{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:14:03Z","timestamp":1771467243708,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the 2024 Higher Education Industry Support Program project","award":["CYZC-2024-24"],"award-info":[{"award-number":["CYZC-2024-24"]}]},{"name":"the 2024 Higher Education Industry Support Program project","award":["CYZC-2024-24"],"award-info":[{"award-number":["CYZC-2024-24"]}]},{"name":"the 2024 Higher Education Industry Support Program project","award":["CYZC-2024-24"],"award-info":[{"award-number":["CYZC-2024-24"]}]},{"name":"the 2024 Higher Education Industry Support Program project","award":["CYZC-2024-24"],"award-info":[{"award-number":["CYZC-2024-24"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10586-025-05100-x","type":"journal-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T11:21:45Z","timestamp":1745839305000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An edge-enhanced graphSAGE-based intrusion detection model for the internet of things"],"prefix":"10.1007","volume":"28","author":[{"given":"Ruisheng","family":"Li","sequence":"first","affiliation":[]},{"given":"Huimin","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Qilong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Huimin","family":"Duan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,28]]},"reference":[{"issue":"4","key":"5100_CR1","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347\u20132376 (2015). https:\/\/doi.org\/10.1109\/COMST.2015.2444095","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"10","key":"5100_CR2","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.3390\/electronics9101565","volume":"9","author":"MA Lawal","year":"2020","unstructured":"Lawal, M.A., Shaikh, R.A., Hassan, S.R.: An anomaly mitigation framework for iot using fog computing. Electronics 9(10), 1565 (2020). https:\/\/doi.org\/10.3390\/electronics9101565","journal-title":"Electronics"},{"key":"5100_CR3","unstructured":"Zhou, Y., Pengfei\u00a0He, R.Q., Guo\u00a0Chen, W.W.: Research on intrusion detection based on random forest and gradient boosting tree. Journal of Software 32(10) (2021)"},{"issue":"6","key":"5100_CR4","doi-asserted-by":"publisher","first-page":"4069","DOI":"10.1007\/s10586-022-03810-0","volume":"26","author":"C Hazman","year":"2023","unstructured":"Hazman, C., Guezzaz, A., Benkirane, S., Azrour, M.: lids-sioel: intrusion detection framework for iot-based smart environments security using ensemble learning. Cluster Comput. 26(6), 4069\u20134083 (2023). https:\/\/doi.org\/10.1007\/s10586-022-03810-0","journal-title":"Cluster Comput."},{"issue":"2","key":"5100_CR5","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.1007\/s00500-023-09452-7","volume":"28","author":"M Al-Ambusaidi","year":"2024","unstructured":"Al-Ambusaidi, M., Yinjun, Z., Muhammad, Y., Yahya, A.: Ml-ids: an efficient ml-enabled intrusion detection system for securing iot networks and applications. Soft Comput. 28(2), 1765\u20131784 (2024). https:\/\/doi.org\/10.1007\/s00500-023-09452-7","journal-title":"Soft Comput."},{"key":"5100_CR6","doi-asserted-by":"publisher","first-page":"65611","DOI":"10.1109\/access.2022.3183213","volume":"10","author":"B Deore","year":"2022","unstructured":"Deore, B., Bhosale, S.: Hybrid optimization enabled robust cnn-lstm technique for network intrusion detection. Ieee Access 10, 65611\u201365622 (2022). https:\/\/doi.org\/10.1109\/access.2022.3183213","journal-title":"Ieee Access"},{"issue":"3","key":"5100_CR7","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1007\/s10586-023-04102-x","volume":"27","author":"AV Hanafi","year":"2024","unstructured":"Hanafi, A.V., Ghaffari, A., Rezaei, H., Valipour, A., Arasteh, B.: Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and lstm. Cluster Comput. 27(3), 2673\u20132690 (2024). https:\/\/doi.org\/10.1007\/s10586-023-04102-x","journal-title":"Cluster Comput."},{"issue":"11","key":"5100_CR8","doi-asserted-by":"publisher","first-page":"31505","DOI":"10.1007\/s11042-023-16662-6","volume":"83","author":"V Saravanan","year":"2024","unstructured":"Saravanan, V., Madiajagan, M., Rafee, S.M., Sanju, P., Rehman, T.B., Pattanaik, B.: Iot-based blockchain intrusion detection using optimized recurrent neural network. Multimed. Tool Appl. 83(11), 31505\u201331526 (2024). https:\/\/doi.org\/10.1007\/s11042-023-16662-6","journal-title":"Multimed. Tool Appl."