{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T16:01:23Z","timestamp":1768924883657,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T00:00:00Z","timestamp":1758153600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T00:00:00Z","timestamp":1758153600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012639","name":"Prince Sultan University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012639","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004242","name":"Princess Nourah bint Abdulrahman University","doi-asserted-by":"crossref","award":["PNURSP2025R319"],"award-info":[{"award-number":["PNURSP2025R319"]}],"id":[{"id":"10.13039\/501100004242","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10207-025-01128-7","type":"journal-article","created":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T12:44:09Z","timestamp":1758199449000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Intrusion detection in IoT network using temporal wavelet augmented deep dense and LSTM auto-encoders"],"prefix":"10.1007","volume":"24","author":[{"given":"Mohammed","family":"Zakariah","sequence":"first","affiliation":[]},{"given":"Syed Umar","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Fatma S.","family":"Alrayes","sequence":"additional","affiliation":[]},{"given":"Abeer","family":"Alnuaim","sequence":"additional","affiliation":[]},{"given":"Zafar Iqbal","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,18]]},"reference":[{"key":"1128_CR1","doi-asserted-by":"publisher","first-page":"101574","DOI":"10.1109\/ACCESS.2021.3097247","volume":"9","author":"J Lansky","year":"2021","unstructured":"Lansky, J., et al.: Deep learning-based intrusion detection systems: a systematic review. IEEE Access. 9, 101574\u2013101599 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3097247","journal-title":"IEEE Access."},{"key":"1128_CR2","doi-asserted-by":"publisher","unstructured":"Feroz Khan, A.B., Hussain, M.M., Kalpana Devi, S., Gunavathie, M.A.: DDoS attack modeling and resistance using trust based protocol for the security of internet of things. J. Eng. Res. 11(2), 100058 (Jun. 2023). https:\/\/doi.org\/10.1016\/j.jer.2023.100058","DOI":"10.1016\/j.jer.2023.100058"},{"key":"1128_CR3","doi-asserted-by":"publisher","unstructured":"Sayed, M.A., Atallah, R., Assi, C., Debbabi, M.: Electric vehicle attack impact on power grid operation. Int. J. Electr. Power Energy Syst. 137, 107784 (May 2022). https:\/\/doi.org\/10.1016\/j.ijepes.2021.107784","DOI":"10.1016\/j.ijepes.2021.107784"},{"key":"1128_CR4","doi-asserted-by":"publisher","unstructured":"Abdalzaher, M.S., Elwekeil, M., Wang, T., Zhang, S.: A deep auto-encoder trust model for mitigating jamming attack in IoT assisted by cognitive radio. IEEE Syst J. 16(3), 3635\u20133645 (Sep. 2022). https:\/\/doi.org\/10.1109\/JSYST.2021.3099072","DOI":"10.1109\/JSYST.2021.3099072"},{"key":"1128_CR5","doi-asserted-by":"publisher","unstructured":"Latif, S., et al.: Intrusion detection framework for the internet of things using a dense random neural network. IEEE Trans Industr Inform. 18(9), 6435\u20136444 (Sep. 2022). https:\/\/doi.org\/10.1109\/TII.2021.3130248","DOI":"10.1109\/TII.2021.3130248"},{"key":"1128_CR6","doi-asserted-by":"publisher","unstructured":"Yao, W., Hu, L., Hou, Y., Li, X.: A lightweight intelligent network intrusion detection system using one-class auto-encoder and ensemble learning for IoT. Sensors. 