{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:01:20Z","timestamp":1776074480727,"version":"3.50.1"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:00:00Z","timestamp":1773619200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:00:00Z","timestamp":1773619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Kocaeli University Scientific Research Projects Coordination Unit","award":["FAA-2024-4232"],"award-info":[{"award-number":["FAA-2024-4232"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Wi-Fi networks have become a fundamental component of Internet of Things (IoT) environments, while their open and shared nature also exposes them to a wide range of cyber attacks. This study examines the use of time-series feature engineering combined with classical machine learning techniques for multiclass Wi-Fi intrusion detection using the AWID3 dataset. Network traffic is segmented into multivariate time-series blocks to capture temporal characteristics of wireless communication. From these segments, two complementary feature representations are derived: statistical descriptors that support interpretability and CNN-based features that capture spatial and temporal patterns. The proposed framework is evaluated using K-Nearest Neighbors, Support Vector Machines, XGBoost, and ensemble voting classifiers across 24 experimental configurations, considering different sequence lengths and feature extraction strategies. The experimental results indicate that classical machine learning models, particularly XGBoost combined with statistical time-series features, achieve strong performance in a 14-class intrusion detection task, with accuracy and F1-score exceeding 0.98. These findings demonstrate that carefully designed feature representations, when paired with well-established classifiers, can provide an effective and computationally efficient solution for practical Wi-Fi intrusion detection scenarios.<\/jats:p>","DOI":"10.1007\/s10207-026-01224-2","type":"journal-article","created":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T20:01:07Z","timestamp":1773691267000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A hybrid feature fusion approach for multiclass Wi-Fi intrusion detection using classical machine learning"],"prefix":"10.1007","volume":"25","author":[{"given":"\u015eevval","family":"\u015eolpan","sequence":"first","affiliation":[]},{"given":"Hakan","family":"G\u00fcnd\u00fcz","sequence":"additional","affiliation":[]},{"given":"Kerem","family":"K\u00fc\u00e7\u00fck","sequence":"additional","affiliation":[]},{"given":"Fatih","family":"\u00d6zyurt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,16]]},"reference":[{"key":"1224_CR1","doi-asserted-by":"crossref","unstructured":"Ozturk, S.B., Aydos, M.: Wireless intrusion detection using shallow neural network models. 2023 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom) (2023)","DOI":"10.1109\/BlackSeaCom58138.2023.10299700"},{"key":"1224_CR2","doi-asserted-by":"publisher","first-page":"13611","DOI":"10.1109\/ACCESS.2022.3146802","volume":"10","author":"LJ Mwinuka","year":"2022","unstructured":"Mwinuka, L.J., Agghey, A.Z., Kaijage, S.F., Ndibwile, J.D.: FakeAP detector: An android-based client-side application for detecting Wi-Fi hotspot spoofing. IEEE Access 10, 13611\u201313623 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3146802","journal-title":"IEEE Access"},{"key":"1224_CR3","doi-asserted-by":"publisher","DOI":"10.1088\/2632-2153\/ad1f77","volume":"5","author":"T Chakraborty","year":"2024","unstructured":"Chakraborty, T., Ujjwal Reddy, K.S., Naik, S.M., Panja, M., Manvitha, B.: Ten years of generative adversarial nets (GANs): a survey of the state-of-the-art. Machine Learning Science and Technology 5, 011001 (2024). https:\/\/doi.org\/10.1088\/2632-2153\/ad1f77","journal-title":"Machine Learning Science and Technology"},{"key":"1224_CR4","doi-asserted-by":"publisher","first-page":"19723","DOI":"10.1109\/ACCESS.2021.3054688","volume":"9","author":"S Rajagopal","year":"2021","unstructured":"Rajagopal, S., Kundapur, P.P., Hareesha, K.S.: Towards effective network intrusion detection: