{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T14:04:13Z","timestamp":1774879453674,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819584130","type":"print"},{"value":"9789819584147","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-8414-7_15","type":"book-chapter","created":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T13:16:44Z","timestamp":1774876604000},"page":"255-271","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["XGTFormer: A Hybrid Transformer-Boosted Model for\u00a0Effective Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Hantao","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Han","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Hongbing","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,31]]},"reference":[{"issue":"9","key":"15_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3472753","volume":"54","author":"D Chou","year":"2021","unstructured":"Chou, D., Jiang, M.: A survey on data-driven network intrusion detection. ACM Comput. Surv. (CSUR) 54(9), 1\u201336 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"5","key":"15_CR2","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1007\/s10207-023-00682-2","volume":"22","author":"OH Abdulganiyu","year":"2023","unstructured":"Abdulganiyu, O.H., Ait Tchakoucht, T., Saheed, Y.K.: A systematic literature review for network intrusion detection system (IDS). Int. J. Inf. Secur. 22(5), 1125\u20131162 (2023)","journal-title":"Int. J. Inf. Secur."},{"key":"15_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102675","volume":"116","author":"Z Yang","year":"2022","unstructured":"Yang, Z., Liu, X., Li, T., et al.: A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput. Secur. 116, 102675 (2022)","journal-title":"Comput. Secur."},{"issue":"1","key":"15_CR4","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1109\/COMST.2022.3233793","volume":"25","author":"K He","year":"2023","unstructured":"He, K., Kim, D.D., Asghar, M.R.: Adversarial machine learning for network intrusion detection systems: a comprehensive survey. IEEE Commun. Surv. Tutorials 25(1), 538\u2013566 (2023)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"6","key":"15_CR5","doi-asserted-by":"publisher","first-page":"339","DOI":"10.14257\/ijfgcn.2016.9.6.32","volume":"9","author":"SK Patel","year":"2016","unstructured":"Patel, S.K., Sonker, A.: Rule-based network intrusion detection system for port scanning with efficient port scan detection rules using snort. Int. J. Future Gener. Commun. Network. 9(6), 339\u2013350 (2016)","journal-title":"Int. J. Future Gener. Commun. Network."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Malek, Z.S., Trivedi, B., Shah, A.: User behavior pattern-signature based intrusion detection. In: 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), pp. 549\u2013552. IEEE (2020)","DOI":"10.1109\/WorldS450073.2020.9210368"},{"key":"15_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102861","volume":"121","author":"C Zhang","year":"2022","unstructured":"Zhang, C., Jia, D., Wang, L., et al.: Comparative research on network intrusion detection methods based on machine learning. Comput. Secur. 121, 102861 (2022)","journal-title":"Comput. Secur."},{"key":"15_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102767","volume":"169","author":"S Gamage","year":"2020","unstructured":"Gamage, S., Samarabandu, J.: Deep learning methods in network intrusion detection: a survey and an objective comparison. J. Netw. Comput. Appl. 169, 102767 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"D\u00fczg\u00fcn, B., \u00c7ayr, A., \u00dcnal, U., et al.: Network intrusion detection system by learning jointly from tabular and text-based features. Expert Syst. 41(4), e13518 (2024)","DOI":"10.1111\/exsy.13518"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"10657","DOI":"10.1109\/ACCESS.2020.3048172","volume":"9","author":"S Khan","year":"2020","unstructured":"Khan, S., Sajjad, M., Hussain, T., et al.: A review on traditional machine learning and deep learning models for WBCs classification in blood smear images. IEEE Access 9, 10657\u201310673 (2020)","journal-title":"IEEE Access"},{"key":"15_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102940","volume":"123","author":"MS Milosevic","year":"2022","unstructured":"Milosevic, M.S., Ciric, V.M.: Extreme minority class detection in imbalanced data for network intrusion. Comput. Secur. 123, 102940 (2022)","journal-title":"Comput. Secur."