{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:06:20Z","timestamp":1772910380861,"version":"3.50.1"},"reference-count":80,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T00:00:00Z","timestamp":1714003200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T00:00:00Z","timestamp":1714003200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10207-023-00792-x","type":"journal-article","created":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T05:01:51Z","timestamp":1714021311000},"page":"2457-2487","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8098-7110","authenticated-orcid":false,"given":"N. D.","family":"Patel","sequence":"first","affiliation":[]},{"given":"B. M.","family":"Mehtre","sequence":"additional","affiliation":[]},{"given":"Rajeev","family":"Wankar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,25]]},"reference":[{"key":"792_CR1","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1613\/jair.301","volume":"4","author":"L Kaelbling","year":"1996","unstructured":"Kaelbling, L., Littman, M., Moore, A.: Reinforcement learning: a survey. J. Artif. Intell. Res. 4, 237\u2013285 (1996)","journal-title":"J. Artif. Intell. Res."},{"key":"792_CR2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-31","volume-title":"Intrusion detection systems","author":"R Bace","year":"2001","unstructured":"Bace, R., Mell, P., et al.: Intrusion detection systems. US Department of Commerce, Technology Administration, National Institute of Standards and Technology (2001)"},{"key":"792_CR3","doi-asserted-by":"crossref","unstructured":"Jordan, M., Mitchell, T.: Machine learning: trends, perspectives, and prospects. Science 349, 255\u2013260 (2015)","DOI":"10.1126\/science.aaa8415"},{"key":"792_CR4","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BF02478259","volume":"5","author":"W McCulloch","year":"1943","unstructured":"McCulloch, W., Pitts, W.: A logical calculus of the ideas immanent in nervous activity. Bull. Math. Biophys. 5, 115\u2013133 (1943)","journal-title":"Bull. Math. Biophys."},{"key":"792_CR5","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1037\/h0042519","volume":"65","author":"F Rosenblatt","year":"1958","unstructured":"Rosenblatt, F.: The perceptron: a probabilistic model for information storage and organization in the brain. Psychol. Rev. 65, 386 (1958)","journal-title":"Psychol. Rev."},{"key":"792_CR6","doi-asserted-by":"crossref","unstructured":"Dua, S., Du, X.: Data Mining and Machine Learning in Cybersecurity. CRC Press (2016)","DOI":"10.1201\/b10867"},{"key":"792_CR7","doi-asserted-by":"crossref","unstructured":"Kanimozhi, V., Jacob, T.: Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing. In: 2019 International Conference On Communication And Signal Processing (ICCSP), pp. 0033\u20130036 (2019)","DOI":"10.1109\/ICCSP.2019.8698029"},{"key":"792_CR8","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/65.283931","volume":"8","author":"B Mukherjee","year":"1994","unstructured":"Mukherjee, B., Heberlein, L., Levitt, K.: Network intrusion detection. IEEE Netw. 8, 26\u201341 (1994)","journal-title":"IEEE Netw."},{"key":"792_CR9","unstructured":"Pappas, N.: Network IDS & IPS deployment strategies (2008)"},{"key":"792_CR10","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1109\/TSP.2003.814797","volume":"51","author":"M Thottan","year":"2003","unstructured":"Thottan, M., Ji, C.: Anomaly detection in IP networks. IEEE Trans. Signal Process. 51, 2191\u20132204 (2003)","journal-title":"IEEE Trans. Signal Process."},{"key":"792_CR11","first-page":"229","volume":"99","author":"M Roesch","year":"1999","unstructured":"Roesch, M., et al.: Snort: lightweight intrusion detection for networks. Lisa. 99, 229\u2013238 (1999)","journal-title":"Lisa."