{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:03:32Z","timestamp":1773842612133,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T00:00:00Z","timestamp":1740441600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T00:00:00Z","timestamp":1740441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10586-024-04904-7","type":"journal-article","created":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T01:22:02Z","timestamp":1740446522000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Network Intrusion Detection System Using Convolutional Neural Networks: NIDS-DL-CNN for IoT Security"],"prefix":"10.1007","volume":"28","author":[{"given":"Kamir","family":"Kharoubi","sequence":"first","affiliation":[]},{"given":"Sarra","family":"Cherbal","sequence":"additional","affiliation":[]},{"given":"Djamila","family":"Mechta","sequence":"additional","affiliation":[]},{"given":"Amjad","family":"Gawanmeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,25]]},"reference":[{"key":"4904_CR1","doi-asserted-by":"crossref","unstructured":"Kamir, K., Sarra, C.: \u201cMachine learning solutions for securing iot-based healthcare: A review,\u201d in 2023 5th International Conference on Pattern Analysis and Intelligent Systems (PAIS). IEEE, pp. 1\u20138 (2023)","DOI":"10.1109\/PAIS60821.2023.10321982"},{"issue":"1","key":"4904_CR2","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/s11036-022-01937-3","volume":"28","author":"IH Sarker","year":"2023","unstructured":"Sarker, I.H., Khan, A.I., Abushark, Y.B., Alsolami, F.: Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mobile Netw. Appl. 28(1), 296\u2013312 (2023)","journal-title":"Mobile Netw. Appl."},{"key":"4904_CR3","doi-asserted-by":"crossref","unstructured":"Ni, C., Li, S.\u00a0C.: \u201cMachine learning enabled industrial iot security: Challenges, trends and solutions,\u201d Journal of Industrial Information Integration, p. 100549, (2024)","DOI":"10.1016\/j.jii.2023.100549"},{"key":"4904_CR4","doi-asserted-by":"publisher","first-page":"40 281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag, M.A., Friha, O., Hamouda, D., Maglaras, L., Janicke, H.: Edge-iiotset: a new comprehensive realistic cyber security dataset of iot and iiot applications for centralized and federated learning. IEEE Access 10, 40 281-40 306 (2022)","journal-title":"IEEE Access"},{"key":"4904_CR5","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.future.2023.03.011","volume":"146","author":"F Zhang","year":"2023","unstructured":"Zhang, F., Wang, H., Zhou, L., Xu, D., Liu, L.: A blockchain-based security and trust mechanism for ai-enabled iiot systems. Future Genet. Comput. Syst. 146, 78\u201385 (2023)","journal-title":"Future Genet. Comput. Syst."},{"key":"4904_CR6","doi-asserted-by":"publisher","first-page":"102060","DOI":"10.1016\/j.inffus.2023.102060","volume":"102","author":"SF Ahmed","year":"2024","unstructured":"Ahmed, S.F., Alam, M.S.B., Afrin, S., Rafa, S.J., Rafa, N., Gandomi, A.H.: Insights into internet of medical things (iomt): data fusion, security issues and potential solutions. Inform. Fusion 102, 102060 (2024)","journal-title":"Inform. Fusion"},{"key":"4904_CR7","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.comcom.2023.06.012","volume":"208","author":"F Xu","year":"2023","unstructured":"Xu, F., Liu, S., Yang, X.: An efficient privacy-preserving authentication scheme with enhanced security for iomt applications. Comput. Commun. 208, 171\u2013178 (2023)","journal-title":"Comput. Commun."},{"key":"4904_CR8","unstructured":"Vailshery, L.\u00a0S.: \u201cNumber of internet of things (iot) connections worldwide from 2022 to 2023, with forecasts from 2024 to 2033,\u201d accessed: 2024-07-05. [Online]. Available: https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide\/ (2024)"},{"key":"4904_CR9","doi-asserted-by":"crossref","unstructured":"Jony, A.\u00a0I., Arnob, A.\u00a0K.\u00a0B.: \u201cA long short-term memory based approach for detecting cyber attacks in iot using cic-iot2023 dataset,\u201d Journal of Edge Computing, (2024)","DOI":"10.55056\/jec.648"},{"issue":"6","key":"4904_CR10","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.1007\/s10586-022-03776-z","volume":"26","author":"A Heidari","year":"2023","unstructured":"Heidari, A., Jabraeil Jamali, M.A.: Internet of things intrusion detection systems: a comprehensive review and future directions. Cluster Comput. 