{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T05:07:32Z","timestamp":1773983252901,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T00:00:00Z","timestamp":1751068800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T00:00:00Z","timestamp":1751068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10207-025-01077-1","type":"journal-article","created":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T05:44:00Z","timestamp":1751089440000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["MF2S-CID: A dynamic multi-model framework for scalable and interpretable intrusion detection"],"prefix":"10.1007","volume":"24","author":[{"given":"Saida","family":"Farhat","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Patel","sequence":"additional","affiliation":[]},{"given":"Ana Luiza Bessa","family":"Barros","sequence":"additional","affiliation":[]},{"given":"Alwi M","family":"Bamhdi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,28]]},"reference":[{"issue":"4","key":"1077_CR1","doi-asserted-by":"publisher","first-page":"2637","DOI":"10.1007\/s11277-022-10063-y","volume":"128","author":"LK Vashishtha","year":"2023","unstructured":"Vashishtha, L.K., Singh, A.P., Chatterjee, K.: Hidm: A hybrid intrusion detection model for cloud based systems. Wireless Personal Communications 128(4), 2637\u20132666 (2023). https:\/\/doi.org\/10.1007\/s11277-022-10063-y","journal-title":"Wireless Personal Communications"},{"key":"1077_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2022.103236","volume":"173","author":"M Mayuranathan","year":"2022","unstructured":"Mayuranathan, M., Saravanan, S.K., Muthusenthil, B., Samydurai, A.: An efficient optimal security system for intrusion detection in cloud computing environment using hybrid deep learning technique. Advances in Engineering Software 173, 103236 (2022). https:\/\/doi.org\/10.1016\/j.advengsoft.2022.103236","journal-title":"Advances in Engineering Software"},{"key":"1077_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2024.100517","volume":"27","author":"M Ouhssini","year":"2024","unstructured":"Ouhssini, M., Afdel, K., Akouhar, M., Agherrabi, E., Abarda, A.: Advancements in detecting, preventing, and mitigating ddos attacks in cloud environments: A comprehensive systematic review of state-of-the-art approaches. Egyptian Informatics Journal 27, 100517 (2024). https:\/\/doi.org\/10.1016\/j.eij.2024.100517","journal-title":"Egyptian Informatics Journal"},{"issue":"4","key":"1077_CR4","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/s10586-024-04884-8","volume":"28","author":"MF Hussain","year":"2025","unstructured":"Hussain, M.F., Hasan, S.S., Rauf, H.: Cloud security modeling: using tcp deltas with data analytics and machine learning techniques. Cluster Computing 28(4), 260 (2025). https:\/\/doi.org\/10.1007\/s10586-024-04884-8","journal-title":"Cluster Computing"},{"key":"1077_CR5","doi-asserted-by":"publisher","unstructured":"Akuthota, U.C., Bhargava, L.: Transformer based intrusion detection for iot networks. IEEE Internet of Things Journal, 1\u20131 (2025). Available at: https:\/\/doi.org\/10.1109\/JIOT.2025.3525494","DOI":"10.1109\/JIOT.2025.3525494"},{"issue":"1","key":"1077_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1186\/s13677-023-00574-9","volume":"13","author":"Z Long","year":"2024","unstructured":"Long, Z., Yan, H., Shen, G., Zhang, X., He, H., Cheng, L.: A transformer-based network intrusion detection approach for cloud security. Journal of Cloud Computing 13(1), 5 (2024). https:\/\/doi.org\/10.1186\/s13677-023-00574-9","journal-title":"Journal of Cloud Computing"},{"key":"1077_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.112447","volume":"167","author":"AA Mamun","year":"2024","unstructured":"Mamun, A.A., Al-Sahaf, H., Welch, I., Mansoori, M., Camtepe, S.: Detection of advanced persistent threat: A genetic programming approach. Applied Soft Computing 167, 112447 (2024). https:\/\/doi.org\/10.1016\/j.asoc.2024.112447","journal-title":"Applied Soft Computing"},{"key":"1077_CR8","doi-asserted-by":"publisher","unstructured":"Binbusayyis, A.: Innovative defense: Deep learning-powered intrusion detection for iot networks. IEEE Access, 1\u20131 (2025). Available at: https:\/\/doi.org\/10.1109\/ACCESS.2025.3542275","DOI":"10.1109\/ACCESS.2025.3542275"},{"issue":"6","key":"1077_CR9","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1049\/cmu2.12833","volume":"18","author":"A