EST 2025
Tue Nov 18 21:55:49 EST 2025
Sat Nov 29 07:18:25 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 16
Language English
License Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c485t-db6019035187ce76240c39b21bff5b7efd529c82c2e23e1fbb4e9a31738bbb733
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0001-9851-4103
0000-0001-8768-9709
0000-0003-0137-9422
0000-0001-5034-3034
0000-0003-0438-4243
0000-0002-4931-724X
OpenAccessLink https://www.proquest.com/docview/2706454591?pq-origsite=%requestingapplication%
PMID 36015878
PQID 2706454591
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_f34266c37ee44134809bb493d456f9e3
pubmedcentral_primary_oai_pubmedcentral_nih_gov_9413110
proquest_miscellaneous_2707610457
proquest_journals_2706454591
gale_infotracacademiconefile_A746531115
crossref_citationtrail_10_3390_s22166117
crossref_primary_10_3390_s22166117
PublicationCentury 2000
PublicationDate 2022-08-01
PublicationDateYYYYMMDD 2022-08-01
PublicationDate_xml – month: 08
  year: 2022
  text: 2022-08-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationYear 2022
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Shitharth (ref_42) 2021; 9
Dilek (ref_40) 2015; 6
Sudhir (ref_38) 2016; 1
Mahdi (ref_43) 2022; 17
ref_13
ref_35
ref_12
Patil (ref_2) 2019; 85
Malik (ref_14) 2018; 21
Shamshirband (ref_30) 2013; 26
ref_32
Aljuhani (ref_6) 2019; 2
Farivar (ref_20) 2020; 16
Fadlil (ref_7) 2017; 6
ref_18
Setiawan (ref_21) 2019; 12
Wiafe (ref_39) 2020; 8
Mirjalili (ref_3) 2014; 25
ref_17
ref_16
ref_37
Elmasry (ref_10) 2020; 168
Kuzlu (ref_22) 2021; 1
Shitharth (ref_36) 2022; 10
Qi (ref_33) 2019; 1345
Jun (ref_27) 2021; 2021
Akojwar (ref_29) 2016; 7
Chaabouni (ref_19) 2019; 21
ref_25
Suroor (ref_28) 2017; 9
Alabbas (ref_31) 2021; 37
Casola (ref_8) 2019; 7
ref_23
Liu (ref_1) 2018; 14
Sarker (ref_34) 2021; 2
Wang (ref_24) 2018; 6
ref_41
Garg (ref_15) 2018; 71
ref_26
ref_9
Khadidos (ref_11) 2022; 2022
Huda (ref_5) 2018; 31
Mazini (ref_4) 2018; 31
References_xml – volume: 10
  start-page: 46424
  year: 2022
  ident: ref_36
  article-title: An Innovative Perceptual Pigeon Galvanized Optimization (PPGO) Based Likelihood Naïve Bayes (LNB) Classification Approach for Network Intrusion Detection System
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3171660
– ident: ref_23
  doi: 10.3390/informatics6010008
– volume: 17
  start-page: 357
  year: 2022
  ident: ref_43
  article-title: Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2022.3140687
– volume: 1
  start-page: 7
  year: 2021
  ident: ref_22
  article-title: Role of Artificial Intelligence in the Internet of Things (IoT) cybersecurity
  publication-title: Discov. Internet Things
  doi: 10.1007/s43926-020-00001-4
– ident: ref_17
  doi: 10.3390/en15103624
– volume: 14
  start-page: 3801
  year: 2018
  ident: ref_1
  article-title: Defending on–off attacks using light probing messages in smart sensors for industrial communication systems
  publication-title: IEEE Trans. Ind. Inf.
  doi: 10.1109/TII.2018.2836150
– ident: ref_9
  doi: 10.1109/WCNCW.2018.8369033
– volume: 9
  start-page: 229
  year: 2017
  ident: ref_28
  article-title: Identifying the factors of modern-day stress using machine learning
  publication-title: Int. J. Eng. Sci. Technol.
– volume: 2
  start-page: 83
  year: 2019
  ident: ref_6
  article-title: Mitigation of Application Layer DDoS Flood Attack Against Web Servers
  publication-title: J. Inf. Secur. Cybercrimes Res.
