{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T02:21:03Z","timestamp":1769739663525,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,10,31]],"date-time":"2022-10-31T00:00:00Z","timestamp":1667174400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,31]],"date-time":"2022-10-31T00:00:00Z","timestamp":1667174400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100002790","name":"Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2020-05363"],"award-info":[{"award-number":["RGPIN-2020-05363"]}],"id":[{"id":"10.13039\/501100002790","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s10586-022-03779-w","type":"journal-article","created":{"date-parts":[[2022,10,31]],"date-time":"2022-10-31T14:02:56Z","timestamp":1667224976000},"page":"1147-1158","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Group intrusion detection in the Internet of Things using a hybrid recurrent neural network"],"prefix":"10.1007","volume":"26","author":[{"given":"Asma","family":"Belhadi","sequence":"first","affiliation":[]},{"given":"Youcef","family":"Djenouri","sequence":"additional","affiliation":[]},{"given":"Djamel","family":"Djenouri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9851-4103","authenticated-orcid":false,"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[]},{"given":"Jerry Chun-Wei","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,31]]},"reference":[{"key":"3779_CR1","doi-asserted-by":"publisher","first-page":"101842","DOI":"10.1016\/j.adhoc.2019.02.001","volume":"90","author":"M Aloqaily","year":"2019","unstructured":"Aloqaily, M., Otoum, S., Al Ridhawi, I., Jararweh, Y.: An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw. 90, 101842 (2019)","journal-title":"Ad Hoc Netw."},{"key":"3779_CR2","doi-asserted-by":"publisher","first-page":"6206","DOI":"10.1109\/TITS.2021.3084396","volume":"23","author":"P Arthurs","year":"2021","unstructured":"Arthurs, P., Gillam, L., Krause, P., Wang, N., Halder, K., Mouzakitis, A.: A taxonomy and survey of edge cloud computing for intelligent transportation systems and connected vehicles. IEEE Trans. Intell. Transp. Syst. 23, 6206 (2021)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"3779_CR3","first-page":"1","volume":"25","author":"C Bachechi","year":"2021","unstructured":"Bachechi, C., Rollo, F., Po, L.: Detection and classification of sensor anomalies for simulating urban traffic scenarios. Clust. Comput. 25, 1\u201325 (2021)","journal-title":"Clust. Comput."},{"key":"3779_CR4","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/j.ins.2021.08.039","volume":"577","author":"A Bagozi","year":"2021","unstructured":"Bagozi, A., Bianchini, D., De Antonellis, V.: Multi-level and relevance-based parallel clustering of massive data streams in smart manufacturing. Inf. Sci. 577, 805\u2013823 (2021)","journal-title":"Inf. Sci."},{"key":"3779_CR5","unstructured":"Bai, S., He, Z., Lei, Y., Wu, W., Zhu, C., Sun, M., Yan, J.: Traffic anomaly detection via perspective map based on spatial-temporal information matrix. In: Proc. CVPR Workshops (2019)"},{"key":"3779_CR6","doi-asserted-by":"publisher","first-page":"4508","DOI":"10.1109\/TCYB.2020.3029338","volume":"52","author":"A Belhadi","year":"2020","unstructured":"Belhadi, A., Djenouri, Y., Djenouri, D., Michalak, T., Lin, J.C.W.: Deep learning versus traditional solutions for group trajectory outliers. IEEE Trans. Cybern. 52, 4508\u20134519 (2020)","journal-title":"IEEE Trans. Cybern."},{"key":"3779_CR7","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.inffus.2020.08.003","volume":"65","author":"A Belhadi","year":"2021","unstructured":"Belhadi, A., Djenouri, Y., Srivastava, G., Djenouri, D., Lin, J.C.W., Fortino, G.: Deep learning for pedestrian collective behavior analysis in smart cities: a model of group trajectory outlier detection. Inf. Fusion 65, 13\u201320 (2021)","journal-title":"Inf. Fusion"},{"key":"3779_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2020.102920","volume":"124","author":"N Chiabaut","year":"2021","unstructured":"Chiabaut, N., Faitout, R.: Traffic congestion and travel time prediction based on historical congestion maps and identification of consensual days. Transp. Res. Part C 124, 102920 (2021)","journal-title":"Transp. Res. Part C"},{"key":"3779_CR9","doi-asserted-by":"publisher","first-page":"12192","DOI":"10.1109\/ACCESS.2019.2893124","volume":"7","author":"Y