{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:43:42Z","timestamp":1774021422496,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T00:00:00Z","timestamp":1714694400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T00:00:00Z","timestamp":1714694400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s10586-024-04310-z","type":"journal-article","created":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T14:37:57Z","timestamp":1714747077000},"page":"10025-10051","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Attention-based ResNet for intrusion detection and severity analysis using sliding window blockchain and firewall in IoT"],"prefix":"10.1007","volume":"27","author":[{"given":"Ernest","family":"Ntizikira","sequence":"first","affiliation":[]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jenhui","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xinxin","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,3]]},"reference":[{"issue":"6689134","key":"4310_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/6689134","volume":"2020","author":"A Derhab","year":"2020","unstructured":"Derhab, A., Aldweesh, A., Emam, A.Z., Khan, F.A.: Intrusion detection system for the internet of things based on temporal convolution neural network and efficient feature engineering. Wirel. Commun. Mob. Comput. 2020(6689134), 1\u201316 (2020)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"8819545","key":"4310_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8819545","volume":"2020","author":"P Pirozmand","year":"2020","unstructured":"Pirozmand, P., Ghafary, M.A., Siadat, S., Ren, J.: Intrusion detection into cloud-fog-based IoT networks using game theory. Wirel. Commun. Mob. Comput. 2020(8819545), 1\u20139 (2020)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"4529757","key":"4310_CR3","first-page":"1","volume":"2019","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Yuan, Y., Zhou, Z., Li, S., Qi, L., Puthal, D.: Intrusion detection and prevention in cloud, fog, and internet of things. Secur. Commun. Netw. 2019(4529757), 1\u20134 (2019)","journal-title":"Secur. Commun. Netw."},{"key":"4310_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105648","volume":"195","author":"L Lv","year":"2020","unstructured":"Lv, L., Wang, W., Zhang, Z., Liu, X.: A novel intrusion detection system based on an optimal hybrid kernel extreme learning machine. Knowl. Based Syst. 195, 105648 (2020)","journal-title":"Knowl. Based Syst."},{"key":"4310_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101938","volume":"97","author":"A Das","year":"2020","unstructured":"Das, A., Kalam, S., Sahar, N., Sinha, D.: UCFL: user categorization using fuzzy logic towards PUF based two-phase authentication of fog assisted IoT devices. Comput. Secur. 97, 101938 (2020)","journal-title":"Comput. Secur."},{"key":"4310_CR6","doi-asserted-by":"crossref","unstructured":"Akhundov, H., Sluis, E.V., Hamdioui, S., Taouil, M.: Public-key based authentication architecture for IoT devices using PUF. ArXiv, abs\/2002.01277 (2020)","DOI":"10.5121\/csit.2019.91328"},{"key":"4310_CR7","doi-asserted-by":"publisher","first-page":"2023","DOI":"10.1007\/s11277-020-07137-0","volume":"112","author":"M Babu","year":"2020","unstructured":"Babu, M., Reddy, A.: SH-IDS: specification heuristics based intrusion detection system for IoT net-works. Wirel. Pers. Commun. 112, 2023\u20132045 (2020)","journal-title":"Wirel. Pers. Commun."},{"key":"4310_CR8","doi-asserted-by":"publisher","first-page":"61","DOI":"10.33166\/AETiC.2020.05.004","volume":"4","author":"R Ramadan","year":"2020","unstructured":"Ramadan, R., Yadav, K.: A novel hybrid intrusion detection system (IDS) for the detection of internet of things (IoT) network attacks. Ann. Emerg. Technol. Comput. 4, 61 (2020)","journal-title":"Ann. Emerg. Technol. Comput."