{"id":"https://openalex.org/W4281637960","doi":"https://doi.org/10.32604/iasc.2023.026571","title":"A Novel MegaBAT Optimized Intelligent Intrusion Detection System in Wireless Sensor Networks","display_name":"A Novel MegaBAT Optimized Intelligent Intrusion Detection System in Wireless Sensor Networks","publication_year":2022,"publication_date":"2022-06-06","ids":{"openalex":"https://openalex.org/W4281637960","doi":"https://doi.org/10.32604/iasc.2023.026571"},"language":"en","primary_location":{"id":"doi:10.32604/iasc.2023.026571","is_oa":true,"landing_page_url":"https://doi.org/10.32604/iasc.2023.026571","pdf_url":"https://file.techscience.com/ueditor/files/iasc/TSP_IASC-35-1/TSP_IASC_26571/TSP_IASC_26571.pdf","source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://file.techscience.com/ueditor/files/iasc/TSP_IASC-35-1/TSP_IASC_26571/TSP_IASC_26571.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087147086","display_name":"G. Nagalalli","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"G. Nagalalli","raw_affiliation_strings":["Department of Electronics and Comunication Engineering, Sona College of Technology, Salem, 636005, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Comunication Engineering, Sona College of Technology, Salem, 636005, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091736645","display_name":"G. Ravi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"G. Ravi","raw_affiliation_strings":["Department of Electronics and Comunication Engineering, Sona College of Technology, Salem, 636005, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Comunication Engineering, Sona College of Technology, Salem, 636005, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087147086"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.6567,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.84162541,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"35","issue":"1","first_page":"475","last_page":"490"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8977444171905518},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7673962116241455},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6535282135009766},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.4832068681716919},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4394238293170929},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.43138301372528076},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3654511570930481},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3177212178707123},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22769397497177124}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8977444171905518},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7673962116241455},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6535282135009766},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.4832068681716919},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4394238293170929},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.43138301372528076},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3654511570930481},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3177212178707123},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22769397497177124}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/iasc.2023.026571","is_oa":true,"landing_page_url":"https://doi.org/10.32604/iasc.2023.026571","pdf_url":"https://file.techscience.com/ueditor/files/iasc/TSP_IASC-35-1/TSP_IASC_26571/TSP_IASC_26571.pdf","source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/iasc.2023.026571","is_oa":true,"landing_page_url":"https://doi.org/10.32604/iasc.2023.026571","pdf_url":"https://file.techscience.com/ueditor/files/iasc/TSP_IASC-35-1/TSP_IASC_26571/TSP_IASC_26571.pdf","source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4281637960.pdf","grobid_xml":"https://content.openalex.org/works/W4281637960.grobid-xml"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W2005363590","https://openalex.org/W2011778831","https://openalex.org/W2015177282","https://openalex.org/W2039802096","https://openalex.org/W2047301871","https://openalex.org/W2077819016","https://openalex.org/W2143978378","https://openalex.org/W2161934507","https://openalex.org/W2342408547","https://openalex.org/W2501244995","https://openalex.org/W2525336835","https://openalex.org/W2591