{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:14:49Z","timestamp":1757625289504,"version":"3.44.0"},"reference-count":80,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:00:00Z","timestamp":1753920000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:00:00Z","timestamp":1753920000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-024-04952-z","type":"journal-article","created":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T12:29:39Z","timestamp":1753964979000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced anomaly-based network intrusion detection leveraging a modified picture fuzzy clustering approach"],"prefix":"10.1007","volume":"28","author":[{"given":"Sumedha","family":"Seniaray","sequence":"first","affiliation":[]},{"given":"Rajni","family":"Jindal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,31]]},"reference":[{"key":"4952_CR1","doi-asserted-by":"publisher","unstructured":"Lee, S.-W., Sidqi, H.M., Mohammadi, M., Rashidi, S., Rahmani, A.M., Masdari, M., Hosseinzadeh, M.: Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review. Journal of Network and Computer Applications 187(103111) (2021) https:\/\/doi.org\/10.1016\/j.jnca.2021.103111","DOI":"10.1016\/j.jnca.2021.103111"},{"key":"4952_CR2","doi-asserted-by":"publisher","unstructured":"Denning, D.E.: An intrusion-detection model. IEEE Transactions on Software Engineering SE-13(2) 222\u2013232 (1987) https:\/\/doi.org\/10.1109\/TSE.1987.232894","DOI":"10.1109\/TSE.1987.232894"},{"issue":"1","key":"4952_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(1), 1\u201322 (2019). https:\/\/doi.org\/10.1186\/s42400-019-0038-7","journal-title":"Cybersecurity"},{"key":"4952_CR4","volume-title":"Computer security threat monitoring and surveillance","author":"JP Anderson","year":"1980","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance. James P. Anderson Company, Technical Report (1980)"},{"key":"4952_CR5","doi-asserted-by":"publisher","unstructured":"Seniaray, S., Jindal, R.: Machine learning-based network intrusion detection system. In: Computer Networks and Inventive Communication Technologies: Proceedings of Fourth ICCNCT 2021, pp. 175\u2013187 (2022). https:\/\/doi.org\/10.1007\/978-981-16-3728-5_13 . Springer","DOI":"10.1007\/978-981-16-3728-5_13"},{"key":"4952_CR6","doi-asserted-by":"publisher","first-page":"103560","DOI":"10.1016\/j.jnca.2022.103560","volume":"212","author":"MA Khan","year":"2023","unstructured":"Khan, M.A., Iqbal, N., Jamil, H., Kim, D.-H.: An optimized ensemble prediction model using automl based on soft voting classifier for network intrusion detection. J. Net. Comp. Appl. 212, 103560 (2023). https:\/\/doi.org\/10.1016\/j.jnca.2022.103560","journal-title":"J. Net. Comp. Appl."},{"key":"4952_CR7","doi-asserted-by":"publisher","unstructured":"Harish, B., Kumar, S.A.: Anomaly based intrusion detection using modified fuzzy clustering (2017). https:\/\/doi.org\/10.9781\/ijimai.2017.05.002","DOI":"10.9781\/ijimai.2017.05.002"},{"key":"4952_CR8","doi-asserted-by":"publisher","first-page":"32150","DOI":"10.1109\/ACCESS.2020.2973219","volume":"8","author":"G Karatas","year":"2020","unstructured":"Karatas, G., Demir, O., Sahingoz, O.K.: Increasing the performance of machine learning-based idss on an imbalanced and up-to-date dataset. IEEE Access 8, 32150\u201332162 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2973219","journal-title":"IEEE Access"},{"key":"4952_CR9","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"4952_CR10","doi-asserted-by":"crossref","unstructured":"Barkah, A.S., Selamat, S.R., Abidin, Z.Z., Wahyudi, R.: Impact of data balancing and feature selection on machine