{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:11:40Z","timestamp":1771467100816,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T00:00:00Z","timestamp":1745884800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T00:00:00Z","timestamp":1745884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10586-024-05060-8","type":"journal-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T15:17:33Z","timestamp":1745939853000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["HCIVAD: Explainable hybrid voting classifier for network intrusion detection systems"],"prefix":"10.1007","volume":"28","author":[{"given":"Usman","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Jiangbin","sequence":"additional","affiliation":[]},{"given":"Sheharyar","family":"Khan","sequence":"additional","affiliation":[]},{"given":"M T","family":"Sadiq","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,29]]},"reference":[{"issue":"4","key":"5060_CR1","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.icte.2021.12.003","volume":"8","author":"J-H Park","year":"2022","unstructured":"Park, J.-H., Kwon, H.-Y.: Cyberattack detection model using community detection and text analysis on social media. ICT Express 8(4), 499\u2013506 (2022)","journal-title":"ICT Express"},{"issue":"2","key":"5060_CR2","doi-asserted-by":"publisher","first-page":"174","DOI":"10.62411\/faith.2024-33","volume":"1","author":"ZS Dhahir","year":"2024","unstructured":"Dhahir, Z.S.: A hybrid approach for efficient DDoS detection in network traffic using CBLOF-based feature engineering and XGBoost. J. Future Artif. Intell. Technol. 1(2), 174\u2013190 (2024)","journal-title":"J. Future Artif. Intell. Technol."},{"key":"5060_CR3","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Company (1980)"},{"issue":"5","key":"5060_CR4","doi-asserted-by":"publisher","first-page":"4403","DOI":"10.1109\/TSG.2020.2992782","volume":"11","author":"P Lau","year":"2020","unstructured":"Lau, P., Wei, W., Wang, L., Liu, Z., Ten, C.-W.: A cybersecurity insurance model for power system reliability considering optimal defense resource allocation. IEEE Transa. Smart Grid 11(5), 4403\u20134414 (2020)","journal-title":"IEEE Transa. Smart Grid"},{"key":"5060_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106263","volume":"91","author":"X Dastile","year":"2020","unstructured":"Dastile, X., Celik, T., Potsane, M.: Statistical and machine learning models in credit scoring: a systematic literature survey. Appl. Soft Comput. 91, 106263 (2020)","journal-title":"Appl. Soft Comput."},{"issue":"5","key":"5060_CR6","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/S0167-4048(02)00514-X","volume":"21","author":"Y Liao","year":"2002","unstructured":"Liao, Y., Vemuri, V.R.: Use of k-nearest neighbor classifier for intrusion detection. Comput. Secur. 21(5), 439\u2013448 (2002)","journal-title":"Comput. Secur."},{"issue":"19","key":"5060_CR7","doi-asserted-by":"publisher","first-page":"3079","DOI":"10.3390\/electronics11193079","volume":"11","author":"S Patil","year":"2022","unstructured":"Patil, S., Varadarajan, V., Mazhar, S.M., Sahibzada, A., Ahmed, N., Sinha, O., Kumar, S., Shaw, K., Kotecha, K.: Explainable artificial intelligence for intrusion detection system. Electronics 11(19), 3079 (2022)","journal-title":"Electronics"},{"key":"5060_CR8","doi-asserted-by":"crossref","unstructured":"Speith, T.: A review of taxonomies of explainable artificial intelligence (XAI) methods. In: Proceedings of the 2022 ACM Conference on Fairness, Accountability, and Transparency, pp. 2239\u20132250 (2022)","DOI":"10.1145\/3531146.3534639"},{"issue":"5","key":"5060_CR9","first-page":"12285","volume":"30","author":"R Rami","year":"2024","unstructured":"Rami, R., Malek, Z.: Hybrid approach for anomaly detection using clustering mechanism. Educ. Adm. Theory Pract. 30(5), 12285\u201312292 (2024)","journal-title":"Educ. Adm. Theory Pract."