  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Intelligent Systems and Internet of Things</full_title>
  <abbrev_title>JISIoT</abbrev_title>
  <issn media_type="print">2690-6791</issn>
  <issn media_type="electronic">2769-786X</issn>
  <doi_data>
   <doi>10.54216/JISIoT</doi>
   <resource>https://www.americaspg.com/journals/show/3094</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>A Hybrid Heuristic AI Technique for Enhancing Intrusion Detection Systems in IoT Environments</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Department of Computer Science, College of Science for Women, University of Baghdad, Iraq</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Yousra</given_name>
    <surname>Yousra</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Office of the Vice President for Scientific, University of Baghdad, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Fadhel K.</given_name>
    <surname>Jabor</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Office of the Vice President for Scientific, University of Baghdad, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ghufran A.</given_name>
    <surname>Omran</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science, University of Technology, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Mohammed Hamid</given_name>
    <surname>Kassem</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science, University of Information Technology &amp; Communications, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Raghad Hamid</given_name>
    <surname>Kassem</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Science, University of Technology, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ali Naseer</given_name>
    <surname>Abood</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>In the evolving landscape of the Internet of Things (IoT), effective intrusion detection is paramount for maintaining security and data integrity. This study introduces a hybrid heuristic technique utilizing artificial intelligence for enhancing intrusion detection systems (IDS) in IoT environments. By integrating various machine learning models, the research focuses on training, tuning, and validating a sequential neural network to predict intrusion occurrences based on extensive data analysis. The methodology involves modelling, which starts with training machine learning algorithms to predict labels from features, tuning the models to meet organizational requirements, and validating them using holdout data. Key machine learning techniques explored include logistic regression, k-nearest neighbors (KNN), naive Bayes, support vector machines (SVM), decision trees, random forests, and neural networks. Each technique's applicability to classification tasks, particularly binary and multivariate scenarios, is discussed in the context of enhancing IDS capabilities. A sequential neural network model, comprising multiple dense and dropout layers, was developed and trained with 148,033 parameters to achieve high accuracy and robustness. The architecture's effectiveness in learning intricate patterns associated with malicious activities while avoiding overfitting is emphasized. The study demonstrates the model's proficiency in binary classification tasks, which is critical for distinguishing between normal and anomalous behaviors in IoT systems. The results indicate that the neural network, optimized using the hybrid heuristic approach, shows a significant reduction in validation loss and a steady improvement in accuracy over multiple epochs. Despite initial overfitting signs, the model maintains high performance on unseen data, underscoring the importance of ongoing model assessment and tuning.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2025</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2025</year>
  </publication_date>
  <pages>
   <first_page>01</first_page>
   <last_page>15</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JISIoT.140101</doi>
   <resource>https://www.americaspg.com/articleinfo/18/show/3094</resource>
  </doi_data>
 </journal_article>
</journal>