learning-based network intrusion detection. JOIV: International Journal on Informatics Visualization 7(1), 241\u2013248 (2023)","DOI":"10.30630\/joiv.7.1.1041"},{"key":"4952_CR11","doi-asserted-by":"publisher","unstructured":"Shah, H., Undercoffer, J., Joshi, A.: Fuzzy clustering for intrusion detection. In: The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ\u201903., vol. 2, pp. 1274\u20131278 (2003). https:\/\/doi.org\/10.1109\/FUZZ.2003.1206614 . IEEE","DOI":"10.1109\/FUZZ.2003.1206614"},{"key":"4952_CR12","doi-asserted-by":"publisher","unstructured":"Ren, W., Cao, J., Wu, X.: Application of network intrusion detection based on fuzzy c-means clustering algorithm. In: 2009 Third International Symposium on Intelligent Information Technology Application, vol. 3, pp. 19\u201322 (2009). https:\/\/doi.org\/10.1109\/IITA.2009.269 . IEEE","DOI":"10.1109\/IITA.2009.269"},{"key":"4952_CR13","doi-asserted-by":"publisher","unstructured":"Fitni, Q.R.S., Ramli, K.: Implementation of ensemble learning and feature selection for performance improvements in anomaly-based intrusion detection systems. In: 2020 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), pp. 118\u2013124 (2020). https:\/\/doi.org\/10.1109\/IAICT50021.2020.9172014 . IEEE","DOI":"10.1109\/IAICT50021.2020.9172014"},{"key":"4952_CR14","doi-asserted-by":"publisher","first-page":"108","DOI":"10.5220\/0006639801080116","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018). https:\/\/doi.org\/10.5220\/0006639801080116","journal-title":"ICISSp"},{"key":"4952_CR15","unstructured":"Canadian Institute for Cybersecurity: CSE-CIC-IDS2018 Dataset. Dataset (2018). https:\/\/www.unb.ca\/cic\/datasets\/ids-2018.html"},{"key":"4952_CR16","doi-asserted-by":"publisher","unstructured":"Verkerken, M., D\u2019hooge, L., Wauters, T., Volckaert, B., De\u00a0Turck, F.: Towards model generalization for intrusion detection: Unsupervised machine learning techniques. Journal of Network and Systems Management 30, 1\u201325 (2021) https:\/\/doi.org\/10.1007\/s10922-021-09615-7","DOI":"10.1007\/s10922-021-09615-7"},{"key":"4952_CR17","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.comnet.2018.11.010","volume":"148","author":"F Salo","year":"2019","unstructured":"Salo, F., Nassif, A.B., Essex, A.: Dimensionality reduction with ig-pca and ensemble classifier for network intrusion detection. Comp. Net. 148, 164\u2013175 (2019). https:\/\/doi.org\/10.1016\/j.comnet.2018.11.010","journal-title":"Comp. Net."},{"key":"4952_CR18","doi-asserted-by":"publisher","first-page":"33789","DOI":"10.1109\/ACCESS.2018.2841987","volume":"6","author":"I Ahmad","year":"2018","unstructured":"Ahmad, I., Basheri, M., Iqbal, M.J., Rahim, A.: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6, 33789\u201333795 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2841987","journal-title":"IEEE Access"},{"issue":"4","key":"4952_CR19","doi-asserted-by":"publisher","first-page":"1674","DOI":"10.3390\/app11041674","volume":"11","author":"N Oliveira","year":"2021","unstructured":"Oliveira, N., Pra\u00e7a, I., Maia, E., Sousa, O.: Intelligent cyber attack detection and classification for network-based intrusion detection systems. Appl. Sci. 11(4), 1674 (2021). https:\/\/doi.org\/10.3390\/app11041674","journal-title":"Appl. Sci."