From concept to creation on azure cloud. IEEE Access 9, 19723\u201319742 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3054688","journal-title":"IEEE Access"},{"key":"1224_CR5","doi-asserted-by":"crossref","unstructured":"Saini, R., Halder, D., Baswade, A.M.: RIDS: Real-time intrusion detection system for WPA3 enabled enterprise networks. GLOBECOM 2022 - IEEE Global Communications Conference (2022)","DOI":"10.1109\/GLOBECOM48099.2022.10001501"},{"key":"1224_CR6","doi-asserted-by":"crossref","unstructured":"El Bizri, M., El-Hajj, A.M., Haidar, A.M.: Towards safer Wi-Fi networks: Leveraging neural networks for intrusion detection. 2023 IEEE 4th International Multidisciplinary Conference on Engineering Technology (2023)","DOI":"10.1109\/IMCET59736.2023.10368234"},{"key":"1224_CR7","doi-asserted-by":"publisher","first-page":"113199","DOI":"10.1109\/ACCESS.2021.3104113","volume":"9","author":"SM Kasongo","year":"2021","unstructured":"Kasongo, S.M.: An advanced intrusion detection system for IIoT based on GA and tree based algorithms. IEEE Access 9, 113199\u2013113212 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3104113","journal-title":"IEEE Access"},{"key":"1224_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100843","volume":"23","author":"Z Noor","year":"2023","unstructured":"Noor, Z., Hina, S., Hayat, F., Shah, G.A.: An intelligent context-aware threat detection and response model for smart cyber-physical systems. Internet of Things 23, 100843 (2023). https:\/\/doi.org\/10.1016\/j.iot.2023.100843","journal-title":"Internet of Things"},{"key":"1224_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100615","volume":"20","author":"H Ahmetoglu","year":"2022","unstructured":"Ahmetoglu, H., Das, R.: A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions. Internet of Things 20, 100615 (2022). https:\/\/doi.org\/10.1016\/j.iot.2022.100615","journal-title":"Internet of Things"},{"issue":"4","key":"1224_CR10","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.1093\/jcde\/qwad053","volume":"10","author":"NK Hussein","year":"2023","unstructured":"Hussein, N.K., Qaraad, M., Amjad, S., Farag, M.A., Hassan, S., Mirjalili, S., Elhosseini, M.A.: Enhancing feature selection with GMSFO: A global optimization algorithm for machine learning with application to intrusion detection. Journal of Computational Design and Engineering 10(4), 1363\u20131389 (2023). https:\/\/doi.org\/10.1093\/jcde\/qwad053","journal-title":"Journal of Computational Design and Engineering"},{"key":"1224_CR11","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.comcom.2022.12.010","volume":"199","author":"SM Kasongo","year":"2023","unstructured":"Kasongo, S.M.: A deep learning technique for intrusion detection system using a recurrent neural networks based framework. Comput. Commun. 199, 113\u2013125 (2023). https:\/\/doi.org\/10.1016\/j.comcom.2022.12.010","journal-title":"Comput. Commun."},{"key":"1224_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103405","volume":"72","author":"MA Talukder","year":"2023","unstructured":"Talukder, M.A., Hasan, K.F., Islam, M.M., Uddin, M.A., Akhter, A., Yousuf, M.A., Alharbi, F., Moni, M.A.: A dependable hybrid machine learning model for network intrusion detection. Journal of Information Security and Applications 72, 103405 (2023). https:\/\/doi.org\/10.1016\/j.jisa.2022.103405","journal-title":"Journal of Information Security and Applications"},{"key":"1224_CR13","doi-asserted-by":"crossref","unstructured":"Asaduzzaman, M., Rahman, M.M.: An adversarial approach for intrusion detection using hybrid deep learning model. 2022 International Conference on Information Technology Research and Innovation (2022)","DOI":"10.1109\/ICITRI56423.2022.9970221"},{"key":"1224_CR14","doi-asserted-by":"publisher","first-page":"5245622","DOI":"10.1155\/2022\/5245622","volume":"2022","author":"Y Song","year":"2022","unstructured":"Song, Y., Li, H., Xu, P., Liu, D.: A method of intrusion detection based on WOA-XGBoost algorithm. Discret. Dyn. Nat. Soc. 2022, 5245622 (2022). https:\/\/doi.org\/10.1155\/2022\/5245622","journal-title":"Discret. Dyn. Nat. Soc."