{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T01:04:18Z","timestamp":1759971858228,"version":"build-2065373602"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10586-025-05351-8","type":"journal-article","created":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T12:24:19Z","timestamp":1757593459000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Innovative cybersecurity solutions: a deep learning-driven model for accurate intrusion detection in network traffic"],"prefix":"10.1007","volume":"28","author":[{"given":"Abida","family":"Naz","sequence":"first","affiliation":[]},{"given":"Irshad","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Kwizera K.","family":"Jonath","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Uzair","sequence":"additional","affiliation":[]},{"given":"Abdul Haseeb","family":"Nizamani","sequence":"additional","affiliation":[]},{"given":"Husnain","family":"Mushtaq","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,11]]},"reference":[{"issue":"15","key":"5351_CR1","doi-asserted-by":"publisher","first-page":"12251","DOI":"10.1109\/JIOT.2021.3060878","volume":"8","author":"M Abdel-Basset","year":"2021","unstructured":"Abdel-Basset, M., Hawash, H., Chakrabortty, R.K., Ryan, M.J.: Semi-supervised spatiotemporal deep learning for intrusions detection in iot networks. IEEE Internet Things J. 8(15), 12251\u201312265 (2021)","journal-title":"IEEE Internet Things J."},{"key":"5351_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3354045","author":"N Abdi","year":"2024","unstructured":"Abdi, N., Albaseer, A., Abdallah, M.: The role of deep learning in advancing proactive cybersecurity measures for smart grid networks: a survey. IEEE Internet Things J. (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3354045","journal-title":"IEEE Internet Things J."},{"key":"5351_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19\u201331 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"5351_CR4","doi-asserted-by":"publisher","first-page":"2472","DOI":"10.7717\/peerj-cs.2472","volume":"10","author":"A Ahmed","year":"2024","unstructured":"Ahmed, A., Asim, M., Ullah, I., Ateya, A.A., et al.: An optimized ensemble model with advanced feature selection for network intrusion detection. PeerJ Comput. Sci. 10, 2472 (2024)","journal-title":"PeerJ Comput. Sci."},{"issue":"1","key":"5351_CR5","doi-asserted-by":"publisher","first-page":"5579851","DOI":"10.1155\/2021\/5579851","volume":"2021","author":"H Alkahtani","year":"2021","unstructured":"Alkahtani, H., Aldhyani, T.H.: Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complexity 2021(1), 5579851 (2021)","journal-title":"Complexity"},{"issue":"7","key":"5351_CR6","doi-asserted-by":"publisher","first-page":"9438","DOI":"10.1007\/s11227-021-04285-3","volume":"78","author":"AS Alqahtani","year":"2022","unstructured":"Alqahtani, A.S.: Retracted article: Fso-lstm ids: hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks. J. Supercomput. 78(7), 9438\u20139455 (2022)","journal-title":"J. Supercomput."},{"issue":"2","key":"5351_CR7","first-page":"873","volume":"42","author":"OA Alzubi","year":"2022","unstructured":"Alzubi, O.A.: A deep learning-based frechet and dirichlet model for intrusion detection in iwsn. J. Intell. Fuzzy Syst. 42(2), 873\u2013883 (2022)","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"4","key":"5351_CR8","doi-asserted-by":"publisher","first-page":"12879","DOI":"10.1111\/exsy.12879","volume":"39","author":"JA Alzubi","year":"2022","unstructured":"Alzubi, J.A., Alzubi, O.A., Beseiso, M., Budati, A.K., Shankar, K.: Optimal multiple key-based homomorphic encryption with deep neural networks to secure medical data transmission and diagnosis. Expert Syst. 39(4), 12879 (2022)","journal-title":"Expert Syst."