{"id":"https://openalex.org/W4286506823","doi":"https://doi.org/10.1109/cits55221.2022.9832976","title":"Deep Reinforcement Learning based Intrusion Detection System with Feature Selections Method and Optimal Hyper-parameter in IoT Environment","display_name":"Deep Reinforcement Learning based Intrusion Detection System with Feature Selections Method and Optimal Hyper-parameter in IoT Environment","publication_year":2022,"publication_date":"2022-07-13","ids":{"openalex":"https://openalex.org/W4286506823","doi":"https://doi.org/10.1109/cits55221.2022.9832976"},"language":"en","primary_location":{"id":"doi:10.1109/cits55221.2022.9832976","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cits55221.2022.9832976","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ro.ecu.edu.au/ecuworks2022-2026/1101","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080969458","display_name":"Said Bakhshad","orcid":null},"institutions":[{"id":"https://openalex.org/I931681460","display_name":"Universiti Tunku Abdul Rahman","ror":"https://ror.org/050pq4m56","country_code":"MY","type":"education","lineage":["https://openalex.org/I931681460"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Said Bakhshad","raw_affiliation_strings":["Universiti Tunku Abdul Rahman,Faculty of Information and Communication Technology,Bandar Barat,Malaysia,31900"],"affiliations":[{"raw_affiliation_string":"Universiti Tunku Abdul Rahman,Faculty of Information and Communication Technology,Bandar Barat,Malaysia,31900","institution_ids":["https://openalex.org/I931681460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041935786","display_name":"Vasaki Ponnusamy","orcid":"https://orcid.org/0000-0002-7761-9552"},"institutions":[{"id":"https://openalex.org/I931681460","display_name":"Universiti Tunku Abdul Rahman","ror":"https://ror.org/050pq4m56","country_code":"MY","type":"education","lineage":["https://openalex.org/I931681460"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Vasaki Ponnusamy","raw_affiliation_strings":["Universiti Tunku Abdul Rahman,Faculty of Information and Communication Technology,Bandar Barat,Malaysia,31900"],"affiliations":[{"raw_affiliation_string":"Universiti Tunku Abdul Rahman,Faculty of Information and Communication Technology,Bandar Barat,Malaysia,31900","institution_ids":["https://openalex.org/I931681460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037910437","display_name":"Robithoh Annur","orcid":"https://orcid.org/0000-0002-0761-1192"},"institutions":[{"id":"https://openalex.org/I931681460","display_name":"Universiti Tunku Abdul Rahman","ror":"https://ror.org/050pq4m56","country_code":"MY","type":"education","lineage":["https://openalex.org/I931681460"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Robithoh Annur","raw_affiliation_strings":["Universiti Tunku Abdul Rahman,Faculty of Information and Communication Technology,Bandar Barat,Malaysia,31900"],"affiliations":[{"raw_affiliation_string":"Universiti Tunku Abdul Rahman,Faculty of Information and Communication Technology,Bandar Barat,Malaysia,31900","institution_ids":["https://openalex.org/I931681460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059438308","display_name":"Muhammad Waqasyz","orcid":null},"institutions":[{"id":"https://openalex.org/I106663880","display_name":"University of Bahrain","ror":"https://ror.org/0317ekv86","country_code":"BH","type":"education","lineage":["https://openalex.org/I106663880"]},{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]},{"id":"https://openalex.org/I8541234","display_name":"University College of Bahrain","ror":"https://ror.org/00m2z1b30","country_code":"BH","type":"education","lineage":["https://openalex.org/I8541234"]}],"countries":["AU","BH"],"is_corresponding":false,"raw_author_name":"Muhammad Waqasyz","raw_affiliation_strings":["University of Bahrain,College of Information Technology,Computer Engineering Department,Bahrain,32038","School of Engineering, Edith Cowan University, Perth, WA, Australia"],"affiliations":[{"raw_affiliation_string":"University of Bahrain,College of Information Technology,Computer Engineering Department,Bahrain,32038","institution_ids":["https://openalex.org/I8541234","https://openalex.org/I106663880"]},{"raw_affiliation_string":"School of Engineering, Edith Cowan University, Perth, WA, Australia","institution_ids":["https://openalex.org/I12079687"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067599262","display_name":"Hisham Alasmary","orcid":"https://orcid.org/0000-0002-6482-3968"},"institutions":[{"id":"https://openalex.org/I82952536","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30","country_code":"SA","type":"education","lineage":["https://openalex.org/I82952536"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Hisham Alasmary","raw_affiliation_strings":["King Khalid University,College of Computer Science,Department of Computer Science,Abha,Kingdom of Saudi Arabia","Information Security and Cybersecurity Unit, King Khalid University, Abha, Kingdom of Saudi Arabia","Department of Computer Science, College of Computer Science, King Khalid University, Abha, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Khalid University,College of Computer Science,Department of Computer Science,Abha,Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]},{"raw_affiliation_string":"Information Security and Cybersecurity Unit, King Khalid University, Abha, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]},{"raw_affiliation_string":"Department of Computer Science, College of Computer Science, King Khalid University, Abha, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078831968","display_name":"Shanshan Tux","orcid":null},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shanshan Tux","raw_affiliation_strings":["Beijing University of Technology,Faculty of Information Technology,Beijing,China,100124"],"affiliations":[{"raw_affiliation_string":"Beijing University of Technology,Faculty of Information