23(8), 4141 (Apr. 2023). https:\/\/doi.org\/10.3390\/s23084141","DOI":"10.3390\/s23084141"},{"key":"1128_CR7","doi-asserted-by":"publisher","unstructured":"Ranjana, D.P.: An intrusion detection system using a machine learning approach in IoT-based smart cities. J. Internet Serv. Inform. Secur. 13(1), 11\u201321 (Jan. 2023). https:\/\/doi.org\/10.58346\/JISIS.2023.I1.002","DOI":"10.58346\/JISIS.2023.I1.002"},{"key":"1128_CR8","doi-asserted-by":"publisher","unstructured":"Bouchayer, R., Jun, J.-Y., Chaouchi, H., Millet, P.: In search of distance functions that improve auto-encoder performance for intrusion detection. In: 2023 Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN), IEEE, 456\u2013461 (Jul. 2023). https:\/\/doi.org\/10.1109\/ICUFN57995.2023.10200629","DOI":"10.1109\/ICUFN57995.2023.10200629"},{"key":"1128_CR9","doi-asserted-by":"publisher","unstructured":"Qaddoura, R., Al-Zoubi, A.M., Faris, H., Almomani, I.: A multi-layer classification approach for intrusion detection in IoT networks based on deep learning. Sensors. 21(9), 2987 (Apr. 2021). https:\/\/doi.org\/10.3390\/s21092987","DOI":"10.3390\/s21092987"},{"key":"1128_CR10","doi-asserted-by":"publisher","unstructured":"Hassan, H.A., Hemdan, E.E., El-Shafai, W., Shokair, M., El-Samie, F.E.A.: Intrusion detection systems for the internet of thing: a survey study. Wirel Pers Commun. 128(4), 2753\u20132778 (Feb. 2023). https:\/\/doi.org\/10.1007\/s11277-022-10069-6","DOI":"10.1007\/s11277-022-10069-6"},{"key":"1128_CR11","doi-asserted-by":"publisher","unstructured":"Azar, A.T., Shehab, E., Mattar, A.M., Hameed, I.A., Elsaid, S.A.: Deep learning based hybrid intrusion detection systems to protect satellite networks. J. Netw. Syst. Manag. 31, 82 (2023). https:\/\/doi.org\/10.1007\/s10922-023-09767-8","DOI":"10.1007\/s10922-023-09767-8"},{"key":"1128_CR12","doi-asserted-by":"publisher","unstructured":"Zhang, W., Zhang, Y.: Intrusion detection model for industrial internet of things based on improved auto-encoder. Comput Intell Neurosci, 1\u20138 (May 2022). https:\/\/doi.org\/10.1155\/2022\/1406214","DOI":"10.1155\/2022\/1406214"},{"key":"1128_CR13","doi-asserted-by":"publisher","unstructured":"Khudhu, A.R., Samsudin, K.: IoT intrusion detection using auto-encoder and machine learning techniques. J. Comput. Sci. 18(10), 904\u2013912 (Oct. 2022). https:\/\/doi.org\/10.3844\/jcssp.2022.904.912","DOI":"10.3844\/jcssp.2022.904.912"},{"key":"1128_CR14","doi-asserted-by":"publisher","unstructured":"Mahmoud, M., Kasem, M., Abdallah, A., Kang, H.S.: AE-LSTM: auto-encoder with LSTM-based intrusion detection in IoT. In: 2022 International Telecommunications Conference (ITC-Egypt), IEEE, pp. 1\u20136. (Jul. 2022). https:\/\/doi.org\/10.1109\/ITC-Egypt55520.2022.9855688","DOI":"10.1109\/ITC-Egypt55520.2022.9855688"},{"key":"1128_CR15","doi-asserted-by":"publisher","unstructured":"Catillo, M., Pecchia, A., Villano, U.: Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding, in Proceedings of the 17th International Conference on Availability, Reliability and Security, New York, NY, USA: ACM, Aug. pp. 1\u20137. (2022). https:\/\/doi.org\/10.1145\/3538969.3544460","DOI":"10.1145\/3538969.3544460"},{"key":"1128_CR16","doi-asserted-by":"publisher","unstructured":"Bovenzi, G., Aceto, G., Ciuonzo, D., Montieri, A., Persico, V., Pescap\u00e9, A.: Network anomaly detection methods in IoT environments via deep learning: A fair comparison of performance and robustness. Comput. Secur. 