{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:14:08Z","timestamp":1774455248384,"version":"3.50.1"},"reference-count":126,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T00:00:00Z","timestamp":1722556800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T00:00:00Z","timestamp":1722556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s10207-024-00896-y","type":"journal-article","created":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T12:58:54Z","timestamp":1722603534000},"page":"3433-3463","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["RETRACTED ARTICLE: Deep learning based\n            network intrusion detection system: a systematic literature review and future\n            scopes"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4881-1622","authenticated-orcid":false,"family":"Yogesh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4618-0281","authenticated-orcid":false,"given":"Lalit Mohan","family":"Goyal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,2]]},"reference":[{"key":"896_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compeleceng.2021.107094","volume":"92","author":"JS Abbasi","year":"2021","unstructured":"Abbasi, J.S., Bashir, F., Qureshi, K.N., Islam, M.N., Jeon, G.:\n                    Deep learning-based feature extraction and optimizing pattern matching for\n                    intrusion detection using finite state machine. Comput. Electr. Eng. 92, 1\u201312 (2021). https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107094","journal-title":"Comput. Electr. Eng."},{"key":"896_CR2","doi-asserted-by":"publisher","unstructured":"Abdulganiyu, O.H., Tchakoucht, T.A., Saheed, Y.K.: A systematic\n                    literature review for network intrusion detection system (IDS). Int. J. Inf.\n                    Secur. 1\u201338 (2023). https:\/\/doi.org\/10.1007\/s10207-023-00682-2","DOI":"10.1007\/s10207-023-00682-2"},{"key":"896_CR3","doi-asserted-by":"publisher","unstructured":"Ahmad, Z., Khan, A.S., Shiang, C.W., Abdullah, J., Ahmad, F.:\n                    Network Intrusion Detection System: A systematic study of machine learning and\n                    deep learning approaches. Trans. Emerg. Telecommunications Technol. 1\u201329\n                    (2020). https:\/\/doi.org\/10.1002\/ett.4150","DOI":"10.1002\/ett.4150"},{"key":"896_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compeleceng.2022.108455","volume":"104","author":"MY Aldarwbi","year":"2022","unstructured":"Aldarwbi, M.Y., Lashkari, A.H., Ghorbani, A.A.: The sound of\n                    intrusion: A novel intrusion detection system. Comput. Electr. Eng. 104, 1\u201312 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108455","journal-title":"Comput. Electr. Eng."},{"key":"896_CR5","doi-asserted-by":"crossref","unstructured":"Al-Hawawreh, M., Sitnikova, E., Aboutorabb, N.: X-IIoTID: A\n                    connectivity-agnostic and device-agnostic Intrusion Data Set for Industrial\n                    Internet of things. IEEE Internet Things J., 3962\u20133977.\n                    (2022)","DOI":"10.1109\/JIOT.2021.3102056"},{"key":"896_CR6","doi-asserted-by":"publisher","unstructured":"Almomani, I., Kasabeh, B.A., Al-Akhras, M.: WSN-DS: A dataset for\n                    intrusion detection systems in Wireless Sensor Networks. J. Sens. 1\u201317\n                    (2016). https:\/\/doi.org\/10.1155\/2016\/4731953","DOI":"10.1155\/2016\/4731953"},{"issue":"3","key":"896_CR7","doi-asserted-by":"publisher","first-page":"66828","DOI":"10.1109\/ACCESS\/2023.3287896","volume":"11","author":"L Almutairi","year":"2023","unstructured":"Almutairi, L., Daniel, R., Khasimbee, S., Lydia, E.L., Acharya, S.,\n                    Kim, H.-I.: Quantam Dwarf Mongoose Optimization with Ensemble Deep Learning\n                    based intrusion detection in Cyber-physical systems. IEEE Access. 11(3), 66828\u201366837 (2023). https:\/\/doi.org\/10.1109\/ACCESS\/2023.3287896","journal-title":"IEEE Access."},{"key":"896_CR8","doi-asserted-by":"publisher","unstructured":"Alotaibi, S.D., Yadav, K., Aledaily, A.N., Alkwai, L.M., Dafhalla,\n                    A.K.Y., Almansour, S., Lingamuthu, V.: Deep neural network-based intrusion\n                    detection system through PCA. Math. Probl. Eng. 1\u20139 (2022). https:\/\/doi.org\/10.1155\/2022\/6488571","DOI":"10.1155\/2022\/6488571"},{"key":"896_CR9","doi-asserted-by":"publisher","first-page":"52843","DOI":"10.1109\/ACCESS.2018.2869577","volume":"6","author":"M Al-Qatf","year":"2018","unstructured":"Al-Qatf, M., Lasheng, Y., Al-Habib, M., Al-Sabahi, K.: Deep\n                    Learning Approach combining sparse autoencoder with SVM for Network Intrusion\n                    Detection. IEEE Access. 6, 52843\u201352856\n                    (2018)","journal-title":"IEEE Access."},{"key":"896_CR10","doi-asserted-by":"crossref","unstructured":"Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, A.:\n                    TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for\n                    Data-Driven Intrusion Detect. Syst. IEEE Access., 165130\u2013165150.\n                    (2020)","DOI":"10.1109\/ACCESS.2020.3022862"},{"key":"896_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jestch2022.101322","volume":"38","author":"HC Altunay","year":"2023","unstructured":"Altunay, H.C., Albayrak, Z.: A hybrid\n                    CNN\u2009+\u2009LSTM -based intrusion detection system for industrial\n                    IoT networks. Eng. Sci. Technol. 38,\n                    1\u201313 (2023). https:\/\/doi.org\/10.1016\/j.jestch2022.101322","journal-title":"Eng. Sci. Technol."},{"key":"896_CR12","doi-asserted-by":"crossref","unstructured":"Alyousuf, M.Y., Abdelmajeeb, N.T.: Dynamically Detecting Security\n                    Threats and Updating a Signature-Based Intrusion Detection System\u2019s\n                    Database. In 23rd International Conference on Knowledge-Based and Intelligent\n                    Information & Engineering Systems, Procedia Computer Science, 159,\n                    1507\u20131516. (2019)","DOI":"10.1016\/j.procs.2019.09.321"},{"key":"896_CR13","doi-asserted-by":"crossref","unstructured":"Ashiku, L., Dagli, C.: Network Intrusion Detection System using\n                    Deep Learning. In Complex Adaptive System Conference Theme: Big Data, IoT, and\n                    AI for a Smarter Future, 239\u2013247. (Elsevier) (2021)","DOI":"10.1016\/j.procs.2021.05.025"},{"key":"896_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.iot.2023.100936","volume":"24","author":"SA Bakhsh","year":"2023","unstructured":"Bakhsh, S.A., Khan, M.A., Ahmed, F., Alshehri, M.S., Ali, H.,\n                    Ahmad, J.: Enhancing IoT network security through deep learning-powered\n                    intrusion detection system. Internet Things. 