{"id":"https://openalex.org/W4396523495","doi":"https://doi.org/10.1109/access.2024.3395328","title":"Empowering Cybersecurity Using Enhanced Rat Swarm Optimization With Deep Stack-Based Ensemble Learning Approach","display_name":"Empowering Cybersecurity Using Enhanced Rat Swarm Optimization With Deep Stack-Based Ensemble Learning Approach","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4396523495","doi":"https://doi.org/10.1109/access.2024.3395328"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3395328","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3395328","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10510449.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10510449.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103033597","display_name":"P. Manickam","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"P. Manickam","raw_affiliation_strings":["Department of Computer Science, Thiagarajar College, Madurai, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Thiagarajar College, Madurai, Tamil Nadu, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013776155","display_name":"M. Girija","orcid":null},"institutions":[{"id":"https://openalex.org/I2800849556","display_name":"American College, Madurai","ror":"https://ror.org/01b1fn946","country_code":"IN","type":"education","lineage":["https://openalex.org/I2800849556"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M. Girija","raw_affiliation_strings":["Department of Computer Science, The American College, Madurai, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The American College, Madurai, Tamil Nadu, India","institution_ids":["https://openalex.org/I2800849556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073416127","display_name":"Ashit Kumar Dutta","orcid":"https://orcid.org/0000-0002-1208-2678"},"institutions":[{"id":"https://openalex.org/I4391767729","display_name":"Almaarefa University","ror":"https://ror.org/00s3s5518","country_code":null,"type":"education","lineage":["https://openalex.org/I4391767729"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ashit Kumar Dutta","raw_affiliation_strings":["Department of Computer Science and Information Systems, College of Applied Sciences, AlMaarefa University, Diriyah, Riyadh, Saudi Arabia","Department of Computer Science and Information Systems, College of Applied Sciences, AlMaarefa University, Ad Diriyah, Riyadh, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Systems, College of Applied Sciences, AlMaarefa University, Diriyah, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I4391767729"]},{"raw_affiliation_string":"Department of Computer Science and Information Systems, College of Applied Sciences, AlMaarefa University, Ad Diriyah, Riyadh, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I4391767729"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060099842","display_name":"Palamakula Ramesh Babu","orcid":"https://orcid.org/0000-0001-6389-9269"},"institutions":[{"id":"https://openalex.org/I134892692","display_name":"Chaitanya Bharathi Institute of Technology","ror":"https://ror.org/047ymzq84","country_code":"IN","type":"education","lineage":["https://openalex.org/I134892692"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Palamakula Ramesh Babu","raw_affiliation_strings":["Department of Information Technology, Chaitanya Bharathi Institute of Technology, Hyderabad, Telangana, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Chaitanya Bharathi Institute of Technology, Hyderabad, Telangana, India","institution_ids":["https://openalex.org/I134892692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003501137","display_name":"Krishan Arora","orcid":"https://orcid.org/0000-0003-0007-8759"},"institutions":[{"id":"https://openalex.org/I110360157","display_name":"Lovely Professional University","ror":"https://ror.org/00et6q107","country_code":"IN","type":"education","lineage":["https://openalex.org/I110360157"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Krishan Arora","raw_affiliation_strings":["School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara, Punjab, India","School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara, Panjab, India"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara, Punjab, India","institution_ids":["https://openalex.org/I110360157"]},{"raw_affiliation_string":"School of Electronics and Electrical Engineering, Lovely Professional University, Phagwara, Panjab, India","institution_ids":["https://openalex.org/I110360157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057140860","display_name":"Mun Seok Jeong","orcid":"https://orcid.org/0000-0002-7019-8089"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mun Jeong","raw_affiliation_strings":["Department of Research and Development, Information Technology Research Center, UMLogics Company Ltd., Daejeon, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Research and Development, Information Technology Research Center, UMLogics Company Ltd., Daejeon, Republic of Korea","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015970771","display_name":"Srijana Acharya","orcid":"https://orcid.org/0000-0002-0724-8936"},"institutions":[{"id":"https://openalex.org/I206597221","display_name":"Kongju National University","ror":"https://ror.org/0373nm262","country_code":"KR","type":"education","lineage":["https://openalex.org/I206597221"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Srijana Acharya","raw_affiliation_strings":["Department of Convergence Science, Kongju National University, Gongju-si, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Convergence Science, Kongju National University, Gongju-si, South Korea","institution_ids":["https://openalex.org/I206597221"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5103033597"],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.6525,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.93327518,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"12","issue":null,"first_page":"62492","last_page":"62501"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8789507746696472},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6725749373435974},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6146219372749329},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5307550430297852},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.5013768672943115},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.4699288308620453},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4668850004673004},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.46535569429397583},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.4418729245662689},{"id":"https://openalex.org/keywords/ensemble-forecasting","display_name":"Ensemble