{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:15:58Z","timestamp":1774368958711,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10586-025-05561-0","type":"journal-article","created":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T12:44:23Z","timestamp":1757594663000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A layered and integrative framework for Advance Persistent Threat detection and mitigation: combining AI, Zero-Trust, and Advanced Threat Intelligence"],"prefix":"10.1007","volume":"28","author":[{"given":"Manish","family":"Khule","sequence":"first","affiliation":[]},{"given":"Deepak","family":"Motwani","sequence":"additional","affiliation":[]},{"given":"Dipti","family":"Chauhan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,11]]},"reference":[{"key":"5561_CR1","doi-asserted-by":"crossref","unstructured":"Saxena, A., Khule, M.: Remapping attack detection and prevention for reliable data service in manet. In: Tiwari, B., Tiwari, V., Das, K.C., Mishra, D.K., Bansal, J.C. (eds.) Proceedings of International Conference on Recent Advancement on Computer and Communication, pp. 125\u2013134. Springer, Singapore (2018)","DOI":"10.1007\/978-981-10-8198-9_13"},{"key":"5561_CR2","doi-asserted-by":"publisher","first-page":"9355","DOI":"10.1007\/s12652-023-04603-y","volume":"14","author":"A Sharma","year":"2023","unstructured":"Sharma, A., Gupta, B.B., Singh, A.K., Saraswat, V.K.: Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures. J. Ambient. Intell. Humaniz. Comput. 14, 9355\u20139381 (2023). https:\/\/doi.org\/10.1007\/s12652-023-04603-y","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"2","key":"5561_CR3","first-page":"150","volume":"18","author":"M Johnson","year":"2023","unstructured":"Johnson, M., Lee, K.: Advanced persistent threat detection techniques: A survey. J. Cybersecur. Res. 18(2), 150\u2013175 (2023)","journal-title":"J. Cybersecur. Res."},{"issue":"2","key":"5561_CR4","first-page":"80","volume":"8","author":"A Smith","year":"2023","unstructured":"Smith, A., White, L.: Behavioral techniques for apt detection: A case study. J. Netw. Forensics. 8(2), 80\u201395 (2023)","journal-title":"J. Netw. Forensics."},{"issue":"2","key":"5561_CR5","first-page":"115","volume":"15","author":"R Davis","year":"2023","unstructured":"Davis, R., Kumar, A.: Explainable ai for enhanced trust in cybersecurity applications. AI in Security 15(2), 115\u2013135 (2023)","journal-title":"AI in Security"},{"issue":"1","key":"5561_CR6","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10207-022-00631-5","volume":"22","author":"A Sharma","year":"2023","unstructured":"Sharma, A., Gupta, B.B., Singh, A.K., Saraswat, V.K.: A novel approach for detection of apt malware using multi-dimensional hybrid bayesian belief network. Int. J. Inf. Secur. 22(1), 119\u2013135 (2023). https:\/\/doi.org\/10.1007\/s10207-022-00631-5","journal-title":"Int. J. Inf. Secur."},{"key":"5561_CR7","doi-asserted-by":"publisher","unstructured":"Armijos, A., Cuenca, E.: Zero-day attacks: review of the methods used based on intrusion detection and prevention systems, pp. 1\u20136 (2023). https:\/\/doi.org\/10.1109\/C358072.2023.10436218","DOI":"10.1109\/C358072.2023.10436218"},{"issue":"1","key":"5561_CR8","first-page":"65","volume":"29","author":"J Lee","year":"2023","unstructured":"Lee, J., Kumar, N.: Ai-driven techniques for advanced persistent threat detection. J. Artif. Intell. Res 29(1), 65\u201385 (2023)","journal-title":"J. Artif. Intell. Res"},{"issue":"2","key":"5561_CR9","first-page":"85","volume":"14","author":"L Nguyen","year":"2023","unstructured":"Nguyen, L., Patel, R.: The role of artificial intelligence in apt detection and mitigation. IEEE Transactions on Cybersecurity 14(2), 85\u2013100 (2023)","journal-title":"IEEE Transactions on Cybersecurity"},{"issue":"5","key":"5561_CR10","first-page":"55","volume":"20","author":"L Taylor","year":"2022","unstructured":"Taylor, L., Ahmed, F.: Zero-trust architecture for enterprise cybersecurity: Principles and practices. IEEE Secur. Priv. 20(5), 55\u201364 (2022)","journal-title":"IEEE Secur. Priv."},{"key":"5561_CR11","unstructured":"Baker, M., Zhang, Y.: Implementing micro-segmentation for zero-trust architectures. In: Proceedings of the International Conference on Cyber Defense, pp. 45\u201360 (2022). IEEE"},{"issue":"3","key":"5561_CR12","first-page":"250","volume":"40","author":"W Chen","year":"2022","unstructured":"Chen, W., Zhang, M.: Blockchain-enhanced threat intelligence sharing: A new paradigm. Int. J. Secure. Network. 