{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,19]],"date-time":"2026-05-19T15:05:14Z","timestamp":1779203114018,"version":"3.51.4"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T00:00:00Z","timestamp":1714608000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T00:00:00Z","timestamp":1714608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Port Said University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The Internet of Things (IoT) has grown significantly in recent years, allowing devices with sensors to share data via the internet. Despite the growing popularity of IoT devices, they remain vulnerable to cyber-attacks. To address this issue, researchers have proposed the Hybrid Intrusion Detection System (HIDS) as a way to enhance the security of IoT. This paper presents a novel intrusion detection model, namely QSVM-IGWO, for improving the detection capabilities and reducing false positive alarms of HIDS. This model aims to improve the performance of the Quantum Support Vector Machine (QSVM) by incorporating parameters from the Improved Grey Wolf Optimizer (IGWO) algorithm. IGWO is introduced under the hypothesis that the social hierarchy observed in grey wolves enhances the searching procedure and overcomes the limitations of GWO. In addition, the QSVM model is employed for binary classification by selecting the kernel function to obtain an optimal solution. Experimental results show promising performance of QSVM-IGWO in terms of accuracy, Recall, Precision, F1 score, and ROC curve, when compared with recent detection models.<\/jats:p>","DOI":"10.1007\/s10586-024-04458-8","type":"journal-article","created":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T12:02:02Z","timestamp":1714651322000},"page":"9917-9935","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["A novel intrusion detection system based on a hybrid quantum support vector machine and improved Grey Wolf optimizer"],"prefix":"10.1007","volume":"27","author":[{"given":"E. I.","family":"Elsedimy","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hala","family":"Elhadidy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sara M. M.","family":"Abohashish","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,5,2]]},"reference":[{"key":"4458_CR1","doi-asserted-by":"crossref","DOI":"10.1186\/s13677-018-0123-6","volume":"7","author":"MF Elrawy","year":"2018","unstructured":"Elrawy, M.F., Awad, A.I., Hamed, H.F.A.: Intrusion detection systems for IoT-based smart environments: a survey. J. Cloud Comput. Adv. Syst. Appl. 7, 21 (2018)","journal-title":"J Cloud Comput Adv Syst Appl"},{"key":"4458_CR2","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1016\/j.future.2019.02.020","volume":"96","author":"SF Aghili","year":"2019","unstructured":"Aghili, S.F., Mala, H., Shojafar, M., Peris-Lopez, P.: LACO: lightweight three-factor authentication, access control and ownership transfer scheme for E-health systems in IoT. Future Gener Comput Syst. 96, 410\u2013424 (2019)","journal-title":"Future Gener Comput Syst."},{"key":"4458_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-021-01150-7","author":"ESP Krishna","year":"2021","unstructured":"Krishna, E.S.P., Thangavelu, A.: Attack detection in IoT devices using hybrid metaheuristic lion optimization algorithm and firefly optimization algorithm. Int. J. Syst. Assur. Eng. Manag. (2021). https:\/\/doi.org\/10.1007\/s13198-021-01150-7","journal-title":"Int. J. Syst. Assur. Eng. Manag."