Improved smart city security using a deep maxout network-based intrusion detection system with walrus optimization

Smart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban environments become interconnected hubs of digital innovation, securing critical components like public transportation infrastructure becomes increasingly importan...

Full description

Saved in:
Bibliographic Details
Published inPeerJ. Computer science Vol. 11; p. e2743
Main Authors Rajeh, Wahid, Aborokbah, Majed, S., Manimurugan, Albalawi, Umar, Aljuhani, Ahamed, Younes, Osama Shibl Abdalghany, Periyasami, Karthikeyan
Format Journal Article
LanguageEnglish
Published United States PeerJ. Ltd 31.03.2025
PeerJ Inc
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Smart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban environments become interconnected hubs of digital innovation, securing critical components like public transportation infrastructure becomes increasingly important. This research addresses the need for robust intrusion detection systems (IDS) tailored to the unique challenges of securing public transportation within smart cities. Focused on the Tabuk region in Saudi Arabia, the study introduces an IDS model integrating the deep maxout network with walrus optimization (DMN-WO). The DMN is configured with an architecture that includes multiple layers with maxout activation functions. These layers are capable of capturing complex patterns in the data, making the DMN particularly effective for identifying anomalies in IoT network traffic. The DMN-WO model is ensured to be resource-efficient and suitable for real-time deployment on constrained devices like Raspberry Pi, typical in IoT systems. Training and validation are conducted using the CIC-IDS-2018 dataset, CIC-IDS -2029 dataset and real-time data from Raspberry Pi devices deployed in the smart city's public transportation network. Real-time data application maintains robust performance, with 98.06% accuracy, 98.50% detection rate, 98.81% precision, 98.24% specificity, and a 98.57% F1-score. This research advances cybersecurity measures in smart city applications by providing a resilient solution for detecting and mitigating security threats in public transportation infrastructure. It lays the groundwork for further refinements and real-world deployments in the dynamic landscape of smart cities.
AbstractList Smart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban environments become interconnected hubs of digital innovation, securing critical components like public transportation infrastructure becomes increasingly important. This research addresses the need for robust intrusion detection systems (IDS) tailored to the unique challenges of securing public transportation within smart cities. Focused on the Tabuk region in Saudi Arabia, the study introduces an IDS model integrating the deep maxout network with walrus optimization (DMN-WO). The DMN is configured with an architecture that includes multiple layers with maxout activation functions. These layers are capable of capturing complex patterns in the data, making the DMN particularly effective for identifying anomalies in IoT network traffic. The DMN-WO model is ensured to be resource-efficient and suitable for real-time deployment on constrained devices like Raspberry Pi, typical in IoT systems. Training and validation are conducted using the CIC-IDS-2018 dataset, CIC-IDS -2029 dataset and real-time data from Raspberry Pi devices deployed in the smart city's public transportation network. Real-time data application maintains robust performance, with 98.06% accuracy, 98.50% detection rate, 98.81% precision, 98.24% specificity, and a 98.57% F1-score. This research advances cybersecurity measures in smart city applications by providing a resilient solution for detecting and mitigating security threats in public transportation infrastructure. It lays the groundwork for further refinements and real-world deployments in the dynamic landscape of smart cities.
Background Smart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban environments become interconnected hubs of digital innovation, securing critical components like public transportation infrastructure becomes increasingly important. Methods This research addresses the need for robust intrusion detection systems (IDS) tailored to the unique challenges of securing public transportation within smart cities. Focused on the Tabuk region in Saudi Arabia, the study introduces an IDS model integrating the deep maxout network with walrus optimization (DMN-WO). The DMN is configured with an architecture that includes multiple layers with maxout activation functions. These layers are capable of capturing complex patterns in the data, making the DMN particularly effective for identifying anomalies in IoT network traffic. The DMN-WO model is ensured to be resource-efficient and suitable for real-time deployment on constrained devices like Raspberry Pi, typical in IoT systems. Results Training and validation are conducted using the CIC-IDS-2018 dataset, CIC-IDS -2029 dataset and real-time data from Raspberry Pi devices deployed in the smart city's public transportation network. Real-time data application maintains robust performance, with 98.06% accuracy, 98.50% detection rate, 98.81% precision, 98.24% specificity, and a 98.57% F1-score. Conclusions This research advances cybersecurity measures in smart city applications by providing a resilient solution for detecting and mitigating security threats in public transportation infrastructure. It lays the groundwork for further refinements and real-world deployments in the dynamic landscape of smart cities.