24, 1\u201336 (2023). https:\/\/doi.org\/10.1016\/j.iot.2023.100936","journal-title":"Internet Things"},{"key":"896_CR15","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.pattrec.2022.02.013","volume":"56","author":"E Balamurgan","year":"2022","unstructured":"Balamurgan, E., Mehbodniya, A., Kariri, E., Yadav, K., Kumar, A.,\n                    Haq, M.A.: Network optimization using defender system in cloud computing\n                    security-based intrusion detection system with game theory deep neural network\n                    (IDSGT-DNN). Pattern Recognit. Lett. 56,\n                    142\u2013151 (2022). https:\/\/doi.org\/10.1016\/j.pattrec.2022.02.013","journal-title":"Pattern Recognit. Lett."},{"key":"896_CR16","doi-asserted-by":"publisher","first-page":"4813","DOI":"10.1007\/s00521-021-06011-9","volume":"35","author":"A Basati","year":"2021","unstructured":"Basati, A., Faghih, M.M.: APAE: An IoT intrusion detection system\n                    using asymmetric parallel auto-encoder. Neural Comput. Appl. 35, 4813\u20134833 (2021). https:\/\/doi.org\/10.1007\/s00521-021-06011-9","journal-title":"Neural Comput. Appl."},{"key":"896_CR17","doi-asserted-by":"publisher","DOI":"10.1145\/3344382","author":"RA Bridges","year":"2019","unstructured":"Bridges, R.A., Tarrah, G.-V.R., Iannacone, M.D., Vincent, M.S.,\n                    Chen, Q.: ACM Comput. Surveys. 52(6),\n                    1\u201335 (2019). https:\/\/doi.org\/10.1145\/3344382 A Survey of Intrusion Detection Systems Leveraging Host\n                    Data"},{"key":"896_CR18","doi-asserted-by":"publisher","unstructured":"Cao, B., Li, C., Song, Y., Fan, X.: Network Intrusion Detection\n                    Technology Based on Convolutional Neural Network and BiGRU. Comput. Intell.\n                    Neurosci. 1\u201320 (2022). https:\/\/doi.org\/10.1155\/2022\/1942847","DOI":"10.1155\/2022\/1942847"},{"key":"896_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.knosys.2022.108505","volume":"244","author":"Y Chen","year":"2022","unstructured":"Chen, Y., Lin, Q., Wei, W., Ji, J., Wong, Coello, K.-C., C.A.C:\n                    Intrusion detection using multi-objective evolutionary convolutional neural\n                    network for internet of things in Fog Computing. Knowl. Based Syst. 244, 1\u201314 (2022). https:\/\/doi.org\/10.1016\/j.knosys.2022.108505","journal-title":"Knowl. Based Syst."},{"key":"896_CR20","unstructured":"CIC-Darknet: (2020). https:\/\/www.unb.ca\/cic\/datasets\/darknet2020.html, last accessed 10th April 2024"},{"key":"896_CR21","unstructured":"CIC-DDoS: (2019). https:\/\/www.unb.ca\/cic\/datasets\/ddos-2019.html, last accessed 12th April 2024"},{"key":"896_CR22","unstructured":"CIC-IDS: (2017). https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html, last accessed 12th April 2024"},{"key":"896_CR23","unstructured":"CIC-IoT22: (2024). https:\/\/www.unb.ca\/cic\/datasets\/iotdataset-2022.html, last accessed 15th"},{"key":"896_CR24","unstructured":"CSE-CIC-IDS: https:\/\/www.unb.ca\/cic\/datasets\/ids-2018.html, (2018). last accessed 18th April 2024."},{"key":"896_CR25","unstructured":"CSIC-: (2010). https:\/\/www\/isi.csic.es\/dataset, last accessed 30th March 2024"},{"issue":"9","key":"896_CR26","doi-asserted-by":"publisher","first-page":"2512","DOI":"10.1109\/TPDS.2023.3290650","volume":"34","author":"J Cui","year":"2023","unstructured":"Cui, J., Sun, H., Zhong, H., Zhang, J., Wei, L., Bolodurina, I.,\n                    He, D.: Collaborative intrusion detection system for SDVN: A Fairness Federated\n                    Deep Learning Approach. IEEE Trans. Parallel Distrib. Syst. 34(9), 2512\u20132528 (2023)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"16","key":"896_CR27","doi-asserted-by":"publisher","first-page":"14438","DOI":"10.1109\/JIOT.2021.3078292","volume":"9","author":"T-N Dao","year":"2021","unstructured":"Dao, T.-N., Lee, H.: Stacked autoencoder-based Probabilistic\n                    feature extraction for On-Device Network Intrusion Detection. IEEE Internet\n                    Things J. 9(16), 14438\u201314451\n                    (2021)","journal-title":"IEEE Internet Things J."},{"key":"896_CR28","doi-asserted-by":"publisher","unstructured":"Deng, H., Yang, H.: Network Intrusion Detection based on sparse\n                    autoencoder and IGA-BP network. Wirel. Communication Mob. Comput. 1\u201311\n                    (2021). https:\/\/doi.org\/10.1155\/2021\/9510858","DOI":"10.1155\/2021\/9510858"},{"issue":"1","key":"896_CR29","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1109\/TNSM.2022.3213807","volume":"20","author":"X Deng","year":"2023","unstructured":"Deng, X., Zhu, J., Pei, X., Zhang, L., Ling, Z.: Flow\n                    Topology-based graph Convolutional Network for Intrusion Detection in\n                    label-limited IoT networks. IEEE Trans. Netw. Serv. Manage. 20(1), 684\u2013696 (2023)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"896_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2020.100317","volume":"39","author":"P Dixit","year":"2021","unstructured":"Dixit, P., Silakari, S.: Deep learning algorithms for Cybersecurity\n                    Applications: A Technological and Status Review. Comput. Sci. Rev. 39, 1\u201315 (2021). https:\/\/doi.org\/10.1016\/j.cosrev.2020.100317","journal-title":"Comput. Sci. Rev."},{"key":"896_CR31","doi-asserted-by":"crossref","unstructured":"Dong, B., Wang, X.: Comparison Deep Learning Method to Traditional\n                    Methods Using for Network Intrusion Detection. In 2016 8th IEEE International\n                    Conference on Communication Software and Networks, 581\u2013585. (IEEE)\n                    (2016)","DOI":"10.1109\/ICCSN.2016.7586590"},{"key":"896_CR32","unstructured":"DS2OS: (2024). https:\/\/www\/kaggle.com\/datasets\/francoisxa\/ds2ostraffictraces, last accessed 30th"},{"key":"896_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compeleceng.2022.108190","volume":"102","author":"MA Elaveini","year":"2022","unstructured":"Elaveini, M.A., Simon, J., Kapileswar, N., Polasi, P.K.: Hybrid\n                    intrusion detection system for wireless IoT networks using deep learning\n                    algorithm. Comput. Electr. Eng. 102,\n                    1\u201311 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108190","journal-title":"Comput. Electr. Eng."