},{"key":"4458_CR4","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.future.2017.10.016","volume":"80","author":"SAR Shah","year":"2018","unstructured":"Shah, S.A.R., Issac, B.: Performance comparison of intrusion detection systems and application of machine learning to snort system. Futur. Gener. Comput. Syst. 80, 157\u2013170 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"4458_CR5","doi-asserted-by":"crossref","first-page":"852","DOI":"10.3390\/app12020852","volume":"12","author":"JD Verdejo","year":"2022","unstructured":"Verdejo, J.D., Calle, J.M., Alonso, A.E., Alonso, R.E., Madinabeitia, G.: On the Detection capabilities of signature-based intrusion detection systems in the context of web attacks. Appl. Sci. 12(2), 1\u201316 (2022)","journal-title":"Appl Sci."},{"key":"4458_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2014.04.012","volume":"49","author":"H Neminath","year":"2014","unstructured":"Neminath, H., Suryanarayanan, V.: False alarm minimization techniques in signature-based intrusion detection systems: a survey. Comput Commun. 49, 1\u201317 (2014)","journal-title":"Comput Commun."},{"issue":"3","key":"4458_CR7","first-page":"35","volume":"1","author":"V Kumar","year":"2012","unstructured":"Kumar, V., Sangwan, O.P.: Signature based intrusion detection system using SNORT. Int. J. Comput. Appl. Inf. Technol. 1(3), 35\u201341 (2012)","journal-title":"Int J Comput Appl Inf Technol."},{"key":"4458_CR8","doi-asserted-by":"crossref","unstructured":"Meng F., Fu Y., Lou F., Chen Z.: An effective network attack detection method based on kernel PCA and LSTMRNN, International Conference on Computer Systems, Electronics and Control (ICCSEC), 2017","DOI":"10.1109\/ICCSEC.2017.8447022"},{"key":"4458_CR9","doi-asserted-by":"crossref","unstructured":"Ingre, B., Yadav A.: Performance Analysis of NSL-KDD dataset using ANN, 2015 International Conference on Signal Processing and Communication Engineering Systems, 92\u201396 (2015)","DOI":"10.1109\/SPACES.2015.7058223"},{"key":"4458_CR10","first-page":"89","volume-title":"A heuristic intrusion detection system for internet-of-things (IoT)","author":"A Qureshi","year":"2019","unstructured":"Qureshi, A., Larijani, H., Ahmad, J., Mtetwa, N.: A heuristic intrusion detection system for internet-of-things (IoT), vol. 997, pp. 89\u201398. Springer, New York (2019)"},{"key":"4458_CR11","unstructured":"Pavananag, N., Divakar, R.: A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks, International Journal of Advanced Research in Computer and Communication Engineering, 2022"},{"key":"4458_CR12","doi-asserted-by":"crossref","first-page":"81664","DOI":"10.1109\/ACCESS.2019.2921912","volume":"7","author":"F Muhammad","year":"2019","unstructured":"Muhammad, F., Alberto, S.: Anomaly detection, analysis and prediction techniques in IoT environment: a systematic literature review. IEEE Access 7, 81664\u201381681 (2019)","journal-title":"IEEE Access"},{"key":"4458_CR13","first-page":"465","volume-title":"Rawat attacks and anomaly detection in IoT network using machine learning","author":"A Alzahrani","year":"2021","unstructured":"Alzahrani, A., Baabdullah, T., Danda, B.: Rawat attacks and anomaly detection in IoT network using machine learning, pp. 465\u2013472. Springer Nature, Cham (2021)"},{"key":"4458_CR14","unstructured":"Muaadh A., Shukor R., Maheyzah Md S., Ibtehal N., Fuad A. G., Faisal S., and Maged N.: Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review, MDPI, Applied Science, 2021"},{"key":"4458_CR15","doi-asserted-by":"crossref","first-page":"1323","DOI":"10.1007\/s11277-019-06789-x","volume":"110","author":"DB Gothawal","year":"2020","unstructured":"Gothawal, D.B., Nagaraj, S.V.: Anomaly-based intrusion detection system in rpl by applying stochastic and evolutionary game models over IoT environment. Wireless Pers. Commun. 110, 1323\u20131344 (2020)","journal-title":"Wireless Pers. Commun."