},{"key":"792_CR12","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"Ahmed, M., Mahmood, A., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19\u201331 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"792_CR13","doi-asserted-by":"crossref","unstructured":"Charitou, C., Garcez, A., Dragicevic, S.: Semi-supervised GANs for fraud detection. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138 (2020)","DOI":"10.1109\/IJCNN48605.2020.9206844"},{"key":"792_CR14","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., Alazab, M., Soman, K., Poornachandran, P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access. 7, 41525\u201341550 (2019)","journal-title":"IEEE Access."},{"key":"792_CR15","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136 (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"792_CR16","doi-asserted-by":"crossref","unstructured":"Song, J., Takakura, H., Okabe, Y., Eto, M., Inoue, D., Nakao, K.: Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. In: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 29\u201336 (2011)","DOI":"10.1145\/1978672.1978676"},{"key":"792_CR17","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136 (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"792_CR18","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.cose.2018.04.010","volume":"77","author":"R Vijayanand","year":"2018","unstructured":"Vijayanand, R., Devaraj, D., Kannapiran, B.: Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection. Comput. Secur. 77, 304\u2013314 (2018)","journal-title":"Comput. Secur."},{"key":"792_CR19","doi-asserted-by":"crossref","unstructured":"Creech, G., Hu, J.: Generation of a new IDS test dataset: time to retire the KDD collection. In: 2013 IEEE Wireless Communications and Networking Conference (WCNC), pp. 4487\u20134492 (2013)","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"792_CR20","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A., Ghorbani, A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"key":"792_CR21","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Habibi Lashkari, A., Ghorbani, A.: A detailed analysis of the cicids2017 data set. In: International Conference on Information Systems Security and Privacy, pp. 172\u2013188 (2018)","DOI":"10.1007\/978-3-030-25109-3_9"},{"key":"792_CR22","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.icte.2018.04.003","volume":"4","author":"A Shenfield","year":"2018","unstructured":"Shenfield, A., Day, D., Ayesh, A.: Intelligent intrusion detection systems using artificial neural networks. ICT Express 4, 95\u201399 (2018)","journal-title":"ICT Express"},{"key":"792_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11219-022-09587-0","volume":"30","author":"M Catillo","year":"2022","unstructured":"Catillo, M., Del Vecchio, A., Pecchia, A., Villano, U.: Transferability of machine learning models learned from public intrusion detection datasets: the CICIDS2017 case study. Softw. Qual. J. 30, 1\u201327 (2022)","journal-title":"Softw. Qual. J."},{"key":"792_CR24","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/s10207-021-00567-2","volume":"21","author":"M Soltani","year":"2022","unstructured":"Soltani, M., Siavoshani, M., Jahangir, A.: A content-based deep intrusion detection system. Int. J. Inf. Secur. 21, 547\u2013562 (2022)","journal-title":"Int. J. Inf. Secur."