{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:43:36Z","timestamp":1772822616368,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T00:00:00Z","timestamp":1747180800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T00:00:00Z","timestamp":1747180800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10207-025-01036-w","type":"journal-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T20:20:49Z","timestamp":1747254049000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["XMID-MQTT: explaining machine learning-based intrusion detection system for MQTT protocol in IoT environment"],"prefix":"10.1007","volume":"24","author":[{"given":"Hayette","family":"Zeghida","sequence":"first","affiliation":[]},{"given":"Mehdi","family":"Boulaiche","sequence":"additional","affiliation":[]},{"given":"Ramdane","family":"Chikh","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Patel","sequence":"additional","affiliation":[]},{"given":"Ana Luiza Bessa","family":"Barros","sequence":"additional","affiliation":[]},{"given":"Alwi M.","family":"Bamhdi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"issue":"4","key":"1036_CR1","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","volume":"58","author":"I Lee","year":"2015","unstructured":"Lee, I., Lee, K.: The internet of things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431\u2013440 (2015)","journal-title":"Bus. Horiz."},{"key":"1036_CR2","doi-asserted-by":"publisher","first-page":"104961","DOI":"10.1016\/j.compbiomed.2021.104961","volume":"139","author":"N Faruqui","year":"2021","unstructured":"Faruqui, N., Yousuf, M.A., Whaiduzzaman, M., Azad, A., Barros, A., Moni, M.A.: LungNet: a hybrid deep-CNN model for lung cancer diagnosis using CT and wearable sensor-based medical IoT data. Comput. Biol. Med. 139, 104961 (2021)","journal-title":"Comput. Biol. Med."},{"issue":"12","key":"1036_CR3","doi-asserted-by":"publisher","first-page":"9153","DOI":"10.1109\/TII.2022.3164066","volume":"18","author":"MK Hasan","year":"2022","unstructured":"Hasan, M.K., Akhtaruzzaman, M., Kabir, S.R., Gadekallu, T.R., Islam, S., Magalingam, P., Hassan, R., Alazab, M., Alazab, M.A.: Evolution of industry and blockchain era: monitoring price hike and corruption using BIoT for smart government and industry 4.0. IEEE Trans. Ind. Inf. 18(12), 9153\u20139161 (2022)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"3","key":"1036_CR4","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.3390\/s22031154","volume":"22","author":"T-T-H Le","year":"2022","unstructured":"Le, T.-T.-H., Kim, H., Kang, H., Kim, H.: Classification and explanation for intrusion detection system based on ensemble trees and SHAP method. Sensors 22(3), 1154 (2022)","journal-title":"Sensors"},{"key":"1036_CR5","doi-asserted-by":"publisher","first-page":"4571","DOI":"10.1002\/ett.4571","volume":"34","author":"R Sharma","year":"2022","unstructured":"Sharma, R., Arya, R.: Security threats and measures in the internet of things for smart city infrastructure: a state of art. Trans. Emerg. Telecommun. Technol. 34, 4571 (2022)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"1036_CR6","doi-asserted-by":"crossref","unstructured":"Nastase, L.: Security in the internet of things: a survey on application layer protocols. In: 2017 21st International Conference on Control Systems and Computer Science (CSCS), pp. 659\u2013666. IEEE (2017)","DOI":"10.1109\/CSCS.2017.101"},{"key":"1036_CR7","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.jpdc.2019.01.004","volume":"127","author":"M Veeramanikandan","year":"2019","unstructured":"Veeramanikandan, M., Sankaranarayanan, S.: Publish\/subscribe based multi-tier edge computational model in internet of things for latency reduction. J. Parallel Distrib. Comput. 127, 18\u201327 (2019)","journal-title":"J. Parallel Distrib. Comput."},{"key":"1036_CR8","doi-asserted-by":"crossref","unstructured":"Nastase, L.: Security in the internet of things: A survey on application layer protocols. In: 2017 21st International Conference on Control Systems and Computer Science (CSCS), pp. 659\u2013666. IEEE (2017)","DOI":"10.1109\/CSCS.2017.101"},{"issue":"1","key":"1036_CR9","first-page":"1","volume":"2","author":"AS Ashoor","year":"2011","unstructured":"Ashoor, A.S., Gore, S.: Importance of intrusion detection system (IDS). Int. J. Sci. Eng. Res. 2(1), 1\u20134 (2011)","journal-title":"Int. J. Sci. Eng. Res."