128, 103167 (May 2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103167","DOI":"10.1016\/j.cose.2023.103167"},{"key":"1128_CR17","doi-asserted-by":"publisher","unstructured":"Saba, T., Rehman, A., Sadad, T., Kolivand, H., Bahaj, S.A.: Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput. Electr. Eng. 99, 107810 (Apr. 2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107810","DOI":"10.1016\/j.compeleceng.2022.107810"},{"issue":"2","key":"1128_CR18","doi-asserted-by":"publisher","first-page":"3763","DOI":"10.32604\/cmc.2022.027483","volume":"72","author":"R Marzouk","year":"2022","unstructured":"Marzouk, R., et al.: Hybrid deep learning enabled intrusion detection in clustered IIoT environment. Computers Mater. Continua. 72(2), 3763\u20133775 (2022). https:\/\/doi.org\/10.32604\/cmc.2022.027483","journal-title":"Computers Mater. Continua"},{"key":"1128_CR19","doi-asserted-by":"publisher","unstructured":"Sanju, P.: Enhancing intrusion detection in IoT systems: A hybrid metaheuristics-deep learning approach with ensemble of recurrent neural networks. Journal of Engineering Research. 11(4), 356\u2013361 (Dec. 2023). https:\/\/doi.org\/10.1016\/j.jer.2023.100122","DOI":"10.1016\/j.jer.2023.100122"},{"key":"1128_CR20","doi-asserted-by":"publisher","unstructured":"Aloul, F., Zualkernan, I., Abdalgawad, N., Hussain, L., Sakhnini, D.: Network Intrusion Detection on the IoT Edge Using Adversarial Auto-encoders, in 2021 International Conference on Information Technology (ICIT), IEEE, Jul. pp. 120\u2013125. (2021). https:\/\/doi.org\/10.1109\/ICIT52682.2021.9491694","DOI":"10.1109\/ICIT52682.2021.9491694"},{"key":"1128_CR21","doi-asserted-by":"publisher","unstructured":"Alshudukhi, A.F., Jabbar, S.A., Alshaikhdeeb, B.: A feature selection method based on auto-encoder for internet of things intrusion detection. Int. J. Electr. Comput. Eng. (IJECE). 12(3), 3265 (Jun. 2022). https:\/\/doi.org\/10.11591\/ijece.v12i3.pp3265-3275","DOI":"10.11591\/ijece.v12i3.pp3265-3275"},{"key":"1128_CR22","doi-asserted-by":"publisher","unstructured":"Awajan, A.: A novel deep learning-based intrusion detection system for IoT networks. Computers. 12(2), 34 (Feb. 2023). https:\/\/doi.org\/10.3390\/computers12020034","DOI":"10.3390\/computers12020034"},{"key":"1128_CR23","doi-asserted-by":"publisher","unstructured":"ElKashlan, M., Elsayed, M.S., Jurcut, A.D., Azer, M.: A machine Learning-Based intrusion detection system for IoT electric vehicle charging stations (EVCSs). Electron. (Basel). 12(4), 1044 (Feb. 2023). https:\/\/doi.org\/10.3390\/electronics12041044","DOI":"10.3390\/electronics12041044"},{"key":"1128_CR24","doi-asserted-by":"publisher","unstructured":"Song, Y., Hyun, S., Cheong, Y.-G.: Analysis of Auto-encoders for network intrusion detection. Sensors. 21, 4294 (Jun. 2021). https:\/\/doi.org\/10.3390\/s21134294","DOI":"10.3390\/s21134294"},{"key":"1128_CR25","doi-asserted-by":"publisher","unstructured":"Thamaraiselvi, D.R., Mary, S.A.S.: Attack and anomaly detection in IoT networks using machine learning. Int. J. Comput. Sci. Mob. Comput. 