},{"issue":"11","key":"4952_CR20","doi-asserted-by":"publisher","first-page":"1759","DOI":"10.3390\/electronics9111759","volume":"9","author":"X Larriva-Novo","year":"2020","unstructured":"Larriva-Novo, X., S\u00e1nchez-Zas, C., Villagr\u00e1, V.A., Vega-Barbas, M., Rivera, D.: An approach for the application of a dynamic multi-class classifier for network intrusion detection systems. Electronics 9(11), 1759 (2020). https:\/\/doi.org\/10.3390\/electronics9111759","journal-title":"Electronics"},{"issue":"3","key":"4952_CR21","doi-asserted-by":"publisher","first-page":"322","DOI":"10.3390\/electronics8030322","volume":"8","author":"R Abdulhammed","year":"2019","unstructured":"Abdulhammed, R., Musafer, H., Alessa, A., Faezipour, M., Abuzneid, A.: Features dimensionality reduction approaches for machine learning based network intrusion detection. Electronics 8(3), 322 (2019). https:\/\/doi.org\/10.3390\/electronics8030322","journal-title":"Electronics"},{"key":"4952_CR22","doi-asserted-by":"crossref","unstructured":"Chua, T.-H., Salam, I.: Evaluation of machine learning algorithms in network-based intrusion detection system. arXiv preprint arXiv:2203.05232 (2022)","DOI":"10.3390\/sym15061251"},{"key":"4952_CR23","doi-asserted-by":"publisher","first-page":"7550","DOI":"10.1109\/ACCESS.2020.3048198","volume":"9","author":"L Liu","year":"2020","unstructured":"Liu, L., Wang, P., Lin, J., Liu, L.: Intrusion detection of imbalanced network traffic based on machine learning and deep learning. IEEE Access 9, 7550\u20137563 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3048198","journal-title":"IEEE Access"},{"key":"4952_CR24","doi-asserted-by":"publisher","unstructured":"Elhanashi, A., Gasmi, K., Begni, A., Dini, P., Zheng, Q., Saponara, S.: Machine learning techniques for anomaly-based detection system on cse-cic-ids2018 dataset. In: International Conference on Applications in Electronics Pervading Industry, Environment and Society, pp. 131\u2013140 (2023). https:\/\/doi.org\/10.1007\/978-3-031-30333-3_17 . Springer","DOI":"10.1007\/978-3-031-30333-3_17"},{"key":"4952_CR25","doi-asserted-by":"crossref","unstructured":"Sha\u2019ari, A.S., Abdullah, Z.: A comparative study between machine learning and deep learning algorithm for network intrusion detection. Journal of Soft Computing and Data Mining 3(2), 43\u201351 (2022) https:\/\/doi.org\/10.30880\/jscdm.2022.03.02.005","DOI":"10.30880\/jscdm.2022.03.02.005"},{"issue":"7","key":"4952_CR26","doi-asserted-by":"publisher","first-page":"314","DOI":"10.3390\/info13070314","volume":"13","author":"Y Zhang","year":"2022","unstructured":"Zhang, Y., Zhang, H., Zhang, B.: An effective ensemble automatic feature selection method for network intrusion detection. Information 13(7), 314 (2022). https:\/\/doi.org\/10.3390\/info13070314","journal-title":"Information"},{"issue":"2","key":"4952_CR27","first-page":"189","volume":"8","author":"YK Saheed","year":"2024","unstructured":"Saheed, Y.K., Kehinde, T.O., Ayobami Raji, M., Baba, U.A.: Feature selection in intrusion detection systems: a new hybrid fusion of bat algorithm and residue number system. J. Inf. Telecommun. 8(2), 189\u2013207 (2024)","journal-title":"J. Inf. Telecommun."},{"issue":"1","key":"4952_CR28","first-page":"1","volume":"81","author":"OH Abdulganiyu","year":"2024","unstructured":"Abdulganiyu, O.H., Tchakoucht, T.A., Saheed, Y.K., Ahmed, H.A.: Xidintfl-vae: Xgboost-based intrusion detection of imbalance network traffic via class-wise focal loss variational autoencoder. J. Supercomp. 81(1), 1\u201338 (2024)","journal-title":"J. Supercomp."