<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Next-Generation Cyberattack Detection for Industrial IoT using Extreme Learning Machine with Optimization Algorithm</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maha Farouk Sabir</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Information Systems Department, Faculty of Computing and Information Technology, King Abdulaziz University</institution>
          ,
          <addr-line>Jeddah 21589</addr-line>
          ,
          <country country="SA">Saudi Arabia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Proceedings of SNSFAIT 2024: International Symposium on Securing Next-Generation Systems using Future Artificial Intelligence Technologies</institution>
          ,
          <addr-line>Delhi</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The reliability of an industrial Internet of Things (IIoT) system is a significant end-user preference. Preserving network reliability is vital to void the loss of life. A trustworthy IIoT network incorporates the safety features of IT trustworthiness-security, safety, resilience, reliability, and privacy. Traditional security techniques and tools are not sufficient to protect the platform of IIoT owing to the variance in protocols, restricted upgrade opportunities, divergence in protocols, and earliest forms of the operating system employed in the industrial systems. With the unexpected and diversification behaviors of cyber-security attacks, classical cyber-attack recognition methods have some crucial challenges with enlarging huge data with inaccurate classification methods, unappropriated feature selection (FS) and extraction, and high computation time in prediction. This study develops an Advanced Cyberattack Detection for Industrial IoT using the Binary Salp Swarm Algorithm (ACDIIOT-BSSA) technique. The projected ACDIIOT-BSSA method mainly addresses the classification and identification of attack recognition in achieving cyber security. The first phase of data pre-processing is implemented to alter the input data into the relevant format. Next, the proposed ACDIIOT-BSSA approach achieves feature selection progress utilizing the binary salp swarm algorithm (BSSA) algorithm. For attack recognition, the ACDIIOT-BSSA method uses extreme learning machine (ELM) technique. Finally, arithmetic optimization algorithm (AOA) is deployed as a hyperparameter optimizer for the ELM method. To inspect the improved performance of the proposed ACDIIOT-BSSA approach, a wide range of experiments were done. The empirical findings reported a better outcome of the ACDIIOT-BSSA method over other existing techniques.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Industrial Internet of Things</kwd>
        <kwd>Cyberattack Detection</kwd>
        <kwd>Arithmetic Optimization Algorithm</kwd>
        <kwd>Feature Selection</kwd>
        <kwd>Deep Learning 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Cybersecurity plays a dangerous part under industrial control systems (ICSs) observant versus
possible malicious activity and ensures the continuous functionalism of crucial national
frameworks [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The requests of Industry 4.0 which is extremely automatic and has minimum
human intrusion leads to the growth of incorporation of the Industrial Internet of Things (IIoT)
within industrialized processes. The dependence on connected systems has developed
significantly, then constructing industrialized network control methods more sensitive to
cyber-attacks [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Therefore, the significance of executing robust cyber-security functionalism
or protocols inside ICSs has become an imperative concern. The smart organization in the IIoT
environment is exposed to several cyber-attacks such as Man-in-the-Middle attacks (MiM),
DDoS, Infiltration attacks, Backdoors, and so on. Such attacks can break the integrity and
confidentiality of data in that network [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. An Intrusion Detection System (IDS) can be a safety
device for protecting data traffic. It works for the next route of safety which protects the
networks. IDS detects the networks in all admission points and identifies some intrusion in the
packets running into the channel event that it signals the particular authority [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. IDS is
normally used afterward as a firewall, and it appears as an enhanced place for its arrangement.
IDS were well-known mostly in two groups termed Signature-based IDS (SIDS) and
Anomalybased IDS (AIDS) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. SIDS mechanism with pattern toning method for example which scans
the data packet toward malicious content with attack patterns. Having a pre-defined database
or list of the signatures or patterns or the well-known attacks, what employ them by relating
the data packets with them to detect the well-known attack [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        Conventional cyber-security schemes safeguard users and devices via IDS firewalls, user
authentication, anti-virus software, and data encryption [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The usage of a Machine Learning
(ML) model for detecting malignant network traffic, anomalous behaviors, and challenges in
computer schemes in an IDS becomes inadequate [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. However, traditional MLs lack automated
feature engineering, hold a lower detection level, and are not effective in identifying minor
alternatives to present attacks. This has generated a deliberate DL model for improving
cybersecurity schemes [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. DL is an ML subfield, which has grown high recognition in several fields
owing to its development in precision in difficult tasks and the latest expansions in software
and hardware [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. DL methods increase cyber-security schemes preventing attacks by
detecting patterns, which are diverse from standard behavior.