9(10), 95\u2013103 (Oct. 2020). https:\/\/doi.org\/10.47760\/ijcsmc.2020.v09i10.012","DOI":"10.47760\/ijcsmc.2020.v09i10.012"},{"key":"1128_CR26","unstructured":"Weitkamp, E., Satani, Y., Omundsen, A., Wang, J., Li, P.: MalIoT: Scalable and Real-time malware traffic detection for IoT networks. ArXiv (Cornell University), (2023)"},{"key":"1128_CR27","unstructured":"Stoian N.A.: Machine learning for anomaly detection in IoT networks: Malware analysis on the IoT-23 data set. Comput. Sci. 54, 1\u201325 (2020)"},{"key":"1128_CR28","doi-asserted-by":"publisher","unstructured":"Saied, M., Guirguis, S., Madbouly, M.: A comparative study of using boosting-based machine learning algorithms for IoT network intrusion detection. Int. J. Comput. Intell. Syst. 16(1), 177 (Nov. 2023). https:\/\/doi.org\/10.1007\/s44196-023-00355-x","DOI":"10.1007\/s44196-023-00355-x"},{"key":"1128_CR29","doi-asserted-by":"publisher","unstructured":"Saied, M., Guirguis, S., Madbouly, M.: A comparative analysis of using ensemble trees for botnet detection and classification in IoT. Sci. Rep. 13(1), 21632 (Dec. 2023). https:\/\/doi.org\/10.1038\/s41598-023-48681-6","DOI":"10.1038\/s41598-023-48681-6"},{"key":"1128_CR30","doi-asserted-by":"publisher","first-page":"104478","DOI":"10.1016\/j.compbiomed.2021.104478","volume":"134","author":"E Benkhelifa","year":"2021","unstructured":"Benkhelifa, E., Welsh, T., Hamouda, W.: Strengthening privacy and data security in biomedical microelectromechanical systems by IoT communication security and protection in smart healthcare. *Computers Biology Medicine*. 134, 104478 (2021). https:\/\/doi.org\/10.1016\/j.compbiomed.2021.104478","journal-title":"*Computers Biology Medicine*"},{"key":"1128_CR31","doi-asserted-by":"publisher","unstructured":"Miettinen, M., et al.: June. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), (2017). https:\/\/doi.org\/10.1109\/icdcs.2017.283","DOI":"10.1109\/icdcs.2017.283"},{"key":"1128_CR32","doi-asserted-by":"publisher","unstructured":"Roy, S., Li, J., Choi, B.-J., Bai, Y.: A lightweight supervised intrusion detection mechanism for IoT networks. Future Generation Comput. Syst. 127, 276\u2013285 (Feb. 2022). https:\/\/doi.org\/10.1016\/j.future.2021.09.027","DOI":"10.1016\/j.future.2021.09.027"},{"key":"1128_CR33","doi-asserted-by":"publisher","unstructured":"Wu, Y., Nie, L., Wang, S., Ning, Z., Li, S.: Intelligent intrusion detection for internet of things security: a deep convolutional generative adversarial network-enabled approach. IEEE Internet Things J. 10(4), 3094\u20133106 (Feb. 2023). https:\/\/doi.org\/10.1109\/JIOT.2021.3112159","DOI":"10.1109\/JIOT.2021.3112159"},{"key":"1128_CR34","doi-asserted-by":"publisher","unstructured":"Faber, K., Faber, L., Sniezynski, B.: Auto-encoder-based IDS for cloud and mobile devices. In: 2021 IEEE\/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid), IEEE, pp. 728\u2013736. (May 2021). https:\/\/doi.org\/10.1109\/CCGrid51090.2021.00088","DOI":"10.1109\/CCGrid51090.2021.00088"},{"key":"1128_CR35","doi-asserted-by":"publisher","unstructured":"Saied, M., Adjogble, F., Guirguis, S., Hemmji, M., Warschat, J.: A framework for systematic scientific research management. In: 2023 Portland International Conference on Management of Engineering and Technology (PICMET), IEEE, pp. 1\u201316. (Jul. 2023). https:\/\/doi.org\/10.23919\/PICMET59654.2023.10216819","DOI":"10.23919\/PICMET59654.2023.10216819"},{"key":"1128_CR36","doi-asserted-by":"publisher","DOI":"10.13052\/jsn2445-9739.2017.009","author":"I Sharafaldin","year":"2017","unstructured":"Sharafaldin, I., Gharib, A., Lashkari, A.H., Ghorbani, A.A.: Towards a reliable intrusion detection benchmark dataset. Softw. Netw. 2017(1), 177\u2013200 (2017). https:\/\/doi.org\/10.13052\/jsn2445-9739.2017.009"},{"key":"1128_CR37","doi-asserted-by":"publisher","first-page":"8434","DOI":"10.1109\/ACCESS.2022.3144208","volume":"10","author":"B Lahasan","year":"2022","unstructured":"Lahasan, B., Samma, H.: Optimized deep Auto-encoder model for internet of things intruder detection. IEEE Access. 