– volume: 6
  start-page: 140
  year: 2017
  ident: ref_7
  article-title: Review of detection DDOS attack detection using naive bayes classifier for network forensics
  publication-title: Bull. Electr. Eng. Inform.
  doi: 10.11591/eei.v6i2.605
– ident: ref_13
  doi: 10.1109/SPW.2019.00023
– volume: 21
  start-page: 2671
  year: 2019
  ident: ref_19
  article-title: Network Intrusion Detection for IoT Security based on Learning Techniques
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2019.2896380
– volume: 16
  start-page: 2716
  year: 2020
  ident: ref_20
  article-title: Artificial intelligence for detection, estimation, and compensation of malicious attacks in nonlinear cyber-physical systems and industrial IoT
  publication-title: IEEE Trans. Ind. Inf.
  doi: 10.1109/TII.2019.2956474
– ident: ref_41
  doi: 10.1007/s11277-021-08725-4
– ident: ref_18
– volume: 85
  start-page: 402
  year: 2019
  ident: ref_2
  article-title: Designing an efficient security framework for detecting intrusions in virtual network of cloud computing
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2019.05.016
– volume: 25
  start-page: 1423
  year: 2014
  ident: ref_3
  article-title: Binary optimization using hybrid particle swarm optimization and gravitational search algorithm
  publication-title: Neural Comput. Appl.
  doi: 10.1007/s00521-014-1629-6
– volume: 1345
  start-page: 402
  year: 2019
  ident: ref_33
  article-title: Analysis on the Application of artificial Intelligence in classroom
  publication-title: J. Phys. Conf. Ser.
  doi: 10.1088/1742-6596/1345/4/042075
– ident: ref_37
  doi: 10.1007/978-3-319-45507-5_6
– volume: 2022
  start-page: 8457116
  year: 2022
  ident: ref_11
  article-title: Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism
  publication-title: J. Sens.
  doi: 10.1155/2022/8457116
– volume: 2
  start-page: 1
  year: 2021
  ident: ref_34
  article-title: AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions
  publication-title: SN Comput. Sci.
  doi: 10.1007/s42979-021-00557-0
– ident: ref_16
  doi: 10.1109/MilCIS.2017.8190421
– volume: 37
  start-page: 1286
  year: 2021
  ident: ref_31
  article-title: Performance enhancement of safety message communication via designing dynamic power control mechanisms in vehicular ad hoc networks
  publication-title: Comput. Intell.
  doi: 10.1111/coin.12367
– volume: 7
  start-page: 100056
  year: 2019
  ident: ref_8
  article-title: Toward the automation of threat modeling and risk assessment in iot systems
  publication-title: Int. Things
  doi: 10.1016/j.iot.2019.100056
– volume: 31
  start-page: 4287
  year: 2018
  ident: ref_5
  article-title: Efficient feature selection and classification algorithm based on PSO and rough sets
  publication-title: Neural Comput. Appl.
  doi: 10.1007/s00521-017-3317-9
– volume: 31
  start-page: 541
  year: 2018
  ident: ref_4
  article-title: Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms
  publication-title: J. King Saud. Univ. Comput. Inf. Sci.
– volume: 1
  start-page: 231
  year: 2016
  ident: ref_38
  article-title: Performance Evolution of Optimization Techniques for Mathematical Benchmark Functions
  publication-title: Int. J. Comput.
– ident: ref_32
  doi: 10.3390/s20030816
– volume: 7
  start-page: 79
  year: 2016
  ident: ref_29
  article-title: A Novel Probabilistic-PSO Based Learning Algorithm for Optimization of Neural Networks for Benchmark Problems
  publication-title: Wseas Trans. Electron.
– ident: ref_25
  doi: 10.1109/ICTC.2015.7354752
– volume: 12
  start-page: 378
  year: 2019
  ident: ref_21
  article-title: Increasing accuracy and completeness of intrusion detection model using fusion of normalization, feature selection method and support vector machine
  publication-title: Int. J. Intell. Eng. Syst.
– volume: 6
  start-page: 8547
  year: 2018
  ident: ref_24
  article-title: An Immune Genetic Algorithm for Multi-Echelon Inventory Cost Control of IoT Based Supply Chains
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2799306
– volume: 6
  start-page: 6
  year: 2015
  ident: ref_40
  article-title: Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review
  publication-title: Int. J. Artif. Intell. Appl.
– volume: 168
  start-page: 107042
  year: 2020
  ident: ref_10
  article-title: Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2019.107042
– volume: 26
  start-page: 2105
  year: 2013
  ident: ref_30
  article-title: An appraisal and design of a multi -agent system based cooperative wireless intrusion detection computational intelligence technique
  publication-title: Eng. Appl. Artif. Intell.
  doi: 10.1016/j.engappai.2013.04.010
– volume: 8
  start-page: 146598
  year: 2020
  ident: ref_39
  article-title: Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3013145
– ident: ref_26
  doi: 10.1049/cp.2015.0714
– volume: 71
  start-page: 798
  year: 2018
  ident: ref_15
  article-title: Fuzzified cuckoo based clustering technique for network anomaly detection
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2017.07.008
– ident: ref_12
  doi: 10.1007/978-3-030-49669-2
– volume: 9
  start-page: 156297
  year: 2021
  ident: ref_42
  article-title: An Enriched RPCO-BCNN Mechanisms for Attack Detection and Classification in SCADA Systems
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3129053
– volume: 2021
  start-page: 3329581
  year: 2021
  ident: ref_27
  article-title: Artificial Intelligence Application in Cybersecurity and Cyberdefense
  publication-title: Wirel. Commun. Mob. Comput.