},{"key":"1224_CR15","doi-asserted-by":"publisher","first-page":"5245622","DOI":"10.1016\/j.cose.2022.102957","volume":"124","author":"A Alzaqebah","year":"2023","unstructured":"Alzaqebah, A., Aljarah, I., Al-Kadi, O.: A hierarchical intrusion detection system based on extreme learning machine and nature-inspired optimization. Computers & Security 124, 5245622 (2023). https:\/\/doi.org\/10.1016\/j.cose.2022.102957","journal-title":"Computers & Security"},{"key":"1224_CR16","doi-asserted-by":"publisher","first-page":"5693","DOI":"10.1007\/s40747-023-01013-7","volume":"9","author":"N Thockchom","year":"2023","unstructured":"Thockchom, N., Singh, M.M., Nandi, U.: A novel ensemble learning-based model for network intrusion detection. Complex & Intelligent Systems 9, 5693\u20135714 (2023). https:\/\/doi.org\/10.1007\/s40747-023-01013-7","journal-title":"Complex & Intelligent Systems"},{"key":"1224_CR17","doi-asserted-by":"publisher","first-page":"41435","DOI":"10.1109\/ACCESS.2025.3547642","volume":"13","author":"KK Eren","year":"2025","unstructured":"Eren, K.K., K\u00fc\u00e7\u00fck, K., \u00d6zyurt, F., Alhazmi, O.H.: Simple yet powerful: Machine learning-based IoT intrusion system with smart preprocessing and feature generation rivals deep learning. IEEE Access 13, 41435\u201341455 (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3547642","journal-title":"IEEE Access"},{"key":"1224_CR18","doi-asserted-by":"publisher","unstructured":"\u015eolpan, \u015e., G\u00fcnd\u00fcz, H., K\u00fc\u00e7\u00fck, K.: Wi-fi network intrusion detection: Enhanced with feature extraction and machine learning algorithms. 2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP), Malatya, T\u00fcrkiye, 1-7 (2024). https:\/\/doi.org\/10.1109\/IDAP64064.2024.10710685","DOI":"10.1109\/IDAP64064.2024.10710685"},{"key":"1224_CR19","doi-asserted-by":"publisher","DOI":"10.1088\/2632-2153\/ad035d","volume":"4","author":"R Shaikh","year":"2023","unstructured":"Shaikh, R., Rafi, M., Mahoto, N.A., Sulaiman, A., Shaikh, A.: A filter-based feature selection approach in multilabel classification. Machine Learning Science and Technology 4, 045018 (2023). https:\/\/doi.org\/10.1088\/2632-2153\/ad035d","journal-title":"Machine Learning Science and Technology"},{"key":"1224_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2025.101531","volume":"31","author":"S Jamshidi","year":"2025","unstructured":"Jamshidi, S., Nikanjam, A., Nafi, K.W., Khomh, F., Rasta, R.: Application of deep reinforcement learning for intrusion detection in Internet of Things: A systematic review. Internet of Things 31, 101531 (2025). https:\/\/doi.org\/10.1016\/j.iot.2025.101531","journal-title":"Internet of Things"},{"key":"1224_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103419","volume":"133","author":"Chinyang Henry Tseng","year":"2023","unstructured":"Chinyang Henry Tseng: Ya-Ting Chang: EBDM: Ensemble binary detection models for multi-class wireless intrusion detection based on deep neural network. Computers & Security 133, 103419 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103419","journal-title":"Computers & Security"},{"key":"1224_CR22","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1007\/s10586-025-05589-2","volume":"28","author":"IO Asante","year":"2025","unstructured":"Asante, I.O., Wu, L.: Smoke and mirrors: A variational Optuna autoencoder with reinforcement learning for intrusion detection in IoT networks. Clust. Comput. 28, 723 (2025). https:\/\/doi.org\/10.1007\/s10586-025-05589-2","journal-title":"Clust. Comput."},{"key":"1224_CR23","doi-asserted-by":"publisher","first-page":"18584","DOI":"10.1038\/s41598-025-03604-5","volume":"15","author":"F Alshammari","year":"2025","unstructured":"Alshammari, F., Alsaleh, A.: Smart intrusion detection model to identify unknown attacks for improved road safety and management. Sci. Rep. 15, 18584 (2025). https:\/\/doi.org\/10.1038\/s41598-025-03604-5","journal-title":"Sci. Rep."