      </p>
      <p>This study develops an Advanced Cyberattack Detection for Industrial IoT using Binary Salp
Swarm Algorithm (ACDIIOT-BSSA) technique. The projected ACDIIOT-BSSA method mainly
addresses the classification and identification of attack recognition in achieving cyber security.
The first phase of data pre-processing is implemented to alter the input data into the relevant
format. Next, the proposed ACDIIOT-BSSA approach achieves feature selection progress
utilizing the binary salp swarm algorithm (BSSA) algorithm. For attack recognition, the
ACDIIOT-BSSA method uses extreme learning machine (ELM) technique. Finally, arithmetic
optimization algorithm (AOA) is deployed as a hyperparameter optimizer for the ELM method.
The empirical findings reported a better outcome of the ACDIIOT-BSSA method over other
existing techniques.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature Review</title>
      <p>
        In [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], 2 different DL methods are used namely CNNsand Deep Belief Networks (DBNs)
considered as hybrid classifications, to generate methods for identifying attacks in IoT enabled
cyber physical methods. Also, this study aims to propose a novel hybrid optimizer method
named “Seagull Adapted Elephant Herding Optimizer” (SAEHO) to fine-tune the hybrid
classification weights. The “Hybrid Classification + SAEHO” method extracts the feature
extraction datasets as input and identifies the networks as both benign or attacked. Li et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]
develop feasible solutions based on federated sequence learning (FSL) with cyberattack
recognition abilities. In federated frameworks, FSL creates a collective global method unless
violating local data unity. Exploitation of the local sequential model, FSL seizures the inherent
industry time series response. In addition, data heterogeneity between distributed consumers is
also regarded that is significant for maintaining a robust but delicate attack recognition.
Durairaj et al. [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] use the DBNs which is one of the DL methods with few enhancements. To
enhance the precision of the detections, a rule based recognition method is included to improve
the recognition of intruders by utilizing DBN. The presented method is followed by the layer
microgrid structure, which forms the system flexibility and simple towards the execution. The
presented 2 attacks, like Denial of Service attacks and False Data Injection, are produced by
Greedy Algorithms and are identified by the presented method.
      </p>
      <p>
        Mohy-Eddine [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] designed an intrusion detection method using ML and feature
engineering for IIoT security. The method incorporates Isolation Forest (IF) through Pearson's
Correlation Coefficient (PCC) to decrease the forecast time and computing cost. IF is used to
identify and delete anomalies from the dataset. The method employs PCC to select the most
proper feature. IF and PCC are used interchangeably (IFPCC and PCCIF). The RF classification
is executed to improve IDS performance. Kunang et al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] introduced a hybrid DL method.
This method utilized unsupervised methods to mine features and data dimensions, then a neural
network for classifications. Various methods are utilized to identify the efficacy of the DL based
IoT IDS by 2 feature extraction scenarios. The initial stage utilized AE variations like deep AE
(DAE), deep LSTM AE (LSTM-DAE), and deep convolutional AE. The second stage utilized stack
methods for feature extractions, containing stacked AE and deep belief networks.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Materials and Methods</title>
      <p>In this study, we have developed a novel ACDIIOT-BSSA technique. The projected
ACDIIOTBSSA method mainly addresses the classification and identification of attack recognition in
achieving cyber security. To accomplish that, the ACDIIOT-BSSA technique has data
normalization, BSSA based FS, ELM based attack detection, and AOA based parameter selection
are illustrated in Fig. 1.
At primary phase of data, pre-processing is implemented to alter the input data into relevant
format. Data pre-processing utilizing Linear Scaling Normalization (LSN) is essential in
cybersecurity for attack detection, as it converts values of features into a constant range, usually
between 0 and 1. This normalization certifies that every feature pays similarly to the recognition
method, averting any distinct feature from controlling the analysis. By standardizing the data,
LSN improves the model's capability to exactly detect potential and anomaly threats.