},{"key":"792_CR25","doi-asserted-by":"crossref","unstructured":"Kim, D., Nguyen, H., Park, J.: Genetic algorithm to improve SVM based network intrusion detection system. In: 19th International Conference on Advanced Information Networking and Applications (AINA\u201905) Volume 1 (AINA Papers), vol. 2, pp. 155\u2013158 (2005)","DOI":"10.1109\/AINA.2005.191"},{"key":"792_CR26","doi-asserted-by":"crossref","unstructured":"Abd Jalil, K., Kamarudin, M., Masrek, M.: Comparison of machine learning algorithms performance in detecting network intrusion. In: 2010 International Conference on Networking and Information Technology, pp. 221\u2013226 (2010)","DOI":"10.1109\/ICNIT.2010.5508526"},{"key":"792_CR27","unstructured":"Ji, T., Vuppala, S., Chowdhary, G., Driggs-Campbell, K.: Multi-modal anomaly detection for unstructured and uncertain environments. arXiv Preprint ArXiv:2012.08637 (2020)"},{"key":"792_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41, 1\u201358 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"792_CR29","first-page":"176","volume":"5","author":"A Ali","year":"2013","unstructured":"Ali, A., Shamsuddin, S., Ralescu, A.: Classification with class imbalance problem. Int. J. Adv. Soft Comput. Appl. 5, 176\u2013204 (2013)","journal-title":"Int. J. Adv. Soft Comput. Appl."},{"key":"792_CR30","doi-asserted-by":"crossref","unstructured":"Nziga, J., Cannady, J.: Minimal dataset for network intrusion detection systems via MID-PCA: a hybrid approach. In: 2012 6th IEEE International Conference Intelligent Systems, pp. 453\u2013460 (2012)","DOI":"10.1109\/IS.2012.6335176"},{"key":"792_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.20532\/cit.2019.1004591","volume":"27","author":"M Jain","year":"2019","unstructured":"Jain, M., Kaur, G.: A study of feature reduction techniques and classification for network anomaly detection. J. Comput. Inf. Technol. 27, 1\u201316 (2019)","journal-title":"J. Comput. Inf. Technol."},{"key":"792_CR32","unstructured":"Lakhina, S., Joseph, S., Verma, B.: Feature reduction using principal component analysis for effective anomaly-based intrusion detection on NSL-KDD. (Citeseer,2010)"},{"key":"792_CR33","doi-asserted-by":"crossref","unstructured":"Kausar, N., Samir, B., Sulaiman, S., Ahmad, I., Hussain, M.: An approach towards intrusion detection using PCA feature subsets and SVM. In: 2012 International Conference on Computer & Information Science (ICCIS), vol. 2, pp. 569\u2013574 (2012)","DOI":"10.1109\/ICCISci.2012.6297095"},{"key":"792_CR34","doi-asserted-by":"crossref","unstructured":"Cieslak, D., Chawla, N., Striegel, A.: Combating imbalance in network intrusion datasets. In: GrC, pp. 732\u2013737 (2006)","DOI":"10.1109\/GRC.2006.1635905"},{"key":"792_CR35","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s10207-020-00508-5","volume":"20","author":"S Mighan","year":"2021","unstructured":"Mighan, S., Kahani, M.: A novel scalable intrusion detection system based on deep learning. Int. J. Inf. Secur. 20, 387\u2013403 (2021)","journal-title":"Int. J. Inf. Secur."},{"key":"792_CR36","doi-asserted-by":"crossref","unstructured":"Tesfahun, A., Bhaskari, D.: Intrusion detection using random forests classifier with SMOTE and feature reduction. In: 2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies, pp. 127\u2013132 (2013)","DOI":"10.1109\/CUBE.2013.31"},{"key":"792_CR37","doi-asserted-by":"publisher","first-page":"794","DOI":"10.3390\/app10030794","volume":"10","author":"D Gonzalez-Cuautle","year":"2020","unstructured":"Gonzalez-Cuautle, D., Hernandez-Suarez, A., Sanchez-Perez, G., Toscano-Medina, L., Portillo-Portillo, J., Olivares-Mercado, J., Perez-Meana, H., Sandoval-Orozco, A.: Synthetic minority oversampling technique for optimizing classification tasks in botnet and intrusion-detection-system datasets. Appl. Sci. 10, 794 (2020)","journal-title":"Appl. Sci."