},{"issue":"6","key":"1036_CR10","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MWC.2010.5675777","volume":"17","author":"M Zorzi","year":"2010","unstructured":"Zorzi, M., Gluhak, A., Lange, S., Bassi, A.: From today\u2019s intranet of things to a future internet of things: a wireless-and mobility-related view. IEEE Wirel. Commun. 17(6), 44\u201351 (2010)","journal-title":"IEEE Wirel. Commun."},{"key":"1036_CR11","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.cose.2016.07.002","volume":"64","author":"A Patel","year":"2017","unstructured":"Patel, A., Alhussian, H., Pedersen, J.M., Bounabat, B., J\u00fanior, J.C., Katsikas, S.: A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems. Comput. Secur. 64, 92\u2013109 (2017)","journal-title":"Comput. Secur."},{"key":"1036_CR12","doi-asserted-by":"crossref","unstructured":"Makda, T.J., Barros, A.L., Dilek, S.: A secure cloud-based infrastructure for virtual sensors in IoT environments. In: 2023 Sixth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU), pp. 156\u2013161. IEEE (2023)","DOI":"10.1109\/WiDS-PSU57071.2023.00041"},{"key":"1036_CR13","doi-asserted-by":"publisher","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","volume":"6","author":"A Adadi","year":"2018","unstructured":"Adadi, A., Berrada, M.: Peeking inside the black-box: a survey on explainable artificial intelligence (XAI). IEEE Access 6, 52138\u201352160 (2018)","journal-title":"IEEE Access"},{"issue":"4","key":"1036_CR14","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1007\/s13347-021-00477-0","volume":"34","author":"WJ Eschenbach","year":"2021","unstructured":"Eschenbach, W.J.: Transparency and the black box problem: Why we do not trust AI. Philos. Technol. 34(4), 1607\u20131622 (2021)","journal-title":"Philos. Technol."},{"issue":"2","key":"1036_CR15","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1007\/s10462-022-10188-3","volume":"56","author":"N Talpur","year":"2023","unstructured":"Talpur, N., Abdulkadir, S.J., Alhussian, H., Hasan, M.H., Aziz, N., Bamhdi, A.: Deep neuro-fuzzy system application trends, challenges, and future perspectives: a systematic survey. Artif. Intell. Rev. 56(2), 865\u2013913 (2023)","journal-title":"Artif. Intell. Rev."},{"key":"1036_CR16","doi-asserted-by":"crossref","unstructured":"Amarasinghe, K., Kenney, K., Manic, M.: Toward explainable deep neural network based anomaly detection. In: 2018 11th International Conference on Human System Interaction (HSI), pp. 311\u2013317. IEEE (2018)","DOI":"10.1109\/HSI.2018.8430788"},{"key":"1036_CR17","doi-asserted-by":"crossref","unstructured":"Wang, S., Atif\u00a0Qureshi, M., Miralles-Pechu\u00e1n, L., Reddy\u00a0Gadekallu, T., Liyanage, M., et al.: Explainable ai for b5g\/6g: technical aspects, use cases, and research challenges. arXiv e-prints, 2112 (2021)","DOI":"10.1109\/OJCOMS.2024.3386872"},{"issue":"11","key":"1036_CR18","doi-asserted-by":"publisher","first-page":"5088","DOI":"10.3390\/app11115088","volume":"11","author":"AM Antoniadi","year":"2021","unstructured":"Antoniadi, A.M., Du, Y., Guendouz, Y., Wei, L., Mazo, C., Becker, B.A., Mooney, C.: Current challenges and future opportunities for XAI in machine learning-based clinical decision support systems: a systematic review. Appl. Sci. 11(11), 5088 (2021)","journal-title":"Appl. Sci."},{"key":"1036_CR19","doi-asserted-by":"crossref","unstructured":"Hindy, H., Bayne, E., Bures, M., Atkinson, R., Tachtatzis, C., Bellekens, X.: Machine learning based IoT intrusion detection system: An MQTT case study (MQTT-IoT-ids2020 dataset). In: Selected Papers from the 12th International Networking Conference: INC 2020, pp. 73\u201384. Springer (2021)","DOI":"10.1007\/978-3-030-64758-2_6"},{"key":"1036_CR20","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: \"Why should i trust you?\" explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1135\u20131144 (2016)","DOI":"10.1145\/2939672.2939778"},{"key":"1036_CR21","unstructured":"Lundberg, S.M., Lee, S.-I.: A unified approach to interpreting model predictions. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"key":"1036_CR22","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1016\/j.cag.2021.09.002","volume":"102","author":"G Alicioglu","year":"2022","unstructured":"Alicioglu, G., Sun, B.: A survey of visual analytics for explainable artificial intelligence methods. Comput. Graphics 102, 502\u2013520 (2022)","journal-title":"Comput. Graphics"},{"key":"1036_CR23","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.inffus.2019.12.012","volume":"58","author":"AB Arrieta","year":"2020","unstructured":"Arrieta, A.B., D\u00edaz-Rodr\u00edguez, N., Del Ser, J., Bennetot, A., Tabik, S., Barbado, A., Garc\u00eda, S., Gil-L\u00f3pez, S., Molina, D., Benjamins, R., et al.: Explainable artificial intelligence (XAI): concepts, taxonomies, opportunities and challenges toward responsible AI. Inf. Fus. 58, 82\u2013115 (2020)","journal-title":"Inf. Fus."},{"key":"1036_CR24","doi-asserted-by":"publisher","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","volume":"6","author":"A Adadi","year":"2018","unstructured":"Adadi, A., Berrada, M.: Peeking inside the black-box: a survey on explainable artificial intelligence (XAI). IEEE Access 6, 52138\u201352160 (2018)","journal-title":"IEEE Access"},{"issue":"4","key":"1036_CR25","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1007\/s13347-021-00477-0","volume":"34","author":"WJ Eschenbach","year":"2021","unstructured":"Eschenbach, W.J.: Transparency and the black box problem: Why we do not trust ai. Philos. Technol. 34(4), 1607\u20131622 (2021)","journal-title":"Philos. Technol."},{"key":"1036_CR26","doi-asserted-by":"publisher","first-page":"93575","DOI":"10.1109\/ACCESS.2022.3204171","volume":"10","author":"N Capuano","year":"2022","unstructured":"Capuano, N., Fenza, G., Loia, V., Stanzione, C.: Explainable artificial intelligence in cybersecurity: a survey. IEEE Access 10, 93575\u201393600 (2022)","journal-title":"IEEE Access"},{"key":"1036_CR27","unstructured":"Zahavy, T., Ben-Zrihem, N., Mannor, S.: Graying the black box: Understanding DQNs. In: International Conference on Machine Learning, pp. 1899\u20131908. PMLR (2016)"},{"key":"1036_CR28","unstructured":"Lundberg, S.M., Lee, S.-I.: A unified approach to interpreting model predictions. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"key":"1036_CR29","first-page":"17212","volume":"33","author":"I Covert","year":"2020","unstructured":"Covert, I., Lundberg, S.M., Lee, S.-I.: Understanding global feature contributions with additive importance measures. Adv. Neural. Inf. Process. Syst. 33, 17212\u201317223 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"1036_CR30","doi-asserted-by":"crossref","unstructured":"Marc\u00edlio, W.E., Eler, D.M.: From explanations to feature selection: assessing shap values as feature selection mechanism. In: 2020 33rd SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI), pp. 340\u2013347. IEEE (2020)","DOI":"10.1109\/SIBGRAPI51738.2020.00053"},{"key":"1036_CR31","doi-asserted-by":"publisher","first-page":"42210","DOI":"10.1109\/ACCESS.2019.2904620","volume":"7","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Xing, C., Zhang, T., Zhao, Z.: An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7, 42210\u201342219 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2904620","journal-title":"IEEE Access"},{"issue":"2","key":"1036_CR32","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TSUSC.2018.2793284","volume":"5","author":"F Jiang","year":"2020","unstructured":"Jiang, F., Fu, Y., Gupta, B.B., Liang, Y., Rho, S., Lou, F., Meng, F., Tian, Z.: Deep learning based multi-channel intelligent attack detection for data security. IEEE Trans. Sustain. Comput. 