},{"key":"4310_CR9","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0111162","author":"S Alkhliwi","year":"2020","unstructured":"Alkhliwi, S.: Energy efficient cluster based routing protocol with secure IDS for IoT assisted heterogeneous WSN. Int. J. Adv. Comput. Sci. Appl. (2020). https:\/\/doi.org\/10.14569\/IJACSA.2020.0111162","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"4310_CR10","doi-asserted-by":"publisher","first-page":"107042","DOI":"10.1016\/j.comnet.2019.107042","volume":"168","author":"W EImasary","year":"2020","unstructured":"EImasary, W., Akbulut, A., Zaim, A.H.: Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Comput. Netw. 168, 107042 (2020)","journal-title":"Comput. Netw."},{"key":"4310_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113249","volume":"148","author":"H Alazzam","year":"2020","unstructured":"Alazzam, H., Sharieh, A., Sabri, K.E.: A feature selection algorithm for intrusion detection system based on Pigeon inspired optimizer. Expert Syst. Appl. 148, 113249 (2020)","journal-title":"Expert Syst. Appl."},{"key":"4310_CR12","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Cheng, G.: An efficient network intrusion detection system based on feature selection and ensemble classifier. ArXiv, abs\/1904.01352 (2020)","DOI":"10.1016\/j.comnet.2020.107247"},{"key":"4310_CR13","doi-asserted-by":"publisher","first-page":"2287","DOI":"10.1007\/s11277-019-06986-8","volume":"111","author":"A Verma","year":"2020","unstructured":"Verma, A., Ranga, V.: Machine learning based intrusion detection systems for IoT applications. Wirel. Person. Commun. 111, 2287\u20132310 (2020)","journal-title":"Wirel. Person. Commun."},{"key":"4310_CR14","doi-asserted-by":"publisher","first-page":"64366","DOI":"10.1109\/ACCESS.2019.2917299","volume":"7","author":"H Yang","year":"2019","unstructured":"Yang, H., Wang, F.: Wireless network intrusion detection based on improved convolutional neural network. IEEE Access 7, 64366\u201364374 (2019)","journal-title":"IEEE Access"},{"key":"4310_CR15","doi-asserted-by":"publisher","first-page":"583","DOI":"10.3390\/sym11040583","volume":"11","author":"MA Khan","year":"2019","unstructured":"Khan, M.A., Karim, M.R., Kim, Y.: A scalable and hybrid intrusion detection system based on the convolutional-LSTM network. Symmetry 11, 583 (2019)","journal-title":"Symmetry"},{"key":"4310_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3803","author":"Y Otoum","year":"2019","unstructured":"Otoum, Y., Liu, D., Nayak, A.: DL-IDS: a deep learning\u2013based intrusion detection framework for securing IoT. Trans. Emerg. Tel. Tech. (2019). https:\/\/doi.org\/10.1002\/ett.3803","journal-title":"Trans. Emerg. Tel. Tech."},{"key":"4310_CR17","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1016\/j.future.2020.07.042","volume":"113","author":"MT Nguyen","year":"2020","unstructured":"Nguyen, M.T., Kim, K.: Genetic convolutional neural network for intrusion detection systems. Future Gener. Comput. Syst. 113, 418\u2013427 (2020)","journal-title":"Future Gener. Comput. Syst."},{"key":"4310_CR18","doi-asserted-by":"crossref","unstructured":"Ajayi, O., Saadawi, T.: Blockchain-based architecture for secured cyber-attack features exchange. 2020 7th IEEE International conference on cyber security and cloud computing (CSCloud)\/2020 6th IEEE international conference on edge computing and scalable cloud (EdgeCom), pp. 100\u2013107 (2020)","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00025"},{"key":"4310_CR19","first-page":"99","volume":"1","author":"I Burmaka","year":"2020","unstructured":"Burmaka, I., Lytvynov, V., Skiter, I., Lytvyn, S.: Evaluating a blockchain-based network performance for the intrusion detection system. Multimedia Syst. 1, 99\u2013109 (2020)","journal-title":"Multimedia Syst."},{"key":"4310_CR20","doi-asserted-by":"publisher","first-page":"1909","DOI":"10.3390\/app10061909","volume":"10","author":"S Aldhaheri","year":"2020","unstructured":"Aldhaheri, S., Alghazzawi, D.M., Cheng, L., Alzahrani, B., Al-Barakati, A.: DeepDCA: novel network-based detection of IoT attacks using artificial immune system. Appl. Sci. 10, 1909 (2020)","journal-title":"Appl. Sci."