Smart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban environments become interconnected hubs of digital innovation, securing critical components like public transportation infrastructure becomes increasingly important. This research addresses the need for robust intrusion detection systems (IDS) tailored to the unique challenges of securing public transportation within smart cities. Focused on the Tabuk region in Saudi Arabia, the study introduces an IDS model integrating the deep maxout network with walrus optimization (DMN-WO). The DMN is configured with an architecture that includes multiple layers with maxout activation functions. These layers are capable of capturing complex patterns in the data, making the DMN particularly effective for identifying anomalies in IoT network traffic. The DMN-WO model is ensured to be resource-efficient and suitable for real-time deployment on constrained devices like Raspberry Pi, typical in IoT systems. Training and validation are conducted using the CIC-IDS-2018 dataset, CIC-IDS -2029 dataset and real-time data from Raspberry Pi devices deployed in the smart city's public transportation network. Real-time data application maintains robust performance, with 98.06% accuracy, 98.50% detection rate, 98.81% precision, 98.24% specificity, and a 98.57% F1-score. This research advances cybersecurity measures in smart city applications by providing a resilient solution for detecting and mitigating security threats in public transportation infrastructure. It lays the groundwork for further refinements and real-world deployments in the dynamic landscape of smart cities.
Smart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban environments become interconnected hubs of digital innovation, securing critical components like public transportation infrastructure becomes increasingly important.BackgroundSmart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban environments become interconnected hubs of digital innovation, securing critical components like public transportation infrastructure becomes increasingly important.This research addresses the need for robust intrusion detection systems (IDS) tailored to the unique challenges of securing public transportation within smart cities. Focused on the Tabuk region in Saudi Arabia, the study introduces an IDS model integrating the deep maxout network with walrus optimization (DMN-WO). The DMN is configured with an architecture that includes multiple layers with maxout activation functions. These layers are capable of capturing complex patterns in the data, making the DMN particularly effective for identifying anomalies in IoT network traffic. The DMN-WO model is ensured to be resource-efficient and suitable for real-time deployment on constrained devices like Raspberry Pi, typical in IoT systems.MethodsThis research addresses the need for robust intrusion detection systems (IDS) tailored to the unique challenges of securing public transportation within smart cities. Focused on the Tabuk region in Saudi Arabia, the study introduces an IDS model integrating the deep maxout network with walrus optimization (DMN-WO). The DMN is configured with an architecture that includes multiple layers with maxout activation functions. These layers are capable of capturing complex patterns in the data, making the DMN particularly effective for identifying anomalies in IoT network traffic. The DMN-WO model is ensured to be resource-efficient and suitable for real-time deployment on constrained devices like Raspberry Pi, typical in IoT systems.Training and validation are conducted using the CIC-IDS-2018 dataset, CIC-IDS -2029 dataset and real-time data from Raspberry Pi devices deployed in the smart city's public transportation network. Real-time data application maintains robust performance, with 98.06% accuracy, 98.50% detection rate, 98.81% precision, 98.24% specificity, and a 98.57% F1-score.ResultsTraining and validation are conducted using the CIC-IDS-2018 dataset, CIC-IDS -2029 dataset and real-time data from Raspberry Pi devices deployed in the smart city's public transportation network. Real-time data application maintains robust performance, with 98.06% accuracy, 98.50% detection rate, 98.81% precision, 98.24% specificity, and a 98.57% F1-score.This research advances cybersecurity measures in smart city applications by providing a resilient solution for detecting and mitigating security threats in public transportation infrastructure. It lays the groundwork for further refinements and real-world deployments in the dynamic landscape of smart cities.ConclusionsThis research advances cybersecurity measures in smart city applications by providing a resilient solution for detecting and mitigating security threats in public transportation infrastructure. It lays the groundwork for further refinements and real-world deployments in the dynamic landscape of smart cities.