},{"key":"4952_CR29","doi-asserted-by":"publisher","first-page":"91006","DOI":"10.1109\/ACCESS.2022.3201869","volume":"10","author":"HW Oleiwi","year":"2022","unstructured":"Oleiwi, H.W., Mhawi, D.N., Al-Raweshidy, H.: Mlts-adcns: machine learning techniques for anomaly detection in communication networks. IEEE Access 10, 91006\u201391017 (2022)","journal-title":"IEEE Access"},{"issue":"7","key":"4952_CR30","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.3390\/sym14071461","volume":"14","author":"DN Mhawi","year":"2022","unstructured":"Mhawi, D.N., Aldallal, A., Hassan, S.: Advanced feature-selection-based hybrid ensemble learning algorithms for network intrusion detection systems. Symmetry 14(7), 1461 (2022)","journal-title":"Symmetry"},{"issue":"2","key":"4952_CR31","first-page":"73","volume":"22","author":"DN Mhawi","year":"2022","unstructured":"Mhawi, D.N., Hashem, S.H.: Proposed hybrid ensemble learning algorithms for an efficient intrusion detection system. IRAQI J. Comp. Commun. Control Syst. Eng. 22(2), 73\u201384 (2022)","journal-title":"IRAQI J. Comp. Commun. Control Syst. Eng."},{"key":"4952_CR32","doi-asserted-by":"publisher","unstructured":"Samunnisa, K., Kumar, G.S.V., Madhavi, K.: Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods. Measurement: Sensors 25, 100612 (2023) https:\/\/doi.org\/10.1016\/j.measen.2022.100612","DOI":"10.1016\/j.measen.2022.100612"},{"key":"4952_CR33","doi-asserted-by":"publisher","unstructured":"Bhattacharjee, P.S., Fujail, A.K.M., Begum, S.A.: A comparison of intrusion detection by k-means and fuzzy c-means clustering algorithm over the nsl-kdd dataset. In: 2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1\u20136 (2017). https:\/\/doi.org\/10.1109\/ICCIC.2017.8524401 . IEEE","DOI":"10.1109\/ICCIC.2017.8524401"},{"key":"4952_CR34","doi-asserted-by":"publisher","unstructured":"Rustam, Z., Ariantari, N.P.A.A.: Comparison between support vector machine and fuzzy kernel c-means as classifiers for intrusion detection system using chi-square feature selection. In: AIP Conference Proceedings, vol. 2023 (2018). https:\/\/doi.org\/10.1063\/1.5064211 . AIP Publishing","DOI":"10.1063\/1.5064211"},{"key":"4952_CR35","doi-asserted-by":"publisher","unstructured":"Shin, G.-Y., Kim, D.-W., Kim, S.-S., Han, M.-M.: Unknown attack detection: Combining relabeling and hybrid intrusion detection. Computers, Materials & Continua 68(3) (2021) https:\/\/doi.org\/10.32604\/cmc.2021.017502","DOI":"10.32604\/cmc.2021.017502"},{"key":"4952_CR36","doi-asserted-by":"publisher","unstructured":"Zadeh, L.A.: Fuzzy sets. Information and control 8(3), 338\u2013353 (1965). https:\/\/doi.org\/10.1016\/S0019-9958(65)90241-X","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"4952_CR37","doi-asserted-by":"publisher","unstructured":"Atanassov, K.T.: Intuitionistic Fuzzy Sets. Fuzzy Sets and Systems 20(1), 87\u201396 (1999). https:\/\/doi.org\/10.1016\/S0165-0114(86)80034-3","DOI":"10.1016\/S0165-0114(86)80034-3"},{"key":"4952_CR38","doi-asserted-by":"publisher","unstructured":"Bezdek, J.C., Bezdek, J.C.: Objective function clustering. Pattern recognition with fuzzy objective function algorithms, 43\u201393 (1981) https:\/\/doi.org\/10.1007\/978-1-4757-0450-1_3","DOI":"10.1007\/978-1-4757-0450-1_3"},{"key":"4952_CR39","doi-asserted-by":"publisher","unstructured":"Yager, R.R.: On the measure of fuzziness and negation part i: membership in the unit interval (1979). https:\/\/doi.org\/10.1080\/03081077908547452","DOI":"10.1080\/03081077908547452"},{"key":"4952_CR40","doi-asserted-by":"publisher","unstructured":"Yager, R.R.: On the measure of fuzziness and negation. ii. lattices. Information and control 44(3), 236\u2013260 (1980) https:\/\/doi.org\/10.1016\/S0019-9958(80)90156-4","DOI":"10.1016\/S0019-9958(80)90156-4"},{"key":"4952_CR41","doi-asserted-by":"publisher","unstructured":"Cuong, B.C.: Picture fuzzy sets. Journal of Computer Science and Cybernetics 30(4), 409\u2013409 (2014) https:\/\/doi.org\/10.15625\/1813-9663\/30\/4\/5032","DOI":"10.15625\/1813-9663\/30\/4\/5032"},{"issue":"2\u20133","key":"4952_CR42","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/0098-3004(84)90020-7","volume":"10","author":"JC Bezdek","year":"1984","unstructured":"Bezdek, J.C., Ehrlich, R., Full, W.: Fcm: The fuzzy c-means clustering algorithm. Comp. Geosci. 