3.2.</p>
      <sec id="sec-3-1">
        <title>Feature Selection Process</title>
        <p>
          Next, the proposed ACDIIOT-BSSA approach achieves feature selection progress utilizing the
BSSA algorithm. Mirjalili et al. presented the SSA based on the group behavior of salps in the
ocean [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. In SSA, the swarm of salps forages and moves in a chain structure, and the leader
and follower are two different roles of salps. The individual at the forefront of the sales chain
serves as a leader, whereas the others serve as followers. The leaders lead the salp chain
direction, whereas the follower follows the preceding leader. Thereby, the leader explores the
food source, and follower moves to the leader. This enables the salp chain to have stronger local
exploitation and global exploration capabilities. Similar to other swarm‐based techniques, the
salp position can be described by a ‐dimensional vector, where  is the dimension number of
optimization problems. Next, the swarm of salps is described by a x matrix, where  is the
size of swarm.
% − ! 89% − %&gt;" + %?
        </p>
        <p>
          In Eq. (2), %! is the '( dimension vector of first salp position, viz., leader of salps.  denotes
the food source position. ! is a crucial parameter. It has the function of balancing exploration
and exploitation capability of SSA. " and &amp;, that define the stepsize and movement direction
of the leader, correspondingly, are two randomly generated values within [
          <xref ref-type="bibr" rid="ref1">0,1</xref>
          ]. % and % are
the upper and the lower boundaries of the '( dimension, correspondingly.
        </p>
        <p>! = 2) (+-,)! (3)
Where  and  are the existing and the maximum iteration count.</p>
        <p>A follower is used to update the location using the following equation:</p>
        <p>1
%/ = 2 9%/ + %/) !&gt; (4)
In Eq. (4), %/ is the '( dimension vector of '( follower salp position.</p>
        <p>The SSA was initially introduced to resolve the optimization problems. Meanwhile, FS is a
discrete optimization problem, and SSA could not efficiently handle it. To overcome these
issues, BSSA was introduced. In BSSA, the component of position vector should be mapped to
0 or 1 after all the iterations. The mapping model of location vector is given below:
1
9%/&gt; =</p>
        <p>
          1 + exp) 0"#
%/ = U1   ≥ 9%/&gt; (6)
0 
Where %/ is the 1( dimension vector of location representing '( salp;  shows the
uniformly distributed random number within [
          <xref ref-type="bibr" rid="ref1">0,1</xref>
          ]; sigmoid function  is the possibility of
choosing a candidate features; %/ indicates the '( vector dimension of '( salp position.
        </p>
        <p>The fitness function (FF) examines the classifier precision and the chosen feature numbers.
It maximizes the classification precision and minimizes the chosen feature set sizes. Hence, the
subsequent FF is utilized to compute a particular solution, as presented in Eq. (7).
#
 =  ∗  + (1 − ) ∗ #_ (7)</p>
        <p>Where   indicates the classifier error rate utilizing the chosen features.
 Is computed as the ratio of wrong classified to the number of classifiers produced,
represented as a value among 0 and 1. ( Is complementary of the classifier precision),
# indicates the amount of chosen features and #_ indicates the entire amount of features
in the novel dataset.  is utilized to manage the significance of classifier subset length and
quality. In our experimentations, the value  is 0.9.
3.3.</p>
      </sec>
      <sec id="sec-3-2">
        <title>Attack Detection using ELM Classifier</title>
        <p>
          For attack recognition, the ACDIIOT-BSSA method uses ELM technique. The proposed ELM
technique aims to resolve the slower training problems with classical FFNN model [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. The
slow training problems are tracked back to the iterative training owing to its gradient‐based
learning algorithm. Rather than training the network through iterative training, ELM arbitrarily
selects the nodes in the HL of single hidden layer feedforward neural network (SHFN) and later
defines the output weight through the analysis. Thus, the training time can be considerably
decreased while providing better generalizability, though the architecture of NN remains the
same.