},{"key":"896_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comnet.2019.107042","volume":"168","author":"W Elmasry","year":"2020","unstructured":"Elmasry, W., Akbulut, A., Zaim, A.H.: Evolving deep learning\n                    architectures for network intrusion detection using a double PSO metaheuristic.\n                    Comput. Netw. 168, 1\u201321 (2020). https:\/\/doi.org\/10.1016\/j.comnet.2019.107042","journal-title":"Comput. Netw."},{"key":"896_CR35","doi-asserted-by":"crossref","unstructured":"Elsayed, M.S., Le-Khac, N.A., Jurcut, A.D.: InSDN: A Novel SDN\n                    Intrusion Dataset, pp. 165263\u2013165284. IEEE Access\n                    (2020)","DOI":"10.1109\/ACCESS.2020.3022633"},{"key":"896_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jisa.2019.102419","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep\n                    learning for cyber security intrusion detection: Approaches, datasets, and\n                    comparative study. J. Inform. Secur. Appl. 50,\n                    1\u201319 (2020). https:\/\/doi.org\/10.1016\/j.jisa.2019.102419","journal-title":"J. Inform. Secur. Appl."},{"key":"896_CR37","doi-asserted-by":"publisher","unstructured":"Fu, Z.: Computer Network Intrusion Anomaly Detection with recurrent\n                    neural network. Mob. Inform. Syst. 1\u201311 (2022). https:\/\/doi.org\/10.1155\/2022\/6576023","DOI":"10.1155\/2022\/6576023"},{"key":"896_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2020.102767","volume":"169","author":"S Gamage","year":"2020","unstructured":"Gamage, S., Samarabandu, J.: Deep learning methods in network\n                    intrusion detection: A survey and an objective comparison. J. Netw. Comput.\n                    Appl. 169, 1\u201321 (2020). https:\/\/doi.org\/10.1016\/j.jnca.2020.102767","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"896_CR39","doi-asserted-by":"publisher","first-page":"14","DOI":"10.9734\/ajrcos\/2021\/v7i430185","volume":"7","author":"M Ghurab","year":"2021","unstructured":"Ghurab, M., Gaphari, G., Alshami, F., Alshamy, R., Othman, S.: A\n                    detailed analysis of Benchmark datasets for Network Intrusion Detection System.\n                    Asian J. Res. Comput. Sci. 7(4), 14\u201333\n                    (2021)","journal-title":"Asian J. Res. Comput. Sci."},{"key":"896_CR40","doi-asserted-by":"publisher","first-page":"99837","DOI":"10.1109\/ACCESS.2022.3206425","volume":"10","author":"A Halbouni","year":"2022","unstructured":"Halbouni, A., Gunawan, T.S., Habaebi, M.H., Halbouni, M., Kartiwi,\n                    M., Ahmad, R.: CNN-LSTM: Hybrid Deep learning neural network for Network\n                    Intrusion Detection System. IEEE Access. 10,\n                    99837\u201399849 (2022)","journal-title":"IEEE Access."},{"key":"896_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asej\/2023\/102211","volume":"14","author":"RA Hamada","year":"2023","unstructured":"Hamada, R.A., Elsayed, R.A., Abdalla, M.I., Elsaid, A.S.: Securing\n                    IoT and SDN systems using deep-learning based automatic intrusion detection. Ain\n                    Shams Eng. J. 14, 1\u201313 (2023). https:\/\/doi.org\/10.1016\/j.asej\/2023\/102211","journal-title":"Ain Shams Eng. J."},{"issue":"4","key":"896_CR42","first-page":"645","volume":"20","author":"Y Hamid","year":"2018","unstructured":"Hamid, Y., Balasaraswathi, V.R., Journaux, L., Sugumaran, M.:\n                    Benchmark Datasets for Network Intrusion Detection: A review. Int. J. Netw.\n                    Secur. 20(4), 645\u2013654\n                    (2018)","journal-title":"Int. J. Netw. Secur."},{"key":"896_CR43","doi-asserted-by":"publisher","first-page":"104650","DOI":"10.1109\/ACCESS.2020.3000179","volume":"8","author":"H Hindy","year":"2020","unstructured":"Hindy, H., Brosset, D., Bayne, E., Seeam, A., Tachtatzis, C.,\n                    Atkinson, R., Bellekens, X.: A taxonomy of Network threats and the Effect of\n                    current datasets on Intrusion Detection systems. IEEE Access. 8, 104650\u2013104675 (2020)","journal-title":"IEEE Access."},{"key":"896_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.teler.2023.100077","volume":"11","author":"V Hnamte","year":"2023","unstructured":"Hnamte, V., Hussain, J.: Dependable intrusion detection system\n                    using deep convolutional neural network: A novel framework and performance\n                    evaluation approach. Telematics Inf. Rep. 11,\n                    1\u201313 (2023). https:\/\/doi.org\/10.1016\/j.teler.2023.100077","journal-title":"Telematics Inf. Rep."},{"issue":"6","key":"896_CR45","doi-asserted-by":"publisher","first-page":"4286","DOI":"10.1109\/TII.2021.3133300","volume":"18","author":"B Hu","year":"2022","unstructured":"Hu, B., Bi, Y., Zhi, M., Zhang, K., Yan, F., Zhang, Q., Liu, Z.: A\n                    Deep one-class intrusion detection Scheme in Software-defined Industrial\n                    Networks. IEEE Trans. Industr. Inf. 18(6),\n                    4286\u20134296 (2022)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"896_CR46","unstructured":"IoT23: (2024). https:\/\/www.unb.ca\/cic\/datasets\/iotdataset-2023.html, last accessed 05th"},{"key":"896_CR47","unstructured":"ISCX-IDS https:\/\/www.unb.ca\/cic\/datasets\/ids\/html, (2012). last accessed 25th March 2024."},{"key":"896_CR48","unstructured":"ISCXTor https:\/\/www.unb.ca\/cic\/datasets\/tor.html, (2016). last accessed 02nd April 2024."},{"key":"896_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jisa.2023.103516","volume":"76","author":"AH Jahangir","year":"2023","unstructured":"Jahangir, A.H., Soltani, M., Ousat, B., Siavoshani, M.J.: An\n                    adaptable deep learning-based intrusion detection system to zero-day attacks. J.\n                    Inform. Secur. Appl. 76, 1\u201313 (2023). https:\/\/doi.org\/10.1016\/j.jisa.2023.103516","journal-title":"J. Inform. Secur. Appl."},{"key":"896_CR50","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.comcom.2022.12.010","volume":"199","author":"SM Kasongo","year":"2023","unstructured":"Kasongo, S.M.: A deep learning technique for intrusion detection\n                    system using a recurrent neural networks based framework. Comput. Commun.\n                        199, 113\u2013125 (2023). https:\/\/doi.org\/10.1016\/j.comcom.2022.12.010","journal-title":"Comput. Commun."},{"key":"896_CR51","doi-asserted-by":"publisher","first-page":"30373","DOI":"10.1109\/ACCESS.2019.2899721","volume":"7","author":"FA Khan","year":"2019","unstructured":"Khan, F.A., Gumaei, A., Derhab, A., Hussain, A.: A Novel two-stage\n                    deep learning model for efficient network intrusion detection. IEEE Access.