40(3), 250\u2013270 (2022)","journal-title":"Int. J. Secure. Network."},{"issue":"6","key":"5561_CR13","first-page":"75","volume":"20","author":"T Nguyen","year":"2022","unstructured":"Nguyen, T., White, S.: Ai-enhanced threat intelligence sharing for collaborative cybersecurity. IEEE Secur. Priv. 20(6), 75\u201390 (2022)","journal-title":"IEEE Secur. Priv."},{"key":"5561_CR14","unstructured":"Garcia, M., Liu, S.: Federated learning for distributed anomaly detection in cybersecurity. In: Proceedings of the Symposium on AI and Distributed Systems, pp. 120\u2013135 (2023). ACM"},{"issue":"3","key":"5561_CR15","first-page":"145","volume":"25","author":"C Taylor","year":"2022","unstructured":"Taylor, C., Ahmed, N.: Ai and zero-trust: Reinventing enterprise security. IEEE rans. Inf. Secur 25(3), 145\u2013165 (2022)","journal-title":"IEEE rans. Inf. Secur"},{"key":"5561_CR16","unstructured":"Chen, M., Davis, C.: Blockchain technologies for advanced persistent threat defense. In: Proceedings of the International Cybersecurity Conference, pp. 120\u2013140 (2023). IEEE"},{"issue":"3","key":"5561_CR17","first-page":"165","volume":"12","author":"W Chen","year":"2023","unstructured":"Chen, W., Ahmed, F.: Integrating blockchain and zero-trust for enterprise security. Cybersecurity Advances 12(3), 165\u2013185 (2023)","journal-title":"Cybersecurity Advances"},{"issue":"3","key":"5561_CR18","first-page":"230","volume":"10","author":"T Green","year":"2024","unstructured":"Green, T., Singh, A.: Post-quantum cryptographic protocols for cyber defense. J. Cryptol. Netw. Secur. 10(3), 230\u2013250 (2024)","journal-title":"J. Cryptol. Netw. Secur."},{"key":"5561_CR19","doi-asserted-by":"publisher","unstructured":"Khule, M., Motwani, D., Chauhan, D.: Enhancing network intrusion detection with support vector machines: A comparative study of feature selection techniques. In: 2024 5th International Conference on Smart Electronics and Communication (ICOSEC), pp. 1281\u20131286 (2024). https:\/\/doi.org\/10.1109\/ICOSEC61587.2024.10722227","DOI":"10.1109\/ICOSEC61587.2024.10722227"},{"issue":"4","key":"5561_CR20","first-page":"321","volume":"22","author":"E Taylor","year":"2023","unstructured":"Taylor, E., Scott, D.: Energy-efficient ai models for cybersecurity applications. Journal of Green Computing 22(4), 321\u2013340 (2023)","journal-title":"Journal of Green Computing"},{"issue":"2","key":"5561_CR21","first-page":"115","volume":"11","author":"D Scott","year":"2023","unstructured":"Scott, D., Liu, S.: Green cybersecurity: Balancing efficiency and performance. Journal of Environmental Computing 11(2), 115\u2013130 (2023)","journal-title":"Journal of Environmental Computing"},{"issue":"4","key":"5561_CR22","first-page":"302","volume":"25","author":"A Singh","year":"2023","unstructured":"Singh, A., Kumar, R.: Quantum-resilient algorithms in cybersecurity: A comprehensive review. Journal of Cryptographic Advances 25(4), 302\u2013320 (2023)","journal-title":"Journal of Cryptographic Advances"},{"issue":"1","key":"5561_CR23","first-page":"80","volume":"33","author":"A Chen","year":"2022","unstructured":"Chen, A., White, J.: Collaborative threat intelligence sharing using blockchain: Challenges and solutions. Cybersecurity Innovations 33(1), 80\u2013100 (2022)","journal-title":"Cybersecurity Innovations"},{"key":"5561_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109609","volume":"119","author":"A Akhunzada","year":"2024","unstructured":"Akhunzada, A., Al-Shamayleh, A., Zeadally, S., Almogren, A., Abu-Shareha, A.: Design and performance of an ai-enabled threat intelligence framework for iot-enabled autonomous vehicles. Comput. Electr. Eng. 119, 109609 (2024). https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109609","journal-title":"Comput. Electr. Eng."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05561-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05561-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05561-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T17:32:44Z","timestamp":1759944764000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05561-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,11]]},"references-count":24,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["5561"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05561-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,11]]},"assertion":[{"value":"15 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"740"}}