},{"key":"4458_CR16","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s40860-020-00126-x","volume":"7","author":"PK Keserwani","year":"2021","unstructured":"Keserwani, P.K., Govil, M.C., Pilli, E.S., Govil, P.: A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO\u2013PSO\u2013RF model. J Reliable Intell Environ. 7, 3\u201321 (2021)","journal-title":"J Reliable Intell Environ."},{"key":"4458_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-021-00920-1","volume":"3","author":"KP Singh","year":"2022","unstructured":"Singh, K.P., Kesswani, N.: An anomaly-based intrusion detection system for IoT networks using trust factor. SN Comput Sci 3, 1\u20139 (2022)","journal-title":"SN Comput Sci"},{"key":"4458_CR18","first-page":"63","volume":"7","author":"A Davahli","year":"2020","unstructured":"Davahli, A., Shamsi, M., Abaei, G.: A lightweight Anomaly detection model using SVM for WSNs in IoTthrough a hybrid feature selection algorithm based on GA and GWO\u201d. J Comput Secur 7, 63\u201379 (2020)","journal-title":"J Comput Secur"},{"issue":"7","key":"4458_CR19","first-page":"1991","volume":"2018","author":"M Munir","year":"2018","unstructured":"Munir, M., Siddiqui, S.A., Dengel, A., Ahmed, Sh.: DeepAnT: a deep learning approach for unsupervised anomaly detection in time series. IEEE Access 2018(7), 1991\u20132005 (2018)","journal-title":"IEEE Access"},{"key":"4458_CR20","doi-asserted-by":"crossref","first-page":"8820","DOI":"10.1109\/TVT.2020.2995133","volume":"69","author":"X Li","year":"2020","unstructured":"Li, X., Xu, M., Vijayakumar, P., Kumar, N., Liu, X.: Detection of low-frequency and multi-stage attacks in industrial internet of things. IEEE Trans Vehicle Technol 69, 8820\u20138831 (2020)","journal-title":"IEEE Trans Vehicle Technol"},{"key":"4458_CR21","doi-asserted-by":"crossref","first-page":"1022","DOI":"10.3390\/electronics9061022","volume":"9","author":"S Kim","year":"2020","unstructured":"Kim, S., Hwang, C., Lee, T.: Anomaly based unknown intrusion detection in endpoint environments. Electronics. 9, 1022\u20131041 (2020)","journal-title":"Electronics."},{"key":"4458_CR22","doi-asserted-by":"crossref","first-page":"140806","DOI":"10.1109\/ACCESS.2019.2943249","volume":"7","author":"RK Malaiya","year":"2019","unstructured":"Malaiya, R.K., Kwon, D., Suh, S.C., Kim, H., Kim, I., Kim, J.: An empirical evaluation of deep learning for network anomaly detection. IEEE Access 7, 140806\u2013140817 (2019)","journal-title":"IEEE Access"},{"key":"4458_CR23","doi-asserted-by":"crossref","first-page":"16605","DOI":"10.1007\/s00500-020-04963-z","volume":"24","author":"W-C Shi","year":"2020","unstructured":"Shi, W.-C., Sun, H.M.: DeepBot: a time-based botnet detection with deep learning. Soft. Comput. 24, 16605\u201316616 (2020)","journal-title":"Soft. Comput."},{"key":"4458_CR24","doi-asserted-by":"crossref","first-page":"102662","DOI":"10.1016\/j.jnca.2020.102662","volume":"163","author":"G Parra","year":"2020","unstructured":"Parra, G., Rad, P., Choo, K., Beebe, N.: Detecting internet of things attacks using distributed deep learning. J. Netw. Comput. Appl. 163, 102662 (2020)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"4458_CR25","first-page":"1","volume":"10","author":"V Hnamte","year":"2023","unstructured":"Hnamte, V., Hussain, J.: DCNNBiLSTM: an efficient hybrid deep learning-based intrusion detection system. Telematics Inf Rep. 10(1), 1\u201313 (2023)","journal-title":"Telematics Inf Rep."