10(2\u20133), 191\u2013203 (1984). https:\/\/doi.org\/10.1016\/0098-3004(84)90020-7","journal-title":"Comp. Geosci."},{"key":"4952_CR43","doi-asserted-by":"publisher","first-page":"4003","DOI":"10.1007\/s00500-019-04169-y","volume":"24","author":"D Kumar","year":"2020","unstructured":"Kumar, D., Agrawal, R., Verma, H.: Kernel intuitionistic fuzzy entropy clustering for mri image segmentation. Soft Comp. 24, 4003\u20134026 (2020). https:\/\/doi.org\/10.1007\/s00500-019-04169-y","journal-title":"Soft Comp."},{"issue":"4","key":"4952_CR44","doi-asserted-by":"publisher","first-page":"580","DOI":"10.3969\/j.issn.1004-4132.2010.04.009","volume":"21","author":"Z Xu","year":"2010","unstructured":"Xu, Z., Wu, J.: Intuitionistic fuzzy c-means clustering algorithms. J. Syst. Eng. Electron. 21(4), 580\u2013590 (2010). https:\/\/doi.org\/10.3969\/j.issn.1004-4132.2010.04.009","journal-title":"J. Syst. Eng. Electron."},{"key":"4952_CR45","doi-asserted-by":"publisher","unstructured":"Panwar, A.: A kernel based atanassov\u2019s intuitionistic fuzzy clustering for network forensics and intrusion detection. In: 2015 IEEE\/ACIS 14th International Conference on Computer and Information Science (ICIS), pp. 107\u2013112 (2015). https:\/\/doi.org\/10.1109\/ICIS.2015.7166578 . IEEE","DOI":"10.1109\/ICIS.2015.7166578"},{"issue":"2","key":"4952_CR46","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1016\/j.asoc.2010.05.005","volume":"11","author":"T Chaira","year":"2011","unstructured":"Chaira, T.: A novel intuitionistic fuzzy c means clustering algorithm and its application to medical images. Appl. Soft Comp. 11(2), 1711\u20131717 (2011). https:\/\/doi.org\/10.1016\/j.asoc.2010.05.005","journal-title":"Appl. Soft Comp."},{"issue":"3","key":"4952_CR47","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/S0165-0114(98)00244-9","volume":"114","author":"E Szmidt","year":"2000","unstructured":"Szmidt, E., Kacprzyk, J.: Distances between intuitionistic fuzzy sets. Fuzzy Sets Syst. 114(3), 505\u2013518 (2000). https:\/\/doi.org\/10.1016\/S0165-0114(98)00244-9","journal-title":"Fuzzy Sets Syst."},{"issue":"9","key":"4952_CR48","doi-asserted-by":"publisher","first-page":"3549","DOI":"10.1007\/s00500-015-1712-7","volume":"20","author":"PH Thong","year":"2016","unstructured":"Thong, P.H., Son, L.H.: Picture fuzzy clustering: a new computational intelligence method. Soft comp. 20(9), 3549\u20133562 (2016). https:\/\/doi.org\/10.1007\/s00500-015-1712-7","journal-title":"Soft comp."},{"key":"4952_CR49","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.proenv.2011.12.040","volume":"11","author":"Z Liu","year":"2011","unstructured":"Liu, Z.: A method of svm with normalization in intrusion detection. Proc. Environ. Sci. 11, 256\u2013262 (2011). https:\/\/doi.org\/10.1016\/j.proenv.2011.12.040","journal-title":"Proc. Environ. Sci."},{"key":"4952_CR50","doi-asserted-by":"publisher","unstructured":"Umar, M.A., Chen, Z., Shuaib, K., Liu, Y.: Effects of feature selection and normalization on network intrusion detection. Authorea Preprints (2024) https:\/\/doi.org\/10.36227\/techrxiv.12480425.v3","DOI":"10.36227\/techrxiv.12480425.v3"},{"issue":"12","key":"4952_CR51","doi-asserted-by":"publisher","first-page":"245","DOI":"10.3390\/computers12120245","volume":"12","author":"S Songma","year":"2023","unstructured":"Songma, S., Sathuphan, T., Pamutha, T.: Optimizing intrusion detection systems in three phases on the cse-cic-ids-2018 