},{"issue":"2","key":"5351_CR9","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.1007\/s10586-022-03686-0","volume":"26","author":"OA Alzubi","year":"2023","unstructured":"Alzubi, O.A., Qiqieh, I., Alzubi, J.A.: Fusion of deep learning based cyberattack detection and classification model for intelligent systems. Clust. Comput. 26(2), 1363\u20131374 (2023)","journal-title":"Clust. Comput."},{"issue":"1","key":"5351_CR10","doi-asserted-by":"publisher","first-page":"2049","DOI":"10.1109\/TCE.2024.3350231","volume":"70","author":"JA Alzubi","year":"2024","unstructured":"Alzubi, J.A., Alzubi, O.A., Qiqieh, I., Singh, A.: A blended deep learning intrusion detection framework for consumable edge-centric iomt industry. IEEE Trans. Consum. Electron. 70(1), 2049\u20132057 (2024)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"5","key":"5351_CR11","doi-asserted-by":"publisher","first-page":"9042","DOI":"10.1109\/JIOT.2019.2926365","volume":"6","author":"E Anthi","year":"2019","unstructured":"Anthi, E., Williams, L., S\u0142owi\u0144ska, M., Theodorakopoulos, G., Burnap, P.: A supervised intrusion detection system for smart home iot devices. IEEE Internet Things J. 6(5), 9042\u20139053 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"5351_CR12","doi-asserted-by":"publisher","first-page":"34","DOI":"10.3390\/computers12020034","volume":"12","author":"A Awajan","year":"2023","unstructured":"Awajan, A.: A novel deep learning-based intrusion detection system for iot networks. Computers 12(2), 34 (2023)","journal-title":"Computers"},{"key":"5351_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-024-06409-x","author":"AG Ayad","year":"2024","unstructured":"Ayad, A.G., Sakr, N.A., Hikal, N.A.: A hybrid approach for efficient feature selection in anomaly intrusion detection for iot networks. J. Supercomput. (2024). https:\/\/doi.org\/10.1007\/s11227-024-06409-x","journal-title":"J. Supercomput."},{"issue":"4","key":"5351_CR14","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/s42979-023-01770-9","volume":"4","author":"S Bajpai","year":"2023","unstructured":"Bajpai, S., Sharma, K., Chaurasia, B.K.: Intrusion detection framework in iot networks. SN Comput. Sci. 4(4), 350 (2023)","journal-title":"SN Comput. Sci."},{"key":"5351_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04634-w","author":"A Barve","year":"2024","unstructured":"Barve, A., Patheja, P.S.: A hybrid deep learning based enhanced and reliable approach for vanet intrusion detection system. Clust. Comput. (2024). https:\/\/doi.org\/10.1007\/s10586-024-04634-w","journal-title":"Clust. Comput."},{"issue":"10","key":"5351_CR16","doi-asserted-by":"publisher","first-page":"7094","DOI":"10.1007\/s10489-021-02205-9","volume":"51","author":"A Binbusayyis","year":"2021","unstructured":"Binbusayyis, A., Vaiyapuri, T.: Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class svm. Appl. Intell. 51(10), 7094\u20137108 (2021)","journal-title":"Appl. Intell."},{"key":"5351_CR17","doi-asserted-by":"publisher","first-page":"102225","DOI":"10.1016\/j.cose.2021.102225","volume":"104","author":"EK Boahen","year":"2021","unstructured":"Boahen, E.K., Bouya-Moko, B.E., Wang, C.: Network anomaly detection in a controlled environment based on an enhanced psogsarfc. Comput. Secur. 104, 102225 (2021)","journal-title":"Comput. Secur."},{"key":"5351_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3488506","author":"EK Boahen","year":"2024","unstructured":"Boahen, E.K., Sosu, R.N.A., Ocansey, S.K., Xu, Q., Wang, C.: Asrl: adaptive swarm reinforcement learning for enhanced osn intrusion detection. IEEE Trans. Inf. Forensics Secur. (2024). https:\/\/doi.org\/10.1109\/TIFS.2024.3488506","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"5351_CR19","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1109\/TEM.2019.2922936","volume":"67","author":"MA Ferrag","year":"2019","unstructured":"Ferrag, M.A., Maglaras, L.: Deepcoin: a novel deep learning and blockchain-based energy exchange framework for smart grids. IEEE Trans. Eng. Manag. 67(4), 1285\u20131297 (2019)","journal-title":"IEEE Trans. Eng. Manag."