},{"key":"1224_CR24","doi-asserted-by":"publisher","first-page":"66725","DOI":"10.1007\/s11042-023-18034-6","volume":"83","author":"EG Francis","year":"2024","unstructured":"Francis, E.G., Sheeja, S.: An optimized intrusion detection model for wireless sensor networks based on MLP-CatBoost algorithm. Multimedia Tools and Applications 83, 66725\u201366755 (2024). https:\/\/doi.org\/10.1007\/s11042-023-18034-6","journal-title":"Multimedia Tools and Applications"},{"key":"1224_CR25","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7769","volume":"35","author":"N Mathappan","year":"2023","unstructured":"Mathappan, N., Elavarasan, S., Sehar, S.: Hybrid intelligent intrusion detection system for multiple Wi-Fi attacks in wireless networks using stacked restricted Boltzmann machine and deep belief networks. Concurrency and Computation: Practice and Experience 35, e7769 (2023). https:\/\/doi.org\/10.1002\/cpe.7769","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"1224_CR26","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0304082","volume":"19","author":"M Tawfik","year":"2024","unstructured":"Tawfik, M.: Optimized intrusion detection in IoT and fog computing using ensemble learning and advanced feature selection. PLoS ONE 19, e0304082 (2024). https:\/\/doi.org\/10.1371\/journal.pone.0304082","journal-title":"PLoS ONE"},{"issue":"4","key":"1224_CR27","doi-asserted-by":"publisher","first-page":"3257","DOI":"10.1109\/TNSE.2021.3109644","volume":"8","author":"S Lei","year":"2021","unstructured":"Lei, S., Xia, C., Li, Z., Li, X., Wang, T.: HNN: A novel model to study the intrusion detection based on multi-feature correlation and temporal-spatial analysis. IEEE Transactions on Network Science and Engineering 8(4), 3257\u20133274 (2021). https:\/\/doi.org\/10.1109\/TNSE.2021.3109644","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"1224_CR28","doi-asserted-by":"publisher","first-page":"64761","DOI":"10.1109\/ACCESS.2022.3183597","volume":"10","author":"E Chatzoglou","year":"2022","unstructured":"Chatzoglou, E., Kambourakis, G., Kolias, C., Smiliotopoulos, C.: Pick quality over quantity: Expert feature selection and data preprocessing for 802.11 intrusion detection systems. IEEE Access 10, 64761\u201364784 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3183597","journal-title":"IEEE Access"},{"key":"1224_CR29","doi-asserted-by":"crossref","unstructured":"\u0160krak, P., Lehoczk\u00fd, P., Bencel, R., Galinski, M., Kotuliak, I.: Improved preprocessing for machine learning intrusion detection in IEEE 802.11. 2022 14th IFIP Wireless and Mobile Networking Conference (2022)","DOI":"10.23919\/WMNC56391.2022.9954288"},{"key":"1224_CR30","doi-asserted-by":"crossref","unstructured":"Jamil, S., Agarwal, M.: Fusion of feature selection techniques and machine learning algorithms for attack classification on 802.11 Wi-Fi AWID dataset. 2023 IEEE Guwahati Subsection Conference (GCON) (2023)","DOI":"10.1109\/GCON58516.2023.10183427"},{"key":"1224_CR31","doi-asserted-by":"crossref","unstructured":"Chen, J., Yang, T., He, B., He, L.: An analysis and research on wireless network security dataset. 2021 International Conference on Big Data Analysis and Computer Science (2021)","DOI":"10.1109\/BDACS53596.2021.00025"},{"issue":"2","key":"1224_CR32","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/COMST.2023.3345746","volume":"26","author":"D Ficara","year":"2024","unstructured":"Ficara, D., Garroppo, R.G., Henry, J.: A tutorial on privacy, RCM and its implications in WLAN. IEEE Communications Surveys & Tutorials 26(2), 1003\u20131040 (2024). https:\/\/doi.org\/10.1109\/COMST.2023.3345746","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1224_CR33","doi-asserted-by":"crossref","unstructured":"Ahmad, R.S., Ali, A.H., Kazim, S.M., Niyaz, Q.: A GAF and CNN based Wi-Fi network intrusion detection system. IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (2023)","DOI":"10.1109\/INFOCOMWKSHPS57453.2023.10226036"},{"key":"1224_CR34","doi-asserted-by":"publisher","first-page":"99837","DOI":"10.1109\/ACCESS.2022.3206425","volume":"10","author":"A Halbouni","year":"2022","unstructured":"Halbouni, A., Gunawan, T.S., Habaebi, M.H., Halbouni, M., Kartiwi, M., Ahmad, R.: CNN-LSTM: Hybrid deep neural network for network intrusion detection system. IEEE Access 