\n                        7, 30373\u201330385\n                    (2019)","journal-title":"IEEE Access."},{"issue":"2","key":"896_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","volume":"20","author":"A Khraisat","year":"2019","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Joarder, K.: Survey of\n                    intrusion detection systems: Techniques, datasets, and challenges.\n                    Cybersecurity. 20(2), 1\u201322 (2019). https:\/\/doi.org\/10.1186\/s42400-019-0038-7","journal-title":"Cybersecurity"},{"key":"896_CR53","doi-asserted-by":"publisher","first-page":"2049","DOI":"10.1016\/j.infsof.2013.07.010","volume":"55","author":"B Kitchenham","year":"2013","unstructured":"Kitchenham, B., Brereton, P.: A systematic review of systematic\n                    review process research in software engineering. \u200eInf. Softw. Technol.\n                        55, 2049\u20132075\n                    (2013)","journal-title":"\u200eInf. Softw. Technol."},{"key":"896_CR54","unstructured":"Kitchenham, B.A., Stuart, C.: Guidelines for performing systematic\n                    literature reviews in software engineering. In: EBSE Technical Report, Keele\n                    University and Durham University Joint 94, Report, Report EBSE 2007-001. (2007). https:\/\/www.elsevier.com\/__data\/promis_misc\/525444systematicreviewsguide.pdf"},{"key":"896_CR55","doi-asserted-by":"publisher","first-page":"101574","DOI":"10.1109\/ACCESS.2021.3097247","volume":"9","author":"J Lansky","year":"2021","unstructured":"Lansky, J., Ali, S., Mohammadi, M., Majeed, M.K., Karim, S.H.T.,\n                    Rashidi, S., Hosseinzadeh, M., Rahmani, M.: Deep learning-based intrusion\n                    detection systems: A systematic review. IEEE Access. 9, 101574\u2013101599 (2021)","journal-title":"IEEE Access."},{"issue":"2","key":"896_CR56","doi-asserted-by":"publisher","first-page":"2455","DOI":"10.1109\/JSYST.2023.3236995","volume":"17","author":"J Li","year":"2023","unstructured":"Li, J., Tong, X., Liu, J., Cheng, L.: An efficient Federated\n                    Learning System for Network Intrusion Detection. IEEE Syst. J. 17(2), 2455\u20132464 (2023)","journal-title":"IEEE Syst. J."},{"key":"896_CR57","doi-asserted-by":"publisher","first-page":"b2700","DOI":"10.1136\/bmj.b2700","volume":"339","author":"A Liberati","year":"2009","unstructured":"Liberati, A., Altman, D.G., Tetzlaff, J., Mulrow, C., Gotzche, P.,\n                    Loannidis, J.P.A., Clarke, M., Devereaux, P., Kleijnen, J., Moher, D.: The\n                    PRISMA statement for reporting systematic reviews and meta-analyses of studies\n                    that evaluate healthcare interventions: Explanation and elaboration. BMJ.\n                        339, b2700 (2009). https:\/\/doi.org\/10.1136\/bmj.b2700","journal-title":"BMJ"},{"key":"896_CR58","doi-asserted-by":"publisher","unstructured":"Liu, G., Zhang, J.: CNID: Research on Network Intrusion Detection\n                    based on convolutional neural network. Discrete Dynamics Nat. Soc. 1\u201311\n                    (2020). https:\/\/doi.org\/10.1155\/2020\/4705982","DOI":"10.1155\/2020\/4705982"},{"key":"896_CR59","first-page":"1","volume":"9","author":"H Liu","year":"2019","unstructured":"Liu, H., Lang, B.: Machine learning and deep learning methods for\n                    intrusion detection systems: A Survey. Appl. Sci. 9, 1\u201328 (2019)","journal-title":"Appl. Sci."},{"issue":"2","key":"896_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42452-020-2414-z","volume":"675","author":"F Louati","year":"2020","unstructured":"Louati, F., Ktata, F.B.: A deep learning-based multi-agent system\n                    for intrusion detection. Appl. Sci. 675(2),\n                    1\u201313 (2020). https:\/\/doi.org\/10.1007\/s42452-020-2414-z","journal-title":"Appl. Sci."},{"key":"896_CR61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.measen.2022.100527","volume":"24","author":"R Kalpana","year":"2022","unstructured":"Kalpana, R.: Recurrent nonsymmetric deep auto encoder approach for\n                    network intrusion detection system. Measurement: Sens. 24, 1\u20137 (2022). https:\/\/doi.org\/10.1016\/j.measen.2022.100527","journal-title":"Measurement: Sens."},{"key":"896_CR62","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.comcom.2023.02.003","volume":"202","author":"KG Maheswari","year":"2023","unstructured":"Maheswari, K.G., Siva, C., Nalinipriya, G.: Optimal cluster based\n                    feature selection for intrusion detection system in web and cloud computing\n                    environment using hybrid teacher learning optimization enables deep recurrent\n                    network. Comput. Commun. 202, 145\u2013153\n                    (2023). https:\/\/doi.org\/10.1016\/j.comcom.2023.02.003","journal-title":"Comput. Commun."},{"key":"896_CR63","doi-asserted-by":"publisher","unstructured":"Man, J., Sun, G.: A residual learning-based Network Intrusion\n                    Detection System. Secur. Communication Networks. 1\u20139 (2021). https:\/\/doi.org\/10.1155\/2021\/5593435","DOI":"10.1155\/2021\/5593435"},{"key":"896_CR64","doi-asserted-by":"crossref","unstructured":"Marir, N., Wang, H., Feng, G., Li, B., Jia, M.: Distributed\n                    abnormal Behaviour Detection Approach based on Deep Belief Network and Ensemble\n                    SVM using spark. IEEE Access., 59657\u201359671. (2018)","DOI":"10.1109\/ACCESS.2018.2875045"},{"key":"896_CR65","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1539","author":"M Masdari","year":"2016","unstructured":"Masdari, M., Jalali, M.: A survey and taxonomy of DoS attacks in\n                    cloud computing. Secur. Communication Networks. (2016). https:\/\/doi.org\/10.1002\/sec.1539","journal-title":"Secur. Communication Networks"},{"key":"896_CR66","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2023.110173","volume":"137","author":"H Mohammadian","year":"2023","unstructured":"Mohammadian, H., Ghorbani, A., A., Lashkari, A.H.: A gradient-based\n                    approach for adversarial attack on deep learning-based network intrusion\n                    detection systems. Appl. Soft Comput. 137,\n                    1\u201315 (2023). https:\/\/doi.org\/10.1016\/j.asoc.2023.110173","journal-title":"Appl. Soft Comput."