Djenouri","year":"2019","unstructured":"Djenouri, Y., Belhadi, A., Lin, J.C.W., Djenouri, D., Cano, A.: A survey on urban traffic anomalies detection algorithms. IEEE Access 7, 12192\u201312205 (2019)","journal-title":"IEEE Access"},{"key":"3779_CR10","doi-asserted-by":"publisher","first-page":"10015","DOI":"10.1109\/ACCESS.2019.2891933","volume":"7","author":"Y Djenouri","year":"2019","unstructured":"Djenouri, Y., Belhadi, A., Lin, J.C.W., Cano, A.: Adapted k-nearest neighbors for detecting anomalies on spatio-temporal traffic flow. IEEE Access 7, 10015\u201310027 (2019)","journal-title":"IEEE Access"},{"key":"3779_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3092275","author":"Y Djenouri","year":"2021","unstructured":"Djenouri, Y., Belhadi, A., Srivastava, G., Ghosh, U., Chatterjee, P., Lin, J.C.W.: Fast and accurate deep learning framework for secure fault diagnosis in the industrial internet of things. IEEE Internet Things J. (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3092275","journal-title":"IEEE Internet Things J."},{"key":"3779_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03659-3","author":"Y Djenouri","year":"2022","unstructured":"Djenouri, Y., Belhadi, A., Srivastava, G., Lin, J.C.W.: When explainable AI meets IoT applications for supervised learning. Clust. Comput. (2022). https:\/\/doi.org\/10.1007\/s10586-022-03659-3","journal-title":"Clust. Comput."},{"key":"3779_CR13","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inf. Secur. Appl. 50, 102419 (2020)","journal-title":"J. Inf. Secur. Appl."},{"issue":"3","key":"3779_CR14","doi-asserted-by":"publisher","first-page":"924","DOI":"10.1109\/TNSM.2019.2927886","volume":"16","author":"S Garg","year":"2019","unstructured":"Garg, S., Kaur, K., Kumar, N., Kaddoum, G., Zomaya, A.Y., Ranjan, R.: A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Trans. Netw. Serv. Manage. 16(3), 924\u2013935 (2019)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"3779_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100514","volume":"19","author":"SS Gill","year":"2022","unstructured":"Gill, S.S., Xu, M., Ottaviani, C., Patros, P., Bahsoon, R., Shaghaghi, A., Golec, M., Stankovski, V., Wu, H., Abraham, A., et al.: Ai for next generation computing: emerging trends and future directions. Internet Things 19, 100514 (2022)","journal-title":"Internet Things"},{"issue":"4","key":"3779_CR16","doi-asserted-by":"publisher","first-page":"04020015","DOI":"10.1061\/JTEPBS.0000333","volume":"146","author":"J Gu","year":"2020","unstructured":"Gu, J., Jiang, Z., Fan, W., Wu, J., Chen, J.: Real-time passenger flow anomaly detection considering typical time series clustered characteristics at metro stations. J. Transp. Eng. Part A 146(4), 04020015 (2020)","journal-title":"J. Transp. Eng. Part A"},{"key":"3779_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3172393","author":"E Gyamfi","year":"2022","unstructured":"Gyamfi, E., Jurcut, A.D.: Novel online network intrusion detection system for industrial IoT based on oi-svdd and as-elm. IEEE Internet Things J. (2022). https:\/\/doi.org\/10.1109\/JIOT.2022.3172393","journal-title":"IEEE Internet Things J."},{"key":"3779_CR18","doi-asserted-by":"publisher","first-page":"102132","DOI":"10.1016\/j.cose.2020.102132","volume":"102","author":"N Ho-Sam-Sooi","year":"2021","unstructured":"Ho-Sam-Sooi, N., Pieters, W., Kroesen, M.: Investigating the effect of security and privacy on IoT device purchase behaviour. Comput. Secur. 102, 102132 (2021)","journal-title":"Comput. Secur."},{"issue":"3","key":"3779_CR19","doi-asserted-by":"publisher","first-page":"1686","DOI":"10.1109\/COMST.2020.2986444","volume":"22","author":"F Hussain","year":"2020","unstructured":"Hussain, F., Hussain, R., Hassan, S.A., Hossain, E.: Machine learning in IoT security: current solutions and future challenges. IEEE Commun. Surv. Tutor. 22(3), 1686\u20131721 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3779_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102394","volume":"62","author":"Y Jararweh","year":"2020","unstructured":"Jararweh, Y., Otoum, S., Al Ridhawi, I.: Trustworthy and sustainable smart city services at the edge. Sustain. Cities Soc. 62, 102394 (2020)","journal-title":"Sustain. Cities Soc."},{"key":"3779_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03621-3","author":"A Javadpour","year":"2022","unstructured":"Javadpour, A., Pinto, P., Jafari, F., Zhang, W.: Dmaidps: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments. Clust. Comput. (2022). https:\/\/doi.org\/10.1007\/s10586-022-03621-3","journal-title":"Clust. Comput."