ArticleNumber e2743
Audience Academic
Author Rajeh, Wahid
Aljuhani, Ahamed
S., Manimurugan
Albalawi, Umar
Younes, Osama Shibl Abdalghany
Aborokbah, Majed
Periyasami, Karthikeyan
Author_xml – sequence: 1
  givenname: Wahid
  surname: Rajeh
  fullname: Rajeh, Wahid
  organization: Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia
– sequence: 2
  givenname: Majed
  orcidid: 0000-0001-7376-1458
  surname: Aborokbah
  fullname: Aborokbah, Majed
  organization: Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia
– sequence: 3
  givenname: Manimurugan
  orcidid: 0000-0003-1837-6797
  surname: S.
  fullname: S., Manimurugan
  organization: Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia
– sequence: 4
  givenname: Umar
  orcidid: 0000-0002-4852-3981
  surname: Albalawi
  fullname: Albalawi, Umar
  organization: Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia
– sequence: 5
  givenname: Ahamed
  surname: Aljuhani
  fullname: Aljuhani, Ahamed
  organization: Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia
– sequence: 6
  givenname: Osama Shibl Abdalghany
  surname: Younes
  fullname: Younes, Osama Shibl Abdalghany
  organization: Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia
– sequence: 7
  givenname: Karthikeyan
  surname: Periyasami
  fullname: Periyasami, Karthikeyan
  organization: School of Computer Science and Engineering, RV University, Bengaluru, Karnataka, India
BackLink https://www.ncbi.nlm.nih.gov/pubmed/40567668$$D View this record in MEDLINE/PubMed
BookMark eNptks1vnDAQxVGVqkm3OfZaIfWSHtja2GA4VVHUj5UiVerH2RrsgXgLmNomm-1fX5NNo6xUODDy_OZ5Hnovk5PRjpgkrylZC0HF-wnRbTPl17ng7FlyljNRZkVd5ydP6tPk3PstIYQWND71i-SUk6IUZVmdJW4zTM7eok79AC6kyoR96lHNbilmb8YuhVQjTukAd3YO6YhhZ92vrAEfp8wYXKTsGJmAKiyV3_uAQ7oz4SbdQR_7qZ2CGcwfWPqvkuct9B7PH76r5Oenjz-uvmTXXz9vri6vM8U5DVlcT1DgPC-pyhGgITUWoEuuIUcFIFipoGqFYFyxuq4YJQUTXDcF41iVhK2SzUFXW9jKyZlocC8tGHl_YF0no2OjepS01prECxvONa90DYSUwEhL8oapoqVR68NBa5qbAbXCaBv6I9HjzmhuZGdvJc1pTUTcbJVcPCg4-3tGH-RgvMK-hxHt7CXLc54XNeM8om8PaAdxNzO2NkqqBZeXFWOcxh-zCK7_Q8VX42BUzElr4vnRwLujgcgEvAsdzN7Lzfdvx-ybp34fjf4LTgSyA6Cc9d5h-4hQIpdsyvtsSuXlkk32F5D_2GQ
Cites_doi 10.1109/ACCESS.2018.2853985
10.1109/COMST.2017.2748998
10.1016/j.future.2017.03.034
10.1016/j.scs.2020.102324
10.1016/j.micpro.2021.104293
10.1109/ACCESS.2019.2912115
10.1016/j.scs.2021.103041
10.1109/ACCESS.2024.3386631
10.3390/math12040571
10.1109/MCOM.2017.1600267CM
10.1108/IJPCC-05-2022-0197
10.3390/s21248226
10.1002/int.22632
10.1016/j.measen.2023.100885
10.1007/s10586-022-03646-8
10.1016/j.ijinfomgt.2019.04.006
10.1007/s11276-023-03470-x
10.1186/s13677-018-0123-6
10.1007/s11042-023-16436-0
10.1016/j.gltp.2021.08.069
10.1109/ACCESS.2020.3012411
10.22247/ijcna/2023/223423
10.1109/MCOM.2017.1600297CM
10.1002/ett.3677
10.1109/ACCESS.2021.3128701
10.1038/s41598-023-35863-5
10.1016/j.jnca.2019.02.026
10.3390/computers12120245
10.4108/eetsc.v7i1.2825
10.3390/su15086902
10.1016/j.dcan.2022.08.012
10.1007/s42979-024-02921-2
10.4108/eetsc.3222
10.1016/j.compeleceng.2023.108635
10.1109/ACCESS.2024.3438619
ContentType Journal Article
Copyright 2025 Rajeh et al.