},{"key":"15_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122564","volume":"241","author":"LD Manocchio","year":"2024","unstructured":"Manocchio, L.D., Layeghy, S., Lo, W.W., et al.: FlowTransformer: a transformer framework for flow-based network intrusion detection systems. Expert Syst. Appl. 241, 122564 (2024)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"15_CR13","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1007\/s10207-023-00794-9","volume":"23","author":"H Asad","year":"2024","unstructured":"Asad, H., Adhikari, S., Gashi, I.: A perspective\u2013retrospective analysis of diversity in signature-based open-source network intrusion detection systems. Int. J. Inf. Secur. 23(2), 1331\u20131346 (2024)","journal-title":"Int. J. Inf. Secur."},{"issue":"1\u20132","key":"15_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., et al.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1\u20132), 18\u201328 (2009)","journal-title":"Comput. Secur."},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, J., Zulkernine, M.: Anomaly based network intrusion detection with unsupervised outlier detection. In: 2006 IEEE International Conference on Communications, pp. 2388\u20132393. IEEE (2006)","DOI":"10.1109\/ICC.2006.255127"},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"15","DOI":"10.58496\/BJML\/2024\/002","volume":"2024","author":"A Alsajri","year":"2024","unstructured":"Alsajri, A., Steiti, A.: Intrusion detection system based on machine learning algorithms: (SVM and genetic algorithm). Babylonian J. Mach. Learn. 2024, 15\u201329 (2024)","journal-title":"Babylonian J. Mach. Learn."},{"issue":"1","key":"15_CR17","first-page":"107","volume":"24","author":"KG Chachar","year":"2024","unstructured":"Chachar, K.G., Ahsan, S.N.: Anomaly-based network intrusion detection: an approach using ensemble-based machine learning algorithm. Int. J. Comput. Sci. Netw. Secur. 24(1), 107\u2013118 (2024)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Zhao, F., Zhang, M., Zhou, S., et al.: Detection of network security traffic anomalies based on machine learning KNN method. J. Artif. Intell. Gen. Sci. (JAIGS) 1(1), 209\u2013218 (2024). ISSN: 3006-4023","DOI":"10.60087\/jaigs.v1i1.213"},{"key":"15_CR19","doi-asserted-by":"publisher","first-page":"6639714","DOI":"10.1155\/2021\/6639714","volume":"2021","author":"S Einy","year":"2021","unstructured":"Einy, S., Oz, C., Navaei, Y.D.: The anomaly- and signature-based IDS for network security using hybrid inference systems. Math. Probl. Eng. 2021, 6639714 (2021)","journal-title":"Math. Probl. Eng."},{"issue":"6","key":"15_CR20","doi-asserted-by":"publisher","first-page":"867","DOI":"10.3390\/electronics11060867","volume":"11","author":"HY Kwon","year":"2022","unstructured":"Kwon, H.Y., Kim, T., Lee, M.K.: Advanced intrusion detection combining signature-based and behavior-based detection methods. Electronics 11(6), 867 (2022)","journal-title":"Electronics"},{"issue":"3","key":"15_CR21","doi-asserted-by":"publisher","first-page":"164","DOI":"10.3390\/info15030164","volume":"15","author":"M Schr\u00f6tter","year":"2024","unstructured":"Schr\u00f6tter, M., Niemann, A., Schnor, B.: A comparison of neural-network-based intrusion detection against signature-based detection in IoT networks. Information 15(3), 164 (2024)","journal-title":"Information"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Jayaraj, R., Pushpalatha, A., Sangeetha, K., et al.: Intrusion detection based on phishing detection with machine learning. Meas. Sens. 31, 101003 (2024)","DOI":"10.1016\/j.measen.2023.101003"},{"issue":"3","key":"15_CR23","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1089\/big.2020.0263","volume":"9","author":"I Al-Turaiki","year":"2021","unstructured":"Al-Turaiki, I., Altwaijry, N.: A convolutional neural network for improved anomaly-based network intrusion detection. Big Data 9(3), 233\u2013252 (2021)","journal-title":"Big Data"},{"issue":"5","key":"15_CR24","doi-asserted-by":"publisher","first-page":"2754","DOI":"10.3390\/app13052754","volume":"13","author":"T Kim","year":"2023","unstructured":"Kim, T., Pak, W.: Deep learning-based network intrusion detection using multiple image transformers. Appl. Sci. 13(5), 2754 (2023)","journal-title":"Appl. Sci."},{"key":"15_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.123027","volume":"245","author":"R Devendiran","year":"2024","unstructured":"Devendiran, R., Turukmane, A.V.: Dugat-LSTM: deep learning based network intrusion detection system using chaotic optimization strategy. Expert Syst. Appl. 245, 123027 (2024)","journal-title":"Expert Syst. Appl."},{"key":"15_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.112455","volume":"168","author":"M Arafah","year":"2025","unstructured":"Arafah, M., Phillips, I., Adnane, A., et al.: Anomaly-based network intrusion detection using denoising autoencoder and Wasserstein GAN synthetic attacks. Appl. Soft Comput. 