  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Intelligent Systems and Internet of Things</full_title>
  <abbrev_title>JISIoT</abbrev_title>
  <issn media_type="print">2690-6791</issn>
  <issn media_type="electronic">2769-786X</issn>
  <doi_data>
   <doi>10.54216/JISIoT</doi>
   <resource>https://www.americaspg.com/journals/show/3521</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Ensemble of Machine Learning Model with Tuna Swarm Optimization-Driven Feature Selection for Cybersecurity Threat Detection and Classification Approach</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Research Scholar, Department of Computer Applications, Alagappa University, Karaikudi, 630003, Tamilnadu, India</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>K.</given_name>
    <surname>K.</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Assistant Professor, Department of Computer Science , Government Arts and Science College For Women, Paramakudi, 623707, Tamilnadu, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>K. Rajiv</given_name>
    <surname>Gandhi</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>The initial identification of cybersecurity events like attacks is challenging provided the continuously growing threat environment. Despite state-of-the-art surveillance, advanced attackers can apply for more than 100 days in a system before being detected. Guaranteeing cyber security is a composite task that depends on area of interest and needs cognitive capabilities to control possible threats from larger quantities of network data. The most important task of a cyber-security analyst is to safeguard a network from damage. Numerous technological developments in network and information security have enabled progressive monitoring and threat detection for the predictors, but the responsibilities they carried out could not be automated completely. Hence, in recent times’ Artificial intelligence (AI), mainly deep learning (DL) and machine learning (ML) algorithms, has been utilized to expand a beneficial data-driven intrusion detection system (IDS). Many standard ML classification methods provide intelligent facilities in the area of cyber-security, mainly for intrusion detection. This study develops a Tuna Swarm Optimization-Driven Feature Selection with Ensemble of Machine Learning Models for Cybersecurity Threat Detection and Classification (TSOFSEML-CTDC) technique. The proposed TSOFSEML-CTDC model concentrates on detecting and classifying intrusions on the network. Initially, the TSOFSEML-CTDC algorithm performs data preprocessing using min-max normalization to convert an input data into a beneficial format. Then, the feature selection process has been carried out using tuna swarm optimization (TSO) algorithm. For the classification of intrusion detection, ensemble of ML techniques was employed such as support vector regression (SVR) approach, least-square support vector machines (LSSVM) method, and modified extreme learning machine (MELM) technique.  At last, the hyperactive parameter optimization process is executed by using the coati optimization algorithm (COA). The experimental evaluation of the TSOFSEML-CTDC model occurs using a benchmark dataset. The stimulated results emphasized the enhanced performance of the TSOFSEML-CTDC method compared to existing approaches.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2025</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2025</year>
  </publication_date>
  <pages>
   <first_page>76</first_page>
   <last_page>90</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JISIoT.150206</doi>
   <resource>https://www.americaspg.com/articleinfo/18/show/3521</resource>
  </doi_data>
 </journal_article>
</journal>