COPYRIGHT 2025 PeerJ. Ltd.
2025 Rajeh et al. 2025 Rajeh et al.
Copyright_xml – notice: 2025 Rajeh et al.
– notice: COPYRIGHT 2025 PeerJ. Ltd.
– notice: 2025 Rajeh et al. 2025 Rajeh et al.
DBID AAYXX
CITATION
NPM
ISR
7X8
5PM
DOA
DOI 10.7717/peerj-cs.2743
DatabaseName CrossRef
PubMed
Gale In Context: Science
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
MEDLINE - Academic
DatabaseTitleList PubMed




MEDLINE - Academic
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2376-5992
ExternalDocumentID oai_doaj_org_article_19dd0668b44d48d9a006a30f02b3c5f1
PMC12190705
A833418715
40567668
10_7717_peerj_cs_2743
Genre Journal Article
GeographicLocations Saudi Arabia
GeographicLocations_xml – name: Saudi Arabia
GrantInformation_xml – fundername: Deanship of Research and Graduate Studies at University of Tabuk
  grantid: 0135-1444-S
GroupedDBID 53G
5VS
8FE
8FG
AAFWJ
AAYXX
ABUWG
ADBBV
AFKRA
AFPKN
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
CCPQU
CITATION
DWQXO
FRP
GNUQQ
GROUPED_DOAJ
HCIFZ
IAO
ICD
IEA
ISR
ITC
K6V
K7-
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PQQKQ
PROAC
RPM
H13
NPM
PMFND
7X8
PQGLB
5PM
PUEGO
ID FETCH-LOGICAL-c441t-66871a44261c2eaab09e5ad64da2ecaa736ca8f7734c39983105374db534e8603
IEDL.DBID DOA
ISSN 2376-5992
IngestDate Wed Aug 27 01:20:10 EDT 2025
Thu Aug 21 18:33:11 EDT 2025
Fri Jul 11 17:00:11 EDT 2025
Tue Jun 17 21:58:19 EDT 2025
Tue Jun 03 08:35:11 EDT 2025
Fri Jun 27 05:12:41 EDT 2025
Sat Jun 28 01:34:20 EDT 2025
Tue Jul 01 05:14:51 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords RFE
Raspberry Pi
DMN
IDS
Cybersecurity
Smart transportation
Smart city
IoT
Language English
License https://creativecommons.org/licenses/by/4.0
2025 Rajeh et al.
This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c441t-66871a44261c2eaab09e5ad64da2ecaa736ca8f7734c39983105374db534e8603
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0001-7376-1458
0000-0003-1837-6797
0000-0002-4852-3981
OpenAccessLink https://doaj.org/article/19dd0668b44d48d9a006a30f02b3c5f1
PMID 40567668
PQID 3224259344
PQPubID 23479
PageCount e2743
ParticipantIDs doaj_primary_oai_doaj_org_article_19dd0668b44d48d9a006a30f02b3c5f1
pubmedcentral_primary_oai_pubmedcentral_nih_gov_12190705
proquest_miscellaneous_3224259344
gale_infotracmisc_A833418715
gale_infotracacademiconefile_A833418715
gale_incontextgauss_ISR_A833418715
pubmed_primary_40567668
crossref_primary_10_7717_peerj_cs_2743
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2025-03-31
PublicationDateYYYYMMDD 2025-03-31
PublicationDate_xml – month: 03
  year: 2025
  text: 2025-03-31
  day: 31
PublicationDecade 2020
PublicationPlace United States
PublicationPlace_xml – name: United States
– name: San Diego, USA
PublicationTitle PeerJ. Computer science
PublicationTitleAlternate PeerJ Comput Sci
PublicationYear 2025
Publisher PeerJ. Ltd
PeerJ Inc
Publisher_xml – name: PeerJ. Ltd
– name: PeerJ Inc
References Elsaeidy (10.7717/peerj-cs.2743/ref-18) 2021; 9
Mall (10.7717/peerj-cs.2743/ref-27) 2023; 107
Chohan (10.7717/peerj-cs.2743/ref-13) 2023; 7
Hosseinzadeh (10.7717/peerj-cs.2743/ref-21) 2022; 25
Elsaeidy (10.7717/peerj-cs.2743/ref-17) 2020; 8
Sarhan (10.7717/peerj-cs.2743/ref-31) 2022; 10
Alatawi (10.7717/peerj-cs.2743/ref-2) 2023; 10
Li (10.7717/peerj-cs.2743/ref-26) 2019; 49
Zhang (10.7717/peerj-cs.2743/ref-39) 2017; 55
Ashraf (10.7717/peerj-cs.2743/ref-8) 2021; 72
Ayub (10.7717/peerj-cs.2743/ref-9) 2023; 7
Elsaeidy (10.7717/peerj-cs.2743/ref-19) 2019; 135
Al-Atawi (10.7717/peerj-cs.2743/ref-3) 2024; 5
Boopathi (10.7717/peerj-cs.2743/ref-12) 2023; 19
Kim (10.7717/peerj-cs.2743/ref-25) 2017; 76
Nassereddine (10.7717/peerj-cs.2743/ref-28) 2024
Elrawy (10.7717/peerj-cs.2743/ref-16) 2018; 7
Alrayes (10.7717/peerj-cs.2743/ref-5) 2023; 15
Al-Turjman (10.7717/peerj-cs.2743/ref-6) 2022; 33