        </p>
        <p>Consider (/, /), a set of observable samples  and the expected output , thus / =
[/!, ⋯ , /2]1 ∈ ℝ2 and % = [/!, ⋯ , /3]1 ∈ ℝ3.  is the number of the observations, () is
the activation function, and ℎ is the amount of hidden nodes.</p>
        <p>o% = i ℎ %9% ⋅ % + ℎ/&gt; (8)
/5!</p>
        <p>In Eq. (8), o% refers to the output of '( nodes at the output layer,  = 1, ⋯ , , / =
[/!, ⋯ , /2]1 indicates the weight vectors between'( hidden nodes and the input nodes. / =
[/!, ⋯ , /6]1 and ℎ/ are the threshold values of '( hidden nodes. The symbol ⋅ denotes the
inner product of / and /. The SHFN can calculate the desired output of  samples with zero
means using
 = ,
Where  refers to the output matrix of HL.</p>
        <p>7</p>
        <p>(
% = i
/5!
ℎ %9/ ⋅ % + ℎ/&gt;
(9)
 = i ( i / 9/ ⋅ % + ℎ/&gt; − %)" (10)</p>
        <p>%5! /5!</p>
        <p>The parameters such as , the vector form of /, , and  are updated iteratively to reduce
the error from gradient‐based algorithm,
()
$ = $) ! −   (11)
Where  refers to the learning rate. Usually, Backpropagation is utilized as a learning model
thus errors are forwarded back to parameter optimization. If  is small, then it takes long time
for the learning model to be converged. On the other hand, a large  might result in divergence
or instability. Other perplexing issues are gradient‐based learning and Local minima. The
dissimilarity between backpropagation and ELM algorithms lies mainly in the technique for
updating parameters. For ELM, the neuron count in the HL is the primary factor that defines
the ELM performance.</p>
      </sec>
      <sec id="sec-3-3">
        <title>Hyperparameter Optimizer</title>
        <p>Finally, the AOA is deployed as a hyperparameter optimizer for the ELM method. The AOA is
a new metaheuristic algorithm based on the statistical properties of the four basic arithmetical
operators such as multiplication (), division (), subtraction (), and addition () [18]. The
two processes that constitute optimization algorithms in AOA are exploitation and exploration
of mathematical modeling of AOA. The hierarchy of arithmetical operations together with the
domination from the external to inside. The Math Optimizer Accelerated () operator is a
coefficient in the search process.</p>
        <p>(89:;) = Min + &lt;9:; ∗ x
&lt;':;
Where (_) is the function value at '( iterations. 89:; is the existing iteration,
ranging from 1 to the maximal value. “” and “” are the minimal and maximal values
correspondingly.</p>
        <p>The exploration operator of  explores the search region randomly on different
approaches and areas to search for the best solution according to the () and () search
strategies.</p>
        <p>(12)
Max − Min</p>
        <p>z
()
/%(&lt;':; + 1) = 4 +   (13)
() ∗  ∗ 9( − ) ∗  + &gt;, ℎ
//(&lt;':; + 1) is the '( solution in '( position at the existing iteration, and () is the '(
location in the optimum solution.  and  are the upper and lower boundaries of the '(
position and is a small integer number. The search process can be transformed by  where it
denotes the existing iteration,  refers to the setting of the control parameter set as 0.5.</p>
        <p>∗ 9( − ) ∗  + &gt;, 2 &lt; 0.5
 (&lt;':;) = 1 − _!/&gt; (14)</p>
        <p>In Eq. (14), /':; indicates the existing iteration, (_) shows the maximal iteration
number and  (Math Optimizer Probability) is a coefficient.  (&lt;':;) is the function
value at the '( iteration. The delicate parameter  is the exploitation accuracy through the
iteration at 5.</p>
        <p>The () and () search strategies are utilized by the exploitation operators of AOA to
exhaustively explore the search area in the dense places and approach to search for the best
solution.</p>
        <p>_!/&gt;
() −  ∗ 9( − ) ∗  + &gt;3 &lt; 0.5
, (&lt;':; + 1) = </p>
        <p>() +  ∗ 9( − ) ∗  + &gt;, ℎ</p>
        <p>The fitness selection is the significant feature affecting the presentation of the AOA. The
hyper-parameter selection model covers the solution encode method to compute the candidate
solution efficiency. In this study, the AOA finds precision as the main criterion to develop the
FF which could be expressed as follows.</p>
        <p>= max ()</p>
        <p>=</p>
        <p>+ 
From the formulation, TP and FP represent true and false positive values respectively.
