Improved smart city security using a deep maxout network-based intrusion detection system with walrus optimization
Smart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban environments become interconnected hubs of digital innovation, securing critical components like public transportation infrastructure becomes increasingly importan...
Saved in:
Published in | PeerJ. Computer science Vol. 11; p. e2743 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
United States
PeerJ. Ltd
31.03.2025
PeerJ Inc |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Smart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban environments become interconnected hubs of digital innovation, securing critical components like public transportation infrastructure becomes increasingly important.
This research addresses the need for robust intrusion detection systems (IDS) tailored to the unique challenges of securing public transportation within smart cities. Focused on the Tabuk region in Saudi Arabia, the study introduces an IDS model integrating the deep maxout network with walrus optimization (DMN-WO). The DMN is configured with an architecture that includes multiple layers with maxout activation functions. These layers are capable of capturing complex patterns in the data, making the DMN particularly effective for identifying anomalies in IoT network traffic. The DMN-WO model is ensured to be resource-efficient and suitable for real-time deployment on constrained devices like Raspberry Pi, typical in IoT systems.
Training and validation are conducted using the CIC-IDS-2018 dataset, CIC-IDS -2029 dataset and real-time data from Raspberry Pi devices deployed in the smart city's public transportation network. Real-time data application maintains robust performance, with 98.06% accuracy, 98.50% detection rate, 98.81% precision, 98.24% specificity, and a 98.57% F1-score.
This research advances cybersecurity measures in smart city applications by providing a resilient solution for detecting and mitigating security threats in public transportation infrastructure. It lays the groundwork for further refinements and real-world deployments in the dynamic landscape of smart cities. |
---|---|
AbstractList | Smart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban environments become interconnected hubs of digital innovation, securing critical components like public transportation infrastructure becomes increasingly important.
This research addresses the need for robust intrusion detection systems (IDS) tailored to the unique challenges of securing public transportation within smart cities. Focused on the Tabuk region in Saudi Arabia, the study introduces an IDS model integrating the deep maxout network with walrus optimization (DMN-WO). The DMN is configured with an architecture that includes multiple layers with maxout activation functions. These layers are capable of capturing complex patterns in the data, making the DMN particularly effective for identifying anomalies in IoT network traffic. The DMN-WO model is ensured to be resource-efficient and suitable for real-time deployment on constrained devices like Raspberry Pi, typical in IoT systems.
Training and validation are conducted using the CIC-IDS-2018 dataset, CIC-IDS -2029 dataset and real-time data from Raspberry Pi devices deployed in the smart city's public transportation network. Real-time data application maintains robust performance, with 98.06% accuracy, 98.50% detection rate, 98.81% precision, 98.24% specificity, and a 98.57% F1-score.