Songma (10.7717/peerj-cs.2743/ref-34) 2023; 12
Waddenkery (10.7717/peerj-cs.2743/ref-37) 2023; 29
Trojovský (10.7717/peerj-cs.2743/ref-35) 2023; 13
Sharma (10.7717/peerj-cs.2743/ref-32) 2021; 85
UN Habitat (10.7717/peerj-cs.2743/ref-36) 2019
Aborokbah (10.7717/peerj-cs.2743/ref-1) 2024; 12
Singh (10.7717/peerj-cs.2743/ref-33) 2020; 2
Battula (10.7717/peerj-cs.2743/ref-10) 2022; 37
Rajasoundaran (10.7717/peerj-cs.2743/ref-30) 2024; 30
Janani (10.7717/peerj-cs.2743/ref-22) 2021; 2
Khatoun (10.7717/peerj-cs.2743/ref-23) 2017; 55
Eckhoff (10.7717/peerj-cs.2743/ref-15) 2017; 20
Kilichev (10.7717/peerj-cs.2743/ref-24) 2024; 12
W.S. (10.7717/peerj-cs.2743/ref-38) 2020
Bhavsar (10.7717/peerj-cs.2743/ref-11) 2024; 12
Rahman (10.7717/peerj-cs.2743/ref-29) 2020; 61
Alhakami (10.7717/peerj-cs.2743/ref-4) 2019; 7
Alwakeel (10.7717/peerj-cs.2743/ref-7) 2021; 21
Hazman (10.7717/peerj-cs.2743/ref-20) 2023; 83
Cui (10.7717/peerj-cs.2743/ref-14) 2018; 6
References_xml – volume: 6
  start-page: 46134
  year: 2018
  ident: 10.7717/peerj-cs.2743/ref-14
  article-title: Security and privacy in smart cities: challenges and opportunities
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2853985
– volume: 20
  start-page: 489
  issue: 1
  year: 2017
  ident: 10.7717/peerj-cs.2743/ref-15
  article-title: Privacy in the smart city—applications, technologies, challenges, and solutions
  publication-title: IEEE Communications Surveys & Tutorials
  doi: 10.1109/COMST.2017.2748998
– volume: 76
  start-page: 159
  year: 2017
  ident: 10.7717/peerj-cs.2743/ref-25
  article-title: Smart city and IoT
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2017.03.034
– volume: 61
  start-page: 102324
  issue: 1
  year: 2020
  ident: 10.7717/peerj-cs.2743/ref-29
  article-title: Scalable machine learning-based intrusion detection system for IoT-enabled smart cities
  publication-title: Sustainable Cities and Society
  doi: 10.1016/j.scs.2020.102324
– year: 2019
  ident: 10.7717/peerj-cs.2743/ref-36
  article-title: Tabuk City profile
– volume: 85
  start-page: 104293
  issue: 3
  year: 2021
  ident: 10.7717/peerj-cs.2743/ref-32
  article-title: An optimal intrusion detection system using recursive feature elimination and the ensemble of classifiers
  publication-title: Microprocessors and Microsystems
  doi: 10.1016/j.micpro.2021.104293
– volume: 7
  start-page: 52181
  year: 2019
  ident: 10.7717/peerj-cs.2743/ref-4
  article-title: Network anomaly intrusion detection using a nonparametric Bayesian approach and feature selection
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2912115
– volume: 72
  start-page: 103041
  issue: 10
  year: 2021
  ident: 10.7717/peerj-cs.2743/ref-8
  article-title: IoTBoT-IDS: a novel statistical learning-enabled botnet detection framework for protecting networks of smart cities
  publication-title: Sustainable Cities and Society
  doi: 10.1016/j.scs.2021.103041
– volume: 12
  start-page: 52215
  issue: 12
  year: 2024
  ident: 10.7717/peerj-cs.2743/ref-11
  article-title: FL-IDS: federated learning-based intrusion detection system using edge devices for transportation IoT
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2024.3386631
– volume: 12
  start-page: 571
  issue: 4
  year: 2024
  ident: 10.7717/peerj-cs.2743/ref-24
  article-title: Next-generation intrusion detection for IoT EVCS: integrating CNN, LSTM, and GRU models
  publication-title: Mathematics
  doi: 10.3390/math12040571
– start-page: 1
  year: 2020
  ident: 10.7717/peerj-cs.2743/ref-38
  article-title: Machine learning-based intrusion detection framework using recursive feature elimination method
– volume: 55
  start-page: 122
  issue: 1
  year: 2017
  ident: 10.7717/peerj-cs.2743/ref-39