},{"key":"792_CR38","doi-asserted-by":"publisher","first-page":"52843","DOI":"10.1109\/ACCESS.2018.2869577","volume":"6","author":"M Al-Qatf","year":"2018","unstructured":"Al-Qatf, M., Lasheng, Y., Al-Habib, M., Al-Sabahi, K.: Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access 6, 52843\u201352856 (2018)","journal-title":"IEEE Access"},{"key":"792_CR39","doi-asserted-by":"crossref","unstructured":"Chen, Z., Yeo, C., Lee, B., Lau, C.: Autoencoder-based network anomaly detection. In: 2018 Wireless Telecommunications Symposium (WTS), pp. 1\u20135 (2018)","DOI":"10.1109\/WTS.2018.8363930"},{"key":"792_CR40","doi-asserted-by":"crossref","unstructured":"Squartini, S., Hussain, A., Piazza, F.: Preprocessing based solution for the vanishing gradient problem in recurrent neural networks. In: Proceedings of the 2003 International Symposium on Circuits and Systems. ISCAS\u201903, vol. 5, p. V (2003)","DOI":"10.1109\/ISCAS.2003.1206412"},{"key":"792_CR41","unstructured":"Rosenblatt, F.: The perceptron, a perceiving and recognizing automaton Project Para. Cornell Aeronautical Laboratory (1957)"},{"key":"792_CR42","unstructured":"Ranganathan, V., Natarajan, S.: A new backpropagation algorithm without gradient descent. arXiv Preprint arXiv:1802.00027 (2018)"},{"key":"792_CR43","unstructured":"Agarap, A.: Deep learning using rectified linear units (ReLU). arXiv Preprint arXiv:1803.08375 (2018)"},{"key":"792_CR44","unstructured":"Weisstein, E.: Heaviside step function. https:\/\/mathworld.wolfram.com\/ (2002)"},{"key":"792_CR45","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1093\/aob\/mcg029","volume":"91","author":"X Yin","year":"2003","unstructured":"Yin, X., Goudriaan, J., Lantinga, E., Vos, J., Spiertz, H.: A flexible sigmoid function of determinate growth. Ann. Bot. 91, 361\u2013371 (2003)","journal-title":"Ann. Bot."},{"key":"792_CR46","doi-asserted-by":"crossref","unstructured":"Zamanlooy, B., Mirhassani, M.: Efficient VLSI implementation of neural networks with hyperbolic tangent activation function. IEEE Trans. Very Large Scale Integr. VLSI Syst. 22, 39\u201348 (2013)","DOI":"10.1109\/TVLSI.2012.2232321"},{"key":"792_CR47","unstructured":"Nair, V., Hinton, G.: Rectified linear units improve restricted Boltzmann machines. In: ICML (2010)"},{"key":"792_CR48","unstructured":"Hendrycks, D., Gimpel, K.: Gaussian error linear units (GELUs). arXiv Preprint arXiv:1606.08415 (2016)"},{"key":"792_CR49","unstructured":"Glorot, X., Bordes, A., Bengio, Y.: Deep sparse rectifier neural networks. In: Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics, pp. 315\u2013323 (2011)"},{"key":"792_CR50","unstructured":"Clevert, D., Unterthiner, T., Hochreiter, S.: Fast and accurate deep network learning by exponential linear units (ELUs). arXiv Preprint arXiv:1511.07289 (2015)"},{"key":"792_CR51","unstructured":"Klambauer, G., Unterthiner, T., Mayr, A., Hochreiter, S.: Self-normalizing neural networks. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"key":"792_CR52","first-page":"3","volume":"30","author":"A Maas","year":"2013","unstructured":"Maas, A., Hannun, A., Ng, A., et al.: Rectifier nonlinearities improve neural network acoustic models. Proc. ICML 30, 3 (2013)","journal-title":"Proc. ICML"},{"key":"792_CR53","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Delving deep into rectifiers: Surpassing human-level performance on imagenet classification. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1026\u20131034 (2015)","DOI":"10.1109\/ICCV.2015.123"},{"key":"792_CR54","unstructured":"Mish, M.D.: A self regularized non-monotonic activation function. arXiv Preprint arXiv:1908.08681 (2019)"},{"key":"792_CR55","doi-asserted-by":"publisher","first-page":"5374","DOI":"10.1364\/AO.46.005374","volume":"46","author":"N Hagen","year":"2007","unstructured":"Hagen, N., Kupinski, M., Dereniak, E.: Gaussian profile estimation in one dimension. Appl. Opt. 46, 5374\u20135383 (2007)","journal-title":"Appl. Opt."