},{"key":"4458_CR26","doi-asserted-by":"crossref","unstructured":"Bai, L., Yao, L., Kanhere, S. S., Wang, X., Yang, Z.: Automatic device classification from network traffic streams of Internet of Things, in Proceeding IEEE 43rd Conference Local Computer Network (LCN), pp. 1\u20139 (2018)","DOI":"10.1109\/LCN.2018.8638232"},{"key":"4458_CR27","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Soman, K. P., Poornachandran, P.: Applying convolutional neural network for network intrusion detection, in Proceeding. International Conference Advance Computer Communication Information (ICACCI), Udupi, India, Sep. 2017, pp. 1222\u20131228.","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"4458_CR28","doi-asserted-by":"crossref","unstructured":"Simon, J., Kapileswar, N., Polasi, P., Mathiyalakendran, A.E.: Hybrid intrusion detection system for wireless IoT networks using deep learning algorithm. Comput. Electr. Eng. 102(4) (2022)","DOI":"10.1016\/j.compeleceng.2022.108190"},{"key":"4458_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-023-09767-8","author":"A TaherAzar","year":"2023","unstructured":"TaherAzar, A., Shehab, E., Mattar, A.M., Hameed, I.A., Ahmed Elsaid, Sh.: Deep learning based hybrid intrusion detection systems to protect satellite networks. J. Netw. Syst. Manag. 31, 82 (2023). https:\/\/doi.org\/10.1007\/s10922-023-09767-8","journal-title":"J Netw Syst Manag"},{"key":"4458_CR30","first-page":"1","volume":"46","author":"WL Al-Yaseen","year":"2019","unstructured":"Al-Yaseen, W.L.: Improving intrusion detection system by developing feature selection model based on firefly algorithm and support vector machine. IAENG Int. J. Comput. Sci. 46, 1\u20137 (2019)","journal-title":"IAENG Int. J. Comput. Sci."},{"key":"4458_CR31","doi-asserted-by":"crossref","first-page":"75729","DOI":"10.1109\/ACCESS.2021.3082147","volume":"9","author":"C Liu","year":"2021","unstructured":"Liu, C., Gu, Z., Wang, J.: A hybrid intrusion detection system based on scalable K-MeansC random forest and deep learning. IEEE Access 9, 75729\u201375740 (2021)","journal-title":"IEEE Access"},{"key":"4458_CR32","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/j.procs.2015.03.174","volume":"45","author":"U Ravale","year":"2015","unstructured":"Ravale, U., Marathe, N., Padiya, P.: Feature selection based hybrid anomaly intrusion detection system using K means and RBF kernel function. Proc Comput Sci 45, 428\u2013435 (2015)","journal-title":"Proc Comput Sci"},{"key":"4458_CR33","first-page":"275","volume":"11","author":"K Indira","year":"2020","unstructured":"Indira, K., Sakthi, U.: A hybrid intrusion detection system for SDWSN using Random Forest (RF) machine learning approach. Int J Adv Comput Sci Appl. 11, 275\u2013284 (2020)","journal-title":"Int J Adv Comput Sci Appl."},{"key":"4458_CR34","first-page":"1","volume":"6","author":"M Louk","year":"2022","unstructured":"Louk, M., Tama, B.A.: PSO-driven feature selection and hybrid ensemble for network anomaly detection. Big Data Cogn Comput 6, 1\u20133 (2022)","journal-title":"Big Data Cogn Comput"},{"key":"4458_CR35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/s22165986","volume":"22","author":"AK Balyan","year":"2022","unstructured":"Balyan, A.K., Ahuja, S., KumarLilhore, U., KumarSharma, S., Manoharan, P., Algarni, D.A., Elmannai, H., Raahemifar, K.: A hybrid intrusion detection model using EGA-PSO and improved random forest method. Sensors. 22, 1\u201320 (2022)","journal-title":"Sensors."