5(2), 204\u2013212 (2020). https:\/\/doi.org\/10.1109\/TSUSC.2018.2793284","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"1036_CR33","doi-asserted-by":"publisher","first-page":"100446","DOI":"10.1016\/j.simpa.2022.100446","volume":"14","author":"L Yang","year":"2022","unstructured":"Yang, L., Shami, A.: IDS-ML: an open source code for intrusion detection system development using machine learning. Softw. Impacts 14, 100446 (2022)","journal-title":"Softw. Impacts"},{"key":"1036_CR34","doi-asserted-by":"publisher","unstructured":"Abdelkhalek, M., Ravikumar, G., Govindarasu, M.: Ml-based anomaly detection system for der communication in smart grid. In: 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), pp. 1\u20135 (2022). https:\/\/doi.org\/10.1109\/ISGT50606.2022.9817481","DOI":"10.1109\/ISGT50606.2022.9817481"},{"key":"1036_CR35","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1007\/s10207-023-00681-3","volume":"22","author":"H Zeghida","year":"2023","unstructured":"Zeghida, H., Boulaiche, M., Chikh, R.: Securing MQTT protocol for IoT environment using ids based on ensemble learning. Int. J. Inf. Secur. 22, 1075\u20131086 (2023)","journal-title":"Int. J. Inf. Secur."},{"issue":"14","key":"1036_CR36","doi-asserted-by":"publisher","first-page":"2158","DOI":"10.3390\/electronics11142158","volume":"11","author":"S Gadal","year":"2022","unstructured":"Gadal, S., Mokhtar, R., Abdelhaq, M., Alsaqour, R., Ali, E.S., Saeed, R.: Machine learning-based anomaly detection using k-mean array and sequential minimal optimization. Electronics 11(14), 2158 (2022). https:\/\/doi.org\/10.3390\/electronics11142158","journal-title":"Electronics"},{"key":"1036_CR37","doi-asserted-by":"crossref","unstructured":"Zeghida, H., Boulaiche, M., Chikh, R.: Detection of dos attacks in MQTT environment. In: International Conference on Intelligent Systems and Pattern Recognition, pp. 129\u2013140. Springer (2023)","DOI":"10.1007\/978-3-031-46338-9_10"},{"issue":"3","key":"1036_CR38","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s10922-023-09741-4","volume":"31","author":"T Linhares","year":"2023","unstructured":"Linhares, T., Patel, A., Barros, A.L., Fernandez, M.: SDNTruth: innovative DDoS detection scheme for software-defined networks (SDN). J. Netw. Syst. Manage. 31(3), 55 (2023)","journal-title":"J. Netw. Syst. Manage."},{"issue":"4","key":"1036_CR39","doi-asserted-by":"publisher","first-page":"4225","DOI":"10.1109\/TNSM.2021.3098157","volume":"18","author":"A Nascita","year":"2021","unstructured":"Nascita, A., Montieri, A., Aceto, G., Ciuonzo, D., Persico, V., Pescap\u00e9, A.: XAI meets mobile traffic classification: understanding and improving multimodal deep learning architectures. IEEE Trans. Netw. Serv. Manage. 18(4), 4225\u20134246 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"1036_CR40","doi-asserted-by":"crossref","unstructured":"Marino, D.L., Wickramasinghe, C.S., Manic, M.: An adversarial approach for explainable ai in intrusion detection systems. In: IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, pp. 3237\u20133243, IEEE (2018)","DOI":"10.1109\/IECON.2018.8591457"},{"key":"1036_CR41","unstructured":"Mane, S., Rao, D.: Explaining network intrusion detection system using explainable ai framework. arXiv preprint arXiv:2103.07110 (2021)"},{"key":"1036_CR42","doi-asserted-by":"publisher","first-page":"73127","DOI":"10.1109\/ACCESS.2020.2988359","volume":"8","author":"M Wang","year":"2020","unstructured":"Wang, M., Zheng, K., Yang, Y., Wang, X.: An explainable machine learning framework for intrusion detection systems. IEEE Access 8, 73127\u201373141 (2020)","journal-title":"IEEE Access"},{"key":"1036_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6634811","volume":"2021","author":"B Mahbooba","year":"2021","unstructured":"Mahbooba, B., Timilsina, M., Sahal, R., Serrano, M.: Explainable artificial intelligence (XAI) to enhance trust management in intrusion detection systems using decision tree model. Complexity 2021, 1\u201311 (2021)","journal-title":"Complexity"},{"key":"1036_CR44","doi-asserted-by":"crossref","unstructured":"Szczepa\u0144ski, M., Chora\u015b, M., Pawlicki, M., Kozik, R.: Achieving explainability of intrusion detection system by hybrid oracle-explainer approach. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138. IEEE (2020)","DOI":"10.1109\/IJCNN48605.2020.9207199"},{"key":"1036_CR45","doi-asserted-by":"publisher","first-page":"100359","DOI":"10.1016\/j.bdr.2022.100359","volume":"30","author":"M Sarhan","year":"2022","unstructured":"Sarhan, M., Layeghy, S., Portmann, M.: Evaluating standard feature sets towards increased generalisability and explainability of ML-based network intrusion detection. Big Data Res. 30, 100359 (2022)","journal-title":"Big Data Res."},{"key":"1036_CR46","doi-asserted-by":"publisher","first-page":"119000","DOI":"10.1016\/j.ins.2023.119000","volume":"639","author":"M Keshk","year":"2023","unstructured":"Keshk, M., Koroniotis, N., Pham, N., Moustafa, N., Turnbull, B., Zomaya, A.Y.: An explainable deep learning-enabled intrusion detection framework in IoT networks. Inf. Sci. 639, 119000 (2023)","journal-title":"Inf. Sci."},{"key":"1036_CR47","doi-asserted-by":"publisher","first-page":"103329","DOI":"10.1016\/j.adhoc.2023.103329","volume":"153","author":"M Al-Hawawreh","year":"2024","unstructured":"Al-Hawawreh, M., Moustafa, N.: Explainable deep learning for attack intelligence and combating cyber-physical attacks. Ad Hoc Netw. 153, 103329 (2024)","journal-title":"Ad Hoc Netw."},{"issue":"10","key":"1036_CR48","doi-asserted-by":"publisher","first-page":"0286652","DOI":"10.1371\/journal.pone.0286652","volume":"18","author":"D Zegarra Rodr\u00edguez","year":"2023","unstructured":"Zegarra Rodr\u00edguez, D., Daniel Okey, O., Maidin, S.S., Umoren Udo, E., Kleinschmidt, J.H.: Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic xplainable feature selection. PLoS ONE 18(10), 0286652 (2023)","journal-title":"PLoS ONE"},{"key":"1036_CR49","doi-asserted-by":"crossref","unstructured":"Abou El\u00a0Houda, Z., Brik, B., Khoukhi, L.: \u201cWhy should i trust your ids?\u201d: An explainable deep learning framework for intrusion detection systems in internet of things networks. IEEE Open J. Commun. Soc. 3, 1164\u20131176 (2022)","DOI":"10.1109\/OJCOMS.2022.3188750"},{"key":"1036_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10661-015-5049-6","volume":"188","author":"SA Naghibi","year":"2016","unstructured":"Naghibi, S.A., Pourghasemi, H.R., Dixon, B.: GIS-based groundwater potential mapping using boosted regression tree, classification and regression tree, and random forest machine learning models in Iran. Environ. Monit. Assess. 188, 1\u201327 (2016)","journal-title":"Environ. Monit. Assess."},{"key":"1036_CR51","unstructured":"Apostolidis-Afentoulis, V., Lioufi, K.-I.: SVM classification with linear and RBF kernels. July): 0-7. http:\/\/www.academia.edu\/13811676\/SVM Classification with Linear and RBF kernels.[21] (2015)"},{"issue":"11","key":"1036_CR52","doi-asserted-by":"publisher","first-page":"2308","DOI":"10.3390\/sym14112308","volume":"14","author":"MS Akhtar","year":"2022","unstructured":"Akhtar, M.S., Feng, T.: Detection of malware by deep learning as CNN-LSTM machine learning techniques in real time. Symmetry 14(11), 2308 (2022). https:\/\/doi.org\/10.3390\/sym14112308","journal-title":"Symmetry"},{"issue":"4","key":"1036_CR53","first-page":"75","volume":"6","author":"J Maria Navin","year":"2016","unstructured":"Maria Navin, J., Pankaja, R.: Performance analysis of text classification algorithms using confusion matrix. Int. J. Eng. Techn. Res. 6(4), 75\u20138 (2016)","journal-title":"Int. J. Eng. Techn. Res."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01036-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01036-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01036-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:11:46Z","timestamp":1750500706000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01036-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,14]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1036"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01036-w","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,14]]},"assertion":[{"value":"14 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No potential conflict of interest was reported by the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This work was carried out according to the ethical guidelines.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"128"}}