{"id":"https://openalex.org/W4406094135","doi":"https://doi.org/10.1109/access.2025.3526258","title":"Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment","display_name":"Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4406094135","doi":"https://doi.org/10.1109/access.2025.3526258"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3526258","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3526258","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3526258","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093345795","display_name":"Alanoud Al Mazroa","orcid":"https://orcid.org/0000-0002-6201-0410"},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Alanoud Al Mazroa","raw_affiliation_strings":["Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University (PNU), P.O. Box 84428, Riyadh, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-6201-0410","affiliations":[{"raw_affiliation_string":"Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University (PNU), P.O. Box 84428, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027061139","display_name":"Fahad R. Albogamy","orcid":"https://orcid.org/0000-0002-2783-860X"},"institutions":[{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Fahad R. Albogamy","raw_affiliation_strings":["Turabah University College, Computer Sciences Program, Taif University, Taif, Saudi Arabia","Turabah University College, Computer Sciences Program, Taif University, P.O.Box 11099, Taif, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-2783-860X","affiliations":[{"raw_affiliation_string":"Turabah University College, Computer Sciences Program, Taif University, Taif, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]},{"raw_affiliation_string":"Turabah University College, Computer Sciences Program, Taif University, P.O.Box 11099, Taif, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085584754","display_name":"Mohamad Khairi Ishak","orcid":"https://orcid.org/0000-0002-3554-0061"},"institutions":[{"id":"https://openalex.org/I182000528","display_name":"Ajman University","ror":"https://ror.org/01j1rma10","country_code":"AE","type":"education","lineage":["https://openalex.org/I182000528"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mohamad Khairi Ishak","raw_affiliation_strings":["Department of Electrical and Computer Engineering, College of Engineering and Information Technology, Ajman University, Ajman, United Arab Emirates"],"raw_orcid":"https://orcid.org/0000-0002-3554-0061","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, College of Engineering and Information Technology, Ajman University, Ajman, United Arab Emirates","institution_ids":["https://openalex.org/I182000528"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063114495","display_name":"Samih M. Mostafa","orcid":"https://orcid.org/0000-0001-9234-5898"},"institutions":[{"id":"https://openalex.org/I189575948","display_name":"South Valley University","ror":"https://ror.org/00jxshx33","country_code":"EG","type":"education","lineage":["https://openalex.org/I189575948"]},{"id":"https://openalex.org/I91041137","display_name":"Assiut University","ror":"https://ror.org/01jaj8n65","country_code":"EG","type":"education","lineage":["https://openalex.org/I91041137"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Samih M. Mostafa","raw_affiliation_strings":["Computer Science Department, Faculty of Computers and Information, South Valley University, Qena, Egypt","Faculty of Industry and Energy Technology, New Assiut Technological University (N.A.T.U.), New Assiut City, Egypt"],"raw_orcid":"https://orcid.org/0000-0001-9234-5898","affiliations":[{"raw_affiliation_string":"Computer Science Department, Faculty of Computers and Information, South Valley University, Qena, Egypt","institution_ids":["https://openalex.org/I189575948"]},{"raw_affiliation_string":"Faculty of Industry and Energy Technology, New Assiut Technological University (N.A.T.U.), New Assiut City, Egypt","institution_ids":["https://openalex.org/I91041137"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5093345795"],"corresponding_institution_ids":["https://openalex.org/I106778892"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":16.9249,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.99041746,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"13","issue":null,"first_page":"11280","last_page":"11294"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9764999747276306,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9729999899864197,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.770200252532959},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.6478787064552307},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.605423629283905},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5059892535209656},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.49779176712036133},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.4771292209625244},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.43300861120224},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33049294352531433},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3259887099266052}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.770200252532959},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.6478787064552307},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.605423629283905},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5059892535209656},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.49779176712036133},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.4771292209625244},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43300861120224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33049294352531433},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3259887099266052},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3526258","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3526258","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7462ba2c541642f3a8ad781ed05f98b1","is_oa":true,"landing_page_url":"https://doaj.org/article/7462ba2c541642f3a8ad781ed05f98b1","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 