},{"key":"4458_CR36","doi-asserted-by":"crossref","unstructured":"Einy S., Oz C., and Dorostkar Navaei Y.: The Anomaly-and Signature-Based IDS for Network Security Using Hybrid Inference Systems, Mathematical Problems in Engineering, 2021, 1\u201310 (2021)","DOI":"10.1155\/2021\/6639714"},{"key":"4458_CR37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/math10060999","volume":"10","author":"A Alzaqebah","year":"2022","unstructured":"Alzaqebah, A., Aljarah, I., Al-Kadi, O., Dama\u0161evicius, R.: A Modified Grey Wolf Optimization algorithm for an intrusion detection system. Mathematics 10, 1\u201316 (2022)","journal-title":"Mathematics"},{"key":"4458_CR38","doi-asserted-by":"crossref","unstructured":"Kunhare, N., Tiwari, R., Dhar, J.: Intrusion detection system using hybrid classifiers with meta-heuristic algorithms for the optimization and feature selection genetic algorithm. Comput. Electr. Eng. 103(8) (2022)","DOI":"10.1016\/j.compeleceng.2022.108383"},{"key":"4458_CR39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/electronics8111210","volume":"8","author":"A Khraisat","year":"2019","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J., Alazab, A.: A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics 8, 1\u201318 (2019)","journal-title":"Electronics"},{"key":"4458_CR40","doi-asserted-by":"crossref","first-page":"1805","DOI":"10.1007\/s13369-021-06086-5","volume":"47","author":"A Abbas","year":"2022","unstructured":"Abbas, A., Khan, M.A., Latif, S., Ajaz, M., Shah, A.A., Ahmad, J.: A new ensemble-based intrusion detection system for internet of things. Arab J Sci Eng 47, 1805\u20131819 (2022)","journal-title":"Arab J Sci Eng"},{"key":"4458_CR41","doi-asserted-by":"crossref","first-page":"3589","DOI":"10.1007\/s12652-019-01606-6","volume":"12","author":"P Anitha","year":"2021","unstructured":"Anitha, P., Kaarthick, B.: Oppositional based Laplacian Grey Wolf Optimization algorithm with SVM for data mining in intrusion detection system. J Ambient Intell Hum Comput 12, 3589\u20133600 (2021)","journal-title":"J Ambient Intell Hum Comput"},{"key":"4458_CR42","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/s11416-022-00435-0","volume":"19","author":"M Kalinin","year":"2023","unstructured":"Kalinin, M., Krundyshev, V.: Security intrusion detection using quantum machine learning techniques. J Comput Virol Hacking Tech 19, 125\u2013136 (2023)","journal-title":"J Comput Virol Hacking Tech"},{"key":"4458_CR43","unstructured":"Park, J. E., Quanz, B., Wood, S., Higgins, H., Harishankar, R.: Practical Application Improvement to Quantum SVM: Theory to Practice, 34th Conference on Neural Information Processing Systems, 1\u20139 (2020)."},{"key":"4458_CR44","doi-asserted-by":"crossref","first-page":"7575","DOI":"10.1007\/s12652-023-04571-3","volume":"14","author":"R Ghanbarzadeh","year":"2023","unstructured":"Ghanbarzadeh, R., Hosseinalipour, A., Ghaffari, A.: A novel network intrusion detection method based on metaheuristic optimisation algorithms. J. Ambient. Intell. Humaniz. Comput. 14, 7575\u20137592 (2023)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"4458_CR45","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/s12293-017-0234-5","volume":"9","author":"MA Tawhid","year":"2017","unstructured":"Tawhid, M.A., Ali, A.F.: A hybrid Grey Wolf Optimizer and genetic algorithm for minimizing potential energy function. Memetic Comp. 9, 347\u2013359 (2017)","journal-title":"Memetic Comp."},{"key":"4458_CR46","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1016\/j.jocs.2018.06.008","volume":"27","author":"J Prashant","year":"2018","unstructured":"Prashant, J., Madhav, J.: A hybrid Grey Wolf optimizer and artificial bee colony algorithm for enhancing the performance of complex systems. J Comput Sci 27, 284\u2013302 (2018)","journal-title":"J Comput Sci"},{"key":"4458_CR47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/electronics8111210","volume":"8","author":"A Khraisat","year":"2019","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J., Alazab, A.: A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics. 8, 1\u201318 (2019)","journal-title":"Electronics."},{"key":"4458_CR48","first-page":"18","volume":"2","author":"B Azhagusundari","year":"2013","unstructured":"Azhagusundari, B., Thanaman, A.S.I.: Feature selection based on information gain. Int J Innov Technol Explor Eng (IJITEE). 