  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Intelligent Systems and Internet of Things</full_title>
  <abbrev_title>JISIoT</abbrev_title>
  <issn media_type="print">2690-6791</issn>
  <issn media_type="electronic">2769-786X</issn>
  <doi_data>
   <doi>10.54216/JISIoT</doi>
   <resource>https://www.americaspg.com/journals/show/3883</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Ensemble Learning-Based Intrusion Detection and Classification for Securing IoT Networks: An Optimized Strategy for Threat Detection and Prevention</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Associate Professor, Dept. of CSE (AI&amp;ML), Sai Vidya Institute of Technology, Visvesvaraya Technological University, Bengaluru, Karnataka, India </organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Sanjay</given_name>
    <surname>Sanjay</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Associate Professor, Dept. of ISE, Shridevi Institute of Engineering and Technology, Visvesvaraya Technological University, Karnataka, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Charan K..</given_name>
    <surname>V.</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of CSE, Koneru Lakshmaiah Education Foundation, Vaddeswaram,  AP, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>B. Yamini</given_name>
    <surname>Supriya</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Assistant Professor, School of Computer Science and Engineering, Ramdeobaba University, Nagpur, Maharashtra, India </organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Purshottam J.</given_name>
    <surname>Assudani</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Principal, MIT Muzaffarpur, Bihar, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Chandra Bhushan</given_name>
    <surname>Mahato</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Professor, Dept. of AI&amp;DS, Sri Shanmugha College of Engineering and Technology And Director Research, Sri Shanmugha Educational Institutions, Sankari, Salem, TN, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Sanjay Kumar</given_name>
    <surname>Suman</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>The Internet of Things (IoT) advancement has created new security holes, which require intrusion detection systems to defend networks effectively. The complex structure of IoT networks causes traditional security methods to fail because they produce high amounts of incorrect detections and limited ability to accurately identify threats. The authors introduce ID-ELC: Ensemble Learning and Classification framework for Intrusion Detection, which aims to strengthen IoT environment security. A new ID-ELC model uses CS optimization with composite variance to choose network features that boost their detection capabilities. The cybersecurity evaluation of the system utilized Kyoto network records that included 91,000 intrusion-prone records and 59,000 benign logs from 150,000 total records. Experiments revealed ID-ELC surpasses Statistical Flow Features (SFF) and Two-layer Dimension Reduction and Two-tier Classification (TDRTC) through precision 0.98, accuracy 0.98, sensitivity 0.99 and specificity 0.97. Science-based evaluations confirm ID-ELC represents a flexible and resilient tool for IoT intrusion protection that shows practical value for citywide security systems and medicine networks and manufacturing operations. Future investigation will concentrate on enhancing the selection of features alongside classification methods to address rising cyber threats.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2025</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2025</year>
  </publication_date>
  <pages>
   <first_page>101</first_page>
   <last_page>118</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JISIoT.170208</doi>
   <resource>https://www.americaspg.com/articleinfo/18/show/3883</resource>
  </doi_data>
 </journal_article>
</journal>