},{"issue":"3","key":"5351_CR20","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1007\/s40998-022-00498-1","volume":"46","author":"A Ghorbani","year":"2022","unstructured":"Ghorbani, A., Fakhrahmad, S.M.: A deep learning approach to network intrusion detection using a proposed supervised sparse auto-encoder and svm. Iran. J. Sci. Technol. Trans. Electrical Eng. 46(3), 829\u2013846 (2022)","journal-title":"Iran. J. Sci. Technol. Trans. Electrical Eng."},{"issue":"6","key":"5351_CR21","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.1007\/s10586-022-03776-z","volume":"26","author":"A Heidari","year":"2023","unstructured":"Heidari, A., Jabraeil Jamali, M.A.: Internet of things intrusion detection systems: a comprehensive review and future directions. Clust. Comput. 26(6), 3753\u20133780 (2023)","journal-title":"Clust. Comput."},{"key":"5351_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-023-01313-y","author":"Y Imrana","year":"2024","unstructured":"Imrana, Y., Xiang, Y., Ali, L., Noor, A., Sarpong, K., Abdullah, M.A.: Cnn-gru-ff: a double-layer feature fusion-based network intrusion detection system using convolutional neural network and gated recurrent units. Complex Intell. Syst. (2024). https:\/\/doi.org\/10.1007\/s40747-023-01313-y","journal-title":"Complex Intell. Syst."},{"issue":"1","key":"5351_CR23","doi-asserted-by":"publisher","first-page":"489","DOI":"10.32604\/cmc.2022.019636","volume":"71","author":"PL Indrasiri","year":"2022","unstructured":"Indrasiri, P.L., Lee, E., Rupapara, V., Rustam, F., Ashraf, I.: Malicious traffic detection in iot and local networks using stacked ensemble classifier. Comput. Mater. Continua 71(1), 489\u2013515 (2022)","journal-title":"Comput. Mater. Continua"},{"key":"5351_CR24","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC52312.2021.9602373","author":"Y Jiang","year":"2021","unstructured":"Jiang, Y., Jia, M., Zhang, B., Deng, L.: Malicious domain name detection model based on cnn-gru-attention. In: 2021 33rd Chin. Control Decis. Conf. (CCDC) (2021). https:\/\/doi.org\/10.1109\/CCDC52312.2021.9602373","journal-title":"In: 2021 33rd Chin. Control Decis. Conf. (CCDC)"},{"issue":"1","key":"5351_CR25","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s11276-023-03435-0","volume":"30","author":"A Kaushik","year":"2024","unstructured":"Kaushik, A., Al-Raweshidy, H.: A novel intrusion detection system for internet of things devices and data. Wirel. Netw. 30(1), 285\u2013294 (2024)","journal-title":"Wirel. Netw."},{"issue":"1","key":"5351_CR26","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s40860-020-00126-x","volume":"7","author":"PK Keserwani","year":"2021","unstructured":"Keserwani, P.K., Govil, M.C., Pilli, E.S., Govil, P.: A smart anomaly-based intrusion detection system for the internet of things (iot) network using gwo-pso-rf model. J. Reliab. Intell. Environ. 7(1), 3\u201321 (2021)","journal-title":"J. Reliab. Intell. Environ."},{"issue":"2","key":"5351_CR27","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1007\/s10586-023-04052-4","volume":"27","author":"K Kethineni","year":"2024","unstructured":"Kethineni, K., Pradeepini, G.: Intrusion detection in internet of things-based smart farming using hybrid deep learning framework. Clust. Comput. 27(2), 1719\u20131732 (2024)","journal-title":"Clust. Comput."},{"key":"5351_CR28","doi-asserted-by":"publisher","first-page":"89337","DOI":"10.1109\/ACCESS.2020.2994079","volume":"8","author":"S Latif","year":"2020","unstructured":"Latif, S., Zou, Z., Idrees, Z., Ahmad, J.: A novel attack detection scheme for the industrial internet of things using a lightweight random neural network. IEEE Access 8, 89337\u201389350 (2020)","journal-title":"IEEE Access"},{"issue":"1","key":"5351_CR29","first-page":"4705982","volume":"2020","author":"G Liu","year":"2020","unstructured":"Liu, G., Zhang, J.: Cnid: research of network intrusion detection based on convolutional neural network. Discret. Dyn. Nat. Soc. 2020(1), 4705982 (2020)","journal-title":"Discret. Dyn. Nat. Soc."