Salehpour","year":"2024","unstructured":"Salehpour, A., Norouzi, M., Balafar, M.A., SamadZamini, K.: A cloud-based hybrid intrusion detection framework using xgboost and adasyn-augmented random forest for iomt. IET Communications 18(6), 1124\u20131132 (2024). https:\/\/doi.org\/10.1049\/cmu2.12833","journal-title":"IET Communications"},{"key":"1077_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2024.100519","volume":"27","author":"S Ali","year":"2024","unstructured":"Ali, S., Wadho, S.A., Yichiet, A., Gan, M.L., Lee, C.K.: Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing. Egyptian Informatics Journal 27, 100519 (2024). https:\/\/doi.org\/10.1016\/j.eij.2024.100519","journal-title":"Egyptian Informatics Journal"},{"key":"1077_CR11","doi-asserted-by":"publisher","unstructured":"Ali, M., Haque, M.-u.-, Durad, M.H., Usman, A., Mohsin, S.M., Mujlid, H., Maple, C.: Effective network intrusion detection using stacking-based ensemble approach. International Journal of Information Security 22(6), 1781\u20131798 (2023). https:\/\/doi.org\/10.1007\/s10207-023-00718-7","DOI":"10.1007\/s10207-023-00718-7"},{"issue":"1","key":"1077_CR12","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1186\/s13677-023-00420-y","volume":"12","author":"D Mohamed","year":"2023","unstructured":"Mohamed, D., Ismael, O.: Enhancement of an iot hybrid intrusion detection system based on fog-to-cloud computing. Journal of Cloud Computing 12(1), 41 (2023). https:\/\/doi.org\/10.1186\/s13677-023-00420-y","journal-title":"Journal of Cloud Computing"},{"issue":"16","key":"1077_CR13","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1049\/cmu2.12801","volume":"18","author":"M Al-Sharif","year":"2024","unstructured":"Al-Sharif, M., Bushnag, A.: Enhancing cloud security: A study on ensemble learning-based intrusion detection systems. IET Communications 18(16), 950\u2013965 (2024). https:\/\/doi.org\/10.1049\/cmu2.12801","journal-title":"IET Communications"},{"key":"1077_CR14","doi-asserted-by":"publisher","unstructured":"Samriya, J.K., Kumar, S., Kumar, M., Wu, H., Gill, S.S.: Machine learning based network intrusion detection optimization for cloud computing environments. IEEE Transactions on Consumer Electronics (2024). Available at: https:\/\/doi.org\/10.1109\/TCE.2024.3458810","DOI":"10.1109\/TCE.2024.3458810"},{"key":"1077_CR15","doi-asserted-by":"publisher","unstructured":"Abdulganiyu, O., Ait\u00a0Tchakoucht, T., Saheed, Y.: Towards an efficient model for network intrusion detection system (ids): systematic literature review. Wireless Networks 30 (2023). Available at: https:\/\/doi.org\/10.1007\/s11276-023-03495-2","DOI":"10.1007\/s11276-023-03495-2"},{"key":"1077_CR16","doi-asserted-by":"publisher","unstructured":"Chang, V., Golightly, L., Modesti, P., Xu, Q.A., Doan, L.M.T., Hall, K., Boddu, S., Kobusinska, A.: A survey on intrusion detection systems for fog and cloud computing. Future Internet 14(3) (2022). Available at: https:\/\/doi.org\/10.3390\/fi14030089","DOI":"10.3390\/fi14030089"},{"issue":"13","key":"1077_CR17","doi-asserted-by":"publisher","first-page":"11604","DOI":"10.1109\/JIOT.2021.3130156","volume":"9","author":"IA Khan","year":"2022","unstructured":"Khan, I.A., Moustafa, N., Pi, D., Sallam, K.M., Zomaya, A.Y., Li, B.: A new explainable deep learning framework for cyber threat discovery in industrial iot networks. IEEE Internet of Things Journal 9(13), 11604\u201311613 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3130156","journal-title":"IEEE Internet of Things Journal"},{"key":"1077_CR18","doi-asserted-by":"publisher","unstructured":"Altalhan, M., Algarni, A., Monia, T.: Imbalanced data problem in machine learning: A review. IEEE Access PP, 1\u20131 (2025). Available at: https:\/\/doi.org\/10.1109\/ACCESS.2025.3531662","DOI":"10.1109\/ACCESS.2025.3531662"},{"issue":"12","key":"1077_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.modpat.2024.100609","volume":"37","author":"L Pantanowitz","year":"2024","unstructured":"Pantanowitz, L., Hanna, M., Pantanowitz, J., Lennerz, J., Henricks, W.H., Shen, P., Quinn, B., Bennet, S., Rashidi, H.H.: Regulatory aspects of artificial intelligence and machine learning. Modern Pathology 37(12), 100609 (2024). https:\/\/doi.org\/10.1016\/j.modpat.2024.100609","journal-title":"Modern Pathology"},{"key":"1077_CR20","doi-asserted-by":"publisher","unstructured":"Vashishtha, L., Singh, A., Chatterjee, K.: Hidm: A hybrid intrusion detection model for cloud based systems. Wireless Personal Communications 128 (2022). Available at: https:\/\/doi.org\/10.1007\/s11277-022-10063-y","DOI":"10.1007\/s11277-022-10063-y"},{"key":"1077_CR21","doi-asserted-by":"publisher","unstructured":"Rodriguez, D.Z., Okey, O., Maidin, S., Ekikere, U., Kleinschmidt, J.: Attentive transformer deep learning algorithm for intrusion detection on iot systems using automatic xplainable feature selection. PLOS ONE 18, 0286652 (2023). Available at: https:\/\/doi.org\/10.1371\/journal.pone.0286652","DOI":"10.1371\/journal.pone.0286652"},{"key":"1077_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111434","volume":"155","author":"YK Saheed","year":"2024","unstructured":"Saheed, Y.K., Abdulganiyu, O.H., Tchakoucht, T.A.: Modified genetic algorithm and fine-tuned long short-term memory network for intrusion detection in the internet of things networks with edge capabilities. Applied Soft Computing 155, 111434 (2024). https:\/\/doi.org\/10.1016\/j.asoc.2024.111434","journal-title":"Applied Soft Computing"},{"key":"1077_CR23","doi-asserted-by":"publisher","unstructured":"Kamal, H., Mashaly, M.: Advanced hybrid transformer-cnn deep learning model for effective intrusion detection systems with class imbalance mitigation using resampling techniques. Future Internet 16(12) (2024). Available at: https:\/\/doi.org\/10.3390\/fi16120481","DOI":"10.3390\/fi16120481"},{"key":"1077_CR24","doi-asserted-by":"publisher","unstructured":"Aljuaid, W.H., Alshamrani, S.S.: A deep learning approach for intrusion detection systems in cloud computing environments. Applied Sciences 14(13) (2024). https:\/\/doi.org\/10.3390\/app14135381","DOI":"10.3390\/app14135381"},{"issue":"5","key":"1077_CR25","doi-asserted-by":"publisher","first-page":"3329","DOI":"10.1007\/s10207-024-00891-3","volume":"23","author":"AA Wardana","year":"2024","unstructured":"Wardana, A.A., Kolaczek, G., Warzynski, A., Sukarno, P.: Collaborative intrusion detection using weighted ensemble averaging deep neural network for coordinated attack detection in heterogeneous network. International Journal of Information Security 23(5), 3329\u20133349 (2024). https:\/\/doi.org\/10.1007\/s10207-024-00891-3","journal-title":"International Journal of Information Security"},{"issue":"19","key":"1077_CR26","doi-asserted-by":"publisher","first-page":"26942","DOI":"10.1007\/s11227-024-06409-x","volume":"80","author":"AG Ayad","year":"2024","unstructured":"Ayad, A.G., Sakr, N.A., Hikal, N.A.: A hybrid approach for efficient feature selection in anomaly intrusion detection for iot networks. The Journal of Supercomputing 80(19), 26942\u201326984 (2024). https:\/\/doi.org\/10.1007\/s11227-024-06409-x","journal-title":"The Journal of Supercomputing"},{"key":"1077_CR27","doi-asserted-by":"publisher","unstructured":"Babbar, H., Rani, S., Boulila, W.: Ngmd: next generation malware detection in federated server with deep neural network model for autonomous networks. Scientific Reports 14 (2024). Available at: https:\/\/doi.org\/10.1038\/s41598-024-61298-7","DOI":"10.1038\/s41598-024-61298-7"},{"key":"1077_CR28","doi-asserted-by":"publisher","unstructured":"Abdulganiyu, O., Ait\u00a0Tchakoucht, T., Saheed, Y., Ahmed, H.: Xidintfl-vae: Xgboost-based intrusion detection of imbalance network traffic via class-wise focal loss variational autoencoder. The Journal of Supercomputing 81 (2024). Available at: https:\/\/doi.org\/10.1007\/s11227-024-06552-5","DOI":"10.1007\/s11227-024-06552-5"},{"key":"1077_CR29","doi-asserted-by":"publisher","unstructured":"Kurniabudi, Stiawan, D., Darmawijoyo, Bin\u00a0Idris, M.Y., Bamhdi, A.M., Budiarto, R.: Cicids-2017 dataset feature analysis with information gain for anomaly detection. IEEE Access 8, 132911\u2013132921 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3009843","DOI":"10.1109\/ACCESS.2020.3009843"},{"key":"1077_CR30","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.future.2021.09.010","volume":"127","author":"IA Khan","year":"2022","unstructured":"Khan, I.A., Moustafa, N., Razzak, I., Tanveer, M., Pi, D., Pan, Y., Ali, B.S.: Xsru-iomt: Explainable simple recurrent units for threat