{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T13:09:49Z","timestamp":1775221789422,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2023,5,21]],"date-time":"2023-05-21T00:00:00Z","timestamp":1684627200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,21]],"date-time":"2023-05-21T00:00:00Z","timestamp":1684627200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s00500-023-08324-4","type":"journal-article","created":{"date-parts":[[2023,5,21]],"date-time":"2023-05-21T08:01:12Z","timestamp":1684656072000},"page":"9425-9439","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["A deep learning-based intrusion detection approach for mobile Ad-hoc network"],"prefix":"10.1007","volume":"27","author":[{"given":"Rahma","family":"Meddeb","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7511-1221","authenticated-orcid":false,"given":"Farah","family":"Jemili","sequence":"additional","affiliation":[]},{"given":"Bayrem","family":"Triki","sequence":"additional","affiliation":[]},{"given":"Ouajdi","family":"Korbaa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,21]]},"reference":[{"issue":"4","key":"8324_CR1","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347\u20132376","journal-title":"IEEE Commun Surv Tutor"},{"key":"8324_CR2","doi-asserted-by":"crossref","unstructured":"Aminanto ME, Kim K(2016). Detecting impersonation attack in wifi networks using deep learning approach. In: International workshop on information security applications, pages 136\u2013147. Springer, 2016","DOI":"10.1007\/978-3-319-56549-1_12"},{"issue":"2","key":"8324_CR3","doi-asserted-by":"publisher","first-page":"461","DOI":"10.3390\/s20020461","volume":"20","author":"A Amouri","year":"2020","unstructured":"Amouri A, Alaparthy VT, Morgera SD (2020) A machine learning based intrusion detection system for mobile internet of things. Sensors 20(2):461","journal-title":"Sensors"},{"issue":"2","key":"8324_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.3390\/computers12020034","volume":"12","author":"A Awajan","year":"2023","unstructured":"Awajan A (2023) A novel deep learning-based intrusion detection system for IOT networks. Computers 12(2):34","journal-title":"Computers"},{"key":"8324_CR5","doi-asserted-by":"crossref","unstructured":"Bhattacharya S, Lane N\u00a0D(2016) From smart to deep: robust activity recognition on smartwatches using deep learning. In: 2016 IEEE international conference on pervasive computing and communication workshops, pp 1\u20136","DOI":"10.1109\/PERCOMW.2016.7457169"},{"key":"8324_CR6","doi-asserted-by":"crossref","unstructured":"Bouassaba, W, Nabou A, Ouzzif M (2022) Review on machine learning based intrusion detection for manet security. In: 2022 9th international conference on wireless networks and mobile communications (WINCOM), pp 1\u20136. IEEE","DOI":"10.1109\/WINCOM55661.2022.9966457"},{"key":"8324_CR7","unstructured":"Candel A, Parmar V, LeDell E, Arora A (2016). Deep learning with H2O. H2O. ai Inc"},{"issue":"9","key":"8324_CR8","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1080\/09537325.2016.1268682","volume":"29","author":"M Coccia","year":"2017","unstructured":"Coccia M (2017) Sources of technological innovation: radical and incremental innovation problem-driven to support competitive advantage of firms. Technol Anal Strateg Manag 29(9):1048\u20131061","journal-title":"Technol Anal Strateg Manag"},{"issue":"23","key":"8324_CR9","doi-asserted-by":"publisher","first-page":"7803","DOI":"10.3390\/s21237803","volume":"21","author":"M Coccia","year":"2021","unstructured":"Coccia M, Roshani S, Mosleh M (2021) Scientific developments and new technological trajectories in sensor research. Sensors 21(23):7803","journal-title":"Sensors"},{"issue":"23","key":"8324_CR10","doi-asserted-by":"publisher","first-page":"9419","DOI":"10.3390\/s22239419","volume":"22","author":"M Coccia","year":"2022","unstructured":"Coccia M, Roshani S, Mosleh M (2022) Evolution of sensor research for clarifying the dynamics and properties of future directions. Sensors 22(23):9419","journal-title":"Sensors"},{"key":"8324_CR11","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for internet of things. Future Gener Comput Syst 82:761\u2013768","journal-title":"Future