  doi: 10.1155/2021/3329581
– volume: 21
  start-page: 667
  year: 2018
  ident: ref_14
  article-title: A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection
  publication-title: Clust. Comput.
  doi: 10.1007/s10586-017-0971-8
– ident: ref_35
  doi: 10.1109/ICRIS.2019.00087
SSID ssj0023338
Score 2.518053
Snippet High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects...
SourceID doaj
pubmedcentral
proquest
gale
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Enrichment Source
Index Database
StartPage 6117
SubjectTerms Accuracy
Air conditioning
Algorithms
Analysis
ant colony optimization
Artificial intelligence
cyber security threats
Cybersecurity
Cyberterrorism
Data security
genetic algorithm
Internet of Things
Mathematical optimization
optimization techniques
particle swarm optimization
Privacy
Safety and security measures
Sensors
Software
Transmission Control Protocol/Internet Protocol (Computer network protocol)
Ventilation
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NaxUxEB-k9KAH8RNXa4ki6GXp20zSbI5tafEgtVCV4iVssgkW2n3y3qvif-9MNu_5ngpevC27c5hMMl_Zmd8AvEqIyoeo6kBPlKCESd2ZQIGcpPAZQ-zbfKH_6Z05PW0vLuzZ2qgvrgkb4YFHwe0lZB8S0MRInhtVO7HeK4s9ef5kY8b5pKhnmUyVVAsp8xpxhJCS-r25lA05ojyV7Jf3ySD9f5ri38sj1_zNyT24WwJFcTAyeB9uxeEB3FmDD3wIn5f4S9NBTJM4-uHjTJyXgXSCb1gFhXdivPSLC6YZx3SKXCggzsrqxfn3bnYt3pP1uC5tmY_g48nxh6O3dZmVUAfV6kXd-33uCkfdtCZEsnAkdrReNj4l7U1MvZY2tDLIKDE2iWQYbUfBA7bee4P4GLaG6RCfgCAV7bXvI3YmKfTJmiZ1LZLfR-112q_gzVKGLhQgcZ5nceUooWBxu5W4K3i5Iv06omf8jeiQN2JFwIDX-QUdA1cE4f51DCp4zdvoWC2JmdCV7gJaEgNcuQPDQHJk2HUFO8uddkVf504axu1T2jYVvFh9Jk3j3yfdEKc3mcZQsKk0cWw2TsgG65tfhssvGbPbKsY1mjz9H2t9BrclN2HkMsQd2FrMbuJz2A7fFpfz2W5WhJ-Siw4W
  priority: 102
  providerName: Directory of Open Access Journals
Title Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization
URI https://www.proquest.com/docview/2706454591
https://www.proquest.com/docview/2707610457
https://pubmed.ncbi.nlm.nih.gov/PMC9413110
https://doaj.org/article/f34266c37ee44134809bb493d456f9e3
Volume 22
WOSCitedRecordID wos000845197700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: DOA
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: M~E
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Health & Medical Collection
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: 7X7
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthcomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central (subscription)
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: BENPR
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: PIMPY