},{"key":"896_CR67","doi-asserted-by":"publisher","unstructured":"Mohammadpour, L., Ling, T.C., Liew, C.S., Aryanfar, A.: Survey of\n                    CNN-Based Network Intrusion Detection. Appl. Sci. 1\u201334 (2022). https:\/\/doi.org\/10.3390\/app12168162","DOI":"10.3390\/app12168162"},{"key":"896_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jswa.2023.200215","volume":"18","author":"SJ Moore","year":"2023","unstructured":"Moore, S.J., Cruciani, F., Nugent, C.D., Zhang, S., Cleland, I.,\n                    Sani, S.: Deep learning for network intrusion: A hierarchical approach to reduce\n                    false alarm. Intell. Syst. Appl. 18,\n                    1\u201313 (2023). https:\/\/doi.org\/10.1016\/j.jswa.2023.200215","journal-title":"Intell. Syst. Appl."},{"key":"896_CR69","unstructured":"NF-UQ-NIDS: (2024). https:\/\/www.kaggle.com\/datasets\/dhoogla\/nfuqnids, last accessed 08th"},{"issue":"1","key":"896_CR70","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1109\/TITS.2022.3188671","volume":"24","author":"A Oseni","year":"2023","unstructured":"Oseni, A., Moustafa, N., Creech, G., Sohrabi, N., Strelzoff, A.,\n                    Tari, Z., Linkov, I.: An Explainable Deep Learning Framework for resilient\n                    intrusion detection in IoT-Enabled transportation networks. IEEE Trans. Intell.\n                    Transp. Syst. 24(1), 1000\u20131014\n                    (2023)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"896_CR71","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/LNET.2019.2901792","volume":"1","author":"S Otoum","year":"2019","unstructured":"Otoum, S., Kantarci, B., Mouftah: On the feasibility of Deep\n                    Learning in Sensor Network Intrusion Detection. IEEE Netw. Lett. 1(2), 68\u201371 (2019)","journal-title":"IEEE Netw. Lett."},{"issue":"2","key":"896_CR72","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., Hengel, D.V.A.: Deep learning for\n                    Anomaly detection: A review. ACM Comput. Surveys. 54(2), 1\u201338 (2021). https:\/\/doi.org\/10.1145\/3439950","journal-title":"ACM Comput. Surveys"},{"key":"896_CR73","unstructured":"Panigrahi, R., Borah, S.: Syst. Int. J. Eng. Technol. 7, 479\u2013482 (2018). A detailed analysis of\n                    CICIDS2017 dataset for designing Intrusion Detection"},{"issue":"3","key":"896_CR74","doi-asserted-by":"publisher","first-page":"2330","DOI":"10.1109\/JIOT.2022.3211346","volume":"10","author":"C Park","year":"2023","unstructured":"Park, C., Lee, J., Kim, Y., Park, J.-G., Kim, H., Hong, D.: An\n                    enhanced AI-Based Network Intrusion Detection System using Generative\n                    Adversarial Networks. IEEE Internet Things J. 10(3), 2330\u20132345 (2023)","journal-title":"IEEE Internet Things J."},{"key":"896_CR75","doi-asserted-by":"crossref","unstructured":"Peterson, J.M., Leevy, J.L., Khoshgoftaar, T.M.: A review and\n                    Analysis of the BoT-IoT Dataset. In 2021 IEEE International Conference on\n                    Service-Oriented System Engineering (SOSE), 20\u201327.\n                    (2021)","DOI":"10.1109\/SOSE52839.2021.00007"},{"key":"896_CR76","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compeleceng.2023.108831","volume":"110","author":"SV Pingale","year":"2023","unstructured":"Pingale, S.V., Sutar, S.R.: Remora based Deep Maxout model for\n                    network intrusion detection using convolutional neural network features. Comput.\n                    Electr. Eng. 110, 1\u201312 (2023).\n                    https:\/\/doi.org\/10.1016.j.compeleceng.2023.108831","journal-title":"Comput. Electr. Eng."},{"key":"896_CR77","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compeleceng.2022.107764","volume":"99","author":"E Qazi","year":"2022","unstructured":"Qazi, E., Haider, N., Shoaib, M., Razzak, I.: An intelligent and\n                    efficient network intrusion detection system using deep learning. Comput.\n                    Electr. Eng. 99, 1\u201310 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107764","journal-title":"Comput. Electr. Eng."},{"key":"896_CR78","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compeleceng.2022.108156","volume":"102","author":"V Ravi","year":"2022","unstructured":"Ravi, V., Chaganti, R., Alazab, M.: Recurrent deep learning-based\n                    feature future ensemble meta-classifier approach for intelligent network\n                    intrusion detection system. Comput. Electr. Eng. 102, 1\u201317 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108156","journal-title":"Comput. Electr. Eng."},{"key":"896_CR79","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005","author":"M Ring","year":"2019","unstructured":"Ring, M., Wunderlich, S., Scheuring, D., Landes, D., Hatha, A.:\n                    Computers Secur. 1\u201341 (2019). https:\/\/doi.org\/10.1016\/j.cose.2019.06.005 A Survey of Network-based Intrusion Detection Data\n                    Sets"},{"key":"896_CR80","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compeleceng.2022.107810","volume":"99","author":"T Saba","year":"2022","unstructured":"Saba, T., Rehman, A., Sadad, T., Kolivand, H., Bahaj, A.S.:\n                    Anamoly-based intrusion detection system for IoT networks through deep learning\n                    model. Comput. Electr. Eng. 99, 1\u201310\n                    (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107810","journal-title":"Comput. Electr. Eng."},{"key":"896_CR81","doi-asserted-by":"publisher","unstructured":"Sanju, P.: Enhancing intrusion detection in IoT systems: A hybrid\n                    metaheuristics-deep learning approach with ensemble of recurrent neural\n                    networks. J. Eng. Res. 1\u20136 (2023). https:\/\/doi.org\/10.1016\/j.jer.2023\/100122","DOI":"10.1016\/j.jer.2023\/100122"},{"key":"896_CR82","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compeleceng.2023.108626","volume":"107","author":"B Sharma","year":"2023","unstructured":"Sharma, B., Sharma, L., Lal, C., Roy, S.: Anomaly based network\n                    intrusion detection for IoT attacks using deep learning technique. Comput.\n                    Electr. Eng. 107, 1\u201314 (2023). https:\/\/doi.org\/10.1016\/j.compeleceng.2023.108626","journal-title":"Comput. Electr. Eng."},{"issue":"1","key":"896_CR83","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone, N., Ngoc, T.N., Phai, V.D., Shi, Q.: A Deep Learning\n                    Approach to Network Intrusion Detection. IEEE Trans. Emerg. Top. Comput. Intell.\n                        2(1), 41\u201350 (2018)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"896_CR84","doi-asserted-by":"publisher","first-page":"108530","DOI":"10.1109\/ACCESS.2022.3213937","volume":"10","author":"MA Siddiqui","year":"2022","unstructured":"Siddiqui, M.A., Pak, W.: Tier-based optimization for Synthesized\n                    Network Intrusion Detection System. IEEE Access. 