Gener Comput Syst"},{"key":"8324_CR12","doi-asserted-by":"publisher","first-page":"102890","DOI":"10.1016\/j.jnca.2020.102890","volume":"173","author":"G D\u2019Angelo","year":"2021","unstructured":"D\u2019Angelo G, Palmieri F (2021) Network traffic classification using deep convolutional recurrent autoencoder neural networks for spatial-temporal features extraction. J Netw Comput Appl 173:102890","journal-title":"J Netw Comput Appl"},{"key":"8324_CR13","doi-asserted-by":"crossref","unstructured":"D\u2019Angelo G, Palmieri F Robustelli A(2022). Effectiveness of video-classification in android malware detection through API-streams and cnn-lstm autoencoders. In: Mobile internet security: 5th international symposium, MobiSec 2021, Jeju Island, South Korea, October 7\u20139, 2021, Revised Selected Papers, pp 171\u2013194. Springer","DOI":"10.1007\/978-981-16-9576-6_13"},{"issue":"2","key":"8324_CR14","doi-asserted-by":"publisher","first-page":"1737","DOI":"10.32604\/iasc.2023.028022","volume":"35","author":"Singh C Edwin","year":"2023","unstructured":"Edwin Singh C, Celestin Vigila SM (2023) WOA-DNN for intelligent intrusion detection and classification in manet services. Intell Autom Soft Comput 35(2):1737\u20131751","journal-title":"Intell Autom Soft Comput"},{"key":"8324_CR15","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.adhoc.2018.09.014","volume":"84","author":"F Feng","year":"2019","unstructured":"Feng F, Liu X, Yong B, Zhou R, Zhou Q (2019) Anomaly detection in Ad-Hoc networks based on deep learning model: a plug and play device. Ad Hoc Netw 84:82\u201389","journal-title":"Ad Hoc Netw"},{"issue":"7","key":"8324_CR16","doi-asserted-by":"publisher","first-page":"3161","DOI":"10.1007\/s11227-017-2017-7","volume":"73","author":"Q Feng","year":"2017","unstructured":"Feng Q, Zhang Y, Li C, Dou Z, Wang J (2017) Anomaly detection of spectrum in wireless communication via deep auto-encoders. J Supercomput 73(7):3161\u20133178","journal-title":"J Supercomput"},{"key":"8324_CR17","unstructured":"Gwon Y\u00a0L, Kung H\u00a0T (2014) Inferring origin flow patterns in Wi-fi with deep learning. In: 11th International conference on autonomic computing (ICAC 14), pages 73\u201383, Philadelphia, PA, June 2014. ISBN 978-1-931971-11-9"},{"key":"8324_CR18","doi-asserted-by":"crossref","unstructured":"Hou S, Saas A, Chen L, Ye Y(2016). Deep4maldroid: A deep learning framework for android malware detection based on linux kernel system call graphs. In: 2016 IEEE\/WIC\/ACM International conference on web intelligence workshops, pp 104\u2013111. IEEE","DOI":"10.1109\/WIW.2016.040"},{"issue":"15","key":"8324_CR19","doi-asserted-by":"publisher","first-page":"2715","DOI":"10.1002\/sec.1204","volume":"9","author":"MA Khan","year":"2016","unstructured":"Khan MA, Khan S, Shams B, Lloret J (2016) Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks. Secur Commun Netw 9(15):2715\u20132729","journal-title":"Secur Commun Netw"},{"issue":"1","key":"8324_CR20","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat A, Gondal I, Vamplew P, Kamruzzaman J (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1):20","journal-title":"Cybersecurity"},{"issue":"14","key":"8324_CR21","doi-asserted-by":"publisher","first-page":"2484","DOI":"10.1002\/sec.1484","volume":"9","author":"S Kumar","year":"2016","unstructured":"Kumar S, Dutta K (2016) Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. Secur Commun Netw 9(14):2484\u20132556","journal-title":"Secur Commun Netw"},{"issue":"9","key":"8324_CR22","doi-asserted-by":"publisher","first-page":"1967","DOI":"10.3390\/s17091967","volume":"17","author":"M Lopez-Martin","year":"2017","unstructured":"Lopez-Martin M, Carro B, Sanchez-Esguevillas A, Lloret J (2017) Conditional variational autoencoder for prediction and feature recovery applied to intrusion detection in IOT. Sensors 17(9):1967","journal-title":"Sensors"},{"issue":"1","key":"8324_CR23","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TNSE.2018.2848960","volume":"7","author":"C Luo","year":"2018","unstructured":"Luo C, Ji J, Wang Q, Chen X, Li P (2018) Channel state information prediction for 5g wireless communications: a deep learning approach. IEEE Trans Netw Sci Eng 7(1):227\u2013236","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"8324_CR24","doi-asserted-by":"crossref","unstructured":"McLaughlin N, Martinez\u00a0del Rincon J, .