{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:20:51Z","timestamp":1772302851610,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T00:00:00Z","timestamp":1730851200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T00:00:00Z","timestamp":1730851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10586-024-04780-1","type":"journal-article","created":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T19:02:26Z","timestamp":1730919746000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["A smart model integrating LSTM and XGBoost for improving IoT-enabled smart cities security"],"prefix":"10.1007","volume":"28","author":[{"given":"Chaimae","family":"Hazman","sequence":"first","affiliation":[]},{"given":"Azidine","family":"Guezzaz","sequence":"additional","affiliation":[]},{"given":"Said","family":"Benkirane","sequence":"additional","affiliation":[]},{"given":"Mourade","family":"Azrour","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,6]]},"reference":[{"key":"4780_CR1","volume-title":"Smart Cities-Ranking of European Mediumsized Cities","author":"R Giffinger","year":"2007","unstructured":"Giffinger, R., et al.: Smart Cities-Ranking of European Mediumsized Cities. Vienna University of Technology, New York (2007)"},{"issue":"1","key":"4780_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.26599\/BDMA.2020.9020010","volume":"4","author":"M Azrour","year":"2021","unstructured":"Azrour, M., Mabrouki, J., Guezzaz, A., Farhaoui, Y.: New enhanced authentication protocol for internet of things. Big Data Min. Anal. 4(1), 1\u20139 (2021)","journal-title":"Big Data Min. Anal."},{"key":"4780_CR3","doi-asserted-by":"crossref","unstructured":"Wang, Y., Ram, S., Currim, F., Dantas, E., Sab\u00f3ia, L.A.: A big data approach for smart transportation management on bus network. In: Proceedings of the IEEE 2nd International Smart Cities Conference: Improving the Citizens Quality of Life, ISC2 2016\u2014Proceedings, Trento, 12\u201315; pp. 1\u20136 (2016)","DOI":"10.1109\/ISC2.2016.7580839"},{"key":"4780_CR4","unstructured":"Andre\u00e3o, R.V., Athayde, M., Boudy, J., Aguilar, P., de Araujo, I., Andrade, R.: Raspcare: a telemedicine platform for the treatment and monitoring of patients with chronic diseases. In: Assistive Technologies in Smart Cities; IntechOpen: London (2018)"},{"key":"4780_CR5","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1038\/s41746-018-0048-y","volume":"1","author":"PA Keane","year":"2018","unstructured":"Keane, P.A., Topol, E.J.: With an eye to AI and autonomous diagnosis. NPJ Digit. Med. 1, 10 (2018)","journal-title":"NPJ Digit. Med."},{"key":"4780_CR6","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1080\/13549839.2017.1360264","volume":"24","author":"G Trencher","year":"2019","unstructured":"Trencher, G., Karvonen, A.: Stretching, \u201csmart\u201d: advancing health and well-being through the smart city agenda. Local Environ. 24, 610\u2013627 (2019)","journal-title":"Local Environ."},{"key":"4780_CR7","doi-asserted-by":"crossref","unstructured":"Huang, Y., Dang, Z., Choi, Y., Andrade, J., Bar-ilan, A.: High-precision smart system on accelerometers and inclinometers for structural health monitoring: sevelopment and applications. In: Proceedings of the 2018 12th France-Japan and 10th Europe-Asia Congress on Mechatronics, Tsu, pp. 52\u201357 (2018)","DOI":"10.1109\/MECATRONICS.2018.8495730"},{"key":"4780_CR8","doi-asserted-by":"crossref","unstructured":"Farag, S.G.: Application of smart structural system for smart sustainable cities. In: Proceedings of the 2019 4th MEC International Conference on Big Data and Smart City (ICBDSC), Muscat, pp. 1\u20135 (2019)","DOI":"10.1109\/ICBDSC.2019.8645582"},{"key":"4780_CR9","first-page":"1","volume":"3203","author":"E Shirazi","year":"2018","unstructured":"Shirazi, E., Jadid, S.: Autonomous self-healing in smart distribution grids using multi agent systems. IEEE Trans. Ind. Inform. 