2, 18\u201321 (2013)","journal-title":"Int J Innov Technol Explor Eng (IJITEE)."},{"key":"4458_CR49","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili, S., Mirjalili, S.M., Lewis, A.: Grey Wolf Optimizer. Adv. Eng. Softw. 69, 46\u201361 (2014)","journal-title":"Adv. Eng. Softw."},{"key":"4458_CR50","first-page":"1","volume":"2019","author":"Z Gao","year":"2019","unstructured":"Gao, Z., Zhao, J.: An improved Grey Wolf Optimization algorithm with variable weights. Hindawi Comput Intell Neurosci 2019, 1\u201313 (2019)","journal-title":"Hindawi Comput Intell Neurosci"},{"key":"4458_CR51","doi-asserted-by":"crossref","first-page":"5581","DOI":"10.1007\/s12652-020-01919-x","volume":"11","author":"A Davahli","year":"2020","unstructured":"Davahli, A., Shamsi, M., Abaei, G.: Hybridizing genetic algorithm and Grey Wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks. J. Ambient. Intell. Humaniz. Comput. 11, 5581\u20135609 (2020)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"4458_CR52","doi-asserted-by":"crossref","first-page":"103476","DOI":"10.1109\/ACCESS.2020.2999311","volume":"8","author":"K Guo","year":"2020","unstructured":"Guo, K., Cui, L., Mao, M., Zhou, L., Zhang, Q.: An improved Gray Wolf Optimizer MPPT algorithm for PV system with BFBIC converter under partial shading. IEEE access 8, 103476\u2013103490 (2020)","journal-title":"IEEE access"},{"key":"4458_CR53","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"K Nickolaos","year":"2019","unstructured":"Nickolaos, K., Moustafa, N., Sitnikova, E., Turnbull, B.: \"Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Futur. Gener. Comput. Syst. 100, 779\u2013796 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"4458_CR54","doi-asserted-by":"crossref","first-page":"7427","DOI":"10.1007\/s12652-022-04449-w","volume":"14","author":"Sh Ayubkhan","year":"2023","unstructured":"Ayubkhan, Sh., Ab, H., Yap, W.S., Morris, E., Begam Kasim Rawthar, M.: A practical intrusion detection system based on denoising autoencoder and LightGBM classifier with improved detection performance. J Ambient Intell Hum Comput. 14, 7427\u20137452 (2023)","journal-title":"J Ambient Intell Hum Comput."},{"key":"4458_CR55","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1007\/s11036-023-02104-y","volume":"28","author":"M Sharma","year":"2023","unstructured":"Sharma, M., Pant, S., Yadav, P., Kumar, S.D., Gupta, N., Srivastava, G.: Advancing security in the industrial internet of things using deep progressive neural networks. Mobile Netw Appl 28, 782\u2013794 (2023)","journal-title":"Mobile Netw Appl"},{"key":"4458_CR56","first-page":"4001","volume":"261","author":"E Selvan","year":"2023","unstructured":"Selvan, E., Ganeshan, R., DianaJebaJingle, I., Ananth, J.P.: FACVO-DNFN: deep learning-based feature fusion and distributed denial of service attack detection in cloud computing. Knowl Based Syst 261, 4001\u20134008 (2023)","journal-title":"Knowl Based Syst"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04458-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04458-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04458-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:32:13Z","timestamp":1725910333000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04458-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,2]]},"references-count":56,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["4458"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04458-8","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,2]]},"assertion":[{"value":"30 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}