{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T13:55:13Z","timestamp":1764424513395,"version":"3.46.0"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"34","license":[{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"This study was supported by the General Research Projects of Hunan Provincial Department of Education","award":["No.23C0358"],"award-info":[{"award-number":["No.23C0358"]}]},{"name":"the Hunan Provincial Key Laboratory of Intelligent Protection and Utilization Technology in Masonry Artifacts"},{"name":"the Computer science and technology 14th Five-Year application characteristic discipline."}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s00521-025-11285-4","type":"journal-article","created":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T18:13:12Z","timestamp":1748023992000},"page":"28465-28478","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Network security threat detection model based on large-scale multi-source data analysis and perception fusion"],"prefix":"10.1007","volume":"37","author":[{"given":"Ruige","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2452-9900","authenticated-orcid":false,"given":"Li","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,23]]},"reference":[{"issue":"3","key":"11285_CR1","doi-asserted-by":"publisher","first-page":"1963","DOI":"10.1109\/TII.2019.2938778","volume":"16","author":"Z Tian","year":"2019","unstructured":"Tian Z, Luo C, Qiu J, Du X, Guizani M (2019) A distributed deep learning system for web attack detection on edge devices. IEEE Trans Industr Inf 16(3):1963\u20131971","journal-title":"IEEE Trans Industr Inf"},{"key":"11285_CR2","doi-asserted-by":"publisher","first-page":"14925","DOI":"10.1007\/s00521-024-09863-z","volume":"36","author":"G Nguyen","year":"2024","unstructured":"Nguyen G, Dlugolinsky S, Tran V et al (2024) Network security AIOps for online stream data monitoring. Neural Comput Applic 36:14925\u201314949","journal-title":"Neural Comput Applic"},{"issue":"3","key":"11285_CR3","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","volume":"21","author":"N Chaabouni","year":"2019","unstructured":"Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutor 21(3):2671\u20132701","journal-title":"IEEE Commun Surv Tutor"},{"issue":"7","key":"11285_CR4","doi-asserted-by":"publisher","first-page":"4362","DOI":"10.1109\/TII.2019.2891261","volume":"15","author":"F Zhang","year":"2019","unstructured":"Zhang F, Kodituwakku HADE, Hines JW, Coble J (2019) Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data. IEEE Trans Industr Inf 15(7):4362\u20134369","journal-title":"IEEE Trans Industr Inf"},{"issue":"2","key":"11285_CR5","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/LNET.2019.2901792","volume":"1","author":"S Otoum","year":"2019","unstructured":"Otoum S, Kantarci B, Mouftah HT (2019) On the feasibility of deep learning in sensor network intrusion detection. IEEE Netw Lett 1(2):68\u201371","journal-title":"IEEE Netw Lett"},{"issue":"2","key":"11285_CR6","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s12083-017-0630-0","volume":"12","author":"N Sultana","year":"2019","unstructured":"Sultana N, Chilamkurti N, Peng W, Alhadad R (2019) Survey on SDN based network intrusion detection system using machine learning approaches. Peer-to-Peer Netw Appl 12(2):493\u2013501","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"9","key":"11285_CR7","doi-asserted-by":"publisher","first-page":"5672","DOI":"10.1109\/TITS.2020.2988801","volume":"22","author":"P Wang","year":"2020","unstructured":"Wang P, Lai J, Huang Z, Tan Q, Lin T (2020) Estimating traffic flow in large road networks based on multi-source traffic data. IEEE Trans Intell Transp Syst 22(9):5672\u20135683","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"11285_CR8","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/s43926-025-00106-8","volume":"5","author":"DM Amitu","year":"2025","unstructured":"Amitu DM, Akol RN, Serugunda J (2025) Hybrid access control mechanism for massive machine type communications. Discov Internet Things 5:30","journal-title":"Discov Internet