3203, 1\u201311 (2018)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"4780_CR10","doi-asserted-by":"crossref","unstructured":"Weber, M., Boban, M.: Security challenges of the internet of things. In: 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, Opatija. pp. 638\u2013643 (2016)","DOI":"10.1109\/MIPRO.2016.7522219"},{"key":"4780_CR11","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19\u201331 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"4780_CR12","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","volume":"16","author":"I Butun","year":"2014","unstructured":"Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutorials 16(1), 266\u2013282 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"4780_CR13","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.jnca.2017.03.018","volume":"87","author":"W Hider","year":"2017","unstructured":"Hider, W., Hu, J., Slay, J., Turnbull, B., Xie, Y.: generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. J. Netw. Comput. Appl. 87, 185\u2013192 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"4780_CR14","doi-asserted-by":"crossref","unstructured":". Wu, Z., Cun, Y., Jackel, L. D., Jeng, B.-S.: On-line recognition of limited vocabulary Chinese character using multiple convolutional neural networks. In: Circuits and Systems, ISCAS\u201993, 1993 IEEE International Symposium on, IEEE, pp. 2435\u20132438 (1993)","DOI":"10.1109\/ISCAS.1993.394256"},{"key":"4780_CR15","doi-asserted-by":"crossref","unstructured":"Madani, P., Vlajic, N.: Robustness of deep autoencoder in intrusion detection under adversarial contamination, In: Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, ACM, p. 1 (2018)","DOI":"10.1145\/3190619.3190637"},{"key":"4780_CR16","doi-asserted-by":"crossref","unstructured":"Kwon, D., Natarajan, K., Suh, S.C., Kim, H., Kim, J.: An empirical study on network anomaly detection using convolutional neural networks. In: Proceedings of the In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), Vienna, pp. 1595\u20131598 (2018)","DOI":"10.1109\/ICDCS.2018.00178"},{"key":"4780_CR17","doi-asserted-by":"publisher","first-page":"144","DOI":"10.3390\/electronics9010144","volume":"9","author":"YN Soe","year":"2020","unstructured":"Soe, Y.N., Feng, Y., Santosa, P.I., Hartanto, R., Kouichi, S.: Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features. Electronics 9, 144 (2020)","journal-title":"Electronics"},{"key":"4780_CR18","doi-asserted-by":"crossref","unstructured":"Ge, M., Fu, X., Syed, N., Baig, Z., Teo, G., Robles-kelly, A.: Deep learning-based intrusion detection for IoT networks. In: Proceedings of the 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), Kyoto (2019)","DOI":"10.1109\/PRDC47002.2019.00056"},{"key":"4780_CR19","doi-asserted-by":"publisher","first-page":"4822","DOI":"10.1109\/JSEN.2017.2782751","volume":"18","author":"H Al-Khateeb","year":"2018","unstructured":"Al-Khateeb, H., Epiphaniou, G., Reviczky, A., Karadimas, P., Heidari, H.: Proactive threat detection for connected cars using recursive bayesian estimation. IEEE Sens. J. 18, 4822\u20134831 (2018)","journal-title":"IEEE Sens. J."},{"key":"4780_CR20","doi-asserted-by":"crossref","unstructured":"Guezzaz, A., Benkirane, S., Azrour, M. Khurram, S.: A reliable network intrusion detection approach using decision tree with enhanced data quality. Security and Communication Networks, vol. 2021, (2021)","DOI":"10.1155\/2021\/1230593"},{"issue":"3","key":"4780_CR21","first-page":"438","volume":"21","author":"A Guezzaz","year":"2019","unstructured":"Guezzaz, A., Asimi, A., Batou, Z., Asimi, Y., Sadqi, Y.: A global intrusion detection system using PcapSockS sniffer and multilayer perceptron classifier. Int. J. Netw. Secur. 21(3), 438\u2013450 (2019)","journal-title":"Int. J. Netw. Secur."},{"key":"4780_CR22","doi-asserted-by":"publisher","first-page":"924","DOI":"10.1109\/TNSM.2019.2927886","volume":"16","author":"S Garg","year":"2019","unstructured":"Garg, S., Kaur, K., Kumar, N., Kaddoum, G., Zomaya, A.Y., Ranjan, R.: A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Trans. Netw. Serv. Manag. 