{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:33:41Z","timestamp":1775666021175,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,1,30]],"date-time":"2024-01-30T00:00:00Z","timestamp":1706572800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,30]],"date-time":"2024-01-30T00:00:00Z","timestamp":1706572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s10586-023-04223-3","type":"journal-article","created":{"date-parts":[[2024,1,30]],"date-time":"2024-01-30T14:02:52Z","timestamp":1706623372000},"page":"5459-5471","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["DeepLG SecNet: utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments"],"prefix":"10.1007","volume":"27","author":[{"given":"Manikandan","family":"Nanjappan","sequence":"first","affiliation":[]},{"given":"K.","family":"Pradeep","sequence":"additional","affiliation":[]},{"given":"Gobalakrishnan","family":"Natesan","sequence":"additional","affiliation":[]},{"given":"A.","family":"Samydurai","sequence":"additional","affiliation":[]},{"given":"G.","family":"Premalatha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,30]]},"reference":[{"key":"4223_CR1","doi-asserted-by":"publisher","first-page":"107784","DOI":"10.1016\/j.comnet.2020.107784","volume":"186","author":"M Ge","year":"2021","unstructured":"Ge, M., Syed, N.F., Fu, X., Baig, Z., Robles-Kelly, A.: Towards a deep learning-driven intrusion detection approach for internet of things. Comput. Netw. 186, 107784 (2021)","journal-title":"Comput. Netw."},{"issue":"2","key":"4223_CR2","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.icte.2021.04.012","volume":"7","author":"P Nimbalkar","year":"2021","unstructured":"Nimbalkar, P., Kshirsagar, D.: Feature selection for intrusion detection system in internet-of-things (IoT). ICT Express 7(2), 177\u2013181 (2021)","journal-title":"ICT Express"},{"issue":"8","key":"4223_CR3","doi-asserted-by":"publisher","first-page":"2632","DOI":"10.1109\/JSAC.2021.3087242","volume":"39","author":"D Han","year":"2021","unstructured":"Han, D., Wang, Z., Zhong, Y., Chen, W., Yang, J., Lu, S., Shi, X., Yin, X.: Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors. IEEE J. Sel. Areas Commun. 39(8), 2632\u20132647 (2021)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"4223_CR4","doi-asserted-by":"publisher","first-page":"59353","DOI":"10.1109\/ACCESS.2021.3073408","volume":"9","author":"N Mishra","year":"2021","unstructured":"Mishra, N., Pandya, S.: Internet of things applications, security challenges, attacks, intrusion detection, and future visions: a systematic review. IEEE Access 9, 59353\u201359377 (2021)","journal-title":"IEEE Access"},{"key":"4223_CR5","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s12065-019-00291-w","volume":"14","author":"V Kumar","year":"2021","unstructured":"Kumar, V., Das, A.K., Sinha, D.: UIDS: a unified intrusion detection system for IoT environment. Evol. Intel. 14, 47\u201359 (2021)","journal-title":"Evol. Intel."},{"issue":"1","key":"4223_CR6","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s10009-020-00594-9","volume":"23","author":"V Shakhov","year":"2021","unstructured":"Shakhov, V., Koo, I.: Graph-based technique for survivability assessment and optimization of IoT applications. Int. J. Softw. Tools Technol. Transfer 23(1), 105\u2013114 (2021)","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"4223_CR7","doi-asserted-by":"publisher","first-page":"103402","DOI":"10.1016\/j.advengsoft.2022.103402","volume":"176","author":"M Abd Elaziz","year":"2023","unstructured":"Abd Elaziz, M., Al-qaness, M.A., Dahou, A., Ibrahim, R.A., Abd El-Latif, A.A.: Intrusion detection approach for cloud and IoT environments using deep learning and capuchin search algorithm. Adv. Eng. Softw. 176, 103402 (2023)","journal-title":"Adv. Eng. Softw."