This research advances cybersecurity measures in smart city applications by providing a resilient solution for detecting and mitigating security threats in public transportation infrastructure. It lays the groundwork for further refinements and real-world deployments in the dynamic landscape of smart cities. Background Smart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban environments become interconnected hubs of digital innovation, securing critical components like public transportation infrastructure becomes increasingly important. Methods This research addresses the need for robust intrusion detection systems (IDS) tailored to the unique challenges of securing public transportation within smart cities. Focused on the Tabuk region in Saudi Arabia, the study introduces an IDS model integrating the deep maxout network with walrus optimization (DMN-WO). The DMN is configured with an architecture that includes multiple layers with maxout activation functions. These layers are capable of capturing complex patterns in the data, making the DMN particularly effective for identifying anomalies in IoT network traffic. The DMN-WO model is ensured to be resource-efficient and suitable for real-time deployment on constrained devices like Raspberry Pi, typical in IoT systems. Results Training and validation are conducted using the CIC-IDS-2018 dataset, CIC-IDS -2029 dataset and real-time data from Raspberry Pi devices deployed in the smart city's public transportation network. Real-time data application maintains robust performance, with 98.06% accuracy, 98.50% detection rate, 98.81% precision, 98.24% specificity, and a 98.57% F1-score. Conclusions This research advances cybersecurity measures in smart city applications by providing a resilient solution for detecting and mitigating security threats in public transportation infrastructure. It lays the groundwork for further refinements and real-world deployments in the dynamic landscape of smart cities. Smart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban environments become interconnected hubs of digital innovation, securing critical components like public transportation infrastructure becomes increasingly important. This research addresses the need for robust intrusion detection systems (IDS) tailored to the unique challenges of securing public transportation within smart cities. Focused on the Tabuk region in Saudi Arabia, the study introduces an IDS model integrating the deep maxout network with walrus optimization (DMN-WO). The DMN is configured with an architecture that includes multiple layers with maxout activation functions. These layers are capable of capturing complex patterns in the data, making the DMN particularly effective for identifying anomalies in IoT network traffic. The DMN-WO model is ensured to be resource-efficient and suitable for real-time deployment on constrained devices like Raspberry Pi, typical in IoT systems. Training and validation are conducted using the CIC-IDS-2018 dataset, CIC-IDS -2029 dataset and real-time data from Raspberry Pi devices deployed in the smart city's public transportation network. Real-time data application maintains robust performance, with 98.06% accuracy, 98.50% detection rate, 98.81% precision, 98.24% specificity, and a 98.57% F1-score. This research advances cybersecurity measures in smart city applications by providing a resilient solution for detecting and mitigating security threats in public transportation infrastructure. It lays the groundwork for further refinements and real-world deployments in the dynamic landscape of smart cities. Smart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban environments become interconnected hubs of digital innovation, securing critical components like public transportation infrastructure becomes increasingly important.BackgroundSmart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban environments become interconnected hubs of digital innovation, securing critical components like public transportation infrastructure becomes increasingly important.This research addresses the need for robust intrusion