},{"issue":"5","key":"5351_CR30","first-page":"2317","volume":"14","author":"AA Najar","year":"2022","unstructured":"Najar, A.A., Manohar Naik, S.: Ddos attack detection using mlp and random forest algorithms. Int. J. Inf. Technol. 14(5), 2317\u20132327 (2022)","journal-title":"Int. J. Inf. Technol."},{"key":"5351_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109277","volume":"117","author":"AA Najar","year":"2024","unstructured":"Najar, A.A., Manohar Naik, S.: A robust ddos intrusion detection system using convolutional neural network. Comput. Electrical Eng. 117, 109277 (2024)","journal-title":"Comput. Electrical Eng."},{"issue":"2","key":"5351_CR32","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s10586-024-04744-5","volume":"28","author":"AA Najar","year":"2025","unstructured":"Najar, A.A., Manohar Naik, S.: Ae-ciam: a hybrid ai-enabled framework for low-rate ddos attack detection in cloud computing. Clust. Comput. 28(2), 103 (2025)","journal-title":"Clust. Comput."},{"key":"5351_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103716","volume":"139","author":"AA Najar","year":"2024","unstructured":"Najar, A.A., Naik, S.M.: Cyber-secure sdn: a cnn-based approach for efficient detection and mitigation of ddos attacks. Comput. Secur. 139, 103716 (2024)","journal-title":"Comput. Secur."},{"issue":"19","key":"5351_CR34","doi-asserted-by":"publisher","first-page":"8157","DOI":"10.1002\/cpe.8157","volume":"36","author":"AA Najar","year":"2024","unstructured":"Najar, A.A., Sugali, M.N., Lone, F.R., Nazir, A.: A novel cnn-based approach for detection and classification of ddos attacks. Concurr. Computat. Pr. Exp. 36(19), 8157 (2024)","journal-title":"Concurr. Computat. Pr. Exp."},{"issue":"1","key":"5351_CR35","doi-asserted-by":"publisher","first-page":"21789","DOI":"10.1038\/s41598-024-72049-z","volume":"14","author":"A Qaddos","year":"2024","unstructured":"Qaddos, A., Yaseen, M.U., Al-Shamayleh, A.S., Imran, M., Akhunzada, A., Alharthi, S.Z.: A novel intrusion detection framework for optimizing iot security. Sci. Rep. 14(1), 21789 (2024)","journal-title":"Sci. Rep."},{"issue":"9","key":"5351_CR36","doi-asserted-by":"publisher","first-page":"2987","DOI":"10.3390\/s21092987","volume":"21","author":"R Qaddoura","year":"2021","unstructured":"Qaddoura, R., Al-Zoubi, M.A., Faris, H., Almomani, I.: A multi-layer classification approach for intrusion detection in iot networks based on deep learning. Sensors 21(9), 2987 (2021)","journal-title":"Sensors"},{"key":"5351_CR37","doi-asserted-by":"publisher","DOI":"10.1109\/ICAECOT62402.2024.10829160","author":"R Saadouni","year":"2024","unstructured":"Saadouni, R., Gherbi, C., Aliouat, Z., Harbi, Y., Khacha, A.: Intrusion detection systems for iot based on bio-inspired and machine learning techniques: a systematic review of the literature. Clust. Comput. (2024). https:\/\/doi.org\/10.1109\/ICAECOT62402.2024.10829160","journal-title":"Clust. Comput."},{"issue":"2","key":"5351_CR38","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MITP.2020.2992710","volume":"23","author":"T Saba","year":"2021","unstructured":"Saba, T., Sadad, T., Rehman, A., Mehmood, Z., Javaid, Q.: Intrusion detection system through advance machine learning for the internet of things networks. IT Prof. 23(2), 58\u201364 (2021)","journal-title":"IT Prof."