forecasting","score":0.41429173946380615},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3901490569114685}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8789507746696472},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6725749373435974},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6146219372749329},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5307550430297852},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.5013768672943115},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.4699288308620453},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4668850004673004},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.46535569429397583},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.4418729245662689},{"id":"https://openalex.org/C119898033","wikidata":"https://www.wikidata.org/wiki/Q3433888","display_name":"Ensemble forecasting","level":2,"score":0.41429173946380615},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3901490569114685}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3395328","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3395328","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10510449.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5050b5fd133044a9853fc04d543dbfb3","is_oa":true,"landing_page_url":"https://doaj.org/article/5050b5fd133044a9853fc04d543dbfb3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 62492-62501 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3395328","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3395328","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10510449.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5299999713897705,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4396523495.pdf"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W3022218140","https://openalex.org/W3046463181","https://openalex.org/W3096169228","https://openalex.org/W3180273110","https://openalex.org/W3190454471","https://openalex.org/W3196498354","https://openalex.org/W3215803191","https://openalex.org/W4200522456","https://openalex.org/W4285307854","https://openalex.org/W4285731979","https://openalex.org/W4297329009","https://openalex.org/W4298110865","https://openalex.org/W4315783815","https://openalex.org/W4316661052","https://openalex.org/W4317038427","https://openalex.org/W4318570876","https://openalex.org/W4322502960","https://openalex.org/W4327545280","https://openalex.org/W4365816927","https://openalex.org/W4372049009","https://openalex.org/W4375928299","https://openalex.org/W4379470372","https://openalex.org/W4387092430","https://openalex.org/W4387168854","https://openalex.org/W4387431581","https://openalex.org/W4389076505","https://openalex.org/W4390483685","https://openalex.org/W4390523643","https://openalex.org/W7064433692"],"related_works":["https://openalex.org/W4225394202","https://openalex.org/W4298287631","https://openalex.org/W2953061907","https://openalex.org/W1847088711","https://openalex.org/W3036642985","https://openalex.org/W3032952384","https://openalex.org/W3017902212","https://openalex.org/W2964335273","https://openalex.org/W2982145560","https://openalex.org/W2969450769"],"abstract_inverted_index":{"Cybersecurity":[0,129],"is":[1,164,180,235],"a":[2,27,30,138,184,238],"vital":[3],"technology":[4],"and":[5,13,17,29,40,50,60,67,98,108,210],"measures":[6],"intended":[7],"to":[8,82,95,116,155,166,182],"protect":[9],"networks,":[10],"computers,":[11],"information,":[12],"programs":[14],"from":[15,91],"threats":[16],"illegal":[18,52],"access,":[19],"modification,":[20],"or":[21,119],"damage.":[22,61],"A":[23,242],"security":[24],"model":[25,234,249],"covers":[26],"network":[28,64,106,111,123,204],"computer":[31],"safety":[32],"method.":[33],"Each":[34],"system":[35,44,53],"has":[36],"antivirus":[37],"software,":[38],"firewalls,":[39],"an":[41,132,172,251],"intrusion":[42],"detection":[43,76],"(IDS).":[45],"IDS":[46,79,240],"helps":[47],"in":[48,122],"discovering":[49],"identifying":[51],"behavior":[54],"such":[55],"as":[56],"usage,":[57],"copying,":[58],"alteration,":[59],"By":[62],"estimating":[63],"traffic":[65],"anomalies":[66],"patterns,":[68],"deep":[69,202],"learning":[70],"(DL)":[71],"models":[72,87,200,221,259],"can":[73,113],"enhance":[74],"the":[75,159,168,191,195,215,225,232,247],"abilities":[77],"of":[78,186,218,231,255,260],"when":[80],"compared":[81],"traditional":[83],"rule-based":[84],"methods.":[85],"These":[86],"learn":[88],"complex":[89],"representations":[90],"data,":[92,124],"authorizing":[93],"them":[94],"recognize":[96],"subtle":[97],"developing":[99],"attack":[100],"patterns.":[101],"Techniques":[102],"like":[103],"recurrent":[104],"neural":[105,110,203],"(RNN)":[107],"convolutional":[109],"(CNN)":[112],"be":[114],"applied":[115,181],"progress":[117],"consecutive":[118],"spatial":[120],"features":[121],"correspondingly.":[125],"This":[126],"manuscript":[127],"empowers":[128],"by":[130],"utilizing":[131],"Enhanced":[133],"Rat":[134],"Swarm":[135],"Optimizer":[136],"with":[137,152],"Deep":[139],"Stack-Based":[140],"Ensemble":[141],"Learning":[142],"(ERSO-DSEL)":[143],"model.":[144],"The":[145,228],"ERSO-DSEL":[146,160],"approach":[147,179,193,197],"leverages":[148],"feature":[149],"selection":[150,217],"(FS)":[151],"EL":[153],"strategies":[154],"boost":[156],"cybersecurity.":[157,261],"In":[158],"system,":[161],"Z-score":[162],"normalization":[163],"employed":[165],"measure":[167],"input":[169],"data.":[170],"Besides,":[171],"improved":[173],"equilibrium":[174],"optimizer":[175],"(IEO)":[176],"based":[177],"FS":[178],"choose":[183],"set":[185],"features.":[187],"For":[188],"cyberattack":[189],"recognition,":[190],"ERSO-DSBEL":[192,233,248],"uses":[194],"DSEL":[196],"comprising":[198],"three":[199],"namely":[201],"(DNN),":[205],"long":[206],"short-term":[207],"memory":[208],"(LSTM),":[209],"bidirectional":[211],"LSTM":[212],"(Bi-LSTM).":[213],"Furthermore,":[214],"hyperparameter":[216],"these":[219],"DL":[220],"takes":[222],"place":[223],"using":[224],"ERSO":[226],"system.":[227],"solution":[229],"result":[230],"executed":[236],"on":[237],"benchmark":[239],"database.":[241],"wide-contrast":[243],"study":[244],"reported":[245],"that":[246],"accomplishes":[250],"enhanced":[252],"accuracy":[253],"outcome":[254],"99.67%":[256],"over":[257],"other":[258]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