11280-11294 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3526258","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3526258","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G378163162","display_name":null,"funder_award_id":"TU-DSPP-2024-129","funder_id":"https://openalex.org/F4320323722","funder_display_name":"Taif University"}],"funders":[{"id":"https://openalex.org/F4320323722","display_name":"Taif University","ror":"https://ror.org/014g1a453"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W3036517673","https://openalex.org/W3148550006","https://openalex.org/W3158456479","https://openalex.org/W3209272920","https://openalex.org/W4206130810","https://openalex.org/W4213227084","https://openalex.org/W4285065898","https://openalex.org/W4285221291","https://openalex.org/W4286564956","https://openalex.org/W4288430950","https://openalex.org/W4311167586","https://openalex.org/W4313502768","https://openalex.org/W4364376065","https://openalex.org/W4376651812","https://openalex.org/W4377041508","https://openalex.org/W4382278693","https://openalex.org/W4386198836","https://openalex.org/W4386408772","https://openalex.org/W4388286164","https://openalex.org/W4388495333","https://openalex.org/W4388549181","https://openalex.org/W4388642424","https://openalex.org/W4390605115","https://openalex.org/W4391071388","https://openalex.org/W4391124404","https://openalex.org/W4391182555","https://openalex.org/W4391929468","https://openalex.org/W4395679824"],"related_works":["https://openalex.org/W2125652721","https://openalex.org/W1540371141","https://openalex.org/W1549363203","https://openalex.org/W2147697413","https://openalex.org/W2154063878","https://openalex.org/W4231274751","https://openalex.org/W2556012038","https://openalex.org/W1489772951","https://openalex.org/W1538046993","https://openalex.org/W2571255492"],"abstract_inverted_index":{"The":[0,31,151,168,225,238],"swift":[1],"advancement":[2],"of":[3,37,90,104,111,125,228,241,250],"cyber-physical":[4,32],"systems":[5,28,68],"(CPSs)":[6],"across":[7],"sectors":[8],"such":[9],"as":[10],"healthcare,":[11],"transportation,":[12],"critical":[13],"infrastructure,":[14],"and":[15,39,42,56,74,102,123,128,252,256],"energy":[16],"enhances":[17,120],"the":[18,47,108,121,132,160,164,176,181,197,208,218,222,229,242,260],"crucial":[19],"requirement":[20],"for":[21,221],"robust":[22],"cybersecurity":[23],"measures":[24],"to":[25,51,86,114,174,190,216],"protect":[26],"these":[27],"from":[29],"cyberattacks.":[30],"method":[33,146,153,170],"is":[34,49,188,214,232],"a":[35,43,148,235,246],"hybrid":[36],"cyber":[38],"physical":[40],"components,":[41],"safety":[44],"breach":[45],"in":[46,59,147,159,259],"element":[48],"central":[50],"catastrophic":[52],"consequences.":[53],"Cyberattack":[54,76,137],"recognition":[55],"mitigation":[57,103],"techniques":[58],"CPSs":[60],"include":[61],"using":[62,139],"numerous":[63],"models":[64],"like":[65],"intrusion":[66],"detection":[67,77,166],"(IDSs),":[69],"access":[70],"control":[71],"mechanisms,":[72],"encryption,":[73],"firewalls.":[75],"employing":[78],"deep":[79],"learning":[80],"(DL)":[81],"contains":[82],"training":[83],"neural":[84],"networks":[85],"identify":[87],"patterns":[88],"indicative":[89],"malicious":[91],"actions":[92],"within":[93],"system":[94],"logs":[95],"or":[96],"network":[97],"traffic,":[98],"allowing":[99],"positive":[100],"classification":[101],"cyber-attacks.":[105,130,206],"By":[106],"leveraging":[107],"integral":[109],"ability":[110],"DL":[112],"methods":[113],"learn":[115],"complex":[116],"representations,":[117],"this":[118],"technique":[119,231,244],"accuracy":[122,248],"efficiency":[124],"detecting":[126],"diverse":[127],"growing":[129],"Thus,":[131],"study":[133],"proposes":[134],"an":[135,192],"automated":[136],"Detection":[138],"Binary":[140],"Metaheuristics":[141],"with":[142],"Deep":[143],"Learning":[144],"(ACAD-BMDL)":[145],"CPS":[149,161,261],"environment.":[150,262],"ACAD-BMDL":[152,169,230,243],"mainly":[154],"focuses":[155],"on":[156,234],"enhancing":[157],"security":[158],"environment":[162],"via":[163],"cyberattack":[165],"process.":[167],"uses":[171],"Z-score":[172],"normalization":[173],"scale":[175],"input":[177],"dataset.":[178,237],"In":[179],"addition,":[180],"binary":[182],"grey":[183],"wolf":[184],"optimizer":[185],"(BGWO)":[186],"model":[187,204,213],"utilized":[189],"choose":[191],"optimal":[193],"feature":[194],"subset.":[195],"Moreover,":[196],"Enhanced":[198],"Elman":[199],"Spike":[200],"Neural":[201],"Network":[202],"(EESNN)":[203],"detects":[205],"Furthermore,":[207],"Archimedes":[209],"Optimization":[210],"Algorithm":[211],"(AOA)":[212],"employed":[215],"select":[217],"optimum":[219],"hyperparameter":[220],"EESNN":[223],"model.":[224],"empirical":[226],"analysis":[227],"performed":[233],"benchmark":[236],"experimental":[239],"validation":[240],"portrayed":[245],"superior":[247],"value":[249],"99.12%":[251],"99.36%":[253],"under":[254],"NSLKDD2015":[255],"CICIDS2017":[257],"datasets":[258]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":9}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
