Review History


All reviews of published articles are made public. This includes manuscript files, peer review comments, author rebuttals and revised materials. Note: This was optional for articles submitted before 13 February 2023.

Peer reviewers are encouraged (but not required) to provide their names to the authors when submitting their peer review. If they agree to provide their name, then their personal profile page will reflect a public acknowledgment that they performed a review (even if the article is rejected). If the article is accepted, then reviewers who provided their name will be associated with the article itself.

View examples of open peer review.

Summary

  • The initial submission of this article was received on January 23rd, 2023 and was peer-reviewed by 3 reviewers and the Academic Editor.
  • The Academic Editor made their initial decision on February 13th, 2023.
  • The first revision was submitted on March 8th, 2023 and was reviewed by 3 reviewers and the Academic Editor.
  • A further revision was submitted on April 12th, 2023 and was reviewed by the Academic Editor.
  • The article was Accepted by the Academic Editor on April 27th, 2023.

Version 0.3 (accepted)

· Apr 27, 2023 · Academic Editor

Accept

I am accepting the manuscript for publication.

Version 0.2

· Apr 6, 2023 · Academic Editor

Minor Revisions

Please address the remaining comments. Please only add references if you feel they are relevant to your work.

[# PeerJ Staff Note: It is PeerJ policy that additional references suggested during the peer-review process should only be included if the authors are in agreement that they are relevant and useful #]

Reviewer 1 ·

Basic reporting

- The abstract is too extensive, Should be more concise with only core and standard elements of writing the abstract. Unnecessary descriptions should be removed. The authors made appropriate changes.
- Figure shouldn't be part of the introduction. Please move Figure 1 to another section. The authors made appropriate changes.
- The following papers can be cited: Biliavska, V, Castanho, R. A., & Vulevic, A. (2022). Analysis of the Impact of Artificial Intelligence in Enhancing the Human Resource Practices, J. Intell. Manag. Decis., 1(2), 128-136. https://doi.org/10.56578/jimd010206
Adedotun, A. F. (2022). Hybrid Neural Network Prediction for Time Series Analysis of COVID-19 Cases in Nigeria, J. Intell. Manag. Decis., 1(1), 46-55. https://doi.org/10.56578/jimd010106. The authors cited the suggested references.
- Figure 2 is well known and I think that is redundant in this paper. Figure has been removed.

Experimental design

- Equations are well explained and represented.
- All necessary information has been provided.
- Figure 3 isn't readable. Please improve it. Also, Figure 4 should be more quality. Solved.

Validity of the findings

Generally, this part of the paper is well elaborated with enough explanation. Besides some minor corrections should be done.
- Figure 6 isn't readable.
- Figures 9 and 10 can be converted in Table. Now isn't readable

The authors made appropriate changes.

Additional comments

- Please ensure discussion with implications, limitations etc.
- Future research, in conclusion, is poor, you should add more guidelines.
- It is mandatory to reduce self-citations. Now, this number is about 20. Should be reduced to a number less than 10.

The authors made appropriate changes.

Reviewer 2 ·

Basic reporting

no comment

Experimental design

no comment

Validity of the findings

no comment

Additional comments

I think that the authors have very conscientiously and precisely responded to the comments and suggestions of the reviewers and thereby improved the quality of their paper.

Reviewer 3 ·

Basic reporting

The revised manuscript has been improved accordingly.

Experimental design

The revised manuscript has been improved accordingly.

Validity of the findings

The revised manuscript has been improved accordingly.

Version 0.1 (original submission)

· Feb 13, 2023 · Academic Editor

Major Revisions

I have completed my evaluation of your manuscript. The reviewers recommend reconsideration of your manuscript following major revision. I invite you to resubmit your manuscript after addressing the comments below.