  article-title: Security and privacy in smart city applications: challenges and solutions
  publication-title: IEEE Communications Magazine
  doi: 10.1109/MCOM.2017.1600267CM
– volume: 19
  start-page: 666
  issue: 5
  year: 2023
  ident: 10.7717/peerj-cs.2743/ref-12
  article-title: An approach for DoS attack detection in cloud computing using sine cosine anti coronavirus optimized deep maxout network
  publication-title: International Journal of Pervasive Computing and Communications
  doi: 10.1108/IJPCC-05-2022-0197
– volume: 21
  start-page: 8226
  issue: 24
  year: 2021
  ident: 10.7717/peerj-cs.2743/ref-7
  article-title: An overview of fog computing and edge computing security and privacy issues
  publication-title: Sensors
  doi: 10.3390/s21248226
– volume: 37
  start-page: 424
  issue: 1
  year: 2022
  ident: 10.7717/peerj-cs.2743/ref-10
  article-title: Visual features and deep maxout network-based moving target detection using radar signals under sea clutter
  publication-title: International Journal of Intelligent Systems
  doi: 10.1002/int.22632
– volume: 29
  start-page: 100885
  issue: 5
  year: 2023
  ident: 10.7717/peerj-cs.2743/ref-37
  article-title: Adam-Dingo optimized a deep maxout network-based video surveillance system for stealing crime detection
  publication-title: Measurement: Sensors
  doi: 10.1016/j.measen.2023.100885
– start-page: 109
  volume-title: Advanced IoT Technologies and Applications in the Industry 4.0 Digital Economy
  year: 2024
  ident: 10.7717/peerj-cs.2743/ref-28
  article-title: Applications of Internet of Things (IoT) in smart cities
– volume: 2
  start-page: 301
  year: 2020
  ident: 10.7717/peerj-cs.2743/ref-33
  article-title: Security issues in IoT and their countermeasures in smart city applications
– volume: 25
  start-page: 4097
  issue: 6
  year: 2022
  ident: 10.7717/peerj-cs.2743/ref-21
  article-title: Clustering for smart cities in the internet of things: a review
  publication-title: Cluster Computing
  doi: 10.1007/s10586-022-03646-8
– volume: 49
  start-page: 533
  issue: 6
  year: 2019
  ident: 10.7717/peerj-cs.2743/ref-26
  article-title: IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning
  publication-title: International Journal of Information Management
  doi: 10.1016/j.ijinfomgt.2019.04.006
– volume: 30
  start-page: 209
  issue: 1
  year: 2024
  ident: 10.7717/peerj-cs.2743/ref-30
  article-title: Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks
  publication-title: Wireless Networks
  doi: 10.1007/s11276-023-03470-x
– volume: 7
  start-page: 1
  issue: 1
  year: 2018
  ident: 10.7717/peerj-cs.2743/ref-16
  article-title: Intrusion detection systems for IoT-based smart environments: a survey
  publication-title: Journal of Cloud Computing
  doi: 10.1186/s13677-018-0123-6
– volume: 83
  start-page: 1
  issue: 22
  year: 2023
  ident: 10.7717/peerj-cs.2743/ref-20
  article-title: Toward an intrusion detection model for IoT-based smart environments
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-023-16436-0
– volume: 2
  start-page: 187
  issue: 2
  year: 2021
  ident: 10.7717/peerj-cs.2743/ref-22
  article-title: IoT in smart cities: a contemporary survey
  publication-title: Global Transitions Proceedings
  doi: 10.1016/j.gltp.2021.08.069
– volume: 8
  start-page: 137825–137837
  year: 2020
  ident: 10.7717/peerj-cs.2743/ref-17
  article-title: Replay attack detection in smart cities using deep learning
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3012411
– volume: 10
  start-page: 776
  issue: 5
  year: 2023
  ident: 10.7717/peerj-cs.2743/ref-2
  article-title: A hybrid cryptographic cipher solution for secure communication in smart cities
  publication-title: International Journals of Computers Network and Application
  doi: 10.22247/ijcna/2023/223423