},{"key":"792_CR56","unstructured":"Noel, M., Trivedi, A., Dutta, P., et\u00a0al.: Growing cosine unit: a novel oscillatory activation function that can speedup training and reduce parameters in convolutional neural networks. arXiv Preprint arXiv:2108.12943 (2021)"},{"key":"792_CR57","unstructured":"Noel, M., Bharadwaj, S., Muthiah-Nakarajan, V., Dutta, P., Amali, G.: Biologically inspired oscillating activation functions can bridge the performance gap between biological and artificial neurons. arXiv Preprint arXiv:2111.04020 (2021)"},{"key":"792_CR58","unstructured":"Hettich, S.: KDD cup 1999 data. The UCI KDD Archive (1999)"},{"key":"792_CR59","unstructured":"CSE-CIC-IDS2018 on AWS. Canadian Institute for Cybersecurity. https:\/\/www.unb.ca\/cic\/datasets\/ids-2018.html (2018)"},{"key":"792_CR60","doi-asserted-by":"crossref","unstructured":"Ullah, I., Mahmoud, Q.: A scheme for generating a dataset for anomalous activity detection in IoT networks. In: Canadian Conference on Artificial Intelligence, pp. 508\u2013520 (2020)","DOI":"10.1007\/978-3-030-47358-7_52"},{"key":"792_CR61","first-page":"33","volume":"6","author":"E Codd","year":"1972","unstructured":"Codd, E.: Further normalization of the data base relational model. Data Base Syst. 6, 33\u201364 (1972)","journal-title":"Data Base Syst."},{"key":"792_CR62","first-page":"479","volume":"7","author":"R Panigrahi","year":"2018","unstructured":"Panigrahi, R., Borah, S.: A detailed analysis of CICIDS2017 dataset for designing intrusion detection systems. Int. J. Eng. Technol. 7, 479\u2013482 (2018)","journal-title":"Int. J. Eng. Technol."},{"key":"792_CR63","doi-asserted-by":"crossref","unstructured":"Azizjon, M., Jumabek, A., Kim, W.: 1D CNN based network intrusion detection with normalization on imbalanced data. In: 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), pp. 218\u2013224 (2020)","DOI":"10.1109\/ICAIIC48513.2020.9064976"},{"key":"792_CR64","first-page":"4519","volume":"97","author":"M Abdulraheem","year":"2019","unstructured":"Abdulraheem, M., Ibraheem, N.: A detailed analysis of new intrusion detection dataset. J. Theor. Appl. Inf. Technol. 97, 4519\u20134537 (2019)","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"792_CR65","unstructured":"Transform features using quantiles information, scikit-learn 1.0.2. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.preprocessing.quantile_transform.html"},{"key":"792_CR66","doi-asserted-by":"crossref","unstructured":"Pan, V., Chen, Z.: The complexity of the matrix eigenproblem. In: Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, pp. 507\u2013516 (1999)","DOI":"10.1145\/301250.301389"},{"key":"792_CR67","doi-asserted-by":"crossref","unstructured":"Li, X., Yi, P., Wei, W., Jiang, Y., Tian, L.: LNNLS-KH: a feature selection method for network intrusion detection. Secur. Commun. Netw. 2021 (2021)","DOI":"10.1155\/2021\/8830431"},{"key":"792_CR68","doi-asserted-by":"crossref","unstructured":"Aamir, M., Zaidi, S.: Clustering based semi-supervised machine learning for DDoS attack classification. J. King Saud Univ. Comput. Inf. Sci. 33, 436\u2013446 (2021)","DOI":"10.1016\/j.jksuci.2019.02.003"},{"key":"792_CR69","doi-asserted-by":"publisher","first-page":"219","DOI":"10.3390\/electronics9020219","volume":"9","author":"S Bhattacharya","year":"2020","unstructured":"Bhattacharya, S., Maddikunta, P., Kaluri, R., Singh, S., Gadekallu, T., Alazab, M., Tariq, U., et al.: A novel PCA-firefly based XGBoost classification model for intrusion detection in networks using GPU. Electronics 9, 219 (2020)","journal-title":"Electronics"},{"key":"792_CR70","doi-asserted-by":"crossref","unstructured":"Dey, A., Hossain, M., Hoq, M., Majumdar, S., et\u00a0al.: Towards an attention-based accurate intrusion detection approach. In: International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, pp. 261\u2013279 (2021)","DOI":"10.1007\/978-3-030-91424-0_16"},{"key":"792_CR71","doi-asserted-by":"publisher","first-page":"185384","DOI":"10.1109\/ACCESS.2020.3029100","volume":"8","author":"L Sun","year":"2020","unstructured":"Sun, L., Zhou, Y., Wang, Y., Zhu, C., Zhang, W.: The effective methods for intrusion detection with limited network attack data: multi-task learning and oversampling. IEEE Access 8, 185384\u2013185398 (2020)","journal-title":"IEEE Access"},{"key":"792_CR72","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1007\/s10207-019-00482-7","volume":"19","author":"K Sethi","year":"2020","unstructured":"Sethi, K., Sai Rupesh, E., Kumar, R., Bera, P., Venu Madhav, Y.: A context-aware robust intrusion detection system: a reinforcement learning-based approach. Int. J. Inf. Secur. 19, 657\u2013678 (2020)","journal-title":"Int. J. Inf. Secur."},{"key":"792_CR73","unstructured":"JMP Statistical Discovery, SAS Institute. https:\/\/www.jmp.com\/en_in\/software\/data-analysis-software.html (2021)"},{"key":"792_CR74","unstructured":"Chollet, F., et\u00a0al.: Keras. GitHub (2015). https:\/\/github.com\/fchollet\/keras"},{"key":"792_CR75","unstructured":"Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., Corrado, G., Davis, A., Dean, J., Devin, M., et\u00a0al.: Tensorflow: large-scale machine learning on heterogeneous distributed systems. arXiv Preprint arXiv:1603.04467 (2016)"},{"key":"792_CR76","doi-asserted-by":"crossref","unstructured":"Davis, J., Goadrich, M.: The relationship between Precision-Recall and ROC curves. In: Proceedings of the 23rd International Conference on Machine Learning (2006)","DOI":"10.1145\/1143844.1143874"},{"key":"792_CR77","doi-asserted-by":"crossref","unstructured":"Farahani, G.: Feature selection based on cross-correlation for the intrusion detection system. Secur. Commun. Netw. 2020 (2020)","DOI":"10.1155\/2020\/8875404"},{"key":"792_CR78","doi-asserted-by":"publisher","first-page":"265","DOI":"10.3390\/make1010017","volume":"1","author":"W Zegeye","year":"2018","unstructured":"Zegeye, W., Dean, R., Moazzami, F.: Multi-layer hidden Markov model based intrusion detection system. Mach. Learn. Knowl. Extr. 1, 265\u2013286 (2018)","journal-title":"Mach. Learn. Knowl. Extr."},{"key":"792_CR79","doi-asserted-by":"crossref","unstructured":"Roopak, M., Tian, G., Chambers, J.: Deep learning models for cyber security in IoT networks. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0452\u20130457 (2019)","DOI":"10.1109\/CCWC.2019.8666588"},{"key":"792_CR80","doi-asserted-by":"crossref","unstructured":"Li, Y., Xu, Y., Liu, Z., Hou, H., Zheng, Y., Xin, Y., Zhao, Y., Cui, L.: Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement 154, 107450 (2020)","DOI":"10.1016\/j.measurement.2019.107450"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00792-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00792-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00792-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,17]],"date-time":"2024-11-17T00:13:12Z","timestamp":1731802392000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00792-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,25]]},"references-count":80,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["792"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00792-x","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,25]]},"assertion":[{"value":"25 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}