},{"key":"4310_CR21","doi-asserted-by":"publisher","first-page":"2057","DOI":"10.1007\/s11277-020-07139-y","volume":"112","author":"A Abdollahi","year":"2020","unstructured":"Abdollahi, A., Fathi, M.: An intrusion detection system on ping of death attacks in IoT networks. Wirel. Pers. Commun. 112, 2057\u20132070 (2020)","journal-title":"Wirel. Pers. Commun."},{"key":"4310_CR22","doi-asserted-by":"publisher","first-page":"154530","DOI":"10.1109\/ACCESS.2020.3017763","volume":"8","author":"H Chang","year":"2020","unstructured":"Chang, H., Feng, J., Duan, C.: HADIoT: a hierarchical anomaly detection framework for IoT. IEEE Access 8, 154530\u2013154539 (2020)","journal-title":"IEEE Access"},{"key":"4310_CR23","doi-asserted-by":"publisher","first-page":"1375","DOI":"10.3390\/s20051375","volume":"20","author":"I Almomani","year":"2020","unstructured":"Almomani, I., AlRomi, A.: Integrating software engineering processes in the development of efficient intrusion detection systems in wireless sensor networks. Sensors 20, 1375 (2020)","journal-title":"Sensors"},{"key":"4310_CR24","doi-asserted-by":"publisher","first-page":"322","DOI":"10.3390\/electronics8030322","volume":"8","author":"R Abdulhammed","year":"2019","unstructured":"Abdulhammed, R., Musafer, H.A., Alessa, A., Faezipour, M., Abuzneid, A.: Features dimensionality reduction approaches for machine learning based network intrusion detection. Electronics 8, 322 (2019)","journal-title":"Electronics"},{"key":"4310_CR25","doi-asserted-by":"publisher","first-page":"58","DOI":"10.3390\/computers9030058","volume":"9","author":"A Qureshi","year":"2020","unstructured":"Qureshi, A., Larijani, H., Yousefi, M., Adeel, A., Mtetwa, N.: An adversarial approach for intrusion detection systems using Jacobian saliency map attacks (JSMA) algorithm. Computers 9, 58 (2020)","journal-title":"Computers"},{"key":"4310_CR26","doi-asserted-by":"publisher","first-page":"6882","DOI":"10.1109\/JIOT.2020.2970501","volume":"7","author":"M Eskandari","year":"2020","unstructured":"Eskandari, M., Janjua, Z.H., Vecchio, M., Antonelli, F.: Passban IDS: an intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet Things J. 7, 6882\u20136897 (2020)","journal-title":"IEEE Internet Things J."},{"key":"4310_CR27","doi-asserted-by":"publisher","first-page":"3277","DOI":"10.3390\/app10093277","volume":"10","author":"P Dymora","year":"2020","unstructured":"Dymora, P., Mazurek, M.: An innovative approach to anomaly detection in communication networks using multifractal analysis. Appl. Sci. 10, 3277 (2020)","journal-title":"Appl. Sci."},{"key":"4310_CR28","doi-asserted-by":"publisher","first-page":"924","DOI":"10.1109\/TNSM.2019.2927886","volume":"16","author":"S Garg","year":"2019","unstructured":"Garg, S., Kaur, K., Kumar, N., Kaddoum, G., Zomaya, A.Y., Ranjan, R.: A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Trans. Netw. Serv. Manag. 16, 924\u2013935 (2019)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"4310_CR29","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1109\/TETC.2016.2633228","volume":"7","author":"HH Pajouh","year":"2019","unstructured":"Pajouh, H.H., Javidan, R., Khayami, R., Dehghantanha, A., Choo, K.R.: A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans. Emerg. Top. Comput. 7, 314\u2013323 (2019)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"4310_CR30","doi-asserted-by":"publisher","first-page":"100112","DOI":"10.1016\/j.iot.2019.100112","volume":"14","author":"N Balakrishnan","year":"2019","unstructured":"Balakrishnan, N., Rajendran, A., Pelusi, D., Ponnusamy, V.: Deep belief network enhanced intrusion detection system to prevent security breach in the Internet of Things. Internet Things 14, 100112 (2019)","journal-title":"Internet Things"},{"key":"4310_CR31","first-page":"1","volume":"12","author":"P Kumar","year":"2020","unstructured":"Kumar, P., Gupta, G.P., Tripathi, R.: A dis- tributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks. J. Ambient Int. Human. Comput. 