(16)
(17)
 (15)</p>
        <sec id="sec-3-3-1">
          <title>Normal</title>
        </sec>
        <sec id="sec-3-3-2">
          <title>Attack</title>
          <p>Normal</p>
          <p>DDoS-UDP
SQL-injection
DDoS-TCP</p>
          <p>Password
Port-scanning
Ransomware
1500
1500
1500
1500
1500
1500
1500
10500</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Performance Validation</title>
      <p>The experimental validation outcomes of the ACDIIOT-BSSA approach are examined using
EdgeIIoTset dataset [19]. The dataset comprises 10500 samples under seven class labels defined
in Table 1.</p>
      <sec id="sec-4-1">
        <title>IoT Traffic</title>
      </sec>
      <sec id="sec-4-2">
        <title>Type of Event Table 1 : Details of dataset Data Record Total Number of Record</title>
        <p>In Table 2 and Fig. 2, the overall cyberattack detection results of the ACDIIOT-BSSA model
under 70%TRAP and 30%TESP are demonstrated. The table values stated that the
ACDIIOTBSSA method can find the samples proficiently. With 70%TRAP, the ACDIIOT-BSSA
methodology offers average ? of 95.00%, $ of 82.53%, , of 82.51%, @AB;: of 82.51%,
and 6:C@2;: of 82.51%. Followed by, with 30%TESP, the ACDIIOT-BSSA technique provides
average ? of 95.56%, $ of 84.47%, , of 84.45%, @AB;: of 84.43%, and 6:C@2;: of
84.45%.</p>
        <p>In Fig. 3, the training and validation accuracy outcomes of the ACDIIOT-BSSA approach can
be exhibited. The precision values are calculated for 0-25 epoch counts. This figure emphasized
that the training and validation accuracy values display reliable trend that indicated the
capability of the ACDIIOT-BSSA method with better performance over numerous iterations. In
addition, the training accuracy and validation accuracy stay nearer over the epoch count that
denoted less minimum overfitting and shows superior performance of the ACDIIOT-BSSA
technique, ensuring continuous prediction on hidden instances.</p>
        <p>In Fig. 4, the training and validation loss graph of the ACDIIOT-BSSA technique was
demonstrated. The loss values are calculated for 0-25 epoch counts. It is depicted that the
training and validation accuracy values indicated a reducing trend that announced the capacity
of the ACDIIOT-BSSA technique to balance a trade-off between generalization and data fitting.
The consistent decrease in loss values also assurances the better performance of the
ACDIIOTBSSA approach and tuning of the prediction outcomes on time.</p>
        <p>In Table 3 and Fig. 5, an overall comparative analysis of the ACDIIOT-BSSA approach is
noticeably portrayed [20] compared with recent techniques [21-22]. The outcomes depicted
that the RF, SVM, and KNN techniques have demonstrated ineffectual recognition outcomes
with least ? of 80.83%, 73.01%, and 69.33%, respectively. Meanwhile, the DNN
methodology has displayed significant performance with ? of 94.67%, $ of 75.81%,
, of 73.80%, and @AB;: of 70.08%. In addition, the Inception time technique has successfully
performed reasonable results with ? of 94.94%, $ of 70.24%, , of 74.20%, and
@AB;: of 68.27%. Lastly, the ACDIIOT-BSSA method exhibits better performance with
improved ? of 95.56%, $ of 84.47%, , of 84.45%, and @AB;: of 84.43%. Therefore,
the ACDIIOT-BSSA approach was used for superior cyberattack recognition in the IIoT
environment.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>In this study, we have developed a novel ACDIIOT-BSSA technique. The projected
ACDIIOTBSSA method mainly addresses the classification and identification of attack recognition in
achieving cyber security. The first phase of data pre-processing is implemented to alter the
input data into the relevant format. Next, the proposed ACDIIOT-BSSA approach achieves
feature selection progress utilizing the BSSA algorithm. For attack recognition, the
ACDIIOTBSSA method uses ELM technique. Finally, the AOA is deployed as a hyperparameter optimizer
for the ELM method. To inspect the improved performance of the proposed ACDIIOT-BSSA
approach, a wide range of experiments were done. The empirical findings reported a better
outcome of the ACDIIOT-BSSA method over other existing techniques
[18] H. Abdelfattah, A.O. Aseeri, M. Abd Elaziz, Optimized FOPID controller for nuclear
research reactor using enhanced planet optimization algorithm, Alexandria Engineering
Journal, 97, (2024) 267-282.