\u00a0Kang B, Yerima S, Miller P, Sezer S, .\u00a0Safaei Y, Trickel E, Zhao Z, Doup\u00e9 A, et\u00a0al. (2017) Deep android malware detection. In: Proceedings of the seventh ACM on conference on data and application security and privacy, pp 301\u2013308. ACM, 2017","DOI":"10.1145\/3029806.3029823"},{"key":"8324_CR25","doi-asserted-by":"crossref","unstructured":"Meddeb R, Triki B, Jemili F, Korbaa O (2017). A survey of attacks in mobile AD HOC networks. In: 2017 international conference on engineering & MIS (ICEMIS), pp 1\u20137. IEEE","DOI":"10.1109\/ICEMIS.2017.8273007"},{"key":"8324_CR26","doi-asserted-by":"crossref","unstructured":"Meddeb R, Triki B, Jemili F, Korbaa O (2018). An effective ids against routing attacks on mobile ad-hoc networks. In: New trends in intelligent software methodologies, tools and techniques, 297, 201\u2013214. IOS Press","DOI":"10.1109\/ICEMIS.2017.8273007"},{"key":"8324_CR27","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.procs.2019.09.162","volume":"159","author":"R Meddeb","year":"2019","unstructured":"Meddeb R, Jemili F, Triki B, Korbaa O (2019) Anomaly-based behavioral detection in mobile AD-HOC networks. Proced Comput Sci 159:77\u201386","journal-title":"Proced Comput Sci"},{"key":"8324_CR28","unstructured":"Meddeb R, Triki B, Jemili F, Korbaa O (2019b) Dataset for intrusion detection in mobile ad-hoc networks. In: 19th International conference on intelligent systems design and applications, pp 10\u201320, 2019b"},{"issue":"3","key":"8324_CR29","first-page":"154","volume":"10","author":"S Muruganandam","year":"2022","unstructured":"Muruganandam S, Srinivasan N, Sivaprakasam A (2022) An intelligent method for intrusion detection and prevention in mobile AD HOC networks. Int J Intell Syst Appl Eng 10(3):154\u2013160","journal-title":"Int J Intell Syst Appl Eng"},{"key":"8324_CR30","doi-asserted-by":"crossref","unstructured":"Navabi S, Wang C, Bursalioglu OY, Papadopoulos H (2018) Predicting wireless channel features using neural networks. In: 2018 IEEE international conference on communications, pp 1\u20136. IEEE","DOI":"10.1109\/ICC.2018.8422221"},{"issue":"1","key":"8324_CR31","doi-asserted-by":"publisher","first-page":"115","DOI":"10.3390\/s16010115","volume":"16","author":"FJ Ord\u00f3\u00f1ez","year":"2016","unstructured":"Ord\u00f3\u00f1ez FJ, Roggen D (2016) Deep convolutional and lSTM recurrent neural networks for multimodal wearable activity recognition. Sensors 16(1):115","journal-title":"Sensors"},{"issue":"4","key":"8324_CR32","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1108\/IJIUS-05-2021-0028","volume":"10","author":"S Pamarthi","year":"2022","unstructured":"Pamarthi S, Narmadha R (2022) Literature review on network security in wireless mobile ad-hoc network for IOT applications: network attacks and detection mechanisms. Int J Intel Unmanned Syst 10(4):482\u2013506","journal-title":"Int J Intel Unmanned Syst"},{"issue":"4","key":"8324_CR33","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1007\/s11276-022-02913-1","volume":"28","author":"M Prasad","year":"2022","unstructured":"Prasad M, Tripathi S, Dahal K (2022) An enhanced detection system against routing attacks in mobile ad-hoc network. Wirel Netw 28(4):1411\u20131428","journal-title":"Wirel Netw"},{"key":"8324_CR34","doi-asserted-by":"publisher","first-page":"105760","DOI":"10.1016\/j.engappai.2022.105760","volume":"119","author":"M Prasad","year":"2023","unstructured":"Prasad M, Tripathi S, Dahal K (2023) An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks. Eng Appl Artif Intell 119:105760","journal-title":"Eng Appl Artif Intell"},{"issue":"2","key":"8324_CR35","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.32604\/csse.2023.026137","volume":"44","author":"G Rajeshkumar","year":"2023","unstructured":"Rajeshkumar G, Kumar MV, Kumar KS, Bhatia S, Mashat A, Dadheech P (2023) An improved multi-objective particle swarm optimization routing on manet. Comput Syst Sci Eng 44(2):1187\u20131200","journal-title":"Comput Syst Sci Eng"},{"key":"8324_CR36","unstructured":"Ron X(2015). Deepnet package. URL: https:\/\/cran. r-project. org\/package= deepnet, 2015"},{"key":"8324_CR37","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.neucom.2015.04.101","volume":"172","author":"A Saied","year":"2016","unstructured":"Saied A, Overill RE, Radzik T (2016) Detection of known and unknown DDOS attacks using artificial neural networks. Neurocomputing 172:385\u2013393","journal-title":"Neurocomputing"},{"issue":"3","key":"8324_CR38","first-page":"878","volume":"11","author":"O Sbai","year":"2022","unstructured":"Sbai O, Elboukhari M (2022) Deep learning intrusion detection system for mobile ad hoc networks against flooding attacks. IAES Int J Artif Intell 11(3):878","journal-title":"IAES Int J Artif Intell"},{"key":"8324_CR39","doi-asserted-by":"crossref","unstructured":"Su X, Zhang D, Li W, Zhao K (2016). A deep learning approach to android malware feature learning and detection. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp 244\u2013251. IEEE","DOI":"10.1109\/TrustCom.2016.0070"},{"issue":"4","key":"8324_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3017427","volume":"49","author":"K Tam","year":"2017","unstructured":"Tam K, Feizollah A, Anuar NB, Salleh R, Cavallaro L (2017) The evolution of android malware and android analysis techniques. ACM Comput Surv (CSUR) 49(4):1\u201341","journal-title":"ACM Comput Surv (CSUR)"},{"key":"8324_CR41","doi-asserted-by":"crossref","unstructured":"Teng T, Yang X (2016). Facial expressions recognition based on convolutional neural networks for mobile virtual reality. In: Proceedings of the 15th ACM SIGGRAPH conference on virtual-reality continuum and its applications in industry 1: 475\u2013478,","DOI":"10.1145\/3013971.3014025"},{"issue":"2","key":"8324_CR42","doi-asserted-by":"publisher","first-page":"1337","DOI":"10.32604\/iasc.2023.028425","volume":"35","author":"WG Theresa","year":"2023","unstructured":"Theresa WG, Gayathri A, Rama P (2023) A collaborative approach for secured routing in mobile ad-hoc network. Intell Autom Soft Comput 35(2):1337\u20131351","journal-title":"Intell Autom Soft Comput"},{"key":"8324_CR43","doi-asserted-by":"crossref","unstructured":"Thing V\u00a0L (2017). Ieee 802.11 network anomaly detection and attack classification: a deep learning approach. In: 2017 IEEE wireless communications and networking conference (WCNC), pp 1\u20136. IEEE","DOI":"10.1109\/WCNC.2017.7925567"},{"key":"8324_CR44","doi-asserted-by":"crossref","unstructured":"Wang J , Tang J, Xu Z, Wang Y, Xue G, Zhang X, Yang D (2017) Spatiotemporal modeling and prediction in cellular networks: a big data enabled deep learning approach. In: IEEE INFOCOM 2017-IEEE conference on computer communications, pp 1\u20139. IEEE","DOI":"10.1109\/INFOCOM.2017.8057090"},{"key":"8324_CR45","doi-asserted-by":"crossref","unstructured":"Yousefi-Azar M, Varadharajan V, Hamey L, Tupakula U(2017) Autoencoder-based feature learning for cyber security applications. In: 2017 International joint conference on neural networks (IJCNN), pp 3854\u20133861. IEEE","DOI":"10.1109\/IJCNN.2017.7966342"},{"issue":"10","key":"8324_CR46","doi-asserted-by":"publisher","first-page":"7331","DOI":"10.1109\/TCOMM.2019.2924010","volume":"67","author":"A Zappone","year":"2019","unstructured":"Zappone A, Di Renzo M, Debbah M (2019) Wireless networks design in the era of deep learning: model-based, ai-based, or both? IEEE Trans Commun 67(10):7331\u20137376","journal-title":"IEEE Trans Commun"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-08324-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-023-08324-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-08324-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,6]],"date-time":"2023-06-06T13:52:33Z","timestamp":1686059553000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-023-08324-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,21]]},"references-count":46,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["8324"],"URL":"https:\/\/doi.org\/10.1007\/s00500-023-08324-4","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-1349334\/v1","asserted-by":"object"}]},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,21]]},"assertion":[{"value":"24 April 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}