16, 924\u2013935 (2019)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"5","key":"4780_CR23","first-page":"8","volume":"19","author":"M Guezzaz","year":"2022","unstructured":"Guezzaz, M., Azrour, S., Benkirane, M., Mohyeddine, H., Attou, M., Douiba, A.: Lightweight hybrid intrusion detection framework using machine learning for Edge-based IIoT security. Int. Arab J. Inform. Technol. 19(5), 8 (2022)","journal-title":"Int. Arab J. Inform. Technol."},{"key":"4780_CR24","doi-asserted-by":"crossref","unstructured":"Guezzaz, A., Asimi, A., Azrour, M., Batou, Z., Asimi. Y.: A Multilayer Perceptron Classifier for Monitoring Network Traffic, Big Data and Networks Technologies. (2020)","DOI":"10.1007\/978-3-030-23672-4_19"},{"key":"4780_CR25","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s40860-022-00184-3","volume":"9","author":"M Douiba","year":"2022","unstructured":"Douiba, M., Benkirane, S., Guezzaz, A., Azrour, M.: Anomaly detection model based on gradient boosting and decision tree for IoT environments security. J. Reliab. Intell. Environ. 9, 421\u2013432 (2022)","journal-title":"J. Reliab. Intell. Environ."},{"key":"4780_CR26","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Kp, S., Poornachandran, P.; Applying convolutional neural network for network intrusion detection. In: Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"4780_CR27","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1109\/ACCESS.2017.2780250","volume":"6","author":"W Wang","year":"2018","unstructured":"Wang, W., Sheng, Y., Wang, J., Zeng, X., Ye, X., Huang, Y., Zhu, M.: HAST-IDS: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792\u20131806 (2018)","journal-title":"IEEE Access"},{"key":"4780_CR28","doi-asserted-by":"crossref","unstructured":"Wu, P., Guo, H.: LuNet: a deep neural network for network intrusion detection. In: Proceedings of the 2019 IEEE Symposium Series on Computational Intelligence (SSCI), Xiamen pp. 617\u2013624 (2019)","DOI":"10.1109\/SSCI44817.2019.9003126"},{"key":"4780_CR29","doi-asserted-by":"crossref","unstructured":"McDermott, C.D., Majdani, F., Petrovski, A.V.: Botnet detection in the internet of things using deep learning approaches. In: Proceedings of the 2018 International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, pp. 1\u20138 (2018)","DOI":"10.1109\/IJCNN.2018.8489489"},{"key":"4780_CR30","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.cose.2019.05.022","volume":"86","author":"I Gu","year":"2019","unstructured":"Gu, I., Wang, L., Wang, H., Wang, S.: A novel approach to intrusion detection using SVM ensemble with feature augmentation. Comput. Secur. 86, 53\u201362 (2019)","journal-title":"Comput. Secur."},{"key":"4780_CR31","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.future.2020.02.017","volume":"107","author":"M Shafiq","year":"2020","unstructured":"Shafiq, M., Tian, Z., Sun, Y., Du, X., Guizani, M.: Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Futur. Gener. Comput. Syst. 107, 433\u2013442 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"4780_CR32","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J. Inf. Secur. Appl. 50, 102419 (2020)","journal-title":"J. Inf. Secur. Appl."},{"key":"4780_CR33","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2018","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Futur. Gener. Comput. Syst. 100, 779\u2013796 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"4780_CR34","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"E Sitnikova","year":"2019","unstructured":"Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: bot-iotdataset. Future Gener. Comput. Syst. 100, 779\u2013796 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"4780_CR35","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., Friha, O., Hamouda, D., Maglaras, L., Janicke, H.: Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. (2022)","DOI":"10.36227\/techrxiv.18857336"},{"key":"4780_CR36","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W. Ghorbani, A.: A Detailed analysis of the KDD CUP 99 data set. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA) (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"4780_CR37","first-page":"627","volume":"10","author":"J Alsamiri","year":"2019","unstructured":"Alsamiri, J., Alsubhi, K.: Internet of things cyber attacks detection using machine learning. Int. J. Adv. Comput. Sci. Appl. 10, 627\u2013634 (2019)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"4780_CR38","doi-asserted-by":"publisher","first-page":"1210","DOI":"10.3390\/electronics8111210","volume":"8","author":"A Khraisat","year":"2019","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J., Alazab, A.: A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics 8, 1210 (2019)","journal-title":"Electronics"},{"key":"4780_CR39","doi-asserted-by":"publisher","first-page":"530","DOI":"10.3390\/electronics9030530","volume":"9","author":"I Ullah","year":"2020","unstructured":"Ullah, I., Mahmoud, Q.H.: A two-level flow-based anomalous activity detection system for IoT networks. Electronics 9, 530 (2020)","journal-title":"Electronics"},{"key":"4780_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101954","volume":"115","author":"P Kumar","year":"2021","unstructured":"Kumar, P., Gupta, G.P., Tripathi, R.: TP2SF: a trustworthy privacy-preserving secured framework for sustainable smart cities by leveraging blockchain and machine learning. J. Syst. Archit. 115, 101954 (2021)","journal-title":"J. Syst. Archit."},{"key":"4780_CR41","doi-asserted-by":"crossref","unstructured":"Prabavathy, S., Kantham, K.S., Shalinie, S.M.: Design of cognitive fog computing for intrusion detection in Internet of Thing. J. Commun. Netw. (2018)","DOI":"10.1109\/JCN.2018.000041"},{"key":"4780_CR42","doi-asserted-by":"crossref","unstructured":"Jin, D., Lu, Y., Qin, J., Cheng, Z., Mao, Z.: SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism. Comput. Secur. (2020).","DOI":"10.1016\/j.cose.2020.101984"},{"key":"4780_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-26254-8_79","volume-title":"Artificial Intelligence and Smart Environment","author":"C Hazman","year":"2023","unstructured":"Hazman, C., Benkirane, S., Guezzaz, A., Azrour, M., Abdedaime, M.: Intrusion detection framework for IoT-based smart environments security. In: Farhaoui, Y., Rocha, A., Brahmia, Z., Bhushab, B. (eds.) Artificial Intelligence and Smart Environment, vol. 635. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-26254-8_79"},{"key":"4780_CR44","doi-asserted-by":"crossref","unstructured":"Primartha, R., Tama, B.A.: Anomaly detection using random forest: A performance revisited. Int. J. Mach. Learn. Comput. (2017)","DOI":"10.1109\/ICODSE.2017.8285847"},{"key":"4780_CR45","doi-asserted-by":"crossref","unstructured":"Tama, B.A., Rhee, K.H.: An in-depth experimental study of anomaly detection using gradient boosted machine. Neural Comput. Appl. (2017)","DOI":"10.1007\/s00521-017-3128-z"},{"key":"4780_CR46","doi-asserted-by":"publisher","first-page":"229","DOI":"10.3390\/fi14080229","volume":"14","author":"J Moedjahedy","year":"2022","unstructured":"Moedjahedy, J., Setyanto, A., Alarfaj, F.K., Alreshoodi, M.: CCrFS: combine correlation features selection for detecting phishing websites using machine learning. Futur. Internet 14, 229 (2022)","journal-title":"Futur. Internet"},{"key":"4780_CR47","doi-asserted-by":"publisher","unstructured":"Heidari, N.J., Navimipour, M.A., Jamali, J., Akbarpour, S.: A hybrid approach for latency and battery lifetime optimization in IoT devices through offloading and CNN learning. Sustainable Computing: Informatics and Systems, vol. 39, p. 100899, (2023) https:\/\/doi.org\/10.1016\/j.suscom.2023.100899.","DOI":"10.1016\/j.suscom.2023.100899"},{"key":"4780_CR48","volume":"38","author":"A Heidari","year":"2023","unstructured":"Heidari, A., Navimipour, N.J., Jamali, M.A.J., Akbarpour, S.: A green, secure, and deep intelligent method for dynamic IoT-edge-cloud offloading scenarios. Sustain. Comput. 38, 100859 (2023)","journal-title":"Sustain. Comput."