[19]
https://www.kaggle.com/datasets/mohamedamineferrag/edgeiiotset-cybersecuritydataset-of-iot-iiot
[20] Tareq, B.M. Elbagoury, S. El-Regaily, E.S.M. El-Horbaty, Analysis of ton-iot, unw-nb15, and
edge-iiot datasets using dl in cybersecurity for iot, Applied Sciences, 12.19, (2022) 9572.
[21] I. Katib, M. Ragab, Blockchain-assisted hybrid harris hawks optimization based deep DDoS
attack detection in the IoT environment, Mathematics, 11.8 (2023) 1887.
[22] L. A. Maghrabi, I.R. Alzahrani, D. Alsalman, Z. M. AlKubaisy, D. Hamed, M. Ragab. Golden
Jackal Optimization with a Deep Learning-Based Cybersecurity Solution in Industrial
Internet of Things Systems, Electronics 2023, 12(19), 4091.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>N.</given-names>
            <surname>Mhaisen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Fetais</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Massoud</surname>
          </string-name>
          ,
          <article-title>Secure smart contract-enabled control of battery energy storage systems against cyber-attacks</article-title>
          ,
          <source>Alexandria Engineering Journal</source>
          ,
          <volume>58</volume>
          .4, (
          <year>2019</year>
          )
          <fpage>1291</fpage>
          -
          <lpage>1300</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Pan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.L.</given-names>
            <surname>Han</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xiang</surname>
          </string-name>
          ,
          <article-title>Deep learning based attack detection for cyber-physical system cybersecurity: A survey</article-title>
          ,
          <source>IEEE/CAA Journal of Automatica Sinica</source>
          ,
          <volume>9</volume>
          .3, (
          <year>2021</year>
          )
          <fpage>377</fpage>
          -
          <lpage>391</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dehghani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Niknam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ghiasi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Bayati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Savaghebi</surname>
          </string-name>
          ,
          <article-title>Cyber-attack detection in dc microgrids based on deep machine learning and wavelet singular values approach</article-title>
          , Electronics,
          <volume>10</volume>
          .
          <fpage>16</fpage>
          , (
          <year>2021</year>
          )
          <year>1914</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>E. B.</given-names>
            <surname>Ashary</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Maghrabi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Jambi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. B.</given-names>
            <surname>Ashari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Fayoumi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Al-Ghamdi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ragab</surname>
          </string-name>
          ,
          <article-title>Enhancing Resilience in Next-Generation Wireless Networks Through Deep Learning for Security Enhancement</article-title>
          ,
          <source>IEEE Transactions on Consumer Electronics</source>
          .
          <year>2024</year>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O.</given-names>
            <surname>Ajayi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Cherian</surname>
          </string-name>
          , T. Saadawi,
          <source>Secured Cyber-Attack Signatures Distribution using Blockchain Technology</source>
          ,
          <source>2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)</source>
          , New York, NY, USA, (
          <year>2019</year>
          )
          <fpage>482</fpage>
          -
          <lpage>488</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Kelli</surname>
          </string-name>
          ,
          <string-name>
            <surname>Sarigiannidis</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Argyriou</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Lagkas</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Vitsas</surname>
            ,
            <given-names>A Cyber</given-names>
          </string-name>
          <string-name>
            <surname>Resilience</surname>
          </string-name>
          <article-title>Framework for NG-IoT Healthcare Using Machine Learning and Blockchain</article-title>
          , ICC 2021 - IEEE International Conference on Communications, Montreal, QC, Canada, (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Khadidos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. M.</given-names>
            <surname>AlKubaisy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Khadidos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. H.</given-names>
            <surname>Alyoubi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Alshareef</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ragab</surname>
          </string-name>
          ,
          <source>Binary Hunter Prey Optimization with Machine Learning Based Cybersecurity Solution on Internet of Things Environment</source>
          , Sensors, Sensors,
          <volume>23</volume>
          . 16 (
          <year>2023</year>
          )
          <fpage>7207</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R. M. A.</given-names>
            <surname>Ujjan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Pervez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Dahal</surname>
          </string-name>
          ,
          <source>Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN, 2019 13th International Conference on Software, Knowledge, Information Management and Applications</source>
          (SKIMA),
          <source>Island of Ulkulhas</source>