dataset. Computers 12(12), 245 (2023). https:\/\/doi.org\/10.3390\/computers12120245","journal-title":"Computers"},{"key":"4952_CR52","doi-asserted-by":"publisher","unstructured":"Patel, N., Mehtre, B., Wankar, R.: A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection. International Journal of Information Security, 1\u201331 (2024) https:\/\/doi.org\/10.1007\/s10207-023-00792-x","DOI":"10.1007\/s10207-023-00792-x"},{"issue":"6","key":"4952_CR53","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1037\/h0071325","volume":"24","author":"H Hotelling","year":"1933","unstructured":"Hotelling, H.: Analysis of a complex of statistical variables into principal components. J. Edu. Psychol. 24(6), 417 (1933). https:\/\/doi.org\/10.1037\/h0071325","journal-title":"J. Edu. Psychol."},{"issue":"1","key":"4952_CR54","first-page":"30","volume":"9","author":"V Venkatachalam","year":"2008","unstructured":"Venkatachalam, V., Selvan, S.: Performance comparison of intrusion detection system classifiers using various feature reduction techniques. Int. J. Simul. 9(1), 30\u201339 (2008)","journal-title":"Int. J. Simul."},{"key":"4952_CR55","doi-asserted-by":"publisher","unstructured":"Belhumeur, P.N., Hespanha, J.P., Kriegman, D.J.: Eigenfaces vs. fisherfaces: Recognition using class specific linear projection. IEEE Transactions on pattern analysis and machine intelligence 19(7), 711\u2013720 (1997) https:\/\/doi.org\/10.1109\/34.598228","DOI":"10.1109\/34.598228"},{"key":"4952_CR56","doi-asserted-by":"publisher","unstructured":"Elkhadir, Z., Mohammed, B.: A cyber network attack detection based on gm median nearest neighbors lda. computers & security 86, 63\u201374 (2019) https:\/\/doi.org\/10.1016\/j.cose.2019.05.021","DOI":"10.1016\/j.cose.2019.05.021"},{"key":"4952_CR57","doi-asserted-by":"publisher","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Machine learning 20, 273\u2013297 (1995) https:\/\/doi.org\/10.1007\/BF00994018","DOI":"10.1007\/BF00994018"},{"key":"4952_CR58","doi-asserted-by":"publisher","unstructured":"Evgeniou, T., Pontil, M.: Support vector machines: Theory and applications. In: Advanced Course on Artificial Intelligence, pp. 249\u2013257. Springer (1999). https:\/\/doi.org\/10.1007\/3-540-44673-7_12","DOI":"10.1007\/3-540-44673-7_12"},{"issue":"302","key":"4952_CR59","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1080\/01621459.1963.10500855","volume":"58","author":"JN Morgan","year":"1963","unstructured":"Morgan, J.N., Sonquist, J.A.: Problems in the analysis of survey data, and a proposal. J. Am. Stat. Assoc. 58(302), 415\u2013434 (1963)","journal-title":"J. Am. Stat. Assoc."},{"issue":"3","key":"4952_CR60","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1111\/insr.12016","volume":"82","author":"W-Y Loh","year":"2014","unstructured":"Loh, W.-Y.: Fifty years of classification and regression trees. Int. Stat. Rev. 82(3), 329\u2013348 (2014). https:\/\/doi.org\/10.1111\/insr.12016","journal-title":"Int. Stat. Rev."},{"key":"4952_CR61","doi-asserted-by":"publisher","unstructured":"Breiman, L.: Random forests. Machine learning 45, 5\u201332 (2001) https:\/\/doi.org\/10.1023\/A:1010933404324","DOI":"10.1023\/A:1010933404324"},{"key":"4952_CR62","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.isprsjprs.2016.01.011","volume":"114","author":"M Belgiu","year":"2016","unstructured":"Belgiu, M., Dr\u0103gu\u0163, L.: Random forest in remote sensing: a review of applications and future directions. ISPRS J. Photogrammetry Remote Sens. 114, 24\u201331 (2016). https:\/\/doi.org\/10.1016\/j.isprsjprs.2016.01.011","journal-title":"ISPRS J. Photogrammetry Remote Sens."