detection in internet of medical things networks. Future Generation Computer Systems 127, 181\u2013193 (2022). https:\/\/doi.org\/10.1016\/j.future.2021.09.010","journal-title":"Future Generation Computer Systems"},{"key":"1077_CR31","doi-asserted-by":"publisher","unstructured":"Jemili, F., Jouini, K., Korbaa, O.: Intrusion detection based on concept drift detection and online incremental learning. International Journal of Pervasive Computing and Communications 21, 81\u2013115 (2024). Available at: https:\/\/doi.org\/10.1108\/IJPCC-12-2023-0358","DOI":"10.1108\/IJPCC-12-2023-0358"},{"key":"1077_CR32","doi-asserted-by":"publisher","unstructured":"Li, J., Chen, H., Othman, M., Salim, N., Mi\u00a0Yusuf, L., Raja, S.: Nfiot-gate-dtl ids: Genetic algorithm-tuned ensemble of deep transfer learning for netflow-based intrusion detection system for internet of things. Engineering Applications of Artificial Intelligence 143 (2025). Available at: https:\/\/doi.org\/10.1016\/j.engappai.2025.110046","DOI":"10.1016\/j.engappai.2025.110046"},{"key":"1077_CR33","doi-asserted-by":"publisher","unstructured":"Sharafaldin, I., Habibi Lashkari, A., Ghorbani, A.A.: Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy - ICISSP, pp. 108\u2013116. SciTePress, Funchal, Madeira, Portugal (2018). INSTICC. Available at: https:\/\/doi.org\/10.5220\/0006639801080116","DOI":"10.5220\/0006639801080116"},{"key":"1077_CR34","doi-asserted-by":"publisher","unstructured":"Moustafa, N.: ToN_IoT datasets. IEEE Dataport. Available at: https:\/\/doi.org\/10.21227\/fesz-dm97 (2019)","DOI":"10.21227\/fesz-dm97"},{"key":"1077_CR35","doi-asserted-by":"publisher","unstructured":"Sarhan, M., Layeghy, S., Moustafa, N., Portmann, M.: Towards a Standard Feature Set of NIDS Datasets. https:\/\/doi.org\/10.48550\/arXiv.2101.11315 (2021)","DOI":"10.48550\/arXiv.2101.11315"},{"key":"1077_CR36","unstructured":"Luay, M., Layeghy, S., Hosseininoorbin, S., Sarhan, M., Moustafa, N., Portmann, M.: Temporal Analysis of NetFlow Datasets for Network Intrusion Detection Systems. Available at: arxiv:2503.04404 (2025)"},{"key":"1077_CR37","doi-asserted-by":"publisher","unstructured":"Uwazie, E.C., Iheonkhan, I.S., Adenekan, W.A., Apene, O.Z.: Comparison of convolutional neural networks, long short-term memory networks, and recurrent neural networks for intrusion detection system. In: 2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals (SEB4SDG), pp. 1\u20137 (2024). https:\/\/doi.org\/10.1109\/SEB4SDG60871.2024.10630306","DOI":"10.1109\/SEB4SDG60871.2024.10630306"},{"issue":"16","key":"1077_CR38","doi-asserted-by":"publisher","first-page":"27715","DOI":"10.1109\/JIOT.2024.3404808","volume":"11","author":"AGM Mengara","year":"2024","unstructured":"Mengara, A.G.M., Yoo, Y., Leung, V.C.M.: Iotsecut: Uncertainty-based hybrid deep learning approach for superior iot security amidst evolving cyber threats. IEEE Internet of Things Journal 11(16), 27715\u201327731 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3404808","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"1077_CR39","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/s10207-023-00767-y","volume":"23","author":"H Zouhri","year":"2024","unstructured":"Zouhri, H., Idri, A., Ratnani, A.: Evaluating the impact of filter-based feature selection in intrusion detection systems. International Journal of Information Security 23(2), 759\u2013785 (2024). https:\/\/doi.org\/10.1007\/s10207-023-00767-y","journal-title":"International Journal of Information Security"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01077-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01077-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01077-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T11:32:35Z","timestamp":1757071955000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01077-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,28]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1077"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01077-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,28]]},"assertion":[{"value":"28 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of interest of any kind.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"Code will be made available on request.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}],"article-number":"165"}}