Things"},{"issue":"9","key":"11285_CR9","doi-asserted-by":"publisher","first-page":"1853","DOI":"10.1080\/13658816.2022.2087222","volume":"36","author":"F Gao","year":"2022","unstructured":"Gao F, Yue P, Cao Z, Zhao S, Shangguan B, Jiang L et al (2022) A multi-source spatio-temporal data cube for large-scale geospatial analysis. Int J Geogr Inf Sci 36(9):1853\u20131884","journal-title":"Int J Geogr Inf Sci"},{"issue":"1","key":"11285_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s11769-022-1320-2","volume":"33","author":"B Xue","year":"2023","unstructured":"Xue B, Xiao X, Li J, Zhao B, Fu B (2023) Multi-source data-driven identification of urban functional areas: a case of Shenyang. China Chinese Geograp Sci 33(1):21\u201335","journal-title":"China Chinese Geograp Sci"},{"issue":"5","key":"11285_CR11","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1080\/13658816.2018.1563302","volume":"33","author":"J Lin","year":"2019","unstructured":"Lin J, Wu Z, Li X (2019) Measuring inter-city connectivity in an urban agglomeration based on multi-source data. Int J Geogr Inf Sci 33(5):1062\u20131081","journal-title":"Int J Geogr Inf Sci"},{"issue":"4","key":"11285_CR12","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1080\/2150704X.2020.1714772","volume":"11","author":"X Zhao","year":"2020","unstructured":"Zhao X, Liang Y, Guo AJX, Zhu F (2020) Classification of small-scale hyperspectral images with multi-source deep transfer learning. Remote Sens Lett 11(4):303\u2013312","journal-title":"Remote Sens Lett"},{"issue":"2","key":"11285_CR13","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1007\/s10462-017-9611-1","volume":"52","author":"J Nalepa","year":"2019","unstructured":"Nalepa J, Kawulok M (2019) Selecting training sets for support vector machines: a review. Artif Intell Rev 52(2):857\u2013900","journal-title":"Artif Intell Rev"},{"key":"11285_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJIIT.370967","volume":"21","author":"R Parthasarathy","year":"2025","unstructured":"Parthasarathy R et al (2025) STRIFE: a socio-technical framework for threat modeling of artificial intelligence systems. Int J Intell Inf Technol (IJIIT) 21:1\u201332","journal-title":"Int J Intell Inf Technol (IJIIT)"},{"issue":"1","key":"11285_CR15","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.ijforecast.2021.05.002","volume":"38","author":"V Kutateladze","year":"2022","unstructured":"Kutateladze V (2022) The kernel trick for nonlinear factor modeling. Int J Forecast 38(1):165\u2013177","journal-title":"Int J Forecast"},{"issue":"4","key":"11285_CR16","doi-asserted-by":"publisher","first-page":"1891","DOI":"10.1080\/03610918.2019.1689267","volume":"51","author":"J Shabbir","year":"2022","unstructured":"Shabbir J, Ahmed A (2022) Estimation of interquartile range in stratified sampling under non-linear cost function. Commun Stat-Simul Comput 51(4):1891\u20131898","journal-title":"Commun Stat-Simul Comput"},{"issue":"1","key":"11285_CR17","doi-asserted-by":"publisher","first-page":"56","DOI":"10.38094\/jastt1224","volume":"1","author":"R Zebari","year":"2020","unstructured":"Zebari R, Abdulazeez A, Zeebaree D, Zebari D, Saeed J (2020) A comprehensive review of dimensionality reduction techniques for feature selection and feature extraction. J Appl Sci Technol Trends 1(1):56\u201370","journal-title":"J Appl Sci Technol Trends"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-025-11285-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-025-11285-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-025-11285-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T13:51:17Z","timestamp":1764424277000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-025-11285-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,23]]},"references-count":17,"journal-issue":{"issue":"34","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["11285"],"URL":"https:\/\/doi.org\/10.1007\/s00521-025-11285-4","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2025,5,23]]},"assertion":[{"value":"11 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflicts of interest regarding the publication of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}