},{"issue":"1","key":"5060_CR10","first-page":"1","volume":"16","author":"S Sakulin","year":"2022","unstructured":"Sakulin, S., Alfimtsev, A., Kvitchenko, K., Dobkacz, L., Kalgin, Y., Lychkov, I.: Network anomalies detection approach based on weighted voting. Int. J. Inf. Secur. Privacy (IJISP) 16(1), 1\u201317 (2022)","journal-title":"Int. J. Inf. Secur. Privacy (IJISP)"},{"issue":"9","key":"5060_CR11","doi-asserted-by":"publisher","first-page":"1679","DOI":"10.3390\/sym15091679","volume":"15","author":"M Chaudhry","year":"2023","unstructured":"Chaudhry, M., Shafi, I., Mahnoor, M., Vargas, D.L.R., Thompson, E.B., Ashraf, I.: A systematic literature review on identifying patterns using unsupervised clustering algorithms: a data mining perspective. Symmetry 15(9), 1679 (2023)","journal-title":"Symmetry"},{"issue":"16","key":"5060_CR12","doi-asserted-by":"publisher","first-page":"2741","DOI":"10.1002\/sec.592","volume":"8","author":"M Panda","year":"2015","unstructured":"Panda, M., Abraham, A., Patra, M.R.: Hybrid intelligent systems for detecting network intrusions. Secur. Commun. Netw. 8(16), 2741\u20132749 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"5060_CR13","unstructured":"Chalapathy, R., Chawla, S.: Deep learning for anomaly detection: a survey. arXiv preprint arXiv:1901.03407 (2019)"},{"key":"5060_CR14","volume-title":"Outlier analysis","author":"CC Aggarwal","year":"2016","unstructured":"Aggarwal, C.C.: Outlier analysis, 2nd edn. Springer, Berlin (2016)","edition":"2"},{"issue":"3","key":"5060_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"5060_CR16","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1016\/j.neucom.2019.12.138","volume":"452","author":"E Jove","year":"2021","unstructured":"Jove, E., Casado-Vara, R., Casteleiro-Roca, J.-L., P\u00e9rez, J.A.M., Vale, Z., Calvo-Rolle, J.L.: A hybrid intelligent classifier for anomaly detection. Neurocomputing 452, 498\u2013507 (2021)","journal-title":"Neurocomputing"},{"key":"5060_CR17","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.cose.2014.05.011","volume":"45","author":"S Garcia","year":"2014","unstructured":"Garcia, S., Grill, M., Stiborek, J., Zunino, A.: An empirical comparison of botnet detection methods. Comput. Secur. 45, 100\u2013123 (2014)","journal-title":"Comput. Secur."},{"issue":"5","key":"5060_CR18","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1109\/TKDE.2007.1009","volume":"19","author":"X Song","year":"2007","unstructured":"Song, X., Wu, M., Jermaine, C., Ranka, S.: Conditional anomaly detection. IEEE Trans. Knowl. Data Eng. 19(5), 631\u2013645 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"5060_CR19","doi-asserted-by":"crossref","unstructured":"Miyahara, S., Komazaki, Y., Miyamoto, S.: An algorithm combining spectral clustering and dbscan for core points. In: Knowledge and Systems Engineering: Proceedings of the Fifth International Conference KSE 2013, vol. 2, pp. 21\u201328. Springer, Berlin (2014)","DOI":"10.1007\/978-3-319-02821-7_4"},{"key":"5060_CR20","doi-asserted-by":"publisher","first-page":"72458","DOI":"10.1109\/ACCESS.2018.2867345","volume":"6","author":"TA Tchakoucht","year":"2018","unstructured":"Tchakoucht, T.A., Ezziyyani, M.: Multilayered echo-state machine: a novel architecture for efficient intrusion detection. IEEE Access 6, 72458\u201372468 (2018)","journal-title":"IEEE Access"},{"issue":"1","key":"5060_CR21","doi-asserted-by":"publisher","first-page":"25","DOI":"10.3390\/s22010025","volume":"22","author":"Y Tang","year":"2021","unstructured":"Tang, Y., Gu, L., Wang, L.: Deep stacking network for intrusion detection. Sensors 22(1), 25 (2021)","journal-title":"Sensors"},{"key":"5060_CR22","doi-asserted-by":"crossref","unstructured":"Chen, T.M.: Network traffic modeling. In: The Handbook of Computer Networks, vol. 3, p. 156. Wiley, Hoboken (2007)","DOI":"10.1002\/9781118256107.ch21"},{"issue":"20","key":"5060_CR23","doi-asserted-by":"publisher","first-page":"6782","DOI":"10.3390\/en14206782","volume":"14","author":"M Elsaraiti","year":"2021","unstructured":"Elsaraiti, M., Merabet, A.: A comparative analysis of the ARIMA and LSTM predictive models and their effectiveness for predicting wind speed. Energies 14(20), 6782 (2021)","journal-title":"Energies"},{"key":"5060_CR24","doi-asserted-by":"crossref","unstructured":"Wen, Q., Gao, J., Song, X., Sun, L., Xu, H., Zhu, S.: Robuststl: a robust seasonal-trend decomposition algorithm for long time series. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp. 5409\u20135416 (2019)","DOI":"10.1609\/aaai.v33i01.33015409"},{"key":"5060_CR25","doi-asserted-by":"crossref","unstructured":"Chikodili, N.B., Abdulmalik, M.D., Abisoye, O.A., Bashir, S.A.: Outlier detection in multivariate time series data using a fusion of k-medoid, standardized Euclidean distance and z-score. In: International Conference on Information and Communication Technology and Applications, pp. 259\u2013271. Springer, Berlin (2020)","DOI":"10.1007\/978-3-030-69143-1_21"},{"key":"5060_CR26","unstructured":"Huynh, N.A., Ng, W.K., Ulmer, A., Kohlhammer, J.: Uncovering periodic network signals of cyber attacks. In: 2016 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1\u20138. IEEE (2016)"},{"key":"5060_CR27","doi-asserted-by":"publisher","first-page":"121793","DOI":"10.1109\/ACCESS.2019.2938296","volume":"7","author":"C Liu","year":"2019","unstructured":"Liu, C., Wu, X., Zhu, L., Yao, C., Yu, L., Wang, L., Tong, W., Pan, T.: The communication relationship discovery based on the spectrum monitoring data by improved DBSCAN. IEEE Access 7, 121793\u2013121804 (2019)","journal-title":"IEEE Access"},{"issue":"12","key":"5060_CR28","doi-asserted-by":"publisher","first-page":"5933","DOI":"10.1109\/TIP.2016.2616302","volume":"25","author":"J Shen","year":"2016","unstructured":"Shen, J., Hao, X., Liang, Z., Liu, Y., Wang, W., Shao, L.: Real-time superpixel segmentation by DBSCAN clustering algorithm. IEEE Trans. Image Process. 25(12), 5933\u20135942 (2016)","journal-title":"IEEE Trans. Image Process."},{"key":"5060_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11704-019-9059-3","volume":"15","author":"P Bhattacharjee","year":"2021","unstructured":"Bhattacharjee, P., Mitra, P.: A survey of density based clustering algorithms. Front. Comput. Sci. 15, 1\u201327 (2021)","journal-title":"Front. Comput. Sci."},{"issue":"6","key":"5060_CR30","first-page":"1","volume":"21","author":"A Little","year":"2020","unstructured":"Little, A., Maggioni, M., Murphy, J.M.: Path-based spectral clustering: guarantees, robustness to outliers, and fast algorithms. J. Mach. Learn. Res. 21(6), 1\u201366 (2020)","journal-title":"J. Mach. Learn. Res."},{"key":"5060_CR31","doi-asserted-by":"publisher","first-page":"87918","DOI":"10.1109\/ACCESS.2021.3089036","volume":"9","author":"AA Bushra","year":"2021","unstructured":"Bushra, A.A., Yi, G.: Comparative analysis review of pioneering DBSCAN and successive density-based clustering algorithms. IEEE Access 9, 87918\u201387935 (2021)","journal-title":"IEEE Access"},{"issue":"2","key":"5060_CR32","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s11416-022-00441-2","volume":"19","author":"S Hariharan","year":"2023","unstructured":"Hariharan, S., Rejimol Robinson, R., Prasad, R.R., Thomas, C., Balakrishnan, N.: XAI for intrusion detection system: comparing explanations based on global and local scope. J. Comput. Virol. Hacking Techniques 19(2), 217\u2013239 (2023)","journal-title":"J. Comput. Virol. Hacking Techniques"},{"issue":"1","key":"5060_CR33","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1186\/s13677-024-00712-x","volume":"13","author":"U Ahmed","year":"2024","unstructured":"Ahmed, U., Jiangbin, Z., Almogren, A., Khan, S., Sadiq, M.T., Altameem, A., Rehman, A.U.: Explainable AI-based innovative hybrid ensemble model for intrusion detection. J. Cloud Comput. 13(1), 150 (2024)","journal-title":"J. Cloud Comput."