[# PeerJ Staff Note: It is PeerJ policy that additional references suggested during the peer-review process should only be included if the authors are in agreement that they are relevant and useful #]

[# PeerJ Staff Note: Please ensure that all review comments are addressed in a rebuttal letter and any edits or clarifications mentioned in the letter are also inserted into the revised manuscript where appropriate. It is a common mistake to address reviewer questions in the rebuttal letter but not in the revised manuscript. If a reviewer raised a question then your readers will probably have the same question so you should ensure that the manuscript can stand alone without the rebuttal letter. Directions on how to prepare a rebuttal letter can be found at: https://peerj.com/benefits/academic-rebuttal-letters/ #]

Reviewer 1 ·

Basic reporting

The paper falls within the scope of the journal. The authors have performed useful research and have tried to show the benefits of the proposed approach. The paper has potential, but must be improved. My comments are as follows:
- The abstract is too extensive, Should be more concise with only core and standard elements of writing the abstract. Unnecessary descriptions should be removed.
- Figure shouldn't be part of the introduction. Please move Figure 1 to another section.
- The following papers can be cited: Biliavska, V, Castanho, R. A., & Vulevic, A. (2022). Analysis of the Impact of Artificial Intelligence in Enhancing the Human Resource Practices, J. Intell. Manag. Decis., 1(2), 128-136. https://doi.org/10.56578/jimd010206
Adedotun, A. F. (2022). Hybrid Neural Network Prediction for Time Series Analysis of COVID-19 Cases in Nigeria, J. Intell. Manag. Decis., 1(1), 46-55. https://doi.org/10.56578/jimd010106
- Figure 2 is well known and I think that is redundant in this paper.

Experimental design

- Equations are well explained and represented.
- All necessary information has been provided.
- Figure 3 isn't readable. Please improve it. Also, Figure 4 should be more quality.

Validity of the findings

Generally, this part of the paper is well elaborated with enough explanation. Besides some minor corrections should be done.
- Figure 6 isn't readable.
- Figures 9 and 10 can be converted in Table. Now isn't readable.

Additional comments

- Please ensure discussion with implications, limitations etc.
- Future research, in conclusion, is poor, you should add more guidelines.
- It is mandatory to reduce self-citations. Now, this number is about 20. Should be reduced to a number less than 10.

Reviewer 2 ·

Basic reporting

The title should clearly indicate the application of the model – area IoT security.
The summary and conclusion correspond to the essence of the work.
The results are presented both tabularly and graphically in an adequate manner.
The acronyms are consistently explained when first used in the text, except in line 145 - FS.
The use of terminology is correct and it complies with applicable standards.

Experimental design

In lines 183-184, the authors said - The extensive literature survey has also shown that this particular CNN and ELM hybrid combination has never been utilized to address the intrusion detection problem.
Please briefly explain the reasons (motive) that directed you towards the joint use of these two methods (good and bad sides of the methods and what was the assumption that you would achieve the combination), and whether there were considered other possibilities.
I suggest the authors provide a brief comment on the correlation matrices (Figure 9 and Figure 10).
The authors clearly explained the methodology and method of literature selection and presented it clearly in the text, graphically, and tabularly. The way of presenting the results graphically and the choice of graphic types for a clearer visualization of the results are excellent, except that the marks within the graphics are barely visible

Validity of the findings

In the introductory part, the authors indicated the problem and clearly explained the existing ways of solving it. The proposed model is explained in detail, its relevance is compared with other models, and results are presented that unequivocally indicate the applicability of the model.
I request the authors to point out the limitations of the model's application in the concluding part.

Additional comments

no comment

Reviewer 3 ·

Basic reporting

The authors carried out a valuable research in the field of cyber security and optimization algorithms. The developed HASCA algorithm was compared to the scores acquired by 7 additional metaheuristics, separately implemented for the purpose of this research. The chosen algorithms were the basic SCA, ABC, bat algorithm (BA), whale optimization algorithm (WOA), elephant herding optimization (EHO), chimp optimization algorithm (ChOA) and reptile search algorithm (RSA).
The article includes an appropriate introduction and background to demonstrate how the work fits into the broader field of knowledge.
I suggest the following improvements:
There are no explanation regarding the abbreviations in the text, for example CNN, ELM, etc. are introduced without explaining what it stands for.
There is excessive self-citation of the authors’ papers. If possible, it should be reduced.

Experimental design

The research question is well-defined, relevant and meaningful. It is explained how the research fills an identified knowledge gap.
The research is conducted in conformity with the prevailing ethical standards in the field. Methods are described with sufficient detail.

Validity of the findings

The obtained results are of interest to the general and academic audience. The conclusions are appropriately stated and connected to the original investigated question.

All text and materials provided via this peer-review history page are made available under a Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.