– volume: 55
  start-page: 51
  issue: 3
  year: 2017
  ident: 10.7717/peerj-cs.2743/ref-23
  article-title: Cybersecurity and privacy solutions in smart cities
  publication-title: IEEE Communications Magazine
  doi: 10.1109/MCOM.2017.1600297CM
– volume: 33
  start-page: e3677
  issue: 3
  year: 2022
  ident: 10.7717/peerj-cs.2743/ref-6
  article-title: An overview of security and privacy in smart cities’ IoT communications
  publication-title: Transactions on Emerging Telecommunications Technologies
  doi: 10.1002/ett.3677
– volume: 9
  start-page: 154864–154875
  year: 2021
  ident: 10.7717/peerj-cs.2743/ref-18
  article-title: A hybrid deep learning approach for replay and DDoS attack detection in a smart city
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3128701
– volume: 13
  start-page: 8775
  issue: 1
  year: 2023
  ident: 10.7717/peerj-cs.2743/ref-35
  article-title: A new bio-inspired metaheuristic algorithm for solving optimization problems based on walruses behaviour
  publication-title: Scientific Reports
  doi: 10.1038/s41598-023-35863-5
– volume: 135
  start-page: 76
  issue: 6
  year: 2019
  ident: 10.7717/peerj-cs.2743/ref-19
  article-title: Intrusion detection in smart cities using restricted Boltzmann machines
  publication-title: Journal of Network and Computer Applications
  doi: 10.1016/j.jnca.2019.02.026
– volume: 12
  start-page: 245
  issue: 12
  year: 2023
  ident: 10.7717/peerj-cs.2743/ref-34
  article-title: Optimizing intrusion detection systems in three phases on the CSE-CIC-IDS-2018 dataset
  publication-title: Computers
  doi: 10.3390/computers12120245
– volume: 7
  start-page: e4
  issue: 1
  year: 2023
  ident: 10.7717/peerj-cs.2743/ref-9
  article-title: An intelligent machine learning-based intrusion detection system (IDS) for smart city networks
  publication-title: EAI Endorsed Transactions on Smart Cities
  doi: 10.4108/eetsc.v7i1.2825
– volume: 15
  start-page: 6902
  issue: 8
  year: 2023
  ident: 10.7717/peerj-cs.2743/ref-5
  article-title: Intrusion detection using chaotic poor and rich optimization with deep learning model for the smart city environment
  publication-title: Sustainability
  doi: 10.3390/su15086902
– volume: 10
  start-page: 205
  issue: 1
  year: 2022
  ident: 10.7717/peerj-cs.2743/ref-31
  article-title: Feature extraction for machine learning-based intrusion detection in IoT networks
  publication-title: Digital Communications and Networks
  doi: 10.1016/j.dcan.2022.08.012
– volume: 5
  start-page: 548
  issue: 5
  year: 2024
  ident: 10.7717/peerj-cs.2743/ref-3
  article-title: Enhancing internet of smart city security: utilizing logistic boosted algorithms for anomaly detection and cyberattack prevention
  publication-title: SN Computer Science
  doi: 10.1007/s42979-024-02921-2
– volume: 7
  start-page: e4
  issue: 2
  year: 2023
  ident: 10.7717/peerj-cs.2743/ref-13
  article-title: Detection of cyber attacks using machine learning based intrusion detection system for IoT based smart cities
  publication-title: EAI Endorsed Transactions on Smart Cities
  doi: 10.4108/eetsc.3222
– volume: 107
  start-page: 108635
  issue: 5
  year: 2023
  ident: 10.7717/peerj-cs.2743/ref-27
  article-title: Stacking ensemble approach for DDoS attack detection in software-defined cyber-physical systems
  publication-title: Computers and Electrical Engineering
  doi: 10.1016/j.compeleceng.2023.108635
– volume: 12
  start-page: 107431–107444
  year: 2024
  ident: 10.7717/peerj-cs.2743/ref-1
  article-title: A novel intrusion detection model for enhancing security in smart city
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2024.3438619
SSID ssj0001511119
Score 2.287295
Snippet Smart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban environments become...