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwELbolgMceCMCZWUQElyibvyo4xNqq61AoktEAS1cotixoRJNSnYL4sJvZ8bxpl1AXLhEkT1SnIxn_M3E_oaQJ55zYawTqYU7CFDsJK2UBSDHAD5z6-o8JPTfv1KzWT6f6yIm3BZxW-XKJwZHXbcWc-TbTCGzmpA6e376NcWqUfh3NZbQ2CCbyFQmRmRzbzor3gwhF4cIrOcT4hDcby8Yy2BBCtXJzlehQNb_p0v-fZvkhXXn4Pr_jvgGuRYRJ93tp8hNcsk1t8jVCzyEt8nHFZFT29DW0_0fxnX0KFa2o5iqpYATaZ89dEuU6et90rDjgBZx_tGj71V3Ql-DGzqJ5zvvkHcH07f7L9JYdCG1IpfLtDY7eLycyyxX1oGrBP1xbVhmvJdGOV9Lpm3OLHOMu8wbI5yuAIXw3BijOL9LRk3buHuEgq3X0tSOV8oLbrxWma9yDgCCSyP9TkKerZRQ2shIjoUxvpQQmaC-ykFfCXk8iJ72NBx_E9pDTQ4CyJwdGtruUxk_ROk5YhLLlXOABLnIJxpeQfMakKTXjifkKc6DEu0bBmOreEwBXgmZsspdhYx0sELIhGyt9F5Gw1-U50pPyKOhG0wW_8NUjWvPgowC1CokjFitTbG1oa_3NMefA_m3FkiQNLn_74c_IFcYntMIOxW3yGjZnbmH5LL9tjxedGOyoeYqXPNxtJhxSEbA9fDnFNqKl4fFh1-xryQS
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB5VWyTogTciUMAgEFyibmynjg8IlULVVbfLSi2o5RJixy6VaFJ2t1T9U_xGZvJqFxC3HrhFyUixk8_zsucbgOdeCGmsk6HFKwxQbD_MlEVHjqP7LKzLkyqh_2moRqNkb0-PF-BnWwtDxypbnVgp6ry0lCNf4YqY1WSsozfH30PqGkW7q20LjRoWW-7sFEO26evBO_y_LzjfeL-7vhk2XQVCK5N4FuZmleqnRRwlyjrUBThAoQ2PjPexUc7nMdc24ZY7LlzkjZFOZ2hmRWKMUZQARZW_KBHsSQ8Wx4Pt8X4X4gmM-Gr-IiF0f2XKeYQGsOqGdm71quYAf5qA349lXrBzGzf-ty90E643HjVbq5fALVhwxW1YusCzeAc-t0RVZcFKz9bPjJuwnaZzH6NUNEM_mNXZUTcjmbqfKatOVLBxs77Yzmk2OWIfUM0eNfWrd-HjpUzuHvSKsnD3gaEuy2OTO5EpL4XxWkU-SwQ6SCI2sV8N4FX701PbMK5T449vKUZehI-0w0cAzzrR45pm5G9Cbwk5nQAxg1c3yslB2nyI1AvyuaxQzqGnK2TS1zgFLXL0lL12IoCXhLuU9BcOxmZNGQZOiZjA0jVFjHtoAeMAllucpY1im6bnIAvgafcYVRLtM2WFK08qGYVeuYxxxGoO0nNDn39SHH6tyM21JAKo_oN_v_wJXN3c3R6mw8Fo6yFc41STUp3KXIbebHLiHsEV-2N2OJ08blYogy-XDflfHTF7wQ
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwELaqFiE48EYEChgEgku0Gz_q-IBQaVmxallWKqCWS4gdGyrRpGS3VP1r_DpmEiftAuLWA7coGWnt7Od5ZeYbQp54zoWxTsQWriBAscM4VxYcOQbuM7euSJuE_sdtNZmku7t6ukR-dr0wWFbZ6cRGUReVxRz5gClkVhNSJwMfyiKmm6OXh99jnCCFX1q7cRotRLbcyTGEb7MX4034r58yNnr9fuNNHCYMxFakch4XZg17qblMUmUd6AVYLNeGJcZ7aZTzhWTapswyx7hLvDHC6RxMLk-NMQqToaD-V8AlF3DGVqbjt9O9PtzjEP21XEac6-FgxlgCxrCZjHZqAZtBAX-ag99LNM_YvNHV__ltXSNXgqdN19ujcZ0sufIGuXyGf_Em-dQRWFUlrTzdODGupjthoh_FFDUF_5i2WVM3R5l2ziltKi3oNJw7unOc1wf0Hajfg9DXeot8OJfN3SbLZVW6O4SCjiukKRzPlRfceK0Sn6ccHCcujfRrEXneASCzgYkdB4J8yyAiQ6xkPVYi8rgXPWzpR_4m9ApR1AsgY3hzo6q_ZOFFZJ6jL2a5cg48YC7SoYYtaF6AB-214xF5hhjMUK_BYmwe2jNgS8gQlq0rZOIDyygjstphLgsKb5adAi4ij_rHoKrw-1NeuuqokVHgrQsJK1YL8F5Y-uKTcv9rQ3quBRJDDe_--8cfkouA82x7PNm6Ry4xbFVpijVXyfK8PnL3yQX7Y74_qx-Ew0rJ5_NG_C8UzISB
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Prevention+of+Cyber+Security+with+the+Internet+of+Things+Using+Particle+Swarm+Optimization&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Alterazi%2C+Hassan+A&rft.au=Kshirsagar%2C+Pravin+R&rft.au=Manoharan%2C+Hariprasath&rft.au=Selvarajan%2C+Shitharth&rft.date=2022-08-01&rft.pub=MDPI+AG&rft.eissn=1424-8220&rft.volume=22&rft.issue=16&rft.spage=6117&rft_id=info:doi/10.3390%2Fs22166117&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon