{"id":"https://openalex.org/W3204327917","doi":"https://doi.org/10.1080/0952813x.2021.1970824","title":"Threat detection in Internet of Things using Cuckoo search Chicken Swarm optimisation algorithm","display_name":"Threat detection in Internet of Things using Cuckoo search Chicken Swarm optimisation algorithm","publication_year":2021,"publication_date":"2021-09-29","ids":{"openalex":"https://openalex.org/W3204327917","doi":"https://doi.org/10.1080/0952813x.2021.1970824","mag":"3204327917"},"language":"en","primary_location":{"id":"doi:10.1080/0952813x.2021.1970824","is_oa":false,"landing_page_url":"https://doi.org/10.1080/0952813x.2021.1970824","pdf_url":null,"source":{"id":"https://openalex.org/S153467142","display_name":"Journal of Experimental & Theoretical Artificial Intelligence","issn_l":"0952-813X","issn":["0952-813X","1362-3079"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Experimental &amp; Theoretical Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012433208","display_name":"Sivaram Rajeyyagari","orcid":"https://orcid.org/0000-0002-3893-447X"},"institutions":[{"id":"https://openalex.org/I206935292","display_name":"Shaqra University","ror":"https://ror.org/05hawb687","country_code":"SA","type":"education","lineage":["https://openalex.org/I206935292"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Sivaram Rajeyyagari","raw_affiliation_strings":["Department of Computer Science, College of Computing and Information Technology, Shaqra University, Shaqra, Kingdome of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computing and Information Technology, Shaqra University, Shaqra, Kingdome of Saudi Arabia","institution_ids":["https://openalex.org/I206935292"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5012433208"],"corresponding_institution_ids":["https://openalex.org/I206935292"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.13049358,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"35","issue":"5","first_page":"729","last_page":"753"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8671652674674988},{"id":"https://openalex.org/keywords/cuckoo-search","display_name":"Cuckoo search","score":0.807226300239563},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5560271739959717},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5415018796920776},{"id":"https://openalex.org/keywords/swarm-intelligence","display_name":"Swarm intelligence","score":0.49306008219718933},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.48733243346214294},{"id":"https://openalex.org/keywords/swarm-behaviour","display_name":"Swarm behaviour","score":0.48466259241104126},{"id":"https://openalex.org/keywords/window","display_name":"Window (computing)","score":0.43223050236701965},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.43084973096847534},{"id":"https://openalex.org/keywords/hypertext-transfer-protocol","display_name":"Hypertext Transfer Protocol","score":0.42810940742492676},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36638250946998596},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3386610746383667},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.25600355863571167},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1828782558441162},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12893274426460266}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8671652674674988},{"id":"https://openalex.org/C117241572","wikidata":"https://www.wikidata.org/wiki/Q5192379","display_name":"Cuckoo search","level":3,"score":0.807226300239563},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5560271739959717},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5415018796920776},{"id":"https://openalex.org/C119487961","wikidata":"https://www.wikidata.org/wiki/Q863960","display_name":"Swarm intelligence","level":3,"score":0.49306008219718933},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.48733243346214294},{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.48466259241104126},{"id":"https://openalex.org/C2778751112","wikidata":"https://www.wikidata.org/wiki/Q835016","display_name":"Window (computing)","level":2,"score":0.43223050236701965},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.43084973096847534},{"id":"https://openalex.org/C149672775","wikidata":"https://www.wikidata.org/wiki/Q8777","display_name":"Hypertext Transfer Protocol","level":3,"score":0.42810940742492676},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36638250946998596},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3386610746383667},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.25600355863571167},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1828782558441162},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12893274426460266}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/0952813x.2021.1970824","is_oa":false,"landing_page_url":"https://doi.org/10.1080/0952813x.2021.1970824","pdf_url":null,"source":{"id":"https://openalex.org/S153467142","display_name":"Journal of Experimental & Theoretical Artificial Intelligence","issn_l":"0952-813X","issn":["0952-813X","1362-3079"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Experimental &amp; Theoretical Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W1849730171","https://openalex.org/W2003890325","https://openalex.org/W2045597414","https://openalex.org/W2048586099","https://openalex.org/W2060987554","https://openalex.org/W2082610362","https://openalex.org/W2084896955","https://openalex.org/W2093678351","https://openalex.org/W2094789905","https://openalex.org/W2098007102","https://openalex.org/W2143591442","https://openalex.org/W2166919658","https://openalex.org/W2271386612","https://openalex.org/W2292276745","https://openalex.org/W2336386743","https://openalex.org/W2559655401","https://openalex.org/W2564745288","https://openalex.org/W2618136360","https://openalex.org/W2777754251","https://openalex.org/W2790360011","https://openalex.org/W2792571124","https://openalex.org/W2793658248","https://openalex.org/W2801278035","https://openalex.org/W2809790149","https://openalex.org/W2810749629","https://openalex.org/W2896161015","https://openalex.org/W2903294440","https://openalex.org/W2909847362","https://openalex.org/W2915099783","https://openalex.org/W2924196523","https://openalex.org/W2938696669","https://openalex.org/W2943073010","https://openalex.org/W2947097788","https://openalex.org/W2972189363","https://openalex.org/W3000228423","https://openalex.org/W3012340802","https://openalex.org/W3020687048","https://openalex.org/W3021545902","https://openalex.org/W3026777061","https://openalex.org/W3030866640","https://openalex.org/W3092016037","https://openalex.org/W3109800483","https://openalex.org/W4205355513","https://openalex.org/W4205387711","https://openalex.org/W4297446618"],"related_works":["https://openalex.org/W4308079021","https://openalex.org/W1527337688","https://openalex.org/W2048054807","https://openalex.org/W2746377055","https://openalex.org/W4386001959","https://openalex.org/W2594296178","https://openalex.org/W4304182880","https://openalex.org/W3089846858","https://openalex.org/W2159541481","https://openalex.org/W2610550425"],"abstract_inverted_index":{"Smart":[0],"devices":[1],"and":[2,99,126,157,192,215,220,226,229],"people":[3],"existing":[4],"on":[5],"the":[6,16,24,35,47,59,80,84,89,96,102,114,119,134,140,147,151,158,164,175,187,193,200,209,224,233],"internet":[7],"are":[8,44,131,142],"connected":[9],"to":[10,30,78,113,146,208],"smart":[11],"objects":[12],"or":[13],"things":[14],"in":[15,34,46,58,63,83,101],"Internet":[17],"of":[18],"Things":[19],"(IoT)":[20],"technology.":[21],"To":[22],"protect":[23],"user":[25,90,103,107],"information,":[26],"it":[27],"is":[28,53,76,93,111,155,161,172,183],"required":[29],"detect":[31,79],"malicious":[32,51,81],"actions":[33],"IoT":[36,48,97],"environment.":[37],"Even":[38],"though":[39],"different":[40],"threat":[41,82,159],"detection":[42,160],"methods":[43],"introduced":[45],"technology,":[49],"detecting":[50],"activity":[52,91,104,108],"still":[54],"a":[55],"significant":[56],"challenge":[57],"communication":[60],"network.":[61],"Hence,":[62],"this":[64],"research":[65],"work,":[66],"an":[67],"effective":[68],"Cuckoo":[69,188],"Search":[70,189],"Chicken":[71,194],"Swarm":[72,195],"(CSCS)":[73],"optimisation":[74],"algorithm":[75,182,191,202],"proposed":[77,176,180,201],"network":[85,98],"effectively.":[86],"At":[87],"first,":[88],"information":[92],"simulated":[94],"from":[95],"stored":[100],"log.":[105],"The":[106,179],"log":[109],"file":[110],"forwarded":[112],"feature":[115,153],"extraction":[116],"module,":[117],"where":[118],"features,":[120],"like":[121,211],"logon,":[122],"device,":[123],"file,":[124],"email,":[125],"Hypertext":[127],"Transfer":[128],"Protocol":[129],"(HTTP)":[130],"extracted":[132,143],"using":[133,163,174,236],"window":[135,237],"length.":[136],"For":[137],"each":[138],"user,":[139],"features":[141],"with":[144,206],"respect":[145,207],"time":[148],"stamp.":[149],"Then,":[150],"dynamic":[152],"index":[154],"constructed,":[156],"performed":[162],"deep":[165],"Long":[166],"Short-Term":[167],"Memory":[168],"(LSTM)":[169],"classifier,":[170],"which":[171],"trained":[173],"CSCS":[177,181],"algorithm.":[178,198],"designed":[184],"by":[185,222,231],"integrating":[186],"(CS)":[190],"Optimisation":[196],"(CSO)":[197],"Moreover,":[199],"attained":[203],"better":[204],"performance":[205],"metrics,":[210],"namely":[212],"F1-score,":[213],"precision,":[214],"recall":[216],"as":[217,239],"0.915,":[218],"0.975,":[219],"0.884":[221],"varying":[223,232],"k-value":[225],"0.9286,":[227],"0.9235,":[228],"0.9337":[230],"training":[234],"data":[235],"size":[238],"10,":[240],"respectively.":[241]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