detection systems (IDS) tailored to the unique challenges of securing public transportation within smart cities. Focused on the Tabuk region in Saudi Arabia, the study introduces an IDS model integrating the deep maxout network with walrus optimization (DMN-WO). The DMN is configured with an architecture that includes multiple layers with maxout activation functions. These layers are capable of capturing complex patterns in the data, making the DMN particularly effective for identifying anomalies in IoT network traffic. The DMN-WO model is ensured to be resource-efficient and suitable for real-time deployment on constrained devices like Raspberry Pi, typical in IoT systems.MethodsThis research addresses the need for robust intrusion detection systems (IDS) tailored to the unique challenges of securing public transportation within smart cities. Focused on the Tabuk region in Saudi Arabia, the study introduces an IDS model integrating the deep maxout network with walrus optimization (DMN-WO). The DMN is configured with an architecture that includes multiple layers with maxout activation functions. These layers are capable of capturing complex patterns in the data, making the DMN particularly effective for identifying anomalies in IoT network traffic. The DMN-WO model is ensured to be resource-efficient and suitable for real-time deployment on constrained devices like Raspberry Pi, typical in IoT systems.Training and validation are conducted using the CIC-IDS-2018 dataset, CIC-IDS -2029 dataset and real-time data from Raspberry Pi devices deployed in the smart city's public transportation network. Real-time data application maintains robust performance, with 98.06% accuracy, 98.50% detection rate, 98.81% precision, 98.24% specificity, and a 98.57% F1-score.ResultsTraining and validation are conducted using the CIC-IDS-2018 dataset, CIC-IDS -2029 dataset and real-time data from Raspberry Pi devices deployed in the smart city's public transportation network. Real-time data application maintains robust performance, with 98.06% accuracy, 98.50% detection rate, 98.81% precision, 98.24% specificity, and a 98.57% F1-score.This research advances cybersecurity measures in smart city applications by providing a resilient solution for detecting and mitigating security threats in public transportation infrastructure. It lays the groundwork for further refinements and real-world deployments in the dynamic landscape of smart cities.ConclusionsThis research advances cybersecurity measures in smart city applications by providing a resilient solution for detecting and mitigating security threats in public transportation infrastructure. It lays the groundwork for further refinements and real-world deployments in the dynamic landscape of smart cities. |
ArticleNumber | e2743 |
Audience | Academic |
Author | Rajeh, Wahid Aljuhani, Ahamed S., Manimurugan Albalawi, Umar Younes, Osama Shibl Abdalghany Aborokbah, Majed Periyasami, Karthikeyan |
Author_xml | – sequence: 1 givenname: Wahid surname: Rajeh fullname: Rajeh, Wahid organization: Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia – sequence: 2 givenname: Majed orcidid: 0000-0001-7376-1458 surname: Aborokbah fullname: Aborokbah, Majed organization: Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia – sequence: 3 givenname: Manimurugan orcidid: 0000-0003-1837-6797 surname: S. fullname: S., Manimurugan organization: Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia – sequence: 4 givenname: Umar orcidid: 0000-0002-4852-3981 surname: Albalawi fullname: Albalawi, Umar organization: Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia – sequence: 5 givenname: Ahamed surname: Aljuhani fullname: Aljuhani, Ahamed organization: Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia – sequence: 6 givenname: Osama Shibl Abdalghany surname: Younes fullname: Younes, Osama Shibl Abdalghany organization: Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia – sequence: 7 givenname: Karthikeyan surname: Periyasami fullname: Periyasami, Karthikeyan organization: School of Computer Science and Engineering, RV University, Bengaluru, Karnataka, India |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/40567668$$D View this record in MEDLINE/PubMed |