10, 8434\u20138448 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3144208","journal-title":"IEEE Access."},{"key":"1128_CR38","doi-asserted-by":"publisher","unstructured":"Sugitha, G., Preethi, B.C., Kavitha, G.: Intrusion detection framework using stacked auto encoder based deep neural network in <\u2009scp\u2009>\u2009IoT\u2009network. Concurr Comput. 34(28) (Dec. 2022). https:\/\/doi.org\/10.1002\/cpe.7401","DOI":"10.1002\/cpe.7401"},{"key":"1128_CR39","doi-asserted-by":"publisher","first-page":"123448","DOI":"10.1109\/ACCESS.2021.3109081","volume":"9","author":"A Fatani","year":"2021","unstructured":"Fatani, A., Abd Elaziz, M., Dahou, A., Al-Qaness, M.A.A., Lu, S.: IoT intrusion detection system using deep learning and enhanced transient search optimization. IEEE Access. 9, 123448\u2013123464 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3109081","journal-title":"IEEE Access."},{"key":"1128_CR40","doi-asserted-by":"publisher","unstructured":"Lu, H., Wang, T., Xu, X., Wang, T.: Cognitive Memory-Guided Auto-encoder for effective intrusion detection in internet of things. IEEE Trans. Industr Inf. 18(5), 3358\u20133366 (May 2022). https:\/\/doi.org\/10.1109\/TII.2021.3102637","DOI":"10.1109\/TII.2021.3102637"},{"key":"1128_CR41","doi-asserted-by":"publisher","unstructured":"Ahmed, I., Jeon, G., Ahmad, A.: Deep learning-based intrusion detection system for internet of vehicles. IEEE Consum. Electron. Mag. 12(1), 117\u2013123 (Jan. 2023). https:\/\/doi.org\/10.1109\/MCE.2021.3139170","DOI":"10.1109\/MCE.2021.3139170"},{"key":"1128_CR42","doi-asserted-by":"publisher","unstructured":"Oseni, A., et al.: Jan., An explainable deep learning framework for resilient intrusion detection in IoT-enabled transportation networks. IEEE Transactions on Intelligent Transportation Systems. 24(1), 1000\u20131014 (2023). https:\/\/doi.org\/10.1109\/TITS.2022.3188671","DOI":"10.1109\/TITS.2022.3188671"},{"key":"1128_CR43","doi-asserted-by":"publisher","unstructured":"Shah, H., et al.: Deep Learning-Based malicious smart contract and intrusion detection system for IoT environment. Mathematics. 11(2), 418 (Jan. 2023). https:\/\/doi.org\/10.3390\/math11020418","DOI":"10.3390\/math11020418"},{"key":"1128_CR44","doi-asserted-by":"publisher","unstructured":"Musleh, D., Alotaibi, M., Alhaidari, F., Rahman, A., Mohammad, R.M.: Intrusion detection system using feature extraction with machine learning algorithms in IoT. J. Sens. Actuator Networks. 12(2), 29 (Mar. 2023). https:\/\/doi.org\/10.3390\/jsan12020029","DOI":"10.3390\/jsan12020029"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01128-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01128-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01128-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T11:38:21Z","timestamp":1760614701000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01128-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,18]]},"references-count":44,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1128"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01128-7","relation":{"references":[{"id-type":"doi","id":"10.13052\/jsn2445-9739.2017.009","asserted-by":"subject"}]},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,18]]},"assertion":[{"value":"17 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"211"}}