10, 99837\u201399849 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3206425","journal-title":"IEEE Access"},{"key":"1224_CR35","doi-asserted-by":"publisher","first-page":"34720","DOI":"10.1109\/ACCESS.2024.3371996","volume":"12","author":"S Sadhwani","year":"2024","unstructured":"Sadhwani, S., Modi, U.K., Muthalagu, R., Pawar, P.M.: SmartSentry: Cyber threat intelligence in industrial IoT. IEEE Access 12, 34720\u201334740 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3371996","journal-title":"IEEE Access"},{"key":"1224_CR36","doi-asserted-by":"publisher","first-page":"177064","DOI":"10.1109\/ACCESS.2024.3489020","volume":"12","author":"V Shinde","year":"2024","unstructured":"Shinde, V., Singhal, K., Almogren, A., Dhanawat, V., Karande, V., Rehman, A.U.: Ensemble Voting for enhanced robustness in DarkNet traffic detection. IEEE Access 12, 177064\u2013177079 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3489020","journal-title":"IEEE Access"},{"key":"1224_CR37","doi-asserted-by":"publisher","first-page":"115370","DOI":"10.1109\/ACCESS.2024.3437214","volume":"12","author":"J Areia","year":"2024","unstructured":"Areia, J., Bispo, I.A., Santos, L., Costa, R.L.D.C.: IoMT-TrafficData: Dataset and tools for benchmarking intrusion detection in Internet of Medical Things. IEEE Access 12, 115370\u2013115385 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3437214","journal-title":"IEEE Access"},{"key":"1224_CR38","doi-asserted-by":"publisher","first-page":"7550","DOI":"10.1109\/ACCESS.2020.3048198","volume":"9","author":"L Liu","year":"2021","unstructured":"Liu, L., Wang, P., Lin, J., Liu, L.: Intrusion detection of imbalanced network traffic based on machine learning and deep learning. IEEE Access 9, 7550\u20137563 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2020.3048198","journal-title":"IEEE Access"},{"key":"1224_CR39","doi-asserted-by":"crossref","unstructured":"Alghamdi, A., Barsoum, A.: A comprehensive IDs to detect botnet attacks using machine learning techniques. 2024 IEEE 3rd International Conference on Computing and Machine Intelligence (2024)","DOI":"10.1109\/ICMI60790.2024.10585846"},{"key":"1224_CR40","doi-asserted-by":"publisher","first-page":"34188","DOI":"10.1109\/ACCESS.2021.3061609","volume":"9","author":"E Chatzoglou","year":"2021","unstructured":"Chatzoglou, E., Kambourakis, G., Kolias, C.: Empirical evaluation of attacks against IEEE 802.11 enterprise networks: The AWID3 dataset. IEEE Access 9, 34188\u201334205 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3061609","journal-title":"IEEE Access"},{"issue":"1","key":"1224_CR41","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/COMST.2015.2402161","volume":"18","author":"C Kolias","year":"2016","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Gritzalis, S.: Intrusion detection evaluation of threats and a public dataset in 802.11 networks: Empirical. IEEE Communications Surveys & Tutorials 18(1), 184\u2013208 (2016). https:\/\/doi.org\/10.1109\/COMST.2015.2402161","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1224_CR42","doi-asserted-by":"crossref","unstructured":"Zeng, W., Han, D., Cui, M., Wu, Z., Han, B., Zhou, H.: IFLV: Wireless network intrusion detection model integrating FCN, LSTM, and ViT. 2023 IEEE 10th International Conference on Cyber Security and Cloud Computing (CSCloud) \/ 2023 IEEE 9th International Conference on Edge Computing and Scalable Cloud (2023)","DOI":"10.1109\/CSCloud-EdgeCom58631.2023.00086"},{"issue":"10","key":"1224_CR43","doi-asserted-by":"publisher","first-page":"2158","DOI":"10.1109\/TIFS.2015.2433898","volume":"10","author":"H Alipour","year":"2015","unstructured":"Alipour, H., Al-Nashif, Y.B., Satam, P., Hariri, S.: Wireless anomaly detection based on IEEE 802.11 behavior analysis. IEEE Trans. Inf. Forensics Secur. 