BookMark | eNptks1vnDAQxVGVqkm3OfZaIfWSHtja2GA4VVHUj5UiVerH2RrsgXgLmNomm-1fX5NNo6xUODDy_OZ5Hnovk5PRjpgkrylZC0HF-wnRbTPl17ng7FlyljNRZkVd5ydP6tPk3PstIYQWND71i-SUk6IUZVmdJW4zTM7eok79AC6kyoR96lHNbilmb8YuhVQjTukAd3YO6YhhZ92vrAEfp8wYXKTsGJmAKiyV3_uAQ7oz4SbdQR_7qZ2CGcwfWPqvkuct9B7PH76r5Oenjz-uvmTXXz9vri6vM8U5DVlcT1DgPC-pyhGgITUWoEuuIUcFIFipoGqFYFyxuq4YJQUTXDcF41iVhK2SzUFXW9jKyZlocC8tGHl_YF0no2OjepS01prECxvONa90DYSUwEhL8oapoqVR68NBa5qbAbXCaBv6I9HjzmhuZGdvJc1pTUTcbJVcPCg4-3tGH-RgvMK-hxHt7CXLc54XNeM8om8PaAdxNzO2NkqqBZeXFWOcxh-zCK7_Q8VX42BUzElr4vnRwLujgcgEvAsdzN7Lzfdvx-ybp34fjf4LTgSyA6Cc9d5h-4hQIpdsyvtsSuXlkk32F5D_2GQ |
Cites_doi | 10.1109/ACCESS.2018.2853985 10.1109/COMST.2017.2748998 10.1016/j.future.2017.03.034 10.1016/j.scs.2020.102324 10.1016/j.micpro.2021.104293 10.1109/ACCESS.2019.2912115 10.1016/j.scs.2021.103041 10.1109/ACCESS.2024.3386631 10.3390/math12040571 10.1109/MCOM.2017.1600267CM 10.1108/IJPCC-05-2022-0197 10.3390/s21248226 10.1002/int.22632 10.1016/j.measen.2023.100885 10.1007/s10586-022-03646-8 10.1016/j.ijinfomgt.2019.04.006 10.1007/s11276-023-03470-x 10.1186/s13677-018-0123-6 10.1007/s11042-023-16436-0 10.1016/j.gltp.2021.08.069 10.1109/ACCESS.2020.3012411 10.22247/ijcna/2023/223423 10.1109/MCOM.2017.1600297CM 10.1002/ett.3677 10.1109/ACCESS.2021.3128701 10.1038/s41598-023-35863-5 10.1016/j.jnca.2019.02.026 10.3390/computers12120245 10.4108/eetsc.v7i1.2825 10.3390/su15086902 10.1016/j.dcan.2022.08.012 10.1007/s42979-024-02921-2 10.4108/eetsc.3222 10.1016/j.compeleceng.2023.108635 10.1109/ACCESS.2024.3438619 |
ContentType | Journal Article |
Copyright | 2025 Rajeh et al. COPYRIGHT 2025 PeerJ. Ltd. 2025 Rajeh et al. 2025 Rajeh et al. |
Copyright_xml | – notice: 2025 Rajeh et al. – notice: COPYRIGHT 2025 PeerJ. Ltd. – notice: 2025 Rajeh et al. 2025 Rajeh et al. |
DBID | AAYXX CITATION NPM ISR 7X8 5PM DOA |
DOI | 10.7717/peerj-cs.2743 |
DatabaseName | CrossRef PubMed Gale In Context: Science MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef PubMed MEDLINE - Academic |
DatabaseTitleList | PubMed MEDLINE - Academic |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2376-5992 |
ExternalDocumentID | oai_doaj_org_article_19dd0668b44d48d9a006a30f02b3c5f1 PMC12190705 A833418715 40567668 10_7717_peerj_cs_2743 |
Genre | Journal Article |
GeographicLocations | Saudi Arabia |
GeographicLocations_xml | – name: Saudi Arabia |
GrantInformation_xml | – fundername: Deanship of Research and Graduate Studies at University of Tabuk grantid: 0135-1444-S |
GroupedDBID | 53G 5VS 8FE 8FG AAFWJ AAYXX ABUWG ADBBV AFKRA AFPKN ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS AZQEC BCNDV BENPR BGLVJ BPHCQ CCPQU CITATION DWQXO FRP GNUQQ GROUPED_DOAJ HCIFZ IAO ICD IEA ISR ITC K6V K7- M~E OK1 P62 PHGZM PHGZT PIMPY PQQKQ PROAC RPM H13 NPM PMFND 7X8 PQGLB 5PM PUEGO |
ID | FETCH-LOGICAL-c441t-66871a44261c2eaab09e5ad64da2ecaa736ca8f7734c39983105374db534e8603 |
IEDL.DBID | DOA |
ISSN | 2376-5992 |
IngestDate | Wed Aug 27 01:20:10 EDT 2025 Thu Aug 21 18:33:11 EDT 2025 Fri Jul 11 17:00:11 EDT 2025 Tue Jun 17 21:58:19 EDT 2025 Tue Jun 03 08:35:11 EDT 2025 Fri Jun 27 05:12:41 EDT 2025 Sat Jun 28 01:34:20 EDT 2025 Tue Jul 01 05:14:51 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | RFE Raspberry Pi DMN IDS Cybersecurity Smart transportation Smart city IoT |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 2025 Rajeh et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c441t-66871a44261c2eaab09e5ad64da2ecaa736ca8f7734c39983105374db534e8603 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ORCID | 0000-0001-7376-1458 0000-0003-1837-6797 0000-0002-4852-3981 |