102410","https://openalex.org/W2591507999","https://openalex.org/W2746078294","https://openalex.org/W2752006512","https://openalex.org/W2762155482","https://openalex.org/W2783741806","https://openalex.org/W2789253769","https://openalex.org/W2791191836","https://openalex.org/W2803881474","https://openalex.org/W2892077825","https://openalex.org/W2892556724","https://openalex.org/W2903917530","https://openalex.org/W2916641566","https://openalex.org/W2926701059","https://openalex.org/W2929803724","https://openalex.org/W2949228982","https://openalex.org/W2973154060","https://openalex.org/W2982084047","https://openalex.org/W2986101901","https://openalex.org/W2997128470","https://openalex.org/W2999988394","https://openalex.org/W3082365360","https://openalex.org/W3088582808","https://openalex.org/W3122385966","https://openalex.org/W6675030831","https://openalex.org/W6683749612","https://openalex.org/W6742135618","https://openalex.org/W6745609711","https://openalex.org/W6752679721","https://openalex.org/W6763421702","https://openalex.org/W6769335411","https://openalex.org/W6789129392"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2998914036","https://openalex.org/W2388326001","https://openalex.org/W2390009783","https://openalex.org/W4254602698","https://openalex.org/W2394461323","https://openalex.org/W2349441905","https://openalex.org/W2361044160"],"abstract_inverted_index":{"Wireless":[0],"Sensor":[1,195],"Network":[2],"(WSN),":[3],"which":[4,242],"finds":[5],"as":[6,203],"one":[7],"of":[8,12,21,28,44,75,113,157,165],"the":[9,26,42,69,73,99,103,111,126,132,136,142,154,161,174,215,228,239],"major":[10],"components":[11],"modern":[13],"electronic":[14],"and":[15,39,64,119,123,184,199,208,212,236],"wireless":[16],"systems.":[17],"A":[18],"WSN":[19,100],"consists":[20],"numerous":[22],"sensor":[23,29],"nodes":[24],"for":[25,151,153,247],"discovery":[27],"networks":[30],"to":[31,98,178],"leverage":[32],"features":[33],"like":[34],"data":[35,37,59,81],"sensing,":[36],"processing,":[38],"communication.":[40],"In":[41,87,160],"field":[43],"medical":[45],"health":[46,79],"care,":[47],"these":[48,92],"network":[49],"plays":[50],"a":[51,88,180],"very":[52,89],"vital":[53],"role":[54],"in":[55,130,226],"transmitting":[56],"highly":[57],"sensitive":[58],"from":[60,110],"different":[61,76,133,158],"geographic":[62],"regions":[63],"collecting":[65],"this":[66,139,244],"information":[67],"by":[68,85,173],"respective":[70],"network.":[71],"But":[72],"fear":[74],"attacks":[77,93,235],"on":[78],"care":[80],"typically":[82],"increases":[83,125],"day":[84],"day.":[86],"short":[90],"period,":[91],"may":[94],"cause":[95],"adversarial":[96],"effects":[97],"nodes.":[101],"Furthermore,":[102],"existing":[104,217],"Intrusion":[105],"Detection":[106],"System":[107],"(IDS)":[108],"suffers":[109],"drawbacks":[112],"limited":[114],"resources,":[115],"low":[116,181],"detection":[117,156],"rate,":[118],"high":[120,185],"computational":[121,182],"overhead":[122,183],"also":[124],"false":[127],"alarm":[128],"rates":[129],"detecting":[131,227],"attacks.":[134,159],"Given":[135],"above-mentioned":[137],"problems,":[138],"paper":[140],"proposes":[141],"novel":[143],"MegaBAT":[144],"optimized":[145,172],"Long":[146,167],"Short":[147],"Term":[148],"Memory":[149,169],"(MBOLT)-IDS":[150],"WSNs":[152],"effective":[155],"proposed":[162,221],"framework,":[163],"hyperparameters":[164],"deep":[166],"Short-Term":[168],"(LSTM)":[170],"were":[171],"meta-heuristic":[175],"megabat":[176],"algorithm":[177],"obtain":[179],"performance.":[186],"The":[187,220],"experimentations":[188],"have":[189],"been":[190],"carried":[191],"out":[192],"using":[193],"(Wireless":[194],"NetworkDetection":[196],"System)WSN-DS":[197],"datasets":[198],"performance":[200],"metrics":[201],"such":[202],"accuracy,":[204],"recall,":[205],"precision,":[206],"specificity,":[207],"F1-score":[209],"are":[210],"calculated":[211],"compared":[213],"with":[214],"other":[216],"intelligent":[218],"IDS.":[219],"framework":[222],"provides":[223],"outstanding":[224],"results":[225],"black":[229],"hole,":[230,232],"gray":[231],"scheduling,":[233],"flooding":[234],"significantly":[237],"reduces":[238],"time":[240],"complexity,":[241],"makes":[243],"system":[245],"suitable":[246],"resource-constraint":[248],"WSNs.":[249]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