},{"issue":"7","key":"3779_CR22","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: Ddos in the IoT: Mirai and other botnets. Computer 50(7), 80\u201384 (2017)","journal-title":"Computer"},{"key":"3779_CR23","doi-asserted-by":"publisher","first-page":"9180","DOI":"10.1109\/ACCESS.2021.3050038","volume":"9","author":"A Lamssaggad","year":"2021","unstructured":"Lamssaggad, A., Benamar, N., Hafid, A.S., Msahli, M.: A survey on the current security landscape of intelligent transportation systems. IEEE Access 9, 9180\u20139208 (2021)","journal-title":"IEEE Access"},{"key":"3779_CR24","doi-asserted-by":"publisher","first-page":"1310","DOI":"10.1109\/TKDE.2017.2718525","volume":"30","author":"L Lin","year":"2017","unstructured":"Lin, L., Li, J., Chen, F., Ye, J., Huai, J.P.: Road traffic speed prediction: a probabilistic model fusing multi-source data. IEEE Trans. Knowl. Data Eng. 30, 1310\u20131323 (2017)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"7","key":"3779_CR25","doi-asserted-by":"publisher","first-page":"5340","DOI":"10.1109\/JIOT.2020.3032896","volume":"8","author":"JCW Lin","year":"2020","unstructured":"Lin, J.C.W., Srivastava, G., Zhang, Y., Djenouri, Y., Aloqaily, M.: Privacy-preserving multiobjective sanitization model in 6G IoT environments. IEEE Internet Things J. 8(7), 5340\u20135349 (2020)","journal-title":"IEEE Internet Things J."},{"key":"3779_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106548","volume":"212","author":"JCW Lin","year":"2021","unstructured":"Lin, J.C.W., Shao, Y., Djenouri, Y., Yun, U.: Asrnn: a recurrent neural network with an attention model for sequence labeling. Knowl.-Based Syst. 212, 106548 (2021)","journal-title":"Knowl.-Based Syst."},{"key":"3779_CR27","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.future.2021.10.009","volume":"128","author":"Y Liu","year":"2022","unstructured":"Liu, Y., Yu, J., Yang, M., Hou, W., Wang, H.: Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data. Futur. Gener. Comput. Syst. 128, 178\u2013191 (2022)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"3779_CR28","first-page":"1","volume":"21","author":"Z Lv","year":"2021","unstructured":"Lv, Z., Qiao, L., Kumar Singh, A., Wang, Q.: AI-empowered IoT security for smart cities. ACM Trans. Internet Technol. 21(4), 1\u201321 (2021)","journal-title":"ACM Trans. Internet Technol."},{"key":"3779_CR29","doi-asserted-by":"crossref","unstructured":"Mehedi, S.T., Anwar, A., Rahman, Z., Ahmed, K., Rafiqul, I.: Dependable intrusion detection system for IoT: a deep transfer learning-based approach. IEEE Trans. Ind. Inf. (2022)","DOI":"10.1109\/TII.2022.3164770"},{"key":"3779_CR30","doi-asserted-by":"crossref","unstructured":"Munoz-Organero, M., Ruiz-Blaquez, R., S\u00e1nchez-Fern\u00e1ndez, L.: Automatic detection of traffic lights, street crossings and urban roundabouts combining outlier detection and deep learning classification techniques based on GPS traces while driving. Comput. Environ. Urban Syst. (2017)","DOI":"10.1016\/j.compenvurbsys.2017.09.005"},{"key":"3779_CR31","doi-asserted-by":"crossref","unstructured":"Mustapha\u00a0Khiati Djamel\u00a0Djenouri, J.D.Y.D.: Lstm for periodic broadcasting in green iot applications over energy harvesting enabled wireless networks: Case study on adapcast. In: Proceedings of The 17th IEEE International Conference on Mobility, Sensing and Networking (MSN 2021 Workshops). IEEE (2021)","DOI":"10.1109\/MSN53354.2021.00107"},{"issue":"3","key":"3779_CR32","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2050","volume":"29","author":"A Pekta\u015f","year":"2019","unstructured":"Pekta\u015f, A., Acarman, T.: A deep learning method to detect network intrusion through flow-based features. Int. J. Netw. Manag. 29(3), e2050 (2019)","journal-title":"Int. J. Netw. Manag."},{"issue":"4","key":"3779_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3398020","volume":"53","author":"B Qian","year":"2020","unstructured":"Qian, B., Su, J., Wen, Z., Jha, D.N., Li, Y., Guan, Y., Puthal, D., James, P., Yang, R., Zomaya, A.Y., et al.: Orchestrating the development lifecycle of machine learning-based IoT applications: a taxonomy and survey. ACM Comput. Surv. (CSUR) 53(4), 1\u201347 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"1","key":"3779_CR34","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1109\/COMST.2019.2916177","volume":"22","author":"SK Sharma","year":"2019","unstructured":"Sharma, S.K., Wang, X.: Toward massive machine type communications in ultra-dense cellular IoT networks: current issues and machine learning-assisted solutions. IEEE Commun. Surv. Tutor. 