OpenAccessLink | https://doaj.org/article/19dd0668b44d48d9a006a30f02b3c5f1 |
PMID | 40567668 |
PQID | 3224259344 |
PQPubID | 23479 |
PageCount | e2743 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_19dd0668b44d48d9a006a30f02b3c5f1 pubmedcentral_primary_oai_pubmedcentral_nih_gov_12190705 proquest_miscellaneous_3224259344 gale_infotracmisc_A833418715 gale_infotracacademiconefile_A833418715 gale_incontextgauss_ISR_A833418715 pubmed_primary_40567668 crossref_primary_10_7717_peerj_cs_2743 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2025-03-31 |
PublicationDateYYYYMMDD | 2025-03-31 |
PublicationDate_xml | – month: 03 year: 2025 text: 2025-03-31 day: 31 |
PublicationDecade | 2020 |
PublicationPlace | United States |
PublicationPlace_xml | – name: United States – name: San Diego, USA |
PublicationTitle | PeerJ. Computer science |
PublicationTitleAlternate | PeerJ Comput Sci |
PublicationYear | 2025 |
Publisher | PeerJ. Ltd PeerJ Inc |
Publisher_xml | – name: PeerJ. Ltd – name: PeerJ Inc |
References | Elsaeidy (10.7717/peerj-cs.2743/ref-18) 2021; 9 Mall (10.7717/peerj-cs.2743/ref-27) 2023; 107 Chohan (10.7717/peerj-cs.2743/ref-13) 2023; 7 Hosseinzadeh (10.7717/peerj-cs.2743/ref-21) 2022; 25 Elsaeidy (10.7717/peerj-cs.2743/ref-17) 2020; 8 Sarhan (10.7717/peerj-cs.2743/ref-31) 2022; 10 Alatawi (10.7717/peerj-cs.2743/ref-2) 2023; 10 Li (10.7717/peerj-cs.2743/ref-26) 2019; 49 Zhang (10.7717/peerj-cs.2743/ref-39) 2017; 55 Ashraf (10.7717/peerj-cs.2743/ref-8) 2021; 72 Ayub (10.7717/peerj-cs.2743/ref-9) 2023; 7 Elsaeidy (10.7717/peerj-cs.2743/ref-19) 2019; 135 Al-Atawi (10.7717/peerj-cs.2743/ref-3) 2024; 5 Boopathi (10.7717/peerj-cs.2743/ref-12) 2023; 19 Kim (10.7717/peerj-cs.2743/ref-25) 2017; 76 Nassereddine (10.7717/peerj-cs.2743/ref-28) 2024 Elrawy (10.7717/peerj-cs.2743/ref-16) 2018; 7 Alrayes (10.7717/peerj-cs.2743/ref-5) 2023; 15 Al-Turjman (10.7717/peerj-cs.2743/ref-6) 2022; 33 Songma (10.7717/peerj-cs.2743/ref-34) 2023; 12 Waddenkery (10.7717/peerj-cs.2743/ref-37) 2023; 29 Trojovský (10.7717/peerj-cs.2743/ref-35) 2023; 13 Sharma (10.7717/peerj-cs.2743/ref-32) 2021; 85 UN Habitat (10.7717/peerj-cs.2743/ref-36) 2019 Aborokbah (10.7717/peerj-cs.2743/ref-1) 2024; 12 Singh (10.7717/peerj-cs.2743/ref-33) 2020; 2 Battula (10.7717/peerj-cs.2743/ref-10) 2022; 37 Rajasoundaran (10.7717/peerj-cs.2743/ref-30) 2024; 30 Janani (10.7717/peerj-cs.2743/ref-22) 2021; 2 Khatoun (10.7717/peerj-cs.2743/ref-23) 2017; 55 Eckhoff (10.7717/peerj-cs.2743/ref-15) 2017; 20 Kilichev (10.7717/peerj-cs.2743/ref-24) 2024; 12 W.S. (10.7717/peerj-cs.2743/ref-38) 2020 Bhavsar (10.7717/peerj-cs.2743/ref-11) 2024; 12 Rahman (10.7717/peerj-cs.2743/ref-29) 2020; 61 Alhakami (10.7717/peerj-cs.2743/ref-4) 2019; 7 Alwakeel (10.7717/peerj-cs.2743/ref-7) 2021; 21 Hazman (10.7717/peerj-cs.2743/ref-20) 2023; 83 Cui (10.7717/peerj-cs.2743/ref-14) 2018; 6 |
References_xml | – volume: 6 start-page: 46134 year: 2018 ident: 10.7717/peerj-cs.2743/ref-14 article-title: Security and privacy in smart cities: challenges and opportunities publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2853985 – volume: 20 start-page: 489 issue: 1 year: 2017 ident: 10.7717/peerj-cs.2743/ref-15 article-title: Privacy in the smart city—applications, technologies, challenges, and solutions publication-title: IEEE Communications Surveys & Tutorials doi: 10.1109/COMST.2017.2748998 – volume: 76 start-page: 159 year: 2017 ident: 10.7717/peerj-cs.2743/ref-25 article-title: Smart city and IoT publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2017.03.034 – volume: 61 start-page: 102324 issue: 1 year: 2020 ident: 10.7717/peerj-cs.2743/ref-29 