26(6), 3753\u20133780 (2023)","journal-title":"Cluster Comput."},{"key":"4904_CR11","first-page":"100053","volume":"10","author":"V Hnamte","year":"2023","unstructured":"Hnamte, V., Hussain, J.: Dcnnbilstm: an efficient hybrid deep learning-based intrusion detection system. Telemat. form. Rep 10, 100053 (2023)","journal-title":"Telemat. form. Rep"},{"key":"4904_CR12","doi-asserted-by":"crossref","unstructured":"Kumar, P., Kumar, R., Jolfaei, A., Mohammad, N.: \u201cAn automated threat intelligence framework for vehicle road cooperation systems,\u201d IEEE Internet of Things Journal, (2024)","DOI":"10.1109\/JIOT.2024.3397652"},{"issue":"13","key":"4904_CR13","doi-asserted-by":"publisher","first-page":"5941","DOI":"10.3390\/s23135941","volume":"23","author":"ECP Neto","year":"2023","unstructured":"Neto, E.C.P., Dadkhah, S., Ferreira, R., Zohourian, A., Lu, R., Ghorbani, A.A.: Ciciot2023: a real-time dataset and benchmark for large-scale attacks in iot environment. Sensors 23(13), 5941 (2023)","journal-title":"Sensors"},{"key":"4904_CR14","doi-asserted-by":"crossref","unstructured":"Abbas, S., Bouazzi, I., Ojo, S., Al\u00a0Hejaili, A., Sampedro, G.\u00a0A., Almadhor, A., Gregus, M.: \u201cEvaluating deep learning variants for cyber-attacks detection and multi-class classification in iot networks,\u201d PeerJ Computer Science, vol.\u00a010, p. e1793, (2024)","DOI":"10.7717\/peerj-cs.1793"},{"key":"4904_CR15","doi-asserted-by":"crossref","unstructured":"Abbas, S., Alsubai, S., Ojo, S., Sampedro, G.\u00a0A., Almadhor, A., Hejaili, A.\u00a0A., Bouazzi, I.: \u201cAn efficient deep recurrent neural network for detection of cyberattacks in realistic iot environment,\u201d The Journal of Supercomputing, pp. 1\u201319, (2024)","DOI":"10.1007\/s11227-024-05993-2"},{"issue":"1","key":"4904_CR16","doi-asserted-by":"publisher","first-page":"5872","DOI":"10.1038\/s41598-024-56126-x","volume":"14","author":"MM Khan","year":"2024","unstructured":"Khan, M.M., Alkhathami, M.: Anomaly detection in iot-based healthcare: machine learning for enhanced security. Sci. Rep 14(1), 5872 (2024)","journal-title":"Sci. Rep"},{"key":"4904_CR17","doi-asserted-by":"publisher","first-page":"131\u00a0661","DOI":"10.1109\/ACCESS.2023.3336678","volume":"11","author":"RW Wardhani","year":"2023","unstructured":"Wardhani, R.W., Putranto, D.S.C., Jo, U., Kim, H., et al.: Toward enhanced attack detection and explanation in intrusion detection system-based iot environment data. IEEE Access 11, 131\u00a0661-131\u00a0676 (2023)","journal-title":"IEEE Access"},{"key":"4904_CR18","doi-asserted-by":"crossref","unstructured":"Becerra-Suarez, F.\u00a0L., Tuesta-Monteza, V.\u00a0A., Mejia-Cabrera, H.\u00a0I., Arcila-Diaz, J.: \u201cPerformance evaluation of deep learning models for classifying cybersecurity attacks in iot networks,\u201d in Informatics, vol.\u00a011, no.\u00a02. MDPI, p.\u00a032 (2024)","DOI":"10.3390\/informatics11020032"},{"issue":"6","key":"4904_CR19","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.3390\/electronics13061053","volume":"13","author":"S Yaras","year":"2024","unstructured":"Yaras, S., Dener, M.: Iot-based intrusion detection system using new hybrid deep learning algorithm. Electronics 13(6), 1053 (2024)","journal-title":"Electronics"},{"key":"4904_CR20","doi-asserted-by":"crossref","unstructured":"Vajrobol, V., Gupta, B.\u00a0B., Gaurav, A., Chuang, H.-M.: \u201cAdversarial learning for mirai botnet detection based on long short-term memory and xgboost,\u201d International Journal of Cognitive Computing in Engineering, (2024)","DOI":"10.1016\/j.ijcce.2024.02.004"},{"key":"4904_CR21","doi-asserted-by":"crossref","unstructured":"de\u00a0Elias, E.\u00a0M., Carriel, V.\u00a0S., De\u00a0Oliveira, G.\u00a0W., Dos\u00a0Santos, A.\u00a0L., Nogueira, M., Junior, R.\u00a0H., Batista, D.\u00a0M.: \u201cA hybrid cnn-lstm model for iiot edge privacy-aware intrusion detection,\u201d in 2022 IEEE Latin-American Conference on Communications (LATINCOM). IEEE, pp. 1\u20136 (2022)","DOI":"10.1109\/LATINCOM56090.2022.10000468"},{"issue":"19","key":"4904_CR22","doi-asserted-by":"publisher","first-page":"9572","DOI":"10.3390\/app12199572","volume":"12","author":"I Tareq","year":"2022","unstructured":"Tareq, I., Elbagoury, B.M., El-Regaily, S., El-Horbaty, E.