[1] Haddad Pajouh Hamed, Javidan Reza, Khayami Raouf, Dehghantanha Ali, and Raymond Choo Kim-Kwang. “A Two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks”. IEEE Transactions on Emerging Topics in Computing 7, no. 2 (2016): 314-323.
[2] Asharf, Javed, Nour Moustafa, Hasnat Khurshid, Essam Debie, Waqas Haider, and Abdul Wahab, “A review of intrusion detection systems using machine and deep learning in internet of things: challenges, solutions and future directions”. Electronics, 9, no.7 (2020):1-45.
[3] Ankit Thakkar and Ritika Lohiya, “A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges”. Archives of Computational Methods in Engineering 28, no.4 (2020) 3211-3243.
[4] Chen Yuanfang, Zhang Yan, Maharjan Sabita, Alam Muhammad, and Wu Ting. “Deep learning for secure mobile edge computing”. IEEE Network 43, no. 4 (2019): 36-41.
[5] Abdel-Basset Mohamed, Abdel-Fatah Laila, and Sangaiah Arun Kumar , “Metaheuristic algorithms: A comprehensive review”. In Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications, Academic press (2018):185-231.
]6 [ احمدی طاهری، محمدحسن. ارائه روشی مبتنی بر یادگیری عمیق برای تشخیص نفوذ شبکه های کامپیوتری. پایان نامه. مؤسسه آموزش عالی سینا. 1396.
[7] Cervantes Christian, Poplade Diego, Nogueira Michele, and Santos Aldri. “Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things”. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), IEEE,(1015):606-611.
[8] Eung Jun Cho, Jin Ho Kim and Choong Seon Hong. “Attack model and detection scheme for botnet on 6LoWPAN”. In: Asia-Pacific network operations and management symposium, Springer(2009):515–518.
[9] João P. Amaral, Luís M. Oliveira, Joel J. P. C. Rodrigues, Guangjie Han, and Lei Shu, “Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks”. In: 2014 IEEE International Conference on Communications (ICC), IEEE (2014):1796 – 1801.
[10] A. Alghuried, “A Model for anomalies detection in Internet of Things (IoT) using inverse weight clustering and decision tree”. Masters dissertation, Technological University Dublin (2017).
[11] Atefinia Ramin, and Ahmadi Mahmood, “Network intrusion detection using multi-architectural modular deep neural network”. Journal of Supercomputing 71, no. 4 (2021): 3571–3593.
[12] Chawla Shiven, “Deep learning-based intrusion detection system for Internet of Things (Doctoral dissertation) (2017).
[13] Zhang Ying, Li Peisong, and Wang Xinheng, “Intrusion detection for IoT-based on improved genetic algorithm and deep belief network”. IEEE Access, 7, 31711-31722, 2019.
[14] Kennedy James, and Eberhart Russell, “Particle swarm optimization”. In Proceedings of ICNN'95-International Conference on Neural Networks 4, no.2, (1995):1942-1948.
[15] Hassan Rania, Cohanim Babak, de Weck Olivier and Venter Gerhard. “A comparison of particle swarm optimization and the genetic algorithm”. In 46th AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics and Materials conference (2005): 1897-1903 .
[16] Popoola, Segun I., Bamidele Adebisi, Ruth Ande, Mohammad Hammoudeh, Kelvin Anoh, and Aderemi A. Atayero, “SMOTE-DRNN: A deep learning algorithm for botnet detection in the Internet-of-Things networks”. Sensors 21, no .9, (2021): 2851-2861.
[17] Idrissi Idriss, Boukabous Mohammed, Azizi Mostafa, Moussaoui Omar, and El Fadili Hakim, “Toward a deep learning-based intrusion detection system for IoT against botnet attacks”. IAES International Journal of Artificial Intelligence 10, no.1, (2021): 110-122.
[18] Leonid Portnoy, Eleazar Eskin, and Salvatore J. Stolfo, “Intrusion detection with unlabeled data using clustering”, Proceedings of ACM CSS Workshop on Data Mining Applied to Security, (2001):123-132.
[19] Moustafa Noor, and Slay Jill, “UNSW-NB15: A comprehensive dataset for network intrusion detection systems (UNSW-NB15 network data set)”. 2015 Military Communications and Information Systems Conference (MilCIS) (2015):1-6.
[21] Abadi Martín, Agarwal Ashish, Barham Paul, Brevdo Eugene, Chen Zhifeng, and Citro Craig, “Tensorflow: large-scale machine learning on heterogeneous distributed systems”. OSDI'16: Proceedings of the 12th USENIX conference on Operating Systems Design and Implementation, (2016): 265–283.
[22] Pedregosa Fabian, Varoquaux Gaël, Gramfort Alexandre, Michel Vincent, and Thirion Bertrand, “Scikit-learn: machine learning in Python”. Journal of Machine Learning Research 12, no. 3, (2011): 2825-2830.
[23] Attiratanasunthron Nattapat, Fakcharoenphol Jittat, “A running time analysis of an Ant Colony Optimization algorithm for shortest paths in directed acyclic graphs”, Information Processing Letters 105, no. 3, (2008): 88-92.
[24] Yan Fu, Xu Jianzhong, Yun Kumchol, “Dynamically dimensioned search grey wolf optimizer based on positional interaction information”, Computational Methods for Modeling, Simulating, and Optimizing Complex Systems 2019, (2019):1-37.