10(10), 2158\u20132170 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2433898","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"1224_CR44","doi-asserted-by":"publisher","first-page":"6106","DOI":"10.1109\/TITS.2023.3339728","volume":"25","author":"SC Hassler","year":"2024","unstructured":"Hassler, S.C., Mughal, U.A., Ismail, M.: Cyber-physical intrusion detection system for unmanned aerial vehicles. IEEE Trans. Intell. Transp. Syst. 25(6), 6106\u20136117 (2024). https:\/\/doi.org\/10.1109\/TITS.2023.3339728","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"1224_CR45","doi-asserted-by":"publisher","first-page":"2135","DOI":"10.1109\/JIOT.2024.3467328","volume":"12","author":"A Agrawal","year":"2025","unstructured":"Agrawal, A., Maiti, R.R.: TinyAP: An intelligent access point to combat Wi-Fi attacks using TinyML. IEEE Internet Things J. 12(2), 2135\u20132145 (2025). https:\/\/doi.org\/10.1109\/JIOT.2024.3467328","journal-title":"IEEE Internet Things J."},{"key":"1224_CR46","doi-asserted-by":"crossref","unstructured":"Selvarathinam, N.S., Dhar, A.K., Biswas, S.: Evil twin attack detection using discrete event systems in IEEE 802.11 Wi-Fi networks. 2019 27th Mediterranean Conference on Control and Automation (2019)","DOI":"10.1109\/MED.2019.8798568"},{"key":"1224_CR47","doi-asserted-by":"publisher","first-page":"23096","DOI":"10.1109\/ACCESS.2024.3362803","volume":"12","author":"M Thankappan","year":"2024","unstructured":"Thankappan, M., Rif\u00e0-Pous, H., Garrigues, C.: A signature-based wireless intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks. IEEE Access 12, 23096\u201323121 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3362803","journal-title":"IEEE Access"},{"key":"1224_CR48","doi-asserted-by":"crossref","unstructured":"Subhan, A., Kunang, Y.N., Yadi, I.Z.: Analyzing the attack pattern of brute force attack on SSH port. 2023 International Conference on Information Technology and Computing (2023)","DOI":"10.1109\/ICITCOM60176.2023.10441929"},{"issue":"8","key":"1224_CR49","doi-asserted-by":"publisher","first-page":"6882","DOI":"10.1109\/JIOT.2020.2970501","volume":"7","author":"M Eskandari","year":"2020","unstructured":"Eskandari, M., Janjua, Z.H., Vecchio, M., Antonelli, F.: Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet Things J. 7(8), 6882\u20136897 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2970501","journal-title":"IEEE Internet Things J."},{"key":"1224_CR50","doi-asserted-by":"crossref","unstructured":"Raikar, M.M., Meena, S.M.: SSH brute force attack mitigation in Internet of Things (IoT) network: An edge device security measure. 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC) (2021)","DOI":"10.1109\/ICSCCC51823.2021.9478131"},{"key":"1224_CR51","doi-asserted-by":"publisher","first-page":"94518","DOI":"10.1109\/ACCESS.2022.3204001","volume":"10","author":"R Kalakoti","year":"2022","unstructured":"Kalakoti, R., N\u00f5mm, S., Bahsi, H.: In-depth feature selection for the statistical machine learning-based botnet detection in IoT networks. IEEE Access 10, 94518\u201394535 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3204001","journal-title":"IEEE Access"},{"key":"1224_CR52","doi-asserted-by":"publisher","first-page":"73547","DOI":"10.1109\/ACCESS.2024.3404270","volume":"12","author":"D Arnold","year":"2024","unstructured":"Arnold, D., Gromov, M., Saniie, J.: Network traffic visualization coupled with convolutional neural networks for enhanced IoT botnet detection. IEEE Access 12, 73547\u201373560 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3404270","journal-title":"IEEE Access"},{"key":"1224_CR53","doi-asserted-by":"crossref","unstructured":"Samuel, J.K., Jacob, M.T., Roy, M., Sayoojya, P.M., Joy, A.R.: Intelligent malware detection system based on behavior analysis in cloud computing environment. 2023 International Conference on Circuit Power and Computing Technologies (2023)","DOI":"10.1109\/ICCPCT58313.2023.10245065"},{"key":"1224_CR54","doi-asserted-by":"crossref","unstructured":"Thilakraj, M., Anupriya, S., Cibi, M.M., Divya, A.: Detection of SQL injection attacks. 