{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:45:27Z","timestamp":1775839527726,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031624940","type":"print"},{"value":"9783031624957","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-62495-7_14","type":"book-chapter","created":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T20:19:24Z","timestamp":1719001164000},"page":"178-190","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["HEADS: Hybrid Ensemble Anomaly Detection System for Internet-of-Things Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8530-864X","authenticated-orcid":false,"given":"Zeeshan","family":"Ahmad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0987-2791","authenticated-orcid":false,"given":"Andrei","family":"Petrovski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8010-7435","authenticated-orcid":false,"given":"Murshedul","family":"Arifeen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3924-3646","authenticated-orcid":false,"given":"Adnan Shahid","family":"Khan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2052-1121","authenticated-orcid":false,"given":"Syed Aziz","family":"Shah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,22]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","unstructured":"Ahmad, F., Ahmad, Z., Kerrache, C.A., Kurugollu, F., Adnane, A., Barka, E.: Blockchain in Internet-of-Things: architecture, applications and research directions. In: 2019 International Conference on Computer and Information Sciences, ICCIS 2019 (2019). https:\/\/doi.org\/10.1109\/ICCISCI.2019.8716450","DOI":"10.1109\/ICCISCI.2019.8716450"},{"key":"14_CR2","doi-asserted-by":"publisher","unstructured":"Ahmad, Z., et al.: S-ADS: spectrogram image-based anomaly detection system for IoT networks. In: Proceedings - AiIC 2022: 2022 Applied Informatics International Conference: Digital Innovation in Applied Informatics During the Pandemic, pp. 105\u2013110 (2022). https:\/\/doi.org\/10.1109\/AIIC54368.2022.9914599","DOI":"10.1109\/AIIC54368.2022.9914599"},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","volume":"21","author":"N Chaabouni","year":"2019","unstructured":"Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. Tutor. 21, 2671\u20132701 (2019). https:\/\/doi.org\/10.1109\/COMST.2019.2896380","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"87079","DOI":"10.1109\/ACCESS.2021.3088149","volume":"9","author":"AS Khan","year":"2021","unstructured":"Khan, A.S., Ahmad, Z., Abdullah, J., Ahmad, F.: A spectrogram image-based network anomaly detection system using deep convolutional neural network. IEEE Access 9, 87079\u201387093 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3088149","journal-title":"IEEE Access"},{"key":"14_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/J.INS.2023.119000","volume":"639","author":"M Keshk","year":"2023","unstructured":"Keshk, M., Koroniotis, N., Pham, N., Moustafa, N., Turnbull, B., Zomaya, A.Y.: An explainable deep learning-enabled intrusion detection framework in IoT networks. Inf. Sci. 639, 119000 (2023). https:\/\/doi.org\/10.1016\/J.INS.2023.119000","journal-title":"Inf. Sci."},{"key":"14_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/J.ESWA.2022.119030","volume":"213","author":"MHL Louk","year":"2023","unstructured":"Louk, M.H.L., Tama, B.A.: Dual-IDS: a bagging-based gradient boosting decision tree model for network anomaly intrusion detection system. Expert Syst. Appl. 213, 119030 (2023). https:\/\/doi.org\/10.1016\/J.ESWA.2022.119030","journal-title":"Expert Syst. Appl."},{"key":"14_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMPELECENG.2023.108836","volume":"110","author":"Y Cao","year":"2023","unstructured":"Cao, Y., Wang, Z., Ding, H., Zhang, J., Li, B.: An intrusion detection system based on stacked ensemble learning for IoT network. Comput. Electr. Eng. 110, 108836 (2023). https:\/\/doi.org\/10.1016\/J.COMPELECENG.2023.108836","journal-title":"Comput. Electr. Eng."},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1016\/J.JKSUCI.2023.01.014","volume":"35","author":"A Mohammed","year":"2023","unstructured":"Mohammed, A., Kora, R.: A comprehensive review on ensemble deep learning: opportunities and challenges. J. King Saud Univ. Comput. Inf. Sci. 35, 757\u2013774 (2023). https:\/\/doi.org\/10.1016\/J.JKSUCI.2023.01.014","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"5941","DOI":"10.3390\/S23135941","volume":"23","author":"ECP Neto","year":"2023","unstructured":"Neto, E.C.P., Dadkhah, S., Ferreira, R., Zohourian, A., Lu, R., Ghorbani, A.A.: CICIoT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors 23, 5941 (2023). https:\/\/doi.org\/10.3390\/S23135941","journal-title":"Sensors"},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"5810","DOI":"10.1109\/TII.2020.3038761","volume":"17","author":"C Luo","year":"2021","unstructured":"Luo, C., Tan, Z., Min, G., Gan, J., Shi, W., Tian, Z.: A novel web attack detection system for Internet of Things via ensemble classification. IEEE Trans. Ind. Inform. 17, 5810\u20135818 (2021). https:\/\/doi.org\/10.1109\/TII.2020.3038761","journal-title":"IEEE Trans. Ind. Inform."