},{"key":"4780_CR49","doi-asserted-by":"publisher","unstructured":"Heidari, A., Jamali, M.A.J., Navimipour, N.J., Akbarpour, S.: A QoS-aware technique for computation Offloading in IoT-Edge platforms using a convolutional neural network and markov decision process. In: IT Professional, 25(1), pp. 24\u201339 (2023) https:\/\/doi.org\/10.1109\/MITP.2022.3217886.","DOI":"10.1109\/MITP.2022.3217886"},{"key":"4780_CR50","doi-asserted-by":"crossref","unstructured":"Ahmadpour, S.S., Heidari, A., Navimpour, N.J., Asadi, M.A., Yalcin, S.: An Efficient design of multiplier for using in nano-scale IoT systems using atomic silicon. In: IEEE Internet of Things Journal. (2023)","DOI":"10.1109\/JIOT.2023.3267165"},{"key":"4780_CR51","doi-asserted-by":"publisher","first-page":"104089","DOI":"10.1016\/j.scs.2022.104089","volume":"4","author":"A Heidari","year":"2022","unstructured":"Heidari, A., Navimipour, N.J., Unal, M.: Applications of ML\/DL in the management of smart cities and societies based on new trends in information technologies: A systematic literature review. Sustain. Cities Soc. 4, 104089 (2022)","journal-title":"Sustain. Cities Soc."},{"key":"4780_CR52","unstructured":"Yan, S-R. et al.: Implementation of a product-recommender system in an IoT-based smart shopping using fuzzy logic and apriori algorithm. In: IEEE Transactions on Engineering Management (2022)"},{"issue":"4","key":"4780_CR53","doi-asserted-by":"publisher","first-page":"929","DOI":"10.26599\/TST.2023.9010033","volume":"29","author":"C Hazman","year":"2024","unstructured":"Hazman, C., Guezzaz, A., Benkirane, S., Azrour, M.: Enhanced IDS with deep learning for IoT-based smart cities security. Tsinghua Sci. Technol. 29(4), 929\u2013947 (2024). https:\/\/doi.org\/10.26599\/TST.2023.9010033","journal-title":"Tsinghua Sci. Technol."},{"key":"4780_CR54","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-16436-0","author":"C Hazman","year":"2023","unstructured":"Hazman, C., Guezzaz, A., Benkirane, S., et al.: Toward an intrusion detection model for IoT-based smart environments. Multimed. Tools Appl. (2023). https:\/\/doi.org\/10.1007\/s11042-023-16436-0","journal-title":"Multimed. Tools Appl."},{"key":"4780_CR55","doi-asserted-by":"publisher","first-page":"4069","DOI":"10.1007\/s10586-022-03810-0","volume":"26","author":"C Hazman","year":"2023","unstructured":"Hazman, C., Guezzaz, A., Benkirane, S., et al.: lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning. Clust. Comput. 26, 4069\u20134083 (2023). https:\/\/doi.org\/10.1007\/s10586-022-03810-0","journal-title":"Clust. Comput."},{"issue":"2","key":"4780_CR56","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.icte.2021.04.012","volume":"7","author":"P Nimbalkar","year":"2021","unstructured":"Nimbalkar, P., Kshirsagar, D.: Feature selection for intrusion detection system in internet-of-things (iot). ICT Express 7(2), 177\u2013181 (2021)","journal-title":"ICT Express"},{"key":"4780_CR57","unstructured":"Abushwereb, M., Alkasassbeh, M., Almseidin M., Mustafa, M.: An accurate IoT intrusion detection framework using apache spark. arXiv e-prints, p. arXiv:2203.04347, (2022)"},{"key":"4780_CR58","doi-asserted-by":"publisher","first-page":"107810","DOI":"10.1016\/j.compeleceng.2022.107810","volume":"14","author":"T Saba","year":"2022","unstructured":"Saba, T., Rehman, A., Sadad, T., Kolivand, H., Bahaj, S.A.: Anomaly-based intrusion detection system for IoT networks through deep learning model. Comput. Electr. Eng. 14, 107810 (2022)","journal-title":"Comput. Electr. Eng."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04780-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04780-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04780-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T15:17:46Z","timestamp":1736522266000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04780-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,6]]},"references-count":58,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["4780"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04780-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,6]]},"assertion":[{"value":"2 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"70"}}