{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T22:54:23Z","timestamp":1772146463828,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s10586-025-05617-1","type":"journal-article","created":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T18:23:49Z","timestamp":1759170229000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Explainable AI-driven intrusion detection for securing IoT-enabled autonomous transportation systems"],"prefix":"10.1007","volume":"28","author":[{"given":"J.","family":"Akshya","sequence":"first","affiliation":[]},{"given":"M.","family":"Sundarrajan","sequence":"additional","affiliation":[]},{"given":"R.","family":"Vijayakumar","sequence":"additional","affiliation":[]},{"given":"Rajesh Kumar","family":"Dhanaraj","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,29]]},"reference":[{"key":"5617_CR1","doi-asserted-by":"crossref","unstructured":"Pan, H., Luo, M., Wang, J., Huang, T., & Sun, W. (2024). A safe motion planning and reliable control framework for autonomous vehicles.\u00a0IEEE Transactions on Intelligent Vehicles","DOI":"10.1109\/TIV.2024.3360418"},{"issue":"24","key":"5617_CR2","doi-asserted-by":"publisher","first-page":"11265","DOI":"10.3390\/su162411265","volume":"16","author":"BM Mohsen","year":"2024","unstructured":"Mohsen, B.M.: Ai-driven optimisation of urban logistics in smart cities: Integrating autonomous vehicles and IoT for efficient delivery systems. Sustainability 16(24), 11265 (2024)","journal-title":"Sustainability"},{"issue":"4","key":"5617_CR3","doi-asserted-by":"publisher","first-page":"108","DOI":"10.3390\/fi16040108","volume":"16","author":"A Takacs","year":"2024","unstructured":"Takacs, A., Haidegger, T.: A Method for Mapping V2X Communication Requirements to Highly Automated and Autonomous Vehicle Functions. Future Internet 16(4), 108 (2024)","journal-title":"Future Internet"},{"key":"5617_CR4","doi-asserted-by":"crossref","unstructured":"Nwankwo, W., Orukwo, J., Umezuruike, C., Nwankwo, C. P., Chinedu, P. U., & Obasi, C. (2024). IoT-Driven Analytics and Edge Intelligence in Autonomous Navigation Systems. In\u00a0IoT Edge Intelligence\u00a0(pp. 315\u2013333). Cham: Springer Nature Switzerland","DOI":"10.1007\/978-3-031-58388-9_11"},{"key":"5617_CR5","doi-asserted-by":"publisher","first-page":"1491332","DOI":"10.3389\/fenrg.2024.1491332","volume":"12","author":"R Alharthi","year":"2024","unstructured":"Alharthi, R.: Enhancing unmanned aerial vehicle and smart grid communication security using a ConvLSTM model for intrusion detection. Frontiers in Energy Research 12, 1491332 (2024)","journal-title":"Frontiers in Energy Research"},{"key":"5617_CR6","doi-asserted-by":"crossref","unstructured":"Mahmood, K., Ghaffar, Z., Nautiyal, L., Akram, M. W., Das, A. K., & Alenazi, M. J. (2024). A Privacy-Preserving Access Control Protocol for Consumer Flying Vehicles in Smart City Applications.\u00a0IEEE Internet of Things Journal.","DOI":"10.1109\/JIOT.2024.3471861"},{"issue":"1","key":"5617_CR7","doi-asserted-by":"publisher","first-page":"22884","DOI":"10.1038\/s41598-024-73932-5","volume":"14","author":"P Dakic","year":"2024","unstructured":"Dakic, P., Zivkovic, M., Jovanovic, L., Bacanin, N., Antonijevic, M., Kaljevic, J., Simic, V.: Intrusion detection using metaheuristic optimization within IoT\/IIoT systems and software of autonomous vehicles. Sci. Rep. 14(1), 22884 (2024)","journal-title":"Sci. Rep."},{"key":"5617_CR8","doi-asserted-by":"crossref","unstructured":"Bhavsar, M., Bekele, Y., Roy, K., Kelly, J., & Limbrick, D. (2024). FL-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT.\u00a0IEEE Access.","DOI":"10.1109\/ACCESS.2024.3386631"},{"key":"5617_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109609","volume":"119","author":"A Akhunzada","year":"2024","unstructured":"Akhunzada, A., Al-Shamayleh, A.S., Zeadally, S., Almogren, A., Abu-Shareha, A.A.: Design and performance of an AI-enabled threat intelligence framework for IoT-enabled autonomous vehicles. Comput. Electr. Eng. 119, 109609 (2024)","journal-title":"Comput. Electr. Eng."},{"issue":"2","key":"5617_CR10","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/s11227-024-06880-6","volume":"81","author":"KA Darabkh","year":"2025","unstructured":"Darabkh, K.A., Al-Mistarihi, M.F., Al-Maaitah, M.I.: Next-generation routing for autonomous vehicle networks based on innovative clustering: integrating SDN and fog computing along with AODV upon failure. J. Supercomput. 81(2), 379 (2025)","journal-title":"J. Supercomput."},{"key":"5617_CR11","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1016\/j.aej.2024.10.116","volume":"112","author":"M Tanveer","year":"2025","unstructured":"Tanveer, M., Aldossari, S.A.: RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks. Alex. Eng. J. 112, 436\u2013447 (2025)","journal-title":"Alex. Eng. J."},{"key":"5617_CR12","doi-asserted-by":"crossref","unstructured":"Priyadarshi, R. (2024). Exploring machine learning solutions for overcoming challenges in IoT-based wireless sensor network routing: a comprehensive review.\u00a0Wireless Networks, 1\u201327.","DOI":"10.1007\/s11276-024-03697-2"},{"key":"5617_CR13","doi-asserted-by":"crossref","unstructured":"Aslam, A. M., Bhardwaj, A., & Chaudhary, R. (2025). Quantum-Resilient Blockchain-Enabled Secure Communication Framework for Connected Autonomous Vehicles using Post-Quantum Cryptography.\u00a0Vehicular Communications, 100880.","DOI":"10.1016\/j.vehcom.2025.100880"},{"key":"5617_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103927","volume":"88","author":"H Zhang","year":"2025","unstructured":"Zhang, H., Li, M.: Towards an intelligent and automatic irrigation system based on internet of things with authentication feature in VANET. Journal of Information Security and Applications 88, 103927 (2025)","journal-title":"Journal of Information Security and Applications"},{"key":"5617_CR15","doi-asserted-by":"crossref","unstructured":"SaiRamesh, L., Kathrine, G. J. W., Sathiyavathi, V., Selvakumar, K., & Sabena, S. (2025). Intelligent Intrusion Detection and Prevention System for IoT Using Game Theoretic Approach.\u00a0Wireless Personal Communications, 1\u201316.","DOI":"10.1007\/s11277-024-11733-9"},{"key":"5617_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.sintl.2024.100297","volume":"6","author":"YK Saheed","year":"2025","unstructured":"Saheed, Y.K., Omole, A.I., Sabit, M.O.: GA-mADAM-IIoT: A new lightweight threats detection in the industrial IoT via genetic algorithm with attention mechanism and LSTM on multivariate time series sensor data. Sensors International 6, 100297 (2025)","journal-title":"Sensors International"},{"issue":"1","key":"5617_CR17","doi-asserted-by":"publisher","first-page":"247","DOI":"10.3390\/s25010247","volume":"25","author":"W Symbor","year":"2025","unstructured":"Symbor, W., Falas, \u0141: Ensuring Reliable Network Communication and Data Processing in Internet of Things Systems with Prediction-Based Resource Allocation. Sensors 25(1), 247 (2025)","journal-title":"Sensors"},{"key":"5617_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.resourpol.2024.105450","volume":"100","author":"C Chatterjee","year":"2025","unstructured":"Chatterjee, C., Sindhwani, R., Mangla, S.K., Hasteer, N.: Digitization of the mining industry: Pathways to sustainability through enabling technologies. Resour. Policy 100, 105450 (2025)","journal-title":"Resour. Policy"},{"key":"5617_CR19","doi-asserted-by":"crossref","unstructured":"Hemani, Singh, D., & Dwivedi, R. K. (2024). Designing blockchain based secure autonomous vehicular internet of things (IoT) architecture with efficient smart contracts.