},{"key":"5100_CR9","unstructured":"Zhang, L., Tan, L., Shi, H., Sun, H., Zhang, W.: Malicious traffic classification for iot based on graph attention network and long short-term memory network. In: 2023 24st Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 54\u201359 (2023). IEEE"},{"key":"5100_CR10","doi-asserted-by":"publisher","unstructured":"Zhong, M., Lin, M., Zhang, C., Xu, Z.: A survey on graph neural networks for intrusion detection systems: Methods, trends and challenges. Computers & Security, 103821 (2024) https:\/\/doi.org\/10.1016\/j.cose.2024.103821","DOI":"10.1016\/j.cose.2024.103821"},{"issue":"9","key":"5100_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.23915\/distill.00033","volume":"6","author":"B Sanchez-Lengeling","year":"2021","unstructured":"Sanchez-Lengeling, B., Reif, E., Pearce, A., Wiltschko, A.B.: A gentle introduction to graph neural networks. Distill 6(9), 33 (2021). https:\/\/doi.org\/10.23915\/distill.00033","journal-title":"Distill"},{"key":"5100_CR12","doi-asserted-by":"publisher","unstructured":"Mittal, K., Khurana\u00a0Batra, P.: Graph-ensemble fusion for enhanced iot intrusion detection: leveraging gcn and deep learning. Cluster Computing, 1\u201328 (2024) https:\/\/doi.org\/10.1007\/s10586-024-04404-8","DOI":"10.1007\/s10586-024-04404-8"},{"issue":"13","key":"5100_CR13","doi-asserted-by":"publisher","first-page":"11604","DOI":"10.1109\/JIOT.2021.3130156","volume":"9","author":"IA Khan","year":"2021","unstructured":"Khan, I.A., Moustafa, N., Pi, D., Sallam, K.M., Zomaya, A.Y., Li, B.: A new explainable deep learning framework for cyber threat discovery in industrial iot networks. IEEE Internet Thing J. 9(13), 11604\u201311613 (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3130156","journal-title":"IEEE Internet Thing J."},{"key":"5100_CR14","doi-asserted-by":"publisher","first-page":"102930","DOI":"10.1016\/j.adhoc.2022.102930","volume":"134","author":"IA Khan","year":"2022","unstructured":"Khan, I.A., Keshk, M., Pi, D., Khan, N., Hussain, Y., Soliman, H.: Enhancing iiot networks protection: A robust security model for attack detection in internet industrial control systems. Ad Hoc Netw. 134, 102930 (2022). https:\/\/doi.org\/10.1016\/j.adhoc.2022.102930","journal-title":"Ad Hoc Netw."},{"key":"5100_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3200048","author":"I Khan","year":"2022","unstructured":"Khan, I., Pi, D., Abbas, M., Zia, U., Hussain, Y., Soliman, H.: Federated-SRUs: A federated-simple-recurrent-units-based IDS for accurate detection of cyber attacks against IoT-augmented industrial control systems. IEEE (2022). https:\/\/doi.org\/10.1109\/JIOT.2022.3200048","journal-title":"IEEE"},{"key":"5100_CR16","doi-asserted-by":"publisher","first-page":"102074","DOI":"10.1016\/j.inffus.2023.102074","volume":"102","author":"MM Salim","year":"2024","unstructured":"Salim, M.M., El Azzaoui, A., Deng, X., Park, J.H.: Fl-ctif: A federated learning based cti framework based on information fusion for secure iiot. Inform. Fusion 102, 102074 (2024). https:\/\/doi.org\/10.1016\/j.inffus.2023.102074","journal-title":"Inform. Fusion"},{"key":"5100_CR17","doi-asserted-by":"publisher","first-page":"109999","DOI":"10.1016\/j.patcog.2023.109999","volume":"146","author":"Z Ding","year":"2024","unstructured":"Ding, Z., Zhong, G., Qin, X., Li, Q., Fan, Z., Deng, Z., Ling, X., Xiang, W.: Mf-net: Multi-frequency intrusion detection network for internet traffic data. Pattern Recognit. 146, 109999 (2024). https:\/\/doi.org\/10.1016\/j.patcog.2023.109999","journal-title":"Pattern Recognit."},{"key":"5100_CR18","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/j.neunet.2023.12.023","volume":"171","author":"X Zhang","year":"2024","unstructured":"Zhang, X., Shi, S., Sun, H., Chen, D., Wang, G., Wu, K.: Acvae: A novel self-adversarial variational auto-encoder combined with contrast learning for time series anomaly detection. Neural Netw. 171, 383\u2013395 (2024). https:\/\/doi.org\/10.1016\/j.neunet.2023.12.023","journal-title":"Neural Netw."