12, 1\u201318 (2020)","journal-title":"J. Ambient Int. Human. Comput."},{"key":"4310_CR32","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.3390\/electronics9071151","volume":"9","author":"W Jo","year":"2020","unstructured":"Jo, W., Kim, S., Lee, C., Shon, T.: Packet preprocessing in CNN-based network intrusion detection system. Electronics 9, 1151 (2020)","journal-title":"Electronics"},{"key":"4310_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00521-020-05189-8","volume":"32","author":"K Demertzis","year":"2020","unstructured":"Demertzis, K., Iliadis, L., Tziritas, N., Kikiras, P.: Anomaly detection via blockchained deep learning smart contracts in industry 4.0. Neural Comput. Appl. 32, 1\u201318 (2020)","journal-title":"Neural Comput. Appl."},{"issue":"1","key":"4310_CR34","first-page":"13","volume":"20","author":"W Li","year":"2020","unstructured":"Li, W., Wang, Y., Li, J., Au, M.: Toward a blockchain-based framework for challenge-based collaborative intrusion detection. Int. J. Inform. Secur. 20(1), 13 (2020)","journal-title":"Int. J. Inform. Secur."},{"key":"4310_CR35","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.future.2019.02.064","volume":"96","author":"W Li","year":"2019","unstructured":"Li, W., Tug, S., Meng, W., Wang, Y.: Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Gener. Comput. Syst. 96, 481\u2013489 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"4310_CR36","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s10207-019-00462-x","volume":"19","author":"W Meng","year":"2019","unstructured":"Meng, W., Li, W., Yang, L.T., Li, P.: Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain. Int. J. Inform. Secur. 19, 279\u2013290 (2019)","journal-title":"Int. J. Inform. Secur."},{"key":"4310_CR37","doi-asserted-by":"publisher","first-page":"32464","DOI":"10.1109\/ACCESS.2020.2973730","volume":"8","author":"K Jiang","year":"2020","unstructured":"Jiang, K., Wang, W., Wang, A., Wu, H.: Network intrusion detection combined hybrid sampling with deep hierarchical network. IEEE Access 8, 32464\u201332476 (2020)","journal-title":"IEEE Access"},{"key":"4310_CR38","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525\u201341550 (2019)","journal-title":"IEEE Access"},{"key":"4310_CR39","doi-asserted-by":"publisher","first-page":"461","DOI":"10.3390\/s20020461","volume":"20","author":"A Amouri","year":"2020","unstructured":"Amouri, A., Alaparthy, V., Morgera, S.: A machine learning based intrusion detection system for mobile internet of things. Sensors 20, 461 (2020)","journal-title":"Sensors"},{"key":"4310_CR40","doi-asserted-by":"publisher","first-page":"94497","DOI":"10.1109\/ACCESS.2019.2928048","volume":"7","author":"BA Tama","year":"2019","unstructured":"Tama, B.A., Comuzzi, M., Rhee, K.: TSE-IDS: a two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access 7, 94497 (2019)","journal-title":"IEEE Access"},{"key":"4310_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics9071120","volume":"9","author":"C Liang","year":"2020","unstructured":"Liang, C., Shanmugam, B., Azam, S., Karim, A., Islam, A., Zamani, M., Kavianpour, S., Idris, N.B.: Intrusion detection system for the internet of things based on blockchain and multi-agent systems. Electronics 9, 1\u201327 (2020)","journal-title":"Electronics"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04310-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04310-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04310-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:35:27Z","timestamp":1725910527000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04310-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,3]]},"references-count":41,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["4310"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04310-z","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,3]]},"assertion":[{"value":"25 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}