168, 112455 (2025)","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"15_CR27","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1186\/s40537-024-00886-w","volume":"11","author":"MA Talukder","year":"2024","unstructured":"Talukder, M.A., Islam, M.M., Uddin, M.A., et al.: Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction. J. Big Data 11(1), 33 (2024)","journal-title":"J. Big Data"},{"key":"15_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126886","volume":"564","author":"Y Lu","year":"2024","unstructured":"Lu, Y., Chai, S., Suo, Y., et al.: Intrusion detection for industrial internet of things based on deep learning. Neurocomputing 564, 126886 (2024)","journal-title":"Neurocomputing"},{"issue":"1","key":"15_CR29","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1186\/s13677-023-00574-9","volume":"13","author":"Z Long","year":"2024","unstructured":"Long, Z., Yan, H., Shen, G., et al.: A transformer-based network intrusion detection approach for cloud security. J. Cloud Comput. 13(1), 5 (2024)","journal-title":"J. Cloud Comput."},{"issue":"15","key":"15_CR30","doi-asserted-by":"publisher","first-page":"5047","DOI":"10.3390\/s21155047","volume":"21","author":"H Wang","year":"2021","unstructured":"Wang, H., Li, W.: DDosTC: a transformer-based network attack detection hybrid mechanism in SDN. Sensors 21(15), 5047 (2021)","journal-title":"Sensors"},{"issue":"9","key":"15_CR31","doi-asserted-by":"publisher","first-page":"2100","DOI":"10.3390\/electronics12092100","volume":"12","author":"M Wang","year":"2023","unstructured":"Wang, M., Yang, N., Weng, N.: Securing a smart home with a transformer-based IoT intrusion detection system. Electronics 12(9), 2100 (2023)","journal-title":"Electronics"},{"key":"15_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110072","volume":"237","author":"S Ullah","year":"2023","unstructured":"Ullah, S., Ahmad, J., Khan, M.A., et al.: TNN-IDS: transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks. Comput. Netw. 237, 110072 (2023)","journal-title":"Comput. Netw."},{"issue":"1","key":"15_CR33","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.dcan.2023.03.008","volume":"10","author":"F Ullah","year":"2024","unstructured":"Ullah, F., Ullah, S., Srivastava, G., et al.: IDS-INT: intrusion detection system using transformer-based transfer learning for imbalanced network traffic. Digit. Commun. Netw. 10(1), 190\u2013204 (2024)","journal-title":"Digit. Commun. Netw."},{"key":"15_CR34","doi-asserted-by":"publisher","unstructured":"Zhou, Z., Abawajy, J.: Reinforcement learning-based edge server placement in the intelligent internet of vehicles environment. IEEE Trans. Intell. Transp. Syst. 1\u201311 (2025). https:\/\/doi.org\/10.1109\/TITS.2025.3557259","DOI":"10.1109\/TITS.2025.3557259"},{"key":"15_CR35","doi-asserted-by":"publisher","unstructured":"Zhou, Z., Shojafar, M., Alazab, M., Li, F.: IECL: an intelligence energy consumption model for cloud manufacturing. IEEE Trans. Ind. Inf. 18(12), 8967\u20138976 (2022). https:\/\/doi.org\/10.1109\/TII.2022.3165085","DOI":"10.1109\/TII.2022.3165085"},{"issue":"1","key":"15_CR36","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1109\/TGCN.2021.3121961","volume":"6","author":"Z Zhou","year":"2022","unstructured":"Zhou, Z., Shojafar, M., Abawajy, J., Yin, H., Hongming, L.: ECMS: an edge intelligent energy efficient model in mobile edge computing. IEEE Trans. Green Commun. Network. 6(1), 238\u2013247 (2022). https:\/\/doi.org\/10.1109\/TGCN.2021.3121961","journal-title":"IEEE Trans. Green Commun. Network."},{"issue":"2","key":"15_CR37","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1109\/TGCN.2021.3067309","volume":"5","author":"Z Zhou","year":"2021","unstructured":"Zhou, Z., Shojafar, M., Alazab, M., Abawajy, J., Li, F.: AFED-EF: an energy-efficient VM allocation algorithm for IoT applications in a cloud data center. IEEE Trans. Green Commun. Network. 5(2), 658\u2013669 (2021)","journal-title":"IEEE Trans. Green Commun. Network."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-8414-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T13:16:48Z","timestamp":1774876608000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-8414-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819584130","9789819584147"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-8414-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"31 March 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhengzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ieee-cybermatics.org\/2025\/ica3pp\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}