},{"issue":"10","key":"4223_CR8","doi-asserted-by":"publisher","first-page":"301","DOI":"10.3390\/fi14100301","volume":"14","author":"A Sagu","year":"2022","unstructured":"Sagu, A., Gill, N.S., Gulia, P., Chatterjee, J.M., Priyadarshini, I.: A hybrid deep learning model with self-improved optimization algorithm for detection of security attacks in IoT environment. Future Internet 14(10), 301 (2022)","journal-title":"Future Internet"},{"issue":"9","key":"4223_CR9","doi-asserted-by":"publisher","first-page":"4430","DOI":"10.3390\/s23094430","volume":"23","author":"A Fatani","year":"2023","unstructured":"Fatani, A., Dahou, A., Abd Elaziz, M., Al-Qaness, M.A., Lu, S., Alfadhli, S.A., Alresheedi, S.S.: Enhancing intrusion detection systems for IoT and cloud environments using a growth optimizer algorithm and conventional neural networks. Sensors 23(9), 4430 (2023)","journal-title":"Sensors"},{"key":"4223_CR10","doi-asserted-by":"publisher","first-page":"103906","DOI":"10.1109\/ACCESS.2021.3094024","volume":"9","author":"I Ullah","year":"2021","unstructured":"Ullah, I., Mahmoud, Q.H.: Design and development of a deep learning-based model for anomaly detection in IoT networks. IEEE Access 9, 103906\u2013103926 (2021)","journal-title":"IEEE Access"},{"issue":"04","key":"4223_CR11","doi-asserted-by":"publisher","first-page":"190","DOI":"10.36548\/jismac.2020.4.002","volume":"2","author":"S Smys","year":"2020","unstructured":"Smys, S., Basar, A., Wang, H.: Hybrid intrusion detection system for internet of things (IoT). J. ISMAC 2(04), 190\u2013199 (2020)","journal-title":"J. ISMAC"},{"key":"4223_CR12","doi-asserted-by":"publisher","first-page":"102031","DOI":"10.1016\/j.simpat.2019.102031","volume":"101","author":"M Almiani","year":"2020","unstructured":"Almiani, M., AbuGhazleh, A., Al-Rahayfeh, A., Atiewi, S., Razaque, A.: Deep recurrent neural network for IoT intrusion detection system. Simul. Model. Pract. Theory 101, 102031 (2020)","journal-title":"Simul. Model. Pract. Theory"},{"key":"4223_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-021-09621-9","volume":"30","author":"S Tsimenidis","year":"2022","unstructured":"Tsimenidis, S., Lagkas, T., Rantos, K.: Deep learning in IoT intrusion detection. J. Netw. Syst. Manage. 30, 1\u201340 (2022)","journal-title":"J. Netw. Syst. Manage."},{"issue":"4","key":"4223_CR14","first-page":"975","volume":"16","author":"JCS Sicato","year":"2020","unstructured":"Sicato, J.C.S., Singh, S.K., Rathore, S., Park, J.H.: A comprehensive analyses of intrusion detection system for IoT environment. J. Inform. Process. Syst. 16(4), 975\u2013990 (2020)","journal-title":"J. Inform. Process. Syst."},{"key":"4223_CR15","doi-asserted-by":"publisher","first-page":"38254","DOI":"10.1109\/ACCESS.2021.3063671","volume":"9","author":"J Liu","year":"2021","unstructured":"Liu, J., Yang, D., Lian, M., Li, M.: Research on intrusion detection based on particle swarm optimization in IoT. IEEE Access 9, 38254\u201338268 (2021)","journal-title":"IEEE Access"},{"key":"4223_CR16","first-page":"100807","volume":"28","author":"CA Ananth","year":"2023","unstructured":"Ananth, C.A., Krishnaraj, N.: Detection of intrusions in clustered vehicle networks using invasive weed optimization using a deep wavelet neural networks. Measurement: Sens. 28, 100807 (2023)","journal-title":"Measurement: Sens."},{"issue":"1","key":"4223_CR17","doi-asserted-by":"publisher","first-page":"25","DOI":"10.3390\/s22010025","volume":"22","author":"Y Tang","year":"2021","unstructured":"Tang, Y., Gu, L., Wang, L.: Deep stacking network for intrusion detection. Sensors 22(1), 25 (2021)","journal-title":"Sensors"},{"issue":"4","key":"4223_CR18","doi-asserted-by":"publisher","first-page":"692","DOI":"10.3390\/electronics9040692","volume":"9","author":"N Khare","year":"2020","unstructured":"Khare, N., Devan, P., Chowdhary, C.L., Bhattacharya, S., Singh, G., Singh, S., Yoon, B.: Smo-dnn: Spider monkey optimization and deep neural network hybrid classifier model for intrusion detection. Electronics 9(4), 692 (2020)","journal-title":"Electronics"},{"key":"4223_CR19","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.isatra.2019.01.018","volume":"91","author":"Y Yang","year":"2019","unstructured":"Yang, Y., Zheng, H., Li, Y., Xu, M., Chen, Y.: A fault diagnosis scheme for rotating machinery using hierarchical symbolic analysis and convolutional neural network. ISA Trans. 91, 235\u2013252 (2019)","journal-title":"ISA Trans."},{"issue":"2","key":"4223_CR20","first-page":"1602","volume":"25","author":"P Meghana","year":"2021","unstructured":"Meghana, P., Akhila, R., Sandeep, P., Sitanur, H.: Machine learning algorithms based cognitive services for securing data with blockchain. Complex. Int. 25(2), 1602\u20131612 (2021)","journal-title":"Complex. Int."},{"key":"4223_CR21","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1007\/s10462-020-09867-w","volume":"54","author":"S Talatahari","year":"2021","unstructured":"Talatahari, S., Azizi, M.: Chaos game optimization: a novel metaheuristic algorithm. Artif. Intell. Rev. 54, 917\u20131004 (2021)","journal-title":"Artif. Intell. Rev."