Background Smart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban...
SourceID doaj
pubmedcentral
proquest
gale
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
StartPage e2743
SubjectTerms Analysis
Artificial Intelligence
Cybersecurity
Cyberterrorism
Detectors
IDS
Innovations
IoT
Marine mammals
Neural Networks
Public transportation
RFE
Safety and security measures
Smart city
Smart transportation
Transportation authorities
Title Improved smart city security using a deep maxout network-based intrusion detection system with walrus optimization
URI https://www.ncbi.nlm.nih.gov/pubmed/40567668
https://www.proquest.com/docview/3224259344
https://pubmed.ncbi.nlm.nih.gov/PMC12190705
https://doaj.org/article/19dd0668b44d48d9a006a30f02b3c5f1
Volume 11
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELagXLjQ8k5pVwYhOJlmYzu2jy3qUpCoUKFSb5ZjO6WITVbNrujP70ycrTbiwIVrPFplHp5vJjsPQt4CQhVhygULwdRM6BCZ0bVkpshr53XJVf8P_tfT8uRcfLmQFxurvrAmLI0HToI7mJoQABZ1JUSAnzIOzMTxvM6LintZ94kPYN5GMpX6g9EVmDRUU0HKcrCI8foX890HSMP4CIT6Wf1_e-QNSBqXS27gz2yHPBoCR3qYXvgxuRebJ2R7vZSBDnf0KblOnwlioN0cuKMewmzaDVvqKJa5X1JHQ4wLOnc37WpJm1QJzhDQAr1qsA0DtAU0y75Oq6Fp3DPFb7b0j_sN57QFVzMfejifkfPZ8Y-PJ2xYrMA8RD9LBuJUUycwe_JFdK7KTZQulCK4InrnFC-907VSXHgIYHAXmeRKhEpyEXWZ8-dkq2mb-JJQkLVTleaihDghj8Lo4J0B7dS5rHypM_JuLWm7SPMzLOQdqBLbq8T6zqJKMnKEergjwrHX_QMwBjsYg_2XMWTkDWrR4mCLBitnLt2q6-zn72f2UHMAbOBbZuT9QFS3oE_vhkYEYAhnYY0o90aUcPP86Pj12lgsHmG5WhPbVWfBS4IvNFyIjLxIxnPHGETIpSpRMnpkViPOxyfN1c9-8PcU4AVctNz9H7J6RR4WuMu476_cI1tgXHEfAqxlNSH39ezThDw4Oj79djbpb9Ytwb0o-Q
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Improved+smart+city+security+using+a+deep+maxout+network-based+intrusion+detection+system+with+walrus+optimization&rft.jtitle=PeerJ.+Computer+science&rft.au=Rajeh%2C+Wahid&rft.au=Aborokbah%2C+Majed&rft.au=S.%2C+Manimurugan&rft.au=Albalawi%2C+Umar&rft.date=2025-03-31&rft.pub=PeerJ.+Ltd&rft.issn=2376-5992&rft.eissn=2376-5992&rft.volume=11&rft.spage=e2743&rft_id=info:doi/10.7717%2Fpeerj-cs.2743&rft.externalDocID=A833418715
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2376-5992&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2376-5992&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2376-5992&client=summon