},{"key":"5351_CR39","doi-asserted-by":"publisher","DOI":"10.1109\/ICAI55435.2022.9773747","author":"A Sarwar","year":"2022","unstructured":"Sarwar, A., Hasan, S., Khan, W.U., Ahmed, S., Marwat, S.N.K.: Design of an advance intrusion detection system for iot networks. In 2022 2nd Int. Conf. Artif. Intell. (ICAI) (2022). https:\/\/doi.org\/10.1109\/ICAI55435.2022.9773747","journal-title":"In 2022 2nd Int. Conf. Artif. Intell. (ICAI)"},{"key":"5351_CR40","doi-asserted-by":"publisher","first-page":"62722","DOI":"10.1109\/ACCESS.2022.3176317","volume":"10","author":"I Ullah","year":"2022","unstructured":"Ullah, I., Mahmoud, Q.H.: Design and development of rnn anomaly detection model for iot networks. IEEE Access 10, 62722\u201362750 (2022)","journal-title":"IEEE Access"},{"issue":"10","key":"5351_CR41","doi-asserted-by":"publisher","first-page":"3607","DOI":"10.3390\/s22103607","volume":"22","author":"S Ullah","year":"2022","unstructured":"Ullah, S., Ahmad, J., Khan, M.A., Alkhammash, E.H., Hadjouni, M., Ghadi, Y.Y., Saeed, F., Pitropakis, N.: A new intrusion detection system for the internet of things via deep convolutional neural network and feature engineering. Sensors 22(10), 3607 (2022)","journal-title":"Sensors"},{"issue":"1","key":"5351_CR42","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.dcan.2023.03.008","volume":"10","author":"F Ullah","year":"2024","unstructured":"Ullah, F., Ullah, S., Srivastava, G., Lin, J.C.-W.: Ids-int: intrusion detection system using transformer-based transfer learning for imbalanced network traffic. Digit. Commun. Netw. 10(1), 190\u2013204 (2024). https:\/\/doi.org\/10.1016\/j.dcan.2023.03.008","journal-title":"Digit. Commun. Netw."},{"issue":"4","key":"5351_CR43","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/s10586-024-04943-0","volume":"28","author":"I Ullah","year":"2025","unstructured":"Ullah, I., Deng, X., Pei, X., Mushtaq, H., Khan, Z.: Securing internet of vehicles: a blockchain-based federated learning approach for enhanced intrusion detection. Clust. Comput. 28(4), 256 (2025)","journal-title":"Clust. Comput."},{"issue":"1","key":"5351_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-024-01821-9","volume":"18","author":"I Ullah","year":"2025","unstructured":"Ullah, I., Deng, X., Pei, X., Mushtaq, H., Uzair, M.: Iov-sfl: a blockchain-based federated learning framework for secure and efficient data sharing in the internet of vehicles. Peer-to-Peer Netw. Appl. 18(1), 1\u201320 (2025)","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"16","key":"5351_CR45","doi-asserted-by":"publisher","first-page":"24520","DOI":"10.1007\/s11227-024-06345-w","volume":"80","author":"X Wang","year":"2024","unstructured":"Wang, X., Dai, L., Yang, G.: A network intrusion detection system based on deep learning in the iot. J. Supercomput. 80(16), 24520\u201324558 (2024)","journal-title":"J. Supercomput."},{"key":"5351_CR46","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI44817.2019.9003126","author":"P Wu","year":"2016","unstructured":"Wu, P., Guo, H.: Lunet: a deep neural network for network intrusion detection. In: 2019 IEEE Symp. Series Comput. Intell. (SSCI) (2016). https:\/\/doi.org\/10.1109\/SSCI44817.2019.9003126","journal-title":"In: 2019 IEEE Symp. Series Comput. Intell. (SSCI)"},{"key":"5351_CR47","doi-asserted-by":"publisher","DOI":"10.3390\/info10110356","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Xiao, X.: An intrusion detection system based on a simplified residual network. Information (2019). https:\/\/doi.org\/10.3390\/info10110356","journal-title":"Information"},{"key":"5351_CR48","doi-asserted-by":"publisher","first-page":"42210","DOI":"10.1109\/ACCESS.2019.2904620","volume":"7","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Xing, C., Zhang, T., Zhao, Z.: An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 7, 42210\u201342219 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2904620","journal-title":"IEEE Access"},{"key":"5351_CR49","doi-asserted-by":"publisher","first-page":"88348","DOI":"10.1109\/ACCESS.2020.2993335","volume":"8","author":"X Xie","year":"2020","unstructured":"Xie, X., Wang, B., Wan, T., Tang, W.: Multivariate abnormal detection for industrial control systems using 1d cnn and gru. IEEE Access 8, 88348\u201388359 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2993335","journal-title":"IEEE Access"},{"issue":"8","key":"5351_CR50","doi-asserted-by":"publisher","first-page":"4141","DOI":"10.3390\/s23084141","volume":"23","author":"W