          , Maldives, (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ghiasi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dehghani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Niknam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kavousi-Fard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Siano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.H.</given-names>
            <surname>Alhelou</surname>
          </string-name>
          ,
          <article-title>Cyber-attack detection and cyber-security enhancement in smart DC-microgrid based on blockchain technology and Hilbert Huang transform</article-title>
          ,
          <source>IEEE Access</source>
          ,
          <volume>9</volume>
          , (
          <year>2021</year>
          )
          <fpage>29429</fpage>
          -
          <lpage>29440</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>O.</given-names>
            <surname>Ajayi</surname>
          </string-name>
          , T. Saadawi,
          <source>Blockchain-Based Architecture for Secured Cyber-Attack Features Exchange</source>
          ,
          <source>2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)</source>
          , New York, NY, USA, (
          <year>2020</year>
          )
          <fpage>100</fpage>
          -
          <lpage>107</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Sagu</surname>
            ,
            <given-names>N. S.</given-names>
          </string-name>
          <string-name>
            <surname>Gill</surname>
            , Gulia,
            <given-names>I. Priyadarshini</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Chatterjee</surname>
          </string-name>
          ,
          <article-title>Hybrid Optimization Algorithm for Detection of Security Attacks in IoT-Enabled Cyber-Physical Systems</article-title>
          ,
          <source>in IEEE Transactions on Big Data, doi: 10</source>
          .1109/TBDATA.
          <year>2024</year>
          .
          <volume>3372368</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>F.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lin</surname>
          </string-name>
          , H. Han,
          <article-title>FSL: federated sequential learning-based cyberattack detection for Industrial Internet of Things</article-title>
          ,
          <source>Industrial Artificial Intelligence</source>
          ,
          <volume>1</volume>
          .1, (
          <year>2023</year>
          )
          <article-title>4</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>D.</given-names>
            <surname>Durairaj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.K.</given-names>
            <surname>Venkatasamy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mehbodniya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Umar</surname>
          </string-name>
          , T. Alam,
          <article-title>Intrusion detection and mitigation of attacks in microgrid using enhanced deep belief network, Energy Sources</article-title>
          ,
          <string-name>
            <surname>Part</surname>
            <given-names>A</given-names>
          </string-name>
          : Recovery, Utilization, and Environmental Effects,
          <volume>46</volume>
          .1, (
          <year>2024</year>
          )
          <fpage>1519</fpage>
          -
          <lpage>1541</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mohy-Eddine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Guezzaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Benkirane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Azrour</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Farhaoui</surname>
          </string-name>
          ,
          <article-title>An ensemble learning based intrusion detection model for industrial IoT security</article-title>
          ,
          <source>Big Data Mining and Analytics</source>
          ,
          <volume>6</volume>
          .3, (
          <year>2023</year>
          )
          <fpage>273</fpage>
          -
          <lpage>287</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Y.N.</given-names>
            <surname>Kunang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Nurmaini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Stiawan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.Y.</given-names>
            <surname>Suprapto</surname>
          </string-name>
          ,
          <article-title>An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction</article-title>
          ,
          <source>International Journal of Information Security</source>
          , (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>30</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>B.</given-names>
            <surname>Wei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Deng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <article-title>Feature selection via a multi-swarm salp swarm algorithm</article-title>
          ,
          <source>Electronic Research Archive</source>
          ,
          <volume>32</volume>
          .5, (
          <year>2024</year>
          )
          <fpage>3588</fpage>
          -
          <lpage>3617</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>X.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.S.</given-names>
            <surname>Guttery</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.D.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , DF-dRVFL:
          <article-title>A novel deep feature based classifier for breast mass classification</article-title>
          ,
          <source>Multimedia Tools and Applications</source>
          ,
          <volume>83</volume>
          .5, (
          <year>2024</year>
          )
          <fpage>14393</fpage>
          -
          <lpage>14422</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>