\u00a0International Journal of Information Technology, 1\u201317.","DOI":"10.1007\/s41870-023-01712-x"},{"key":"5617_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104136","volume":"148","author":"F Bai","year":"2025","unstructured":"Bai, F., Wang, Z., Zeng, K., Zhang, C., Shen, T., Zhang, X., Gong, B.: Zksa: Secure mutual attestation against toctou zero-knowledge proof based for iot devices. Comput. Secur. 148, 104136 (2025)","journal-title":"Comput. Secur."},{"key":"5617_CR21","doi-asserted-by":"crossref","unstructured":"Bonaventura, D., Esposito, S., & Bella, G. (2025). A case of smart devices that compromise home cybersecurity.\u00a0Computers & Security, 104286.","DOI":"10.1016\/j.cose.2024.104286"},{"key":"5617_CR22","doi-asserted-by":"crossref","unstructured":"Zhou, Q., Ding, Q., Geng, Z., Hu, C., Yang, L., Kan, Z.,... & Kim, J. S. (2025). A Flexible Smart Healthcare Platform Conjugated with Artificial Epidermis Assembled by Three-Dimensionally Conductive MOF Network for Gas and Pressure Sensing.\u00a0Nano-Micro Letters,\u00a017(1), 1\u201320.","DOI":"10.1007\/s40820-024-01548-5"},{"key":"5617_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2024.102685","volume":"62","author":"M Shahin","year":"2024","unstructured":"Shahin, M., Maghanaki, M., Hosseinzadeh, A., Chen, F.F.: Advancing network security in industrial IoT: a deep dive into AI-enabled intrusion detection systems. Adv. Eng. Inform. 62, 102685 (2024)","journal-title":"Adv. Eng. Inform."},{"key":"5617_CR24","doi-asserted-by":"crossref","unstructured":"Almehdhar, M., Albaseer, A., Khan, M. A., Abdallah, M., Menouar, H., Al-Kuwari, S., & Al-Fuqaha, A. (2024). Deep learning in the fast lane: A survey on advanced intrusion detection systems for intelligent vehicle networks.\u00a0IEEE Open Journal of Vehicular Technology.","DOI":"10.1109\/OJVT.2024.3422253"},{"key":"5617_CR25","doi-asserted-by":"crossref","unstructured":"Zhong, M., Lin, M., Zhang, C., & Xu, Z. (2024). A Survey on Graph Neural Networks for Intrusion Detection Systems: Methods, Trends and Challenges.\u00a0Computers & Security, 103821.","DOI":"10.1016\/j.cose.2024.103821"},{"key":"5617_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121912","volume":"238","author":"GSC Kumar","year":"2024","unstructured":"Kumar, G.S.C., Kumar, R.K., Kumar, K.P.V., Sai, N.R., Brahmaiah, M.: Deep residual convolutional neural network: an efficient technique for intrusion detection system. Expert Syst. Appl. 238, 121912 (2024)","journal-title":"Expert Syst. Appl."},{"key":"5617_CR27","doi-asserted-by":"crossref","unstructured":"Gheni, H. Q., & Al-Yaseen, W. L. (2024). Two-step data clustering for improved intrusion detection system using CICIoT2023 dataset.\u00a0e-Prime-Advances in Electrical Engineering, Electronics and Energy,\u00a09, 100673.","DOI":"10.1016\/j.prime.2024.100673"},{"key":"5617_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101422","volume":"29","author":"R Saadouni","year":"2025","unstructured":"Saadouni, R., Gherbi, C., Aliouat, Z., Harbi, Y., Khacha, A., Mabed, H.: Securing smart agriculture networks using bio-inspired feature selection and transfer learning for effective image-based intrusion detection. Internet of Things 29, 101422 (2025)","journal-title":"Internet of Things"},{"key":"5617_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103677","volume":"167","author":"F Mansouri","year":"2025","unstructured":"Mansouri, F., Tarhouni, M., Alaya, B., Zidi, S.: A distributed intrusion detection framework for vehicular ad hoc networks via federated learning and blockchain. Ad Hoc Netw. 167, 103677 (2025)","journal-title":"Ad Hoc Netw."