Yao","year":"2023","unstructured":"Yao, W., Hu, L., Hou, Y., Li, X.: A lightweight intelligent network intrusion detection system using one-class autoencoder and ensemble learning for iot. Sensors 23(8), 4141 (2023)","journal-title":"Sensors"},{"key":"5351_CR51","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12051164","author":"F Zhai","year":"2023","unstructured":"Zhai, F., Yang, T., Chen, H., He, B., Li, S.: Intrusion detection method based on cnn-gru-fl in a smart grid environment. Electronics (2023). https:\/\/doi.org\/10.3390\/electronics12051164","journal-title":"Electronics"},{"key":"5351_CR52","doi-asserted-by":"publisher","first-page":"107315","DOI":"10.1016\/j.comnet.2020.107315","volume":"177","author":"H Zhang","year":"2020","unstructured":"Zhang, H., Huang, L., Wu, C.Q., Li, Z.: An effective convolutional neural network based on smote and gaussian mixture model for intrusion detection in imbalanced dataset. Comput. Netw. 177, 107315 (2020)","journal-title":"Comput. Netw."},{"issue":"11","key":"5351_CR53","doi-asserted-by":"publisher","first-page":"10799","DOI":"10.1109\/TII.2023.3241689","volume":"19","author":"R Zhao","year":"2023","unstructured":"Zhao, R., Huang, Y., Deng, X., Shi, Y., Li, J., Huang, Z., Wang, Y., Xue, Z.: A novel traffic classifier with attention mechanism for industrial internet of things. IEEE Trans. Ind. Inf. 19(11), 10799\u201310810 (2023)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"5351_CR54","doi-asserted-by":"crossref","unstructured":"Gonaygunta, H., Nadella, G.S., Pawar, P.P., Kumar, D.: Enhancing cybersecurity: the development of a flexible deep learning model for enhanced anomaly detection. In: 2024 Systems and Information Engineering Design Symposium (SIEDS), pp. 79\u201384 (2024). IEEE","DOI":"10.1109\/SIEDS61124.2024.10534661"},{"key":"5351_CR55","unstructured":"Khan, N., Ahmad, K., Tamimi, A.A., Alani, M.M., Bermak, A., Khalil, I.: Explainable ai-based intrusion detection system for industry 5.0: An overview of the literature, associated challenges, the existing solutions, and potential research directions. arXiv preprint arXiv:2408.03335 (2024)"},{"key":"5351_CR56","unstructured":"Kingma, D.P.: Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"5351_CR57","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136 (2015). IEEE","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"5351_CR58","doi-asserted-by":"crossref","unstructured":"Ullah, I., Mahmoud, Q.H.: A scheme for generating a dataset for anomalous activity detection in iot networks. In: Canadian Conference on Artificial Intelligence, pp. 508\u2013520. Springer (2020)","DOI":"10.1007\/978-3-030-47358-7_52"},{"key":"5351_CR59","doi-asserted-by":"publisher","unstructured":"Sinha, J., Manollas, M.: Efficient deep cnn-bilstm model for network intrusion detection. In: Proceedings of the 2020 3rd International Conference on Artificial Intelligence and Pattern Recognition. AIPR \u201920, pp. 223\u2013231. Association for Computing Machinery, New York. (2020). https:\/\/doi.org\/10.1145\/3430199.3430224","DOI":"10.1145\/3430199.3430224"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05351-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05351-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05351-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T17:32:19Z","timestamp":1759944739000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05351-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,11]]},"references-count":59,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["5351"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05351-8","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,9,11]]},"assertion":[{"value":"4 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All authors unanimously agree to publish the paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"695"}}