},{"key":"5100_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109960","volume":"145","author":"M Mesgaran","year":"2024","unstructured":"Mesgaran, M., Hamza, A.B.: Graph fairing convolutional networks for anomaly detection. Pattern Recognit. 145, 109960 (2024). https:\/\/doi.org\/10.1016\/j.patcog.2023.109960","journal-title":"Pattern Recognit."},{"key":"5100_CR20","unstructured":"Zhang, L., Tan, L., Shi, H., Sun, H., Zhang, W.: Malicious traffic classification for iot based on graph attention network and long short-term memory network. In: 2023 24st Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 54\u201359 (2023). IEEE"},{"key":"5100_CR21","doi-asserted-by":"publisher","unstructured":"Xiao, Q., Liu, J., Wang, Q., Jiang, Z., Wang, X., Yao, Y.: Towards network anomaly detection using graph embedding. In: Computational Science\u2013ICCS 2020: 20th International Conference, Amsterdam, The Netherlands, June 3\u20135, 2020, Proceedings, Part IV 20, pp. 156\u2013169 (2020). https:\/\/doi.org\/10.1007\/978-3-030-50423-6_12 . Springer","DOI":"10.1007\/978-3-030-50423-6_12"},{"key":"5100_CR22","doi-asserted-by":"publisher","unstructured":"Zhao, J., Liu, X., Yan, Q., Li, B., Shao, M., Peng, H.: Multi-attributed heterogeneous graph convolutional network for bot detection. Information Sciences 537, 380\u2013393 (2020) https:\/\/doi.org\/10.1016\/j.ins.2020.03.113","DOI":"10.1016\/j.ins.2020.03.113"},{"key":"5100_CR23","doi-asserted-by":"publisher","unstructured":"Lo, W.W., Layeghy, S., Sarhan, M., Gallagher, M., Portmann, M.: E-graphsage: A graph neural network based intrusion detection system for iot. In: NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20139 (2022). https:\/\/doi.org\/10.1109\/noms54207.2022.9789878 . IEEE","DOI":"10.1109\/noms54207.2022.9789878"},{"key":"5100_CR24","doi-asserted-by":"publisher","unstructured":"Zhou, J., Xu, Z., Rush, A.M., Yu, M.: Automating botnet detection with graph neural networks. arXiv preprint arXiv:2003.06344 (2020) https:\/\/doi.org\/10.48550\/arXiv.2003.06344","DOI":"10.48550\/arXiv.2003.06344"},{"key":"5100_CR25","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Zhang, Y., Wu, Y., Li, C.: Tpe-nids: uses graph neural networks to detect malicious traffic. In: 2022 4th International Conference on Frontiers Technology of Information and Computer (ICFTIC), pp. 949\u2013958 (2022). https:\/\/doi.org\/10.1109\/icftic57696.2022.10075261 . IEEE","DOI":"10.1109\/icftic57696.2022.10075261"},{"key":"5100_CR26","doi-asserted-by":"publisher","unstructured":"Xu, P., Lu, G., Li, Y., Xu, C.: Ee-gcn: A graph convolutional network based intrusion detection method for iiot. In: 2023 5th International Conference on Natural Language Processing (ICNLP), pp. 338\u2013344 (2023). https:\/\/doi.org\/10.1109\/icnlp58431.2023.00068 . IEEE","DOI":"10.1109\/icnlp58431.2023.00068"},{"key":"5100_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104132","volume":"148","author":"P Deng","year":"2025","unstructured":"Deng, P., Huang, Y.: Edge-featured multi-hop attention graph neural network for intrusion detection system. Comput. Secur. 148, 104132 (2025). https:\/\/doi.org\/10.1016\/j.cose.2024.104132","journal-title":"Comput. Secur."},{"key":"5100_CR28","doi-asserted-by":"publisher","unstructured":"Zhang, B., Li, J., Chen, C., Lee, K., Lee, I.: A practical botnet traffic detection system using gnn. In: Cyberspace Safety and Security: 13th International Symposium, CSS 2021, Virtual Event, November 9\u201311, 2021, Proceedings 13, pp. 66\u201378 (2022). https:\/\/doi.org\/10.1007\/978-3-030-94029-4_5 . Springer","DOI":"10.1007\/978-3-030-94029-4_5"},{"key":"5100_CR29","doi-asserted-by":"publisher","unstructured":"Zhong, X., Wan, G.: Six-graphsecurity: Industrial internet intrusion detection based on graph neural network. In: 2023 IEEE 7th Information Technology and Mechatronics Engineering Conference (ITOEC), vol. 7, pp. 1340\u20131344 (2023). https:\/\/doi.org\/10.1109\/ITOEC57671.2023.10291647 . IEEE","DOI":"10.1109\/ITOEC57671.2023.10291647"},{"key":"5100_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100747","volume":"22","author":"WW Lo","year":"2023","unstructured":"Lo, W.W., Kulatilleke, G., Sarhan, M., Layeghy, S., Portmann, M.: Xg-bot: An explainable deep graph neural network for botnet detection and forensics. Internet Thing 22, 100747 (2023). https:\/\/doi.org\/10.1016\/j.iot.2023.100747","journal-title":"Internet Thing"},{"key":"5100_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3387051","author":"H Chen","year":"2024","unstructured":"Chen, H., Zang, L., Li, Y.: Node-smoothness based adaptive initial residual deep graph convolutional network. IEEE Internet Thing J. (2024). https:\/\/doi.org\/10.1109\/jiot.2024.3387051","journal-title":"IEEE Internet Thing J."},{"key":"5100_CR32","doi-asserted-by":"publisher","unstructured":"Qiu, C., Geng, Y., Lu, J., Chen, K., Zhu, S., Su, Y., Nan, G., Zhang, C., Fu, J., Cui, Q., et al.: 3d-ids: Doubly disentangled dynamic intrusion detection. In: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 1965\u20131977 (2023). https:\/\/doi.org\/10.1145\/3580305.3599238","DOI":"10.1145\/3580305.3599238"},{"key":"5100_CR33","doi-asserted-by":"crossref","unstructured":"Neto, E.C.P., Dadkhah, S., Ferreira, R., Zohourian, A., Lu, R., Ghorbani, A.A.: Ciciot 2023: A real-time dataset and benchmark for large-scale attacks in iot environment. Sensors 23(13), 5941 (2023) https:\/\/doi.org\/10.20944\/preprints202305.0443.v1","DOI":"10.3390\/s23135941"},{"key":"5100_CR34","doi-asserted-by":"publisher","unstructured":"Ferrag, M.A., Friha, O., Hamouda, D., Maglaras, L., Janicke, H.: Edge-iiotset: A new comprehensive realistic cyber security dataset of iot and iiot applications for centralized and federated learning. IEEE Access 10, 40281\u201340306 (2022) https:\/\/doi.org\/10.1109\/access.2022.3165809","DOI":"10.1109\/access.2022.3165809"},{"key":"5100_CR35","doi-asserted-by":"publisher","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems 100, 779\u2013796 (2019) https:\/\/doi.org\/10.1016\/j.future.2019.05.041","DOI":"10.1016\/j.future.2019.05.041"},{"key":"5100_CR36","doi-asserted-by":"publisher","unstructured":"Caville, E., Lo, W.W., Layeghy, S., Portmann, M.: Anomal-e: A self-supervised network intrusion detection system based on graph neural networks. Knowledge-Based Systems 258, 110030 (2022) https:\/\/doi.org\/10.1016\/j.knosys.2022.110030","DOI":"10.1016\/j.knosys.2022.110030"},{"key":"5100_CR37","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3348117","author":"W Yao","year":"2023","unstructured":"Yao, W., Zhao, H., Shi, H.: Privacy-preserving collaborative intrusion detection in edge of internet of things: A robust and efficient deep generative learning approach. IEEE Internet Thing J. (2023). https:\/\/doi.org\/10.1109\/jiot.2023.3348117","journal-title":"IEEE Internet Thing J."},{"issue":"11","key":"5100_CR38","doi-asserted-by":"publisher","first-page":"7704","DOI":"10.1109\/tii.2020.3025755","volume":"17","author":"M Abdel-Basset","year":"2020","unstructured":"Abdel-Basset, M., Chang, V., Hawash, H., Chakrabortty, R.K., Ryan, M.: Deep-ifs: Intrusion detection approach for industrial internet of things traffic in fog environment. IEEE Transac. Indust. Inf. 17(11), 7704\u20137715 (2020). https:\/\/doi.org\/10.1109\/tii.2020.3025755","journal-title":"IEEE Transac. Indust. Inf."},{"key":"5100_CR39","doi-asserted-by":"publisher","first-page":"131661","DOI":"10.1109\/access.2023.3336678","volume":"11","author":"RW Wardhani","year":"2023","unstructured":"Wardhani, R.W., Putranto, D.S.C., Jo, U., Kim, H., et al.: Toward enhanced attack detection and explanation in intrusion detection system-based iot environment data. IEEE Access 11, 131661\u2013131676 (2023). https:\/\/doi.org\/10.1109\/access.2023.3336678","journal-title":"IEEE Access"},{"key":"5100_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2022.103402","volume":"176","author":"M Abd Elaziz","year":"2023","unstructured":"Abd Elaziz, M., Al-qaness, M.A., Dahou, A., Ibrahim, R.A., Abd El-Latif, A.A.: Intrusion detection approach for cloud and iot environments using deep learning and capuchin search algorithm. Adv. Engineer. Softw. 