},{"key":"4952_CR63","doi-asserted-by":"publisher","unstructured":"Parmar, A., Katariya, R., Patel, V.: A review on random forest: An ensemble classifier. In: International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018, pp. 758\u2013763 (2019). https:\/\/doi.org\/10.1007\/978-3-030-03146-6_86 . Springer","DOI":"10.1007\/978-3-030-03146-6_86"},{"key":"4952_CR64","doi-asserted-by":"publisher","unstructured":"Silverman, B.W., Jones, M.C.: E. fix and jl hodges (1951): An important contribution to nonparametric discriminant analysis and density estimation: Commentary on fix and hodges (1951). International Statistical Review\/Revue Internationale de Statistique, 233\u2013238 (1989)https:\/\/doi.org\/10.2307\/1403796","DOI":"10.2307\/1403796"},{"issue":"1","key":"4952_CR65","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","volume":"13","author":"T Cover","year":"1967","unstructured":"Cover, T., Hart, P.: Nearest neighbor pattern classification. IEEE Trans. Inf. Theory 13(1), 21\u201327 (1967). https:\/\/doi.org\/10.1109\/TIT.1967.1053964","journal-title":"IEEE Trans. Inf. Theory"},{"key":"4952_CR66","unstructured":"Bezdek, J.C.: FUZZY-MATHEMATICS IN PATTERN CLASSIFICATION. Cornell University (1973)"},{"issue":"9","key":"4952_CR67","doi-asserted-by":"publisher","first-page":"6225","DOI":"10.1016\/j.eswa.2010.02.102","volume":"37","author":"G Wang","year":"2010","unstructured":"Wang, G., Hao, J., Ma, J., Huang, L.: A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Exp. Syst. Appl. 37(9), 6225\u20136232 (2010)","journal-title":"Exp. Syst. Appl."},{"key":"4952_CR68","unstructured":"MacQueen, J., : Some methods for classification and analysis of multivariate observations. In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, pp. 281\u2013297 (1967). Oakland, CA, USA"},{"key":"4952_CR69","doi-asserted-by":"publisher","first-page":"2321","DOI":"10.1007\/s11277-024-11602-5","volume":"138","author":"S Seniaray","year":"2024","unstructured":"Seniaray, S., Jindal, R.: Performance analysis of anomaly-based network intrusion detection using feature selection and machine learning techniques. Wireless Personal Commun. 138, 2321\u20132351 (2024)","journal-title":"Wireless Personal Commun."},{"key":"4952_CR70","doi-asserted-by":"publisher","unstructured":"Sampat, R., Sonawani, S.: A survey of fuzzy clustering techniques for intrusion detection system. Int J Eng Res Technol 3(1), 2188\u20132192 (2014) https:\/\/doi.org\/10.17577\/IJERTV3IS10866","DOI":"10.17577\/IJERTV3IS10866"},{"issue":"7","key":"4952_CR71","doi-asserted-by":"publisher","first-page":"1442","DOI":"10.3390\/sym14071442","volume":"14","author":"C-M Yang","year":"2022","unstructured":"Yang, C.-M., Liu, Y., Wang, Y.-T., Li, Y.-P., Hou, W.-H., Duan, S., Wang, J.-Q.: A novel adaptive kernel picture fuzzy c-means clustering algorithm based on grey wolf optimizer algorithm. Symmetry 14(7), 1442 (2022). https:\/\/doi.org\/10.3390\/sym14071442","journal-title":"Symmetry"},{"key":"4952_CR72","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00382-x","volume":"7","author":"JL Leevy","year":"2020","unstructured":"Leevy, J.L., Khoshgoftaar, T.M.: A survey and analysis of intrusion detection models based on cse-cic-ids2018 big data. J. Big Data 7, 1\u201319 (2020). https:\/\/doi.org\/10.1186\/s40537-020-00382-x","journal-title":"J. Big Data"},{"issue":"1","key":"4952_CR73","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.eswa.2014.08.002","volume":"42","author":"S Elhag","year":"2015","unstructured":"Elhag, S., Fern\u00e1ndez, A., Bawakid, A., Alshomrani, S., Herrera, F.: On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Exp. Syst. Appl. 42(1), 193\u2013202 (2015). https:\/\/doi.org\/10.1016\/j.eswa.2014.08.002","journal-title":"Exp. Syst. Appl."