},{"key":"14_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/J.ESWA.2022.118745","volume":"213","author":"O Abu Alghanam","year":"2023","unstructured":"Abu Alghanam, O., Almobaideen, W., Saadeh, M., Adwan, O.: An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning. Expert Syst. Appl. 213, 118745 (2023). https:\/\/doi.org\/10.1016\/J.ESWA.2022.118745","journal-title":"Expert Syst. Appl."},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"10268","DOI":"10.3390\/APP112110268","volume":"11","author":"P Verma","year":"2021","unstructured":"Verma, P., et al.: A novel intrusion detection approach using machine learning ensemble for IoT environments. Appl. Sci. 11, 10268 (2021). https:\/\/doi.org\/10.3390\/APP112110268","journal-title":"Appl. Sci."},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"1805","DOI":"10.1007\/S13369-021-06086-5\/TABLES\/12","volume":"47","author":"A Abbas","year":"2022","unstructured":"Abbas, A., Khan, M.A., Latif, S., Ajaz, M., Shah, A.A., Ahmad, J.: A new ensemble-based intrusion detection system for Internet of Things. Arab. J. Sci. Eng. 47, 1805\u20131819 (2022). https:\/\/doi.org\/10.1007\/S13369-021-06086-5\/TABLES\/12","journal-title":"Arab. J. Sci. Eng."},{"key":"14_CR14","doi-asserted-by":"publisher","first-page":"11888","DOI":"10.1109\/JIOT.2023.3244810","volume":"10","author":"A Thakkar","year":"2023","unstructured":"Thakkar, A., Lohiya, R.: Attack classification of imbalanced intrusion data for IoT network using ensemble-learning-based deep neural network. IEEE Internet Things J. 10, 11888\u201311895 (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3244810","journal-title":"IEEE Internet Things J."},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"33789","DOI":"10.1109\/ACCESS.2018.2841987","volume":"6","author":"I Ahmad","year":"2018","unstructured":"Ahmad, I., Basheri, M., Iqbal, M.J., Rahim, A.: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6, 33789\u201333795 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2841987","journal-title":"IEEE Access"},{"key":"14_CR16","series-title":"Internet of Things","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-030-80821-1_15","volume-title":"Artificial Intelligence for Cloud and Edge Computing","author":"YK Saheed","year":"2022","unstructured":"Saheed, Y.K.: Performance improvement of intrusion detection system for detecting attacks on Internet of Things and edge of things. In: Misra, S., Kumar Tyagi, A., Piuri, V., Garg, L. (eds.) Artificial Intelligence for Cloud and Edge Computing. IT, pp. 321\u2013339. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-80821-1_15"},{"key":"14_CR17","doi-asserted-by":"publisher","first-page":"1458","DOI":"10.3390\/SYM12091458","volume":"12","author":"C Tang","year":"2020","unstructured":"Tang, C., Luktarhan, N., Zhao, Y.: An efficient intrusion detection method based on LightGBM and autoencoder. Symmetry 12, 1458 (2020). https:\/\/doi.org\/10.3390\/SYM12091458","journal-title":"Symmetry"},{"key":"14_CR18","doi-asserted-by":"publisher","first-page":"9395","DOI":"10.1016\/J.AEJ.2022.02.063","volume":"61","author":"Y Kayode Saheed","year":"2022","unstructured":"Kayode Saheed, Y., Idris Abiodun, A., Misra, S., Kristiansen Holone, M., Colomo-Palacios, R.: A machine learning-based intrusion detection for detecting internet of things network attacks. Alex. Eng. J. 61, 9395\u20139409 (2022). https:\/\/doi.org\/10.1016\/J.AEJ.2022.02.063","journal-title":"Alex. Eng. J."},{"key":"14_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4810","volume":"34","author":"Z Ahmad","year":"2023","unstructured":"Ahmad, Z., Khan, A.S., Zen, K., Ahmad, F.: MS-ADS: multistage spectrogram image-based anomaly detection system for IoT security. Trans. Emerg. Telecommun. Technol. 34, e4810 (2023). https:\/\/doi.org\/10.1002\/ett.4810","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"14_CR20","doi-asserted-by":"publisher","DOI":"10.7717\/PEERJ-CS.1569\/SUPP-1","volume":"9","author":"Z Wang","year":"2023","unstructured":"Wang, Z., Chen, H., Yang, S., Luo, X., Li, D., Wang, J.: A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization. PeerJ Comput. Sci. 9, e1569 (2023). https:\/\/doi.org\/10.7717\/PEERJ-CS.1569\/SUPP-1","journal-title":"PeerJ Comput. Sci."},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"131661","DOI":"10.1109\/ACCESS.2023.3336678","volume":"11","author":"TTH Le","year":"2023","unstructured":"Le, T.T.H., Wardhani, R.W., Catur Putranto, D.S., Jo, U., Kim, H.: Toward enhanced attack detection and explanation in intrusion detection system-based IoT environment data. IEEE Access 11, 131661\u2013131676 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3336678","journal-title":"IEEE Access"}],"container-title":["Communications in Computer and Information Science","Engineering Applications of Neural Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-62495-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T20:21:30Z","timestamp":1719001290000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-62495-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031624940","9783031624957"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-62495-7_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"22 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Engineering Applications of Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Corfu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eann2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eannconf.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}