-S.M.: Analysis of ton-iot, unw-nb15, and edge-iiot datasets using dl in cybersecurity for iot. Appl. Sci. 12(19), 9572 (2022)","journal-title":"Appl. Sci."},{"key":"4904_CR23","doi-asserted-by":"publisher","first-page":"101351","DOI":"10.1016\/j.iot.2024.101351","volume":"28","author":"S Dadkhah","year":"2024","unstructured":"Dadkhah, S., Neto, E.C.P., Ferreira, R., Molokwu, R.C., Sadeghi, S., Ghorbani, A.A.: Ciciomt2024: a benchmark dataset for multi-protocol security assessment in iomt. Int. Things 28, 101351 (2024)","journal-title":"Int. Things"},{"key":"4904_CR24","doi-asserted-by":"crossref","unstructured":"Attique, D., Hao, W., Ping, W., Javeed, D., Kumar, P.: \u201cExplainable and data-efficient deep learning for enhanced attack detection in iiot ecosystem,\u201d IEEE Internet of Things Journal, pp. 1\u20131, (2024)","DOI":"10.1109\/JIOT.2024.3384374"},{"key":"4904_CR25","doi-asserted-by":"publisher","first-page":"102930","DOI":"10.1016\/j.adhoc.2022.102930","volume":"134","author":"IA Khan","year":"2022","unstructured":"Khan, I.A., Keshk, M., Pi, D., Khan, N., Hussain, Y., Soliman, H.: Enhancing iiot networks protection: a robust security model for attack detection in internet industrial control systems. Ad Hoc Netw. 134, 102930 (2022)","journal-title":"Ad Hoc Netw."},{"issue":"13","key":"4904_CR26","first-page":"11 604","volume":"9","author":"IA Khan","year":"2022","unstructured":"Khan, I.A., Moustafa, N., Pi, D., Sallam, K.M., Zomaya, A.Y., Li, B.: A new explainable deep learning framework for cyber threat discovery in industrial iot networks. IEEE Int. Things J. 9(13), 11 604-11 613 (2022)","journal-title":"IEEE Int. Things J."},{"key":"4904_CR27","doi-asserted-by":"crossref","unstructured":"Khan, I.\u00a0A., Razzak, I., Pi, D., Zia, U., Kamal, S., Hussain, Y.: \u201cA novel collaborative sru network with dynamic behaviour aggregation, reduced communication overhead and explainable features,\u201d IEEE Journal of Biomedical and Health Informatics, (2024)","DOI":"10.1109\/JBHI.2024.3352013"},{"key":"4904_CR28","doi-asserted-by":"crossref","unstructured":"Khan, I.\u00a0A., Pi, D., Khan, N., Khan, Z.\u00a0U., Hussain, Y., Nawaz, A., Ali, F.: \u201cA privacy-conserving framework based intrusion detection method for detecting and recognizing malicious behaviours in cyber-physical power networks,\u201d Applied Intelligence, pp. 1\u201316, (2021)","DOI":"10.1007\/s10489-021-02222-8"},{"key":"4904_CR29","unstructured":"\u201cCiciot2023 dataset link,\u201d [Online]. Available: https:\/\/www.unb.ca\/cic\/datasets\/iotdataset-2023.html (2023)"},{"key":"4904_CR30","unstructured":"\u201cEdge-iiotset link,\u201d [Online]. Available: https:\/\/www.kaggle.com\/code\/mohamedamineferrag\/edge-iiotset-pre-processing (2022)"},{"key":"4904_CR31","unstructured":"\u201cCiciomt dataset link,\u201d [Online]. Available: https:\/\/www.unb.ca\/cic\/datasets\/iomt-dataset-2024.html (2024)"},{"key":"4904_CR32","doi-asserted-by":"crossref","unstructured":"Naidu, G., Zuva, T., Sibanda, E.M.: A review of evaluation metrics in machine learning algorithms. Computer Science On-line Conference. Springer, 15\u201325 (2023)","DOI":"10.1007\/978-3-031-35314-7_2"},{"key":"4904_CR33","doi-asserted-by":"crossref","unstructured":"Khacha, A., Saadouni, R., Harbi, Y., Aliouat, Z.: \u201cHybrid deep learning-based intrusion detection system for industrial internet of things,\u201d in: 5th International Symposium on Informatics and its Applications (ISIA). IEEE 2022, 1\u20136 (2022)","DOI":"10.1109\/ISIA55826.2022.9993487"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04904-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04904-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04904-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T06:32:47Z","timestamp":1757140367000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04904-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,25]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["4904"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04904-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,25]]},"assertion":[{"value":"26 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"219"}}