Please use this identifier to cite or link to this item: http://dx.doi.org/10.25673/121008
Full metadata record
DC FieldValueLanguage
dc.contributor.authorZwayyer, Mustafa Hussein-
dc.contributor.authorDawood, Sajida Allawi-
dc.contributor.authorSaleh, Ammar Bassem-
dc.date.accessioned2025-11-04T12:49:09Z-
dc.date.available2025-11-04T12:49:09Z-
dc.date.issued2025-07-26-
dc.identifier.urihttps://opendata.uni-halle.de//handle/1981185920/122963-
dc.identifier.urihttp://dx.doi.org/10.25673/121008-
dc.description.abstractThe Internet of Things (IoT) has enabled smart systems, but it has also increased vulnerabilities to cyber threats, including botnet attacks. To address these security challenges, this study proposes a hybrid system that combines metaheuristic and machine learning. To tune hyperparameters of a hybrid neural network based on Convolutional Neural Networks and Semi-Recurrent Neural Networks (CNN-QRNN), the Chaotic Butterfly Optimization Algorithm (CBOA) is used. A new metaheuristic algorithm, Self-Adaptive Enhanced Harris Hawks Optimization (SAEHO), as well as a self-upgraded cat and mouse optimizer (SU-CMO), are introduced and evaluated in order to enhance model effectiveness. Based on experiments conducted on the N-BaIoT dataset, it was determined that the proposed models significantly outperformed conventionalclassifiers in key performance metrics, including accuracy, the Matthews Correlation Coefficient (MCC), theRand Index, and the F-Measure. Particularly notable improvements were observed in reducing false-positiverates and enhancing anomaly detection sensitivity. The HMMLB-BND method substantially improvesdetection performance in diverse IoT environments, offering a robust, efficient, and scalable solution suitablefor real-time deployment in resource-constrained systems.-
dc.language.isoeng-
dc.rights.urihttps://creativecommons.org/licenses/by-sa/4.0/-
dc.subject.ddcDDC::6** Technik, Medizin, angewandte Wissenschaften-
dc.titleMetaheuristic Optimization Algorithms for Deep Learning Model Design in Secure Internet of Things Environment-
local.versionTypepublishedVersion-
local.publisher.universityOrInstitutionHochschule Anhalt-
local.openaccesstrue-
dc.identifier.ppn1939682533-
cbs.publication.displayform2025-
local.bibliographicCitation.year2025-
cbs.sru.importDate2025-11-04T12:48:15Z-
local.bibliographicCitationEnthalten in Proceedings of the 13th International Conference on Applied Innovations in IT - Koethen, Germany : Edition Hochschule Anhalt, 2025-
local.accessrights.dnbfree-
Appears in Collections:International Conference on Applied Innovations in IT (ICAIIT)

Files in This Item:
File Description SizeFormat 
3-2-ICAIIT_2025_13(3).pdf1.09 MBAdobe PDFThumbnail
View/Open