article-title: Scalable machine learning-based intrusion detection system for IoT-enabled smart cities publication-title: Sustainable Cities and Society doi: 10.1016/j.scs.2020.102324 – year: 2019 ident: 10.7717/peerj-cs.2743/ref-36 article-title: Tabuk City profile – volume: 85 start-page: 104293 issue: 3 year: 2021 ident: 10.7717/peerj-cs.2743/ref-32 article-title: An optimal intrusion detection system using recursive feature elimination and the ensemble of classifiers publication-title: Microprocessors and Microsystems doi: 10.1016/j.micpro.2021.104293 – volume: 7 start-page: 52181 year: 2019 ident: 10.7717/peerj-cs.2743/ref-4 article-title: Network anomaly intrusion detection using a nonparametric Bayesian approach and feature selection publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2912115 – volume: 72 start-page: 103041 issue: 10 year: 2021 ident: 10.7717/peerj-cs.2743/ref-8 article-title: IoTBoT-IDS: a novel statistical learning-enabled botnet detection framework for protecting networks of smart cities publication-title: Sustainable Cities and Society doi: 10.1016/j.scs.2021.103041 – volume: 12 start-page: 52215 issue: 12 year: 2024 ident: 10.7717/peerj-cs.2743/ref-11 article-title: FL-IDS: federated learning-based intrusion detection system using edge devices for transportation IoT publication-title: IEEE Access doi: 10.1109/ACCESS.2024.3386631 – volume: 12 start-page: 571 issue: 4 year: 2024 ident: 10.7717/peerj-cs.2743/ref-24 article-title: Next-generation intrusion detection for IoT EVCS: integrating CNN, LSTM, and GRU models publication-title: Mathematics doi: 10.3390/math12040571 – start-page: 1 year: 2020 ident: 10.7717/peerj-cs.2743/ref-38 article-title: Machine learning-based intrusion detection framework using recursive feature elimination method – volume: 55 start-page: 122 issue: 1 year: 2017 ident: 10.7717/peerj-cs.2743/ref-39 article-title: Security and privacy in smart city applications: challenges and solutions publication-title: IEEE Communications Magazine doi: 10.1109/MCOM.2017.1600267CM – volume: 19 start-page: 666 issue: 5 year: 2023 ident: 10.7717/peerj-cs.2743/ref-12 article-title: An approach for DoS attack detection in cloud computing using sine cosine anti coronavirus optimized deep maxout network publication-title: International Journal of Pervasive Computing and Communications doi: 10.1108/IJPCC-05-2022-0197 – volume: 21 start-page: 8226 issue: 24 year: 2021 ident: 10.7717/peerj-cs.2743/ref-7 article-title: An overview of fog computing and edge computing security and privacy issues publication-title: Sensors doi: 10.3390/s21248226 – volume: 37 start-page: 424 issue: 1 year: 2022 ident: 10.7717/peerj-cs.2743/ref-10 article-title: Visual features and deep maxout network-based moving target detection using radar signals under sea clutter publication-title: International Journal of Intelligent Systems doi: 10.1002/int.22632 – volume: 29 start-page: 100885 issue: 5 year: 2023 ident: 10.7717/peerj-cs.2743/ref-37 article-title: Adam-Dingo optimized a deep maxout network-based video surveillance system for stealing crime detection publication-title: Measurement: Sensors doi: 10.1016/j.measen.2023.100885 – start-page: 109 volume-title: Advanced IoT Technologies and Applications in the Industry 4.0 Digital Economy year: 2024 ident: 10.7717/peerj-cs.2743/ref-28 article-title: Applications of Internet of Things (IoT) in smart cities – volume: 2 start-page: 301 year: 2020 ident: 10.7717/peerj-cs.2743/ref-33 article-title: Security issues in IoT and their countermeasures in smart city applications – volume: 25 start-page: 4097 issue: 6 year: 2022 ident: 10.7717/peerj-cs.2743/ref-21 article-title: Clustering for smart cities in the internet of things: a review publication-title: Cluster Computing doi: 10.1007/s10586-022-03646-8 – volume: 49 start-page: 