22(1), 426\u2013471 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3779_CR35","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1007\/s10586-018-2860-1","volume":"22","author":"A Shatnawi","year":"2019","unstructured":"Shatnawi, A., AlZahouri, Y., Shehab, M.A., Jararweh, Y., A.A, M.: Toward a new approach for sorting extremely large data files in the big data era. Clust. Comput. 22, 819\u2013828 (2019)","journal-title":"Clust. Comput."},{"key":"3779_CR36","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.compenvurbsys.2017.08.010","volume":"67","author":"Y Shi","year":"2018","unstructured":"Shi, Y., Deng, M., Yang, X., Gong, J.: Detecting anomalies in spatio-temporal flow data by constructing dynamic neighbourhoods. Comput. Environ. Urban Syst. 67, 80\u201396 (2018)","journal-title":"Comput. Environ. Urban Syst."},{"issue":"1","key":"3779_CR37","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s10586-020-03153-8","volume":"24","author":"AJ Siddiqui","year":"2021","unstructured":"Siddiqui, A.J., Boukerche, A.: Tempocode-IoT: temporal codebook-based encoding of flow features for intrusion detection in internet of things. Clust. Comput. 24(1), 17\u201335 (2021)","journal-title":"Clust. Comput."},{"key":"3779_CR38","doi-asserted-by":"publisher","first-page":"92151","DOI":"10.1007\/s10586-020-03138-7","volume":"23","author":"L Tseng","year":"2020","unstructured":"Tseng, L., Yao, X., Otoum, S., Aloqaily, M., Jararweh, Y.: Blockchain-based database in an IoT environment: challenges, opportunities, and analysis. Clust. Comput. 23, 92151\u20132165 (2020)","journal-title":"Clust. Comput."},{"issue":"6","key":"3779_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3417987","volume":"53","author":"N Waheed","year":"2020","unstructured":"Waheed, N., He, X., Ikram, M., Usman, M., Hashmi, S.S., Usman, M.: Security and privacy in IoT using machine learning and blockchain: threats and countermeasures. ACM Comput. Surv. (CSUR) 53(6), 1\u201337 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"9","key":"3779_CR40","doi-asserted-by":"publisher","first-page":"8099","DOI":"10.1109\/JIOT.2020.2996784","volume":"7","author":"H Wu","year":"2020","unstructured":"Wu, H., Zhang, Z., Guan, C., Wolter, K., Xu, M.: Collaborate edge and cloud computing with distributed deep learning for smart city internet of things. IEEE Internet Things J. 7(9), 8099\u20138110 (2020)","journal-title":"IEEE Internet Things J."},{"key":"3779_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10845-021-01768-1","volume":"32","author":"P Zhan","year":"2021","unstructured":"Zhan, P., Wang, S., Wang, J., Qu, L., Wang, K., Hu, Y., Li, X.: Temporal anomaly detection on IoT-enabled manufacturing. J. Intell. Manuf. 32, 1\u201310 (2021)","journal-title":"J. Intell. Manuf."},{"key":"3779_CR42","doi-asserted-by":"crossref","unstructured":"Zhong, Z., Xu, M., Rodriguez, M.A., Xu, C., Buyya, R.: Machine learning-based orchestration of containers: a taxonomy and future directions. ACM Comput. Surv. (CSUR) (2021)","DOI":"10.1145\/3510415"},{"key":"3779_CR43","doi-asserted-by":"crossref","unstructured":"Zhu, L., Krishnan, R., Sivakumar, A., Guo, F., Polak, J.W.: Traffic monitoring and anomaly detection based on simulation of luxembourg road network. In: 2019 IEEE Intelligent Transportation Systems Conference (ITSC), pp. 382\u2013387. IEEE (2019)","DOI":"10.1109\/ITSC.2019.8917015"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03779-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-022-03779-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03779-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T01:32:41Z","timestamp":1679880761000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-022-03779-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,31]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["3779"],"URL":"https:\/\/doi.org\/10.1007\/s10586-022-03779-w","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,31]]},"assertion":[{"value":"25 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflicts of interest in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}