{"id":"https://openalex.org/W4416498839","doi":"https://doi.org/10.1007/s43926-025-00237-y","title":"A harris hawks optimized SVM framework for securing IoT networks through attack detection and feature analysis","display_name":"A harris hawks optimized SVM framework for securing IoT networks through attack detection and feature analysis","publication_year":2025,"publication_date":"2025-11-21","ids":{"openalex":"https://openalex.org/W4416498839","doi":"https://doi.org/10.1007/s43926-025-00237-y"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-025-00237-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00237-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00237-y.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00237-y.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081190742","display_name":"Dana Al Qudah","orcid":"https://orcid.org/0000-0003-1635-2839"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Dana A. Al-Qudah","raw_affiliation_strings":["King Abdullah II School for Information Technology, The University of Jordan, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"King Abdullah II School for Information Technology, The University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042798851","display_name":"Ala\u2019 M. Al-Zoubi","orcid":"https://orcid.org/0000-0003-0414-3570"},"institutions":[{"id":"https://openalex.org/I145019703","display_name":"Al-Zaytoonah University of Jordan","ror":"https://ror.org/04a5b0p13","country_code":"JO","type":"education","lineage":["https://openalex.org/I145019703"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Ala\u2019 M. Al-Zoubi","raw_affiliation_strings":["Department of Data Science and Artificial Intelligence, Al-Zaytoonah University of Jordan, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Data Science and Artificial Intelligence, Al-Zaytoonah University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I145019703"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004895399","display_name":"Bashar Al-Shboul","orcid":"https://orcid.org/0000-0002-5214-6429"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Bashar Al-Shboul","raw_affiliation_strings":["King Abdullah II School for Information Technology, The University of Jordan, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"King Abdullah II School for Information Technology, The University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043250129","display_name":"Bilal Abu-Salih","orcid":"https://orcid.org/0000-0001-9875-4369"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Bilal Abu-Salih","raw_affiliation_strings":["King Abdullah II School for Information Technology, The University of Jordan, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"King Abdullah II School for Information Technology, The University of Jordan, Amman, Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044414661","display_name":"Raneem Qaddoura","orcid":"https://orcid.org/0000-0003-4093-9349"},"institutions":[{"id":"https://openalex.org/I100086675","display_name":"Al-Hussein Bin Talal University","ror":"https://ror.org/019dkd780","country_code":"JO","type":"education","lineage":["https://openalex.org/I100086675"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Raneem Qaddoura","raw_affiliation_strings":["School of Computing and Informatics, Al Hussein Technical University, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"School of Computing and Informatics, Al Hussein Technical University, Amman, Jordan","institution_ids":["https://openalex.org/I100086675"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042517225","display_name":"Mohammad Hijjawi","orcid":"https://orcid.org/0009-0004-3428-3405"},"institutions":[{"id":"https://openalex.org/I146367977","display_name":"Applied Science Private University","ror":"https://ror.org/01ah6nb52","country_code":"JO","type":"education","lineage":["https://openalex.org/I146367977"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammad Hijjawi","raw_affiliation_strings":["\u200b\u200bDepartment of \u200bData Science and Artificial Intelligence, Applied Science Private University, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"\u200b\u200bDepartment of \u200bData Science and Artificial Intelligence, Applied Science Private University, Amman, Jordan","institution_ids":["https://openalex.org/I146367977"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5042798851"],"corresponding_institution_ids":["https://openalex.org/I145019703"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":1.3852,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.87592814,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"5","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.579800009727478,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.579800009727478,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.09690000116825104,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.03480000048875809,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.7985000014305115},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7404999732971191},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6674000024795532},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5436999797821045},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4562999904155731},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4156000018119812}],"concepts":[{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.7985000014305115},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7404999732971191},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6674000024795532},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6424999833106995},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5436999797821045},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5343999862670898},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4909999966621399},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4848000109195709},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4562999904155731},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4156000018119812},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3982999920845032},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.382099986076355},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.36039999127388},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.35429999232292175},{"id":"https://openalex.org/C2780150128","wikidata":"https://www.wikidata.org/wiki/Q21948731","display_name":"Extreme learning machine","level":3,"score":0.262800008058548}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-025-00237-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00237-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00237-y.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:4b7555422c384913a34d92adf1a01de8","is_oa":true,"landing_page_url":"https://doaj.org/article/4b7555422c384913a34d92adf1a01de8","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 5, Iss 1, Pp 1-25 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-025-00237-y","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00237-y","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00237-y.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416498839.pdf","grobid_xml":"https://content.openalex.org/works/W4416498839.grobid-xml"},"referenced_works_count":88,"referenced_works":["https://openalex.org/W40890042","https://openalex.org/W2061438946","https://openalex.org/W2079983098","https://openalex.org/W2119821739","https://openalex.org/W2135879356","https://openalex.org/W2275100661","https://openalex.org/W2278186031","https://openalex.org/W2289218694","https://openalex.org/W2342408547","https://openalex.org/W2528094851","https://openalex.org/W2564619343","https://openalex.org/W2605558588","https://openalex.org/W2626331021","https://openalex.org/W2702883767","https://openalex.org/W2737879662","https://openalex.org/W2745141831","https://openalex.org/W2769593477","https://openalex.org/W2771058985","https://openalex.org/W2793723077","https://openalex.org/W2805930283","https://openalex.org/W2806576037","https://openalex.org/W2806697149","https://openalex.org/W2899429604","https://openalex.org/W2905503927","https://openalex.org/W2916077540","https://openalex.org/W2919979744","https://openalex.org/W2921008479","https://openalex.org/W2921134108","https://openalex.org/W2922140331","https://openalex.org/W2929257783","https://openalex.org/W2941288225","https://openalex.org/W2945730492","https://openalex.org/W2953409786","https://openalex.org/W2958285686","https://openalex.org/W2963073179","https://openalex.org/W2965364867","https://openalex.org/W2994950844","https://openalex.org/W2995257080","https://openalex.org/W2999472659","https://openalex.org/W3006191871","https://openalex.org/W3013798241","https://openalex.org/W3015539767","https://openalex.org/W3017881119","https://openalex.org/W3020687048","https://openalex.org/W3024012711","https://openalex.org/W3025195886","https://openalex.org/W3027870121","https://openalex.org/W3033587968","https://openalex.org/W3033675321","https://openalex.org/W3035366189","https://openalex.org/W3036517673","https://openalex.org/W3037233857","https://openalex.org/W3043799819","https://openalex.org/W3048865944","https://openalex.org/W3082819946","https://openalex.org/W3106716739","https://openalex.org/W3108643162","https://openalex.org/W3118220620","https://openalex.org/W3119693685","https://openalex.org/W3119803541","https://openalex.org/W3120073691","https://openalex.org/W3120254517","https://openalex.org/W3123908207","https://openalex.org/W3128756376","https://openalex.org/W3141567114","https://openalex.org/W3142522002","https://openalex.org/W3148550006","https://openalex.org/W3149086027","https://openalex.org/W3154485088","https://openalex.org/W3158729335","https://openalex.org/W3163967703","https://openalex.org/W3174862392","https://openalex.org/W3184866730","https://openalex.org/W3186320045","https://openalex.org/W3186568986","https://openalex.org/W3195413461","https://openalex.org/W3203713416","https://openalex.org/W3212721454","https://openalex.org/W4206182026","https://openalex.org/W4210632318","https://openalex.org/W4220714257","https://openalex.org/W4249545506","https://openalex.org/W4289545318","https://openalex.org/W4310988117","https://openalex.org/W4367314513","https://openalex.org/W4385062426","https://openalex.org/W4409254508","https://openalex.org/W4410384078"],"related_works":[],"abstract_inverted_index":{"The":[0,81,98,127],"Internet":[1,52],"of":[2,11,19,53,131],"Things":[3,54],"(IoT)":[4],"has":[5],"evolved":[6],"as":[7,65],"a":[8,75,85],"significant":[9],"area":[10],"impact":[12],"and":[13,40,48,68,73,110,119,129,155],"opportunity":[14],"due":[15],"to":[16,37,45,59,135],"the":[17,27,32,92,106,116,121,132,146],"billions":[18],"connected":[20],"devices":[21,55],"that":[22],"have":[23],"been":[24],"distributed":[25],"around":[26],"world.":[28],"IoT":[29],"devices,":[30],"on":[31,115],"other":[33],"hand,":[34],"are":[35,56],"susceptible":[36],"being":[38],"compromised":[39],"hacked.":[41],"When":[42],"it":[43],"comes":[44],"computing":[46],"power":[47],"storage":[49],"capacity,":[50],"these":[51],"more":[57],"vulnerable":[58],"cyberattacks":[60],"than":[61],"traditional":[62],"endpoints":[63],"such":[64],"smartphones,":[66],"tablets,":[67],"laptops.":[69],"This":[70],"study":[71],"introduces":[72],"assesses":[74],"machine":[76],"learning-based":[77],"cyberattack":[78],"detection":[79,137],"system.":[80],"suggested":[82,133],"method":[83],"employs":[84],"Support":[86],"Vector":[87],"Machine":[88],"(SVM)":[89],"classifier":[90,103],"with":[91],"Harris":[93],"Hawks":[94],"Optimization":[95],"(HHO)":[96],"algorithm.":[97],"HHO":[99],"technique":[100],"improves":[101],"SVM":[102,107],"hyperparameters,":[104],"while":[105],"performs":[108],"malicious":[109],"normal":[111],"stream":[112],"classification":[113,153],"based":[114],"best-chosen":[117],"model,":[118],"produces":[120],"optimal":[122],"solution":[123],"for":[124],"feature":[125],"weighting.":[126],"utility":[128],"capacity":[130],"approach":[134],"improve":[136],"performance":[138],"is":[139],"demonstrated":[140],"through":[141],"proper":[142],"scientific":[143],"testing":[144],"utilizing":[145],"LITNET-2020":[147],"benchmark":[148],"dataset":[149],"against":[150],"six":[151],"well-known":[152],"algorithms":[154],"four":[156],"metaheuristic-based":[157],"classifiers":[158],"using":[159],"five":[160],"reliable":[161],"assessment":[162],"measures.":[163]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-11-23T00:00:00"}