533 issue: 6 year: 2019 ident: 10.7717/peerj-cs.2743/ref-26 article-title: IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning publication-title: International Journal of Information Management doi: 10.1016/j.ijinfomgt.2019.04.006 – volume: 30 start-page: 209 issue: 1 year: 2024 ident: 10.7717/peerj-cs.2743/ref-30 article-title: Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks publication-title: Wireless Networks doi: 10.1007/s11276-023-03470-x – volume: 7 start-page: 1 issue: 1 year: 2018 ident: 10.7717/peerj-cs.2743/ref-16 article-title: Intrusion detection systems for IoT-based smart environments: a survey publication-title: Journal of Cloud Computing doi: 10.1186/s13677-018-0123-6 – volume: 83 start-page: 1 issue: 22 year: 2023 ident: 10.7717/peerj-cs.2743/ref-20 article-title: Toward an intrusion detection model for IoT-based smart environments publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-023-16436-0 – volume: 2 start-page: 187 issue: 2 year: 2021 ident: 10.7717/peerj-cs.2743/ref-22 article-title: IoT in smart cities: a contemporary survey publication-title: Global Transitions Proceedings doi: 10.1016/j.gltp.2021.08.069 – volume: 8 start-page: 137825–137837 year: 2020 ident: 10.7717/peerj-cs.2743/ref-17 article-title: Replay attack detection in smart cities using deep learning publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3012411 – volume: 10 start-page: 776 issue: 5 year: 2023 ident: 10.7717/peerj-cs.2743/ref-2 article-title: A hybrid cryptographic cipher solution for secure communication in smart cities publication-title: International Journals of Computers Network and Application doi: 10.22247/ijcna/2023/223423 – volume: 55 start-page: 51 issue: 3 year: 2017 ident: 10.7717/peerj-cs.2743/ref-23 article-title: Cybersecurity and privacy solutions in smart cities publication-title: IEEE Communications Magazine doi: 10.1109/MCOM.2017.1600297CM – volume: 33 start-page: e3677 issue: 3 year: 2022 ident: 10.7717/peerj-cs.2743/ref-6 article-title: An overview of security and privacy in smart cities’ IoT communications publication-title: Transactions on Emerging Telecommunications Technologies doi: 10.1002/ett.3677 – volume: 9 start-page: 154864–154875 year: 2021 ident: 10.7717/peerj-cs.2743/ref-18 article-title: A hybrid deep learning approach for replay and DDoS attack detection in a smart city publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3128701 – volume: 13 start-page: 8775 issue: 1 year: 2023 ident: 10.7717/peerj-cs.2743/ref-35 article-title: A new bio-inspired metaheuristic algorithm for solving optimization problems based on walruses behaviour publication-title: Scientific Reports doi: 10.1038/s41598-023-35863-5 – volume: 135 start-page: 76 issue: 6 year: 2019 ident: 10.7717/peerj-cs.2743/ref-19 article-title: Intrusion detection in smart cities using restricted Boltzmann machines publication-title: Journal of Network and Computer Applications doi: 10.1016/j.jnca.2019.02.026 – volume: 12 start-page: 245 issue: 12 year: 2023 ident: 10.7717/peerj-cs.2743/ref-34 article-title: Optimizing intrusion detection systems in three phases on the CSE-CIC-IDS-2018 dataset publication-title: Computers doi: 10.3390/computers12120245 – volume: 7 start-page: e4 issue: 1 year: 2023 ident: 10.7717/peerj-cs.2743/ref-9 article-title: An intelligent machine learning-based intrusion detection system (IDS) for smart city networks publication-title: EAI Endorsed Transactions on Smart Cities doi: 10.4108/eetsc.v7i1.2825 – volume: 15 start-page: 6902 issue: 8 year: 2023 ident: 10.7717/peerj-cs.2743/ref-5 article-title: Intrusion detection using chaotic poor and rich optimization with deep learning model for the smart city environment publication-title: Sustainability doi: 10.3390/su15086902 – volume: 10 start-page: 205 issue: 1 year: 2022 ident: 