176, 103402 (2023). https:\/\/doi.org\/10.1016\/j.advengsoft.2022.103402","journal-title":"Adv. Engineer. Softw."},{"key":"5100_CR41","doi-asserted-by":"publisher","unstructured":"Wang, Z., Chen, H., Yang, S., Luo, X., Li, D., Wang, J.: A lightweight intrusion detection method for iot based on deep learning and dynamic quantization. PeerJ Computer Science 9, 1569 (2023) https:\/\/doi.org\/10.7717\/peerj-cs.1569","DOI":"10.7717\/peerj-cs.1569"},{"key":"5100_CR42","doi-asserted-by":"publisher","unstructured":"Han, X., Cui, S., Qin, J., Liu, S., Jiang, B., Dong, C., Lu, Z., Liu, B.: Contramtd: An unsupervised malicious network traffic detection method based on contrastive learning. In: Proceedings of the ACM on Web Conference 2024, pp. 1680\u20131689 (2024). https:\/\/doi.org\/10.1145\/3589334.3645479","DOI":"10.1145\/3589334.3645479"},{"key":"5100_CR43","doi-asserted-by":"publisher","unstructured":"Farrukh, Y.A., Wali, S., Khan, I., Bastian, N.D.: Xg-nid: Dual-modality network intrusion detection using a heterogeneous graph neural network and large language model. arXiv preprint arXiv:2408.16021 (2024) https:\/\/doi.org\/10.48550\/arXiv.2408.16021","DOI":"10.48550\/arXiv.2408.16021"},{"key":"5100_CR44","doi-asserted-by":"publisher","unstructured":"Lin, X., Xiong, G., Gou, G., Li, Z., Shi, J., Yu, J.: Et-bert: A contextualized datagram representation with pre-training transformers for encrypted traffic classification. In: Proceedings of the ACM Web Conference 2022, pp. 633\u2013642 (2022). https:\/\/doi.org\/10.1145\/3485447.3512217","DOI":"10.1145\/3485447.3512217"},{"key":"5100_CR45","doi-asserted-by":"publisher","unstructured":"Liu, C., He, L., Xiong, G., Cao, Z., Li, Z.: Fs-net: A flow sequence network for encrypted traffic classification. In: IEEE INFOCOM 2019-IEEE Conference On Computer Communications, pp. 1171\u20131179 (2019). https:\/\/doi.org\/10.1109\/INFOCOM.2019.8737507 . IEEE","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"5100_CR46","doi-asserted-by":"publisher","unstructured":"Li, Z., Zhao, H., Zhao, J., Jiang, Y., Bu, F.: Sat-net: A staggered attention network using graph neural networks for encrypted traffic classification. Journal of Network and Computer Applications, 104069 (2024) https:\/\/doi.org\/10.1016\/j.jnca.2024.104069","DOI":"10.1016\/j.jnca.2024.104069"},{"issue":"19","key":"5100_CR47","doi-asserted-by":"publisher","first-page":"9572","DOI":"10.3390\/app12199572","volume":"12","author":"I Tareq","year":"2022","unstructured":"Tareq, I., Elbagoury, B.M., El-Regaily, S., El-Horbaty, E.-S.M.: Analysis of ton-iot, unw-nb15, and edge-iiot datasets using dl in cybersecurity for iot. Appl. Sci. 12(19), 9572 (2022). https:\/\/doi.org\/10.3390\/app12199572","journal-title":"Appl. Sci."},{"key":"5100_CR48","doi-asserted-by":"publisher","unstructured":"Zhao, R., Zhan, M., Deng, X., Wang, Y., Wang, Y., Gui, G., Xue, Z.: Yet another traffic classifier: A masked autoencoder based traffic transformer with multi-level flow representation. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 37, pp. 5420\u20135427 (2023). https:\/\/doi.org\/10.1609\/aaai.v37i4.25674","DOI":"10.1609\/aaai.v37i4.25674"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05100-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05100-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05100-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T13:26:26Z","timestamp":1755955586000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05100-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,28]]},"references-count":48,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["5100"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05100-x","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,28]]},"assertion":[{"value":"2 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All the authors declare that they have no competing financial interests or personal relationships that could influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The code for the model proposed in this paper can be kindly provided by the corresponding author upon request.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"309"}}