10, 108530\u2013108544 (2022)","journal-title":"IEEE Access."},{"key":"896_CR85","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2020.102151","volume":"102","author":"SM Sohi","year":"2021","unstructured":"Sohi, S.M., Seifert, J.-P., Ganji, F.: RNNIDS: Enhancing network\n                    intrusion detection system through deep learning. Computers Secur. 102, 1\u201318 (2021). https:\/\/doi.org\/10.1016\/j.cose.2020.102151","journal-title":"Computers Secur."},{"key":"896_CR86","doi-asserted-by":"publisher","unstructured":"Susilo, B., Sari, R.F.: Intrusion Detection in IoT Networks Using\n                    Deep Learning Algorithm, pp. 1\u201311. Information (2020). https:\/\/doi.org\/10.3390\/info11050279","DOI":"10.3390\/info11050279"},{"issue":"13","key":"896_CR87","doi-asserted-by":"publisher","first-page":"11888","DOI":"10.1109\/JIOT.2023.3244810","volume":"10","author":"A Thakkar","year":"2023","unstructured":"Thakkar, A., Lohiya, R.: Attack classification of Imbalanced\n                    Intrusion Data for IoT Network using ensemble-learning-based deep neural\n                    network. IEEE Internet Things J. 10(13),\n                    11888\u201311895 (2023)","journal-title":"IEEE Internet Things J."},{"key":"896_CR88","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compeleceng.2021.107044","volume":"91","author":"S Thakur","year":"2021","unstructured":"Thakur, S., Chakraborty, A., De, R., Kumar, N., Sarkar, R.:\n                    Intrusion detection in cyber-physical systems using a generic and domain\n                    specific deep autoencoder model. Comput. Electr. Eng. 91, 1\u201311 (2021). https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107044","journal-title":"Comput. Electr. Eng."},{"key":"896_CR89","doi-asserted-by":"publisher","unstructured":"Tian, Q., Han, D., Li, K.-C., Liu, X., Duan, L., Castiglione, A.:\n                    An intrusion detection approach based on improved deep belief network. Appl.\n                    Intell. 3162\u20133178 (2020). https:\/\/doi.org\/10.1007\/s10489-020-01694-4","DOI":"10.1007\/s10489-020-01694-4"},{"key":"896_CR90","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2023.103419","volume":"133","author":"CH Tseng","year":"2023","unstructured":"Tseng, C.H., Chang, Y.-T.: EBDM: Ensemble binary detection models\n                    for multi-class wireless intrusion detection based on deep neural network.\n                    Computers Secur. 133, 1\u20138 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103419","journal-title":"Computers Secur."},{"key":"896_CR91","doi-asserted-by":"publisher","first-page":"10246","DOI":"10.1016\/j.jksuci.2022.10.019","volume":"34","author":"PB Udas","year":"2022","unstructured":"Udas, P.B., Karim, M.E., Roy, K.S.: SPIDER: A shallow PCA based\n                    network intrusion detection system with enhanced recurrent neural networks. J.\n                    King Saud Univ. \u2013 Comput. Inform. Sci. 34, 10246\u201310272 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2022.10.019","journal-title":"J. King Saud Univ. \u2013 Comput. Inform. Sci."},{"key":"896_CR92","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.comnet.2017.08.013","volume":"127","author":"EK Viegas","year":"2017","unstructured":"Viegas, E.K., Santin, A.O., Oliveira, L.S.: Towards a reliable\n                    anamoly-based intrusion detection in real-world environments. Comput. Netw.\n                        127, 200\u2013216 (2017). https:\/\/doi.org\/10.1016\/j.comnet.2017.08.013","journal-title":"Comput. Netw."},{"issue":"3","key":"896_CR93","doi-asserted-by":"publisher","first-page":"65","DOI":"10.4018\/IJDCF.2019070104","volume":"11","author":"R Vinaykumar","year":"2019","unstructured":"Vinaykumar, R., Sonam, K.P., Pooranchandran, P.: A Comparative\n                    Analysis of Deep Learning Approaches for Network Intrusion Detection Systems\n                    (N-IDSs): Deep learning for N-IDSs. Int. J. Digit. Crime. Forensics. 11(3), 65\u201389 (2019)","journal-title":"Int. J. Digit. Crime. Forensics"},{"key":"896_CR94","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dajour.2022.100142","volume":"5","author":"M Vishwakarma","year":"2022","unstructured":"Vishwakarma, M., Kesswani, N.: DIDS: A deep neural network based\n                    real-time intrusion detection system for IoT. Decis. Analytics J. 5, 1\u20139 (2022). https:\/\/doi.org\/10.1016\/j.dajour.2022.100142","journal-title":"Decis. Analytics J."},{"issue":"20","key":"896_CR95","doi-asserted-by":"publisher","first-page":"19706","DOI":"10.1109\/JIOT.2022.3167005","volume":"9","author":"OA Wahab","year":"2022","unstructured":"Wahab, O.A.: Intrusion detection in the IoT Under Data and Concept\n                    drfits: Online Deep Learning Approach. IEEE Internet Things J. 9(20), 19706\u201319716 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"896_CR96","first-page":"1843","volume":"24","author":"K Wang","year":"2023","unstructured":"Wang, K., Zhang, A., Sun, H., Wang, B.: Analysis of recent\n                    deep-learning-based intrusion detection methods for In-Vehicle Network. IEEE\n                    Trans. Intell. Transp. Syst. 24(2),\n                    1843\u20131854 (2023)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"896_CR97","doi-asserted-by":"publisher","first-page":"2135","DOI":"10.1109\/TIV.2023.3240517","volume":"24","author":"Z Wang","year":"2023","unstructured":"Wang, Z., Xie, X., Chen, L., Song, S., Wang, Z.: Intrusion\n                    Detection and Network Information Security Based on Deep Learning Algorithm in\n                    Urban Rail Transit Management System. IEEE Trans. Intell. Transp. Syst.\n                        24(2), 2135\u20132143\n                    (2023)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"896_CR98","doi-asserted-by":"crossref","unstructured":"Wei, P., Li, Y., Zhang, Z., Hu, T., Li, Z., Liu, D.: An\n                    Optimization Method for Intrusion Detection Classification Model Based on Deep\n                    Belief Network, pp. 87593\u201387605. IEEE Access (2019)","DOI":"10.1109\/ACCESS.2019.2925828"},{"key":"896_CR99","doi-asserted-by":"crossref","unstructured":"Wu, Y., Lee, W.W., Xu, Z., Ni, M.: Large-Scale and Robust Intrusion\n                    Detection Model Combining Improved Deep Belief Network with Feature-Weighted\n                    SVM, pp. 98600\u201398611. IEEE Access (2020)","DOI":"10.1109\/ACCESS.2020.2994947"},{"issue":"4","key":"896_CR100","doi-asserted-by":"publisher","first-page":"3094","DOI":"10.1109\/JIOT.2021.3112159","volume":"10","author":"Y Wu","year":"2023","unstructured":"Wu, Y., Nie, L., Wang, S., Ning, Z., Li, S.: Intelligent Intrusion\n                    detection for internet of things Security: A Deep Convolution Generative\n                    Adversarial Network-Enabled Approach. IEEE Internet Things J. 10(4), 3094\u20133106 (2023)","journal-title":"IEEE Internet Things J."