10.7717/peerj-cs.2743/ref-31 article-title: Feature extraction for machine learning-based intrusion detection in IoT networks publication-title: Digital Communications and Networks doi: 10.1016/j.dcan.2022.08.012 – volume: 5 start-page: 548 issue: 5 year: 2024 ident: 10.7717/peerj-cs.2743/ref-3 article-title: Enhancing internet of smart city security: utilizing logistic boosted algorithms for anomaly detection and cyberattack prevention publication-title: SN Computer Science doi: 10.1007/s42979-024-02921-2 – volume: 7 start-page: e4 issue: 2 year: 2023 ident: 10.7717/peerj-cs.2743/ref-13 article-title: Detection of cyber attacks using machine learning based intrusion detection system for IoT based smart cities publication-title: EAI Endorsed Transactions on Smart Cities doi: 10.4108/eetsc.3222 – volume: 107 start-page: 108635 issue: 5 year: 2023 ident: 10.7717/peerj-cs.2743/ref-27 article-title: Stacking ensemble approach for DDoS attack detection in software-defined cyber-physical systems publication-title: Computers and Electrical Engineering doi: 10.1016/j.compeleceng.2023.108635 – volume: 12 start-page: 107431–107444 year: 2024 ident: 10.7717/peerj-cs.2743/ref-1 article-title: A novel intrusion detection model for enhancing security in smart city publication-title: IEEE Access doi: 10.1109/ACCESS.2024.3438619 |
SSID | ssj0001511119 |
Score | 2.287295 |
Snippet | Smart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban environments become... Background Smart cities, enabled by the Internet of Things (IoT), leverage technology to optimize urban living and enhance infrastructure. As urban... |
SourceID | doaj pubmedcentral proquest gale pubmed crossref |
SourceType | Open Website Open Access Repository Aggregation Database Index Database |
StartPage | e2743 |
SubjectTerms | Analysis Artificial Intelligence Cybersecurity Cyberterrorism Detectors IDS Innovations IoT Marine mammals Neural Networks Public transportation RFE Safety and security measures Smart city Smart transportation Transportation authorities |
Title | Improved smart city security using a deep maxout network-based intrusion detection system with walrus optimization |
URI | https://www.ncbi.nlm.nih.gov/pubmed/40567668 https://www.proquest.com/docview/3224259344 https://pubmed.ncbi.nlm.nih.gov/PMC12190705 https://doaj.org/article/19dd0668b44d48d9a006a30f02b3c5f1 |
Volume | 11 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELagXLjQ8k5pVwYhOJlmYzu2jy3qUpCoUKFSb5ZjO6WITVbNrujP70ycrTbiwIVrPFplHp5vJjsPQt4CQhVhygULwdRM6BCZ0bVkpshr53XJVf8P_tfT8uRcfLmQFxurvrAmLI0HToI7mJoQABZ1JUSAnzIOzMTxvM6LintZ94kPYN5GMpX6g9EVmDRUU0HKcrCI8foX890HSMP4CIT6Wf1_e-QNSBqXS27gz2yHPBoCR3qYXvgxuRebJ2R7vZSBDnf0KblOnwlioN0cuKMewmzaDVvqKJa5X1JHQ4wLOnc37WpJm1QJzhDQAr1qsA0DtAU0y75Oq6Fp3DPFb7b0j_sN57QFVzMfejifkfPZ8Y-PJ2xYrMA8RD9LBuJUUycwe_JFdK7KTZQulCK4InrnFC-907VSXHgIYHAXmeRKhEpyEXWZ8-dkq2mb-JJQkLVTleaihDghj8Lo4J0B7dS5rHypM_JuLWm7SPMzLOQdqBLbq8T6zqJKMnKEergjwrHX_QMwBjsYg_2XMWTkDWrR4mCLBitnLt2q6-zn72f2UHMAbOBbZuT9QFS3oE_vhkYEYAhnYY0o90aUcPP86Pj12lgsHmG5WhPbVWfBS4IvNFyIjLxIxnPHGETIpSpRMnpkViPOxyfN1c9-8PcU4AVctNz9H7J6RR4WuMu476_cI1tgXHEfAqxlNSH39ezThDw4Oj79djbpb9Ytwb0o-Q |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Improved+smart+city+security+using+a+deep+maxout+network-based+intrusion+detection+system+with+walrus+optimization&rft.jtitle=PeerJ.+Computer+science&rft.au=Rajeh%2C+Wahid&rft.au=Aborokbah%2C+Majed&rft.au=S.%2C+Manimurugan&rft.au=Albalawi%2C+Umar&rft.date=2025-03-31&rft.pub=PeerJ.+Ltd&rft.issn=2376-5992&rft.eissn=2376-5992&rft.volume=11&rft.spage=e2743&rft_id=info:doi/10.7717%2Fpeerj-cs.2743&rft.externalDocID=A833418715 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2376-5992&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2376-5992&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2376-5992&client=summon |