2024 International Conference on Inventive Computation Technologies (2024)","DOI":"10.1109\/ICICT60155.2024.10544579"},{"key":"1224_CR55","doi-asserted-by":"publisher","first-page":"135507","DOI":"10.1109\/ACCESS.2023.3337645","volume":"11","author":"N Thalji","year":"2023","unstructured":"Thalji, N., Raza, A., Islam, M.S., Samee, N.A., Jamjoom, M.M.: AE-Net: Novel autoencoder-based deep features for SQL injection attack detection. IEEE Access 11, 135507\u2013135516 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3337645","journal-title":"IEEE Access"},{"key":"1224_CR56","doi-asserted-by":"crossref","unstructured":"Ahadi, S.A.A., Rakesh, N., Varshney, S.: Overview on public Wi-Fi security threat evil twin attack detection. 2020 IEEE International Conference on Advent Trends in Multidisciplinary Research and Innovation (2020)","DOI":"10.1109\/ICATMRI51801.2020.9398377"},{"key":"1224_CR57","doi-asserted-by":"crossref","unstructured":"Kamble, A., Kshirsagar, D.: Feature selection in wireless intrusion detection system for evil twin attack detection. 2023 3rd International Conference on Innovative Sustainable Computational Technologies (2023)","DOI":"10.1109\/CISCT57197.2023.10351382"},{"key":"1224_CR58","doi-asserted-by":"publisher","unstructured":"Eren, K.K., K\u00fc\u00e7\u00fck, K.: Improving intrusion detection systems for IoT devices using automated feature generation based on ToN_IoT dataset. 2023 8th International Conference on Computer Science and Engineering, Burdur, T\u00fcrkiye, 276-281 (2023). https:\/\/doi.org\/10.1109\/UBMK59864.2023.10286655","DOI":"10.1109\/UBMK59864.2023.10286655"},{"issue":"1","key":"1224_CR59","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0306747","volume":"20","author":"N Khalid","year":"2025","unstructured":"Khalid, N., Hina, S., Zaidi, K.S., Gaber, T., Speakman, L., Noor, Z.: An investigation of feature reduction, transferability, and generalization in AWID datasets for secure Wi-Fi networks. PLoS ONE 20(1), e0306747 (2025). https:\/\/doi.org\/10.1371\/journal.pone.0306747","journal-title":"PLoS ONE"},{"key":"1224_CR60","doi-asserted-by":"crossref","unstructured":"Yonbawi, S., Afzal, A., Yasir, M.H., Rizwan, M., Kryvinska, N.: Transferability evaluation in Wi-Fi intrusion detection systems through machine learning and deep learning approaches. IEEE Access (2025)","DOI":"10.1109\/ACCESS.2025.3528214"},{"key":"1224_CR61","doi-asserted-by":"crossref","unstructured":"Popoola, S., Adebisi, B., Ande, R., Hammoudeh, M., Anoh, K., Atayero: SMOTE DRNN: A deep learning algorithm for botnet detection in the Internet-of-Things networks. Sensors (Basel, Switzerland) 21 (2021). https:\/\/doi.org\/10.3390\/s21092985","DOI":"10.3390\/s21092985"},{"key":"1224_CR62","doi-asserted-by":"publisher","unstructured":"Pektas, A., Acarman, T.: Deep learning to detect botnet via network flow summaries. Neural Computing and Applications, 1-13 (2018). https:\/\/doi.org\/10.1007\/s00521-018-3595-x","DOI":"10.1007\/s00521-018-3595-x"},{"key":"1224_CR63","doi-asserted-by":"publisher","unstructured":"Sharma, Y., Arora, A.: CorrNetDroid: Android malware detector leveraging a correlation-based feature selection for network traffic features. ArXiv abs\/2503.01396 (2025). https:\/\/doi.org\/10.48550\/arXiv.2503.01396","DOI":"10.48550\/arXiv.2503.01396"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-026-01224-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-026-01224-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-026-01224-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T09:22:18Z","timestamp":1776072138000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-026-01224-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,16]]},"references-count":63,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["1224"],"URL":"https:\/\/doi.org\/10.1007\/s10207-026-01224-2","relation":{},"ISSN":["1615-5270"],"issn-type":[{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,16]]},"assertion":[{"value":"31 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"K.K. received funding from Kocaeli University Scientific Research Projects Coordination Unit. This document is the results of the research project funded by Kocaeli University Scientific Research Projects Coordination Unit under grant number FAA-2024-4232. \u015e.\u015e., H.G., and K.K. are employed by Kocaeli University. F.\u00d6. is employed by Firat University.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"72"}}