},{"key":"896_CR101","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2020.102688","volume":"164","author":"Z Wu","year":"2020","unstructured":"Wu, Z., Wang, J., Hu, L., Zhang, Z., Wu, H.: A network intrusion\n                    detection method based on semantic re-encoding and deep learning. J. Netw.\n                    Comput. Appl. 164, 1\u201312 (2020). https:\/\/doi.org\/10.1016\/j.jnca.2020.102688","journal-title":"J. Netw. Comput. Appl."},{"key":"896_CR102","doi-asserted-by":"crossref","unstructured":"Xu, H., Sun, L., Fan, G., Li, W., Kuang, G.: A hierarchical\n                    intrusion detection model combining multiple deep learning models with attention\n                    mechanism. IEEE Access., 66212\u201366225. (2023)","DOI":"10.1109\/ACCESS.2023.3290613"},{"key":"896_CR103","doi-asserted-by":"publisher","unstructured":"Yadav, N., Pande, S., Khamparia, A., Gupta, D.: Intrusion detection\n                    system on IoT with 5G network using deep learning. Wirel. Commun. Mob. Comput.\n                    1\u201313 (2022). https:\/\/doi.org\/10.1155\/2022\/9304689","DOI":"10.1155\/2022\/9304689"},{"key":"896_CR104","doi-asserted-by":"publisher","first-page":"82624","DOI":"10.1109\/ACCESS.2019.2923814","volume":"7","author":"H Yang","year":"2019","unstructured":"Yang, H., Qin, G., Ye, L.: Combining Wireless Network Intrusion\n                    Detection Model based on deep learning. IEEE Access. 7, 82624\u201382632 (2019)","journal-title":"IEEE Access."},{"key":"896_CR105","doi-asserted-by":"crossref","unstructured":"Yang, L., Li, J., Yin, L., Sun, Z., Zhao, Y., Li, Z.: Real-time\n                    intrusion detection in Wireless Network: A deep learning-based Intelligent\n                    mechanism. IEEE Access., 170128\u2013170139. (2020)","DOI":"10.1109\/ACCESS.2020.3019973"},{"key":"896_CR106","doi-asserted-by":"publisher","unstructured":"Yang, Y., Zheng, K., Wu, C.,Y: Improving the Classification\n                    Effectiveness of Intrusion Detection by Using Conditional Variational\n                    Autoencoder and Deep Neural Network, pp. 1\u201320. Sensors (2019). https:\/\/doi.org\/10.3390\/s19112528","DOI":"10.3390\/s19112528"},{"key":"896_CR107","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.heliyon.2024.e29410","volume":"10","author":"NSS Chintapalli","year":"2024","unstructured":"Chintapalli, N.S.S., Singh, P.S., Frnda, J., Divakarachari, B.P.,\n                    Sarraju, L.V., Falkowski-Gilski, P.: OOA-modified Bi-LSTM network: An effective\n                    intrusion detection framework for IoT systems. Heliyon. 10, 1\u201315 (2024)","journal-title":"Heliyon"},{"key":"896_CR108","doi-asserted-by":"publisher","unstructured":"Yogesh, Goyal, L.M.: A Systematic Literature Review of Network\n                    Intrusion Detection System Models. In: Yadav, A., Nanda, S.J., Lim, MH. (eds)\n                    Proceedings of International Conference on Paradigms of Communication, Computing\n                    and Data Analytics. PCCDA 2023. Algorithms for Intelligent Systems. Springer,\n                    Singapore. (2023). https:\/\/doi.org\/10.1007\/978-981-99-4626-6_38","DOI":"10.1007\/978-981-99-4626-6_38"},{"issue":"3","key":"896_CR109","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/TNET.2021.3137084","volume":"30","author":"C Zhang","year":"2022","unstructured":"Zhang, C., Costa-Perez, X., Patras, P.: Adversarial Attacks against\n                    Deep Learning-Based Network Intrusion Detection Systems and Defense mechanisms.\n                    IEEE\/ACM Trans. Networking. 30(3),\n                    1294\u20131311 (2022)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"896_CR110","doi-asserted-by":"crossref","unstructured":"Zhang, C., Ruan, F., Yin, L., Chen, X., Zhai, L., Liu, F.: A Deep\n                    Learning Approach for Network Intrusion Detection Based on NSL-KDD Dataset. In\n                    2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and\n                    Identification (ASID), 41\u201345. (IEEE) (2019)","DOI":"10.1109\/ICASID.2019.8925239"},{"issue":"3","key":"896_CR111","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1109\/JAS.2020.1003099","volume":"7","author":"H Zhang","year":"2020","unstructured":"Zhang, H., Li, Y., Lv, Z., Sangaiah, A.K., Huang, T.: A real-time\n                    and Ubiquitous Network Attack Detection Based on Deep Belief Network and Support\n                    Vector Machine. IEEE\/CAA J. Automatica Sinica. 7(3), 790\u2013799 (2020). https:\/\/doi.org\/10.1109\/JAS.2020.1003099","journal-title":"IEEE\/CAA J. Automatica Sinica"},{"issue":"8","key":"896_CR112","doi-asserted-by":"publisher","first-page":"1707","DOI":"10.1109\/LWC.2021.3077946","volume":"10","author":"R Zhao","year":"2021","unstructured":"Zhao, R., Yin, J., Xue, Z., Adebisi, B., Ohtsuki, T., Gacanin, H.,\n                    Sari, H.: An efficient intrusion detection method based on dynamic autoencoder.\n                    IEEE Wirel. Communication Lett. 10(8),\n                    1707\u20131711 (2021)","journal-title":"IEEE Wirel. Communication Lett."},{"key":"896_CR113","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1016\/j.aej.2023.11.078","volume":"86","author":"O Nojood","year":"2024","unstructured":"Nojood, O., Aljehane, H.A., Mengash, M.M., Eltahir, F.A., Alotaibi,\n                    S.S., Aljameel, A., Yafoz, R., Alsini, M.A.: Golden jackal optimization\n                    algorithm with deep learning assisted intrusion detection system for network\n                    security. Alexandria Eng. J. 86, 415\u2013424\n                    (2024). https:\/\/doi.org\/10.1016\/j.aej.2023.11.078","journal-title":"Alexandria Eng. J."},{"key":"896_CR114","doi-asserted-by":"publisher","unstructured":"Devendiran, R., Turukmane, V.A.: Dugat-LSTM: Deep learning based\n                    network intrusion detection system using chaotic optimization strategy. Expert\n                    Syst. Appl. 245 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2023.123027","DOI":"10.1016\/j.eswa.2023.123027"},{"key":"896_CR115","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2024.100434","author":"E Osa","year":"2024","unstructured":"Osa, E., Orukpe, E.P., Irunasi, U.: Eng. Electron. Energy.