},{"issue":"4","key":"4223_CR22","doi-asserted-by":"publisher","first-page":"249","DOI":"10.3390\/jmse8040249","volume":"8","author":"Z Zhang","year":"2020","unstructured":"Zhang, Z., Pan, X., Jiang, T., Sui, B., Liu, C., Sun, W.: Monthly and quarterly sea surface temperature prediction based on gated recurrent unit neural network. J. Marine Sci. Eng. 8(4), 249 (2020)","journal-title":"J. Marine Sci. Eng."},{"issue":"1","key":"4223_CR23","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1186\/s40537-021-00448-4","volume":"8","author":"F Laghrissi","year":"2021","unstructured":"Laghrissi, F., Douzi, S., Douzi, K., Hssina, B.: Intrusion detection systems using long short-term memory (LSTM). J. Big Data 8(1), 65 (2021)","journal-title":"J. Big Data"},{"issue":"9","key":"4223_CR24","doi-asserted-by":"publisher","first-page":"3348","DOI":"10.3390\/s22093348","volume":"22","author":"N Zafar","year":"2022","unstructured":"Zafar, N., Haq, I.U., Chughtai, J.U.R., Shafiq, O.: Applying hybrid LSTM-GRU model based on heterogeneous data sources for traffic speed prediction in urban areas. Sensors 22(9), 3348 (2022)","journal-title":"Sensors"},{"key":"4223_CR25","doi-asserted-by":"publisher","first-page":"77981","DOI":"10.1109\/ACCESS.2019.2921555","volume":"7","author":"K Wang","year":"2019","unstructured":"Wang, K., Dong, J., Wang, Y., Yin, H.: Securing data with blockchain and AI. Ieee Access 7, 77981\u201377989 (2019)","journal-title":"Ieee Access"},{"key":"4223_CR26","doi-asserted-by":"publisher","first-page":"107810","DOI":"10.1016\/j.compeleceng.2022.107810","volume":"99","author":"T Saba","year":"2022","unstructured":"Saba, T., Rehman, A., Sadad, T., Kolivand, H., Bahaj, S.A.: Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput. Electr. Eng. 99, 107810 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"4223_CR27","first-page":"207","volume":"22","author":"B Ingre","year":"2018","unstructured":"Ingre, B., Yadav, A., Soni, A.K.: Decision tree based intrusion detection system for NSL-KDD dataset. Inform. Commun. Technol. Intell. Syst. 22, 207\u2013218 (2018)","journal-title":"Inform. Commun. Technol. Intell. Syst."},{"key":"4223_CR28","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1016\/j.aej.2023.05.082","volume":"75","author":"MM Khayyat","year":"2023","unstructured":"Khayyat, M.M.: Improved bacterial foraging optimization with deep learning based anomaly detection in smart cities. Alex. Eng. J. 75, 407\u2013417 (2023)","journal-title":"Alex. Eng. J."},{"key":"4223_CR29","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.aej.2023.05.049","volume":"75","author":"M Al-Jabbar","year":"2023","unstructured":"Al-Jabbar, M., Al-Mansor, E., Abdel-Khalek, S., Alkhalaf, S.: Ebola optimization with modified DarkNet-53 model for scene classification and security on internet of things in smart cities. Alex. Eng. J. 75, 29\u201340 (2023)","journal-title":"Alex. Eng. J."},{"key":"4223_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.05.029","author":"FN Al-Wesabi","year":"2023","unstructured":"Al-Wesabi, F.N., Mengash, H.A., Marzouk, R., Alruwais, N., Allafi, R., Alabdan, R., Alharbi, M., Gupta, D.: Pelican optimization algorithm with federated learning driven attack detection model in internet of things environment. Future Gener. Comput. Syst. (2023). https:\/\/doi.org\/10.1016\/j.future.2023.05.029","journal-title":"Future Gener. Comput. Syst."},{"key":"4223_CR31","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1016\/j.knosys.2018.12.008","volume":"165","author":"S Gupta","year":"2019","unstructured":"Gupta, S., Deep, K.: Improved sine cosine algorithm with crossover scheme for global optimization. Knowl. Based Syst. 165, 374\u2013406 (2019)","journal-title":"Knowl. Based Syst."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04223-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-023-04223-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04223-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T14:52:43Z","timestamp":1722610363000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-023-04223-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,30]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["4223"],"URL":"https:\/\/doi.org\/10.1007\/s10586-023-04223-3","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,30]]},"assertion":[{"value":"1 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human and animal rights"}}]}}