Technology,Beijing,China,100124","institution_ids":["https://openalex.org/I37796252"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5080969458"],"corresponding_institution_ids":["https://openalex.org/I931681460"],"apc_list":null,"apc_paid":null,"fwci":1.7947,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.85364364,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hyperparameter","display_name":"Hyperparameter","score":0.8243454098701477},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8156616687774658},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7819268703460693},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7335479855537415},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5688385367393494},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5252506136894226},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5215001702308655},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.4969532787799835},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.49539506435394287},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.46582290530204773},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4351402521133423},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42537885904312134},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42335301637649536},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4139740467071533},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33057186007499695},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2544785737991333},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18867918848991394}],"concepts":[{"id":"https://openalex.org/C8642999","wikidata":"https://www.wikidata.org/wiki/Q4171168","display_name":"Hyperparameter","level":2,"score":0.8243454098701477},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8156616687774658},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7819268703460693},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7335479855537415},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5688385367393494},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5252506136894226},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5215001702308655},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.4969532787799835},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.49539506435394287},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.46582290530204773},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4351402521133423},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42537885904312134},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42335301637649536},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4139740467071533},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33057186007499695},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2544785737991333},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18867918848991394},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cits55221.2022.9832976","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cits55221.2022.9832976","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Computer, Information and Telecommunication Systems (CITS)","raw_type":"proceedings-article"},{"id":"pmh:oai:ro.ecu.edu.au:ecuworks2022-2026-2101","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworks2022-2026/1101","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2022 to 2026","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:ro.ecu.edu.au:ecuworks2022-2026-2101","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworks2022-2026/1101","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2022 to 2026","raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320311687","display_name":"Ministry of Education","ror":"https://ror.org/03m01yf64"},{"id":"https://openalex.org/F4320324433","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W2098000029","https://openalex.org/W2795655377","https://openalex.org/W2887548758","https://openalex.org/W2902581743","https://openalex.org/W2916407892","https://openalex.org/W2950204666","https://openalex.org/W2973862992","https://openalex.org/W2991722918","https://openalex.org/W3011655242","https://openalex.org/W3036517673","https://openalex.org/W3082458522","https://openalex.org/W3100068262","https://openalex.org/W3108669277","https://openalex.org/W3125245754","https://openalex.org/W3135502687","https://openalex.org/W3163247476","https://openalex.org/W3166266336","https://openalex.org/W3170820255","https://openalex.org/W3178708553","https://openalex.org/W3190891826","https://openalex.org/W3212271205","https://openalex.org/W4210486317","https://openalex.org/W4210763735","https://openalex.org/W4212824777","https://openalex.org/W4226026738","https://openalex.org/W6674852975","https://openalex.org/W6771110432","https://openalex.org/W6775180354","https://openalex.org/W6810684729"],"related_works":["https://openalex.org/W2133389611","https://openalex.org/W2376886931","https://openalex.org/W2061466315","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W1495178644","https://openalex.org/W2185594426"],"abstract_inverted_index":{"The":[0],"continuous":[1],"rise":[2],"of":[3,6,74,87,112,137,145,161],"inter-contented":[4],"Internet":[5,19],"Things":[7],"(IoT)":[8],"devices":[9],"has":[10],"significantly":[11],"increased":[12],"network":[13,60,174],"traffic,":[14],"complexity,":[15],"and":[16,31,72,85,119,150,165,167],"the":[17,47,53,70,75,83,92,109,135,143,156,159,169],"ever-changing":[18],"environment,":[20],"making":[21],"them":[22],"more":[23],"vulnerable":[24],"to":[25,108],"security":[26],"attacks.":[27],"Therefore,":[28,127],"a":[29],"robust":[30],"elegant":[32],"intrusion":[33,61],"detection":[34,62],"system":[35,63],"(IDS)":[36],"based":[37,59],"on":[38,91],"advanced":[39],"machine":[40],"learning":[41,57],"methods":[42],"is":[43],"required":[44],"for":[45,134,158,172],"securing":[46],"IoT":[48],"environment.":[49],"This":[50],"paper":[51],"discusses":[52],"new":[54],"deep":[55],"reinforcement":[56],"(DRL)":[58],"(NIDS)":[64],"with":[65],"feature":[66],"selection":[67],"methods.":[68],"However,":[69],"structure":[71],"training":[73,136],"DRL":[76,138],"model":[77],"are":[78],"still":[79],"challenging":[80],"tasks.":[81],"Moreover,":[82],"effectiveness":[84,144],"accuracy":[86],"DRL-IDS":[88],"crucially":[89],"depend":[90],"suitable":[93],"hyper-parameters":[94,132,147,157,171],"adaptation,":[95],"i.e.,":[96],"differing":[97],"hyperparameters":[98],"can":[99],"result":[100],"in":[101],"markedly":[102],"varied":[103],"IDS":[104],"performance.":[105],"Furthermore,":[106,140],"due":[107],"commercial":[110],"value":[111],"hyper-parameters,":[113],"confidentiality":[114],"may":[115,122],"be":[116],"deemed":[117],"necessary,":[118],"proprietary":[120],"algorithms":[121],"protect":[123],"their":[124],"exclusive":[125],"use.":[126],"we":[128,141,154],"find":[129],"different":[130,146],"optimal":[131,170],"values":[133],"agents.":[139],"evaluate":[142],"both":[148],"theoretically":[149],"empirically.":[151],"For":[152],"instance,":[153],"assess":[155],"case":[160],"varying":[162],"routing":[163],"systems":[164],"countermeasures":[166],"integrate":[168],"various":[173],"performances.":[175]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
