{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T01:13:28Z","timestamp":1728177208071},"reference-count":26,"publisher":"Wiley","issue":"10","license":[{"start":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T00:00:00Z","timestamp":1664409600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100006701","name":"Umm Al-Qura University","doi-asserted-by":"publisher","award":["22UQU4210118DSR36"],"id":[{"id":"10.13039\/501100006701","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004242","name":"Princess Nourah Bint Abdulrahman University","doi-asserted-by":"publisher","award":["PNURSP2022R319"],"id":[{"id":"10.13039\/501100004242","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007446","name":"King Khalid University","doi-asserted-by":"publisher","award":["RGP1\/241\/43"],"id":[{"id":"10.13039\/501100007446","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems"],"published-print":{"date-parts":[[2022,12]]},"abstract":"Abstract<\/jats:title>The latest advancements in Internet of Things (IoT) have revolutionized the productivity of global shipping industry in the recent years. It also led to the emergence of IoT\u2010enabled Maritime Transportation Systems (MTS). These approaches detect the malware in network before the execution process. Various machine learning (ML) models have been proposed and designed in literature for effective malware detection. However, the existence of numerous features in the data bring dimensionality problem which can be only resolved by the use of feature selection approaches. Therefore, the current research work presents Intelligent Metaheuristics\u2010based Feature Selection model with Optimal ML approach for Malware Detection (IMFSOML\u2010MD) on IoT\u2010enabled MTS. Primarily, IMFSOML\u2010MD technique involves the design of Quantum Invasive Weed Optimization Algorithm\u2010based Feature Selection technique to optimally choose a subset of features. Moreover, an Optimal Wavelet Neural Network (OWNN) model is employed to perform classification process. The initial parameters of WNN model are optimally tuned with the help of Colliding Bodies Optimization algorithm thereby improving the detection performance. The proposed IMFSOML\u2010MD technique was experimentally validated using publicly\u2010available CICMalDroid2020 dataset. The results from extensive comparative analysis demonstrated the superiority of the proposed IMFSOML\u2010MD technique over other compared methods in terms of detection performance with maximum accuracy of 98.96%.<\/jats:p>","DOI":"10.1111\/exsy.13155","type":"journal-article","created":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T11:44:39Z","timestamp":1664451879000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Intelligent metaheuristics with optimal machine learning approach for malware detection on IoT\u2010enabled<\/scp> maritime transportation systems"],"prefix":"10.1111","volume":"39","author":[{"given":"Mohammed","family":"Maray","sequence":"first","affiliation":[{"name":"Department of Information Systems, College of Computer Science King Khalid University Abha Saudi Arabia"}]},{"given":"Mohammed","family":"Alghamdi","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Computer Science King Khalid University Abha Saudi Arabia"},{"name":"Department of Information and Technology Systems, College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia"}]},{"given":"Fatma S.","family":"Alrayes","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh Saudi Arabia"}]},{"given":"Saud S.","family":"Alotaibi","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Computing and Information System Umm Al\u2010Qura University Saudi Arabia"}]},{"given":"Sana","family":"Alazwari","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computers and Information Technology Taif University Taif Saudi Arabia"}]},{"given":"Rana","family":"Alabdan","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Computer and Information Science Majmaah University Al\u2010Majmaah Saudi Arabia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4024-271X","authenticated-orcid":false,"given":"Mesfer","family":"Al Duhayyim","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Sciences and Humanities\u2010 Aflaj Prince Sattam Bin Abdulaziz University Al\u2010Kharj Saudi Arabia"}]}],"member":"311","published-online":{"date-parts":[[2022,9,29]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2021.100108"},{"issue":"1","key":"e_1_2_10_3_1","article-title":"An iot\u2010enabled system for marine data acquisition and cartography","volume":"5","author":"Al\u2010Zaidi R.","year":"2017","journal-title":"Transactions on Networks and Communications"},{"key":"e_1_2_10_4_1","doi-asserted-by":"crossref","unstructured":"Amin Y. M. &Abdel\u2010Hamid A. T.2016 Classification and analysis of IEEE 802.15. 4 PHY layer attacks. 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT) 1\u20138.IEEE.","DOI":"10.1109\/MoWNet.2016.7496624"},{"key":"e_1_2_10_5_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/9437378"},{"key":"e_1_2_10_6_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/7035233"},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3026660"},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3021792"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9245372"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8241342"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2020.11.001"},{"key":"e_1_2_10_12_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TITS.2021.3122368","article-title":"DLTIF: Deep learning\u2010driven cyber threat intelligence modeling and identification framework in IoT\u2010enabled maritime transportation systems","author":"Kumar P.","year":"2021","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"e_1_2_10_13_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TITS.2021.3118853","article-title":"Building covert timing channel of the IoT\u2010enabled MTS based on multi\u2010stage verification","author":"Liang C.","year":"2021","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"e_1_2_10_14_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TITS.2021.3125070","article-title":"Flexible data integrity checking with original data recovery in IoT\u2010enabled maritime transportation systems","author":"Liu D.","year":"2021","journal-title":"IEEE Transactions on Intelligent Transportation Systems."},{"key":"e_1_2_10_15_1","doi-asserted-by":"crossref","unstructured":"Mahdavifar S. Kadir A. F. A. Fatemi R. Alhadidi D. &Ghorbani A. A.2020.Dynamic android malware category classification using semi\u2010supervised deep learning. 2020 IEEE International Conference on Dependable Autonomic and Secure Computing International Conference on Pervasive Intelligence and Computing International Conference on Cloud and Big Data Computing International Conference on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech) 515\u2013522.IEEE.","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00094"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10367-w"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3102957"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3010967"},{"key":"e_1_2_10_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3003211"},{"key":"e_1_2_10_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2977383"},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.01.207"},{"issue":"2","key":"e_1_2_10_22_1","first-page":"413","article-title":"An improved quantum evolutionary algorithm based on invasive weed optimization","volume":"4","author":"Razmjooy N.","year":"2014","journal-title":"Indian Journal of Science Research"},{"key":"e_1_2_10_23_1","unstructured":"Voliotis A. &Filippopoulos I.(2019).An integrated maritime cyber security policy proposal. Proceedings of ISER 637th International Conference on Science Technology Engineering and Management (ICSTEM) 1\u20109."},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9211-1"},{"key":"e_1_2_10_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101619"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2908191"},{"key":"e_1_2_10_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2936869"}],"container-title":["Expert Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/exsy.13155","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1111\/exsy.13155","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/exsy.13155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T10:16:16Z","timestamp":1692612976000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/exsy.13155"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,29]]},"references-count":26,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["10.1111\/exsy.13155"],"URL":"https:\/\/doi.org\/10.1111\/exsy.13155","archive":["Portico"],"relation":{},"ISSN":["0266-4720","1468-0394"],"issn-type":[{"value":"0266-4720","type":"print"},{"value":"1468-0394","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,29]]},"assertion":[{"value":"2022-06-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-09-15","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-09-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}