},{"issue":"2","key":"4952_CR74","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/565117.565124","volume":"31","author":"M Halkidi","year":"2002","unstructured":"Halkidi, M., Batistakis, Y., Vazirgiannis, M.: Cluster validity methods: part i. ACM Sigmod Record 31(2), 40\u201345 (2002). https:\/\/doi.org\/10.1145\/565117.565124","journal-title":"ACM Sigmod Record"},{"issue":"12","key":"4952_CR75","doi-asserted-by":"publisher","first-page":"1","DOI":"10.9734\/jsrr\/2023\/v29i121812","volume":"29","author":"RK Verma","year":"2023","unstructured":"Verma, R.K., Tiwari, R., Thakur, P.S.: Partition coefficient and partition entropy in fuzzy c means clustering. J. Sci. Res. Rep. 29(12), 1\u20136 (2023). https:\/\/doi.org\/10.9734\/jsrr\/2023\/v29i121812","journal-title":"J. Sci. Res. Rep."},{"issue":"19","key":"4952_CR76","doi-asserted-by":"publisher","first-page":"2095","DOI":"10.1016\/j.fss.2007.03.004","volume":"158","author":"W Wang","year":"2007","unstructured":"Wang, W., Zhang, Y.: On fuzzy cluster validity indices. Fuzzy Sets and Syst. 158(19), 2095\u20132117 (2007). https:\/\/doi.org\/10.1016\/j.fss.2007.03.004","journal-title":"Fuzzy Sets and Syst."},{"issue":"10","key":"4952_CR77","doi-asserted-by":"publisher","first-page":"3374","DOI":"10.1016\/j.patcog.2010.04.025","volume":"43","author":"KR \u017dalik","year":"2010","unstructured":"\u017dalik, K.R.: Cluster validity index for estimation of fuzzy clusters of different sizes and densities. Pattern Recognition 43(10), 3374\u20133390 (2010). https:\/\/doi.org\/10.1016\/j.patcog.2010.04.025","journal-title":"Pattern Recognition"},{"issue":"08","key":"4952_CR78","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1109\/34.85677","volume":"13","author":"XL Xie","year":"1991","unstructured":"Xie, X.L., Beni, G.: A validity measure for fuzzy clustering. IEEE Trans. Pattern Anal. Mach. Intell. 13(08), 841\u2013847 (1991)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"3","key":"4952_CR79","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/91.413225","volume":"3","author":"NR Pal","year":"1995","unstructured":"Pal, N.R., Bezdek, J.C.: On cluster validity for the fuzzy c-means model. IEEE Trans. Fuzzy Syst. 3(3), 370\u2013379 (1995)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"3","key":"4952_CR80","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3583778","volume":"14","author":"T Gupta","year":"2023","unstructured":"Gupta, T., Jindal, R., Sreedevi, I.: Empirical review of various thermography-based computer-aided diagnostic systems for multiple diseases. ACM Trans. Intell. Syst. Technol. 14(3), 1\u201333 (2023). https:\/\/doi.org\/10.1145\/3583778","journal-title":"ACM Trans. Intell. Syst. Technol."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04952-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04952-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04952-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T17:40:58Z","timestamp":1757439658000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04952-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,31]]},"references-count":80,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["4952"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04952-z","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,7,31]]},"assertion":[{"value":"28 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The code that supports the findings of this study is available from the corresponding author upon reasonable request.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}],"article-number":"422"}}