},{"issue":"10","key":"5060_CR34","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3390\/fi12100167","volume":"12","author":"N Thapa","year":"2020","unstructured":"Thapa, N., Liu, Z., Kc, D.B., Gokaraju, B., Roy, K.: Comparison of machine learning and deep learning models for network intrusion detection systems. Future Internet 12(10), 167 (2020)","journal-title":"Future Internet"},{"issue":"1","key":"5060_CR35","first-page":"6659022","volume":"2021","author":"M He","year":"2021","unstructured":"He, M., Wang, X., Zhou, J., Xi, Y., Jin, L., Wang, X.: Deep-feature-based autoencoder network for few-shot malicious traffic detection. Secur. Commun. Netw. 2021(1), 6659022 (2021)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"5060_CR36","first-page":"20","volume":"12","author":"W Yaokumah","year":"2020","unstructured":"Yaokumah, W., Wiafe, I.: Analysis of machine learning techniques for anomaly-based intrusion detection. Int. J. Distrib. Artif. Intell. (IJDAI) 12(1), 20\u201338 (2020)","journal-title":"Int. J. Distrib. Artif. Intell. (IJDAI)"},{"key":"5060_CR37","doi-asserted-by":"crossref","unstructured":"Rajasekar, V., Sarika, S., Velliangiri, S., Kalaivani, K., et\u00a0al.: An efficient intrusion detection model based on recurrent neural network. In: 2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), pp. 1\u20136. IEEE (2022)","DOI":"10.1109\/ICDCECE53908.2022.9793016"},{"issue":"1","key":"5060_CR38","doi-asserted-by":"publisher","first-page":"2215852","DOI":"10.1155\/2022\/2215852","volume":"2022","author":"M Naveed","year":"2022","unstructured":"Naveed, M., Arif, F., Usman, S.M., Anwar, A., Hadjouni, M., Elmannai, H., Hussain, S., Ullah, S.S., Umar, F.: A deep learning-based framework for feature extraction and classification of intrusion detection in networks. Wirel. Commun. Mob. Comput. 2022(1), 2215852 (2022)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"5060_CR39","doi-asserted-by":"crossref","unstructured":"Abedin, M.Z., Siddiquee, K.N.E.A., Bhuyan, M., Karim, R., Hossain, M.S., Andersson, K.: Performance analysis of anomaly based network intrusion detection systems. In: 43nd IEEE Conference on Local Computer Networks Workshops (LCN Workshops), Chicago, October 1\u20134, 2018, pp. 1\u20137. IEEE Computer Society (2018)","DOI":"10.1109\/LCNW.2018.8628599"},{"key":"5060_CR40","doi-asserted-by":"crossref","unstructured":"Fitni, Q.R.S., Ramli, K.: Implementation of ensemble learning and feature selection for performance improvements in anomaly-based intrusion detection systems. In: 2020 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), pp. 118\u2013124. IEEE (2020)","DOI":"10.1109\/IAICT50021.2020.9172014"},{"issue":"6","key":"5060_CR41","doi-asserted-by":"publisher","first-page":"898","DOI":"10.3390\/electronics11060898","volume":"11","author":"Y Fu","year":"2022","unstructured":"Fu, Y., Du, Y., Cao, Z., Li, Q., Xiang, W.: A deep learning model for network intrusion detection with imbalanced data. Electronics 11(6), 898 (2022)","journal-title":"Electronics"},{"key":"5060_CR42","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1016\/j.procs.2017.12.091","volume":"125","author":"A Verma","year":"2018","unstructured":"Verma, A., Ranga, V.: Statistical analysis of CIDDS-001 dataset for network intrusion detection systems using distance-based machine learning. Proc. Comput. Sci. 125, 709\u2013716 (2018)","journal-title":"Proc. Comput. Sci."},{"key":"5060_CR43","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s10115-003-0132-7","volume":"6","author":"W Fan","year":"2004","unstructured":"Fan, W., Miller, M., Stolfo, S., Lee, W., Chan, P.: Using artificial anomalies to detect unknown and known network intrusions. Knowl. Inf. Syst. 6, 507\u2013527 (2004)","journal-title":"Knowl. Inf. Syst."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05060-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-05060-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05060-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T12:42:58Z","timestamp":1757162578000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-05060-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,29]]},"references-count":43,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["5060"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-05060-8","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,29]]},"assertion":[{"value":"10 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"343"}}