\n                        7, 1\u20136 (2024). https:\/\/doi.org\/10.1016\/j.prime.2024.100434 Design and implementation of a deep neural network approach for\n                    intrusion detection systems"},{"key":"896_CR116","doi-asserted-by":"publisher","unstructured":"Wu, Y., Hu, Y., Wang, J., Feng, M., Dong, A., Yang, Y.: An active\n                    learning using deep Q-network for zero-day attack detection. Computers Secur.\n                        139 (2024). https:\/\/doi.org\/10.1016\/j.cose.2024.103713","DOI":"10.1016\/j.cose.2024.103713"},{"key":"896_CR117","unstructured":"117. Maddireddy, B. R., & Maddireddy, B. R. (2024). A\n                    Comprehensive Analysis of Machine Learning Algorithms in Intrusion Detection\n                    Systems. Journal Environmental Sciences And Technology, 3(1),\n                    877-891."},{"key":"896_CR118","doi-asserted-by":"publisher","unstructured":"Bhati, B. S., Shankar, A., Saxena, S., Saxena, T., Anbarasi, M.,\n                    & Kumar, M. (2022). Analysis of Support Vector Machine-based Intrusion\n                    Detection Techniques. Arabian Journal for Science and Engineering Springer,\n                    1-13. DOI: https:\/\/doi.org\/10.1007\/s13369-019-03970-z","DOI":"10.1007\/s13369-019-03970-z"},{"issue":"1\u20132","key":"896_CR119","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1504\/IJMIC.2022.127099","volume":"41","author":"BS Bhati","year":"2022","unstructured":"Bhati, B.S., Shankar, A., Saxena, S., Saxena, T., Anbarasi, M.,\n                    Kumar, M.: An ensemble-based approach for image classification using voting\n                    classifier. Int. J. Model. Ident. Control. 41(1\u20132), 87\u201397 (2022)","journal-title":"Int. J. Model. Ident. Control"},{"key":"896_CR120","unstructured":"Bhati, B.S., Rai, C.S.: A survey on intrusion detection tools. In\n                    2019 6th International Conference on Computing for Sustainable Global\n                    Development (INDIACom) (pp. 806\u2013810). IEEE. (2019),\n                    March"},{"key":"896_CR121","doi-asserted-by":"publisher","unstructured":"Bhati, N.S., Khari, M., Comparative Analysis of Classification\n                    Based Intrusion Detection Techniques,: 5th International\n                        Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2021, pp. 1\u20136,\n                    (2021). https:\/\/doi.org\/10.1109\/ISCON52037.2021.9702411","DOI":"10.1109\/ISCON52037.2021.9702411"},{"key":"896_CR122","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-4831-2_64","volume-title":"Applications of Artificial Intelligence and Machine Learning","author":"NS Bhati","year":"2022","unstructured":"Bhati, N.S., Khari, M.: An Ensemble Model for Network Intrusion\n                    Detection Using AdaBoost, Random Forest and Logistic Regression. In: Unhelker,\n                    B., Pandey, H.M., Raj, G. (eds.) Applications of Artificial Intelligence and\n                    Machine Learning. Lecture Notes in Electrical Engineering, vol. 925. Springer,\n                    Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-19-4831-2_64"},{"key":"896_CR123","doi-asserted-by":"crossref","unstructured":"Bhati, B.S., Dikshita, Bhati, N.S., Chugh, G.: A comprehensive\n                    study of intrusion detection and prevention systems. Wirel. Communication\n                    Secur., 115\u2013142. (2022). (Bhoopesh Singh Bhati, Dikshita, Nitesh Singh\n                    Bhati, Garvit Chugh Book Editor(s):Manju Khari, Manisha Bharti, M.\n                    Niranjanamurthy)","DOI":"10.1002\/9781119777465.ch7"},{"issue":"Supp02","key":"896_CR124","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1142\/S0218488520400140","volume":"28","author":"NS Bhati","year":"2020","unstructured":"Bhati, N.S., Khari, M., Garc\u00eda-D\u00edaz, V.,\n                    Verd\u00fa, E.: A review on intrusion detection systems and techniques. Int.\n                    J. Uncertain. Fuzziness Knowledge-Based Syst. 28(Supp02), 65\u201391 (2020)","journal-title":"Int. J. Uncertain. Fuzziness Knowledge-Based Syst."},{"issue":"22","key":"896_CR125","doi-asserted-by":"publisher","first-page":"11752","DOI":"10.3390\/app122211752","volume":"12","author":"P Vanin","year":"2022","unstructured":"Vanin, P., Newe, T., Dhirani, L.L., O\u2019Connell, E.,\n                    O\u2019Shea, D., Lee, B., Rao, M.: A study of network intrusion detection\n                    systems using artificial intelligence\/machine learning. Appl. Sci. 12(22), 11752 (2022)","journal-title":"Appl. Sci."},{"key":"896_CR126","doi-asserted-by":"publisher","first-page":"102861","DOI":"10.1016\/j.cose.2022.102861","volume":"121","author":"C Zhang","year":"2022","unstructured":"Zhang, C., Jia, D., Wang, L., Wang, W., Liu, F., Yang, A.:\n                    Comparative research on network intrusion detection methods based on machine\n                    learning. Computers Secur. 121, 102861\n                    (2022)","journal-title":"Computers Secur."}],"updated-by":[{"DOI":"10.1007\/s10207-024-00947-4","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000}}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00896-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00896-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00896-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T10:40:02Z","timestamp":1732790402000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00896-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,2]]},"references-count":126,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["896"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00896-y","relation":{"references":[{"id-type":"uri","id":"","asserted-by":"subject"},{"id-type":"uri","id":"","asserted-by":"subject"},{"id-type":"uri","id":"","asserted-by":"subject"}]},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,2]]},"assertion":[{"value":"2 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2024","order":2,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":4,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s10207-024-00947-4","URL":"https:\/\/doi.org\/10.1007\/s10207-024-00947-4","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants\n                    or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare that there is no conflict of interest in this\n                    paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}