},{"issue":"1","key":"5617_CR30","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/s10586-024-04752-5","volume":"28","author":"H Zeghida","year":"2025","unstructured":"Zeghida, H., Boulaiche, M., Chikh, R., Bamhdi, A.M., Barros, A.L.B., Zeghida, D., Patel, A.: Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks. Clust. Comput. 28(1), 58 (2025)","journal-title":"Clust. Comput."},{"issue":"1","key":"5617_CR31","doi-asserted-by":"publisher","first-page":"443","DOI":"10.32604\/cmc.2024.059047","volume":"82","author":"H Assmi","year":"2025","unstructured":"Assmi, H., Guezzaz, A., Benkirane, S., Azrour, M., Jabbour, S., Innab, N., Alabdulatif, A.: A Robust Security Detection Strategy for Next Generation IoT Networks. Computers, Materials and Continua 82(1), 443\u2013466 (2025)","journal-title":"Computers, Materials and Continua"},{"key":"5617_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.112667","volume":"170","author":"P Ar\u00e9valo","year":"2025","unstructured":"Ar\u00e9valo, P., Cano, A., Fedoseienko, O., Jurado, F.: A data-driven approach to microgrid fault detection and classification using Taguchi-optimized CNNs and wavelet transform. Appl. Soft Comput. 170, 112667 (2025)","journal-title":"Appl. Soft Comput."},{"key":"5617_CR33","doi-asserted-by":"crossref","unstructured":"Xu, Y., Jabeen, F., Treur, J., Rob Taal, H., & Roelofsma, P. H. (2025). Supporting medical team decision in the neonatal domain: how safety and security risk management through cyberspace can be supported by adaptive agent network models with internal mental models. In\u00a0Using Shared Mental Models and Organisational Learning to Support Safety and Security Through Cyberspace: A Computational Analysis Approach\u00a0(pp. 93\u2013122). Cham: Springer Nature Switzerland.","DOI":"10.1007\/978-3-031-72075-8_4"},{"key":"5617_CR34","doi-asserted-by":"crossref","unstructured":"Hou, Q., Zecchin, M., Park, S., Cai, Y., Yu, G., Chowdhury, K., & Simeone, O. (2025). Automatic AI model selection for wireless systems: Online learning via digital twinning.\u00a0IEEE Transactions on Wireless Communications.","DOI":"10.1109\/TWC.2025.3527741"},{"issue":"1","key":"5617_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-024-04755-2","volume":"28","author":"ME Farfoura","year":"2025","unstructured":"Farfoura, M.E., Mashal, I., Alkhatib, A., Batyha, R.M.: A lightweight machine learning methods for malware classification. Clust. Comput. 28(1), 1\u201314 (2025)","journal-title":"Clust. Comput."},{"key":"5617_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122433","volume":"239","author":"Y Wang","year":"2024","unstructured":"Wang, Y., Chen, Z., Sun, M., Sun, Q.: Enhancing active disturbance rejection design via deep reinforcement learning and its application to autonomous vehicle. Expert Syst. Appl. 239, 122433 (2024)","journal-title":"Expert Syst. Appl."},{"key":"5617_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121358","volume":"236","author":"X Zhao","year":"2024","unstructured":"Zhao, X., Fang, Y., Min, H., Wu, X., Wang, W., Teixeira, R.: Potential sources of sensor data anomalies for autonomous vehicles: An overview from road vehicle safety perspective. Expert Syst. Appl. 236, 121358 (2024)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"5617_CR38","doi-asserted-by":"publisher","first-page":"99","DOI":"10.3390\/wevj15030099","volume":"15","author":"S Chen","year":"2024","unstructured":"Chen, S., Hu, X., Zhao, J., Wang, R., Qiao, M.: A Review of Decision-Making and Planning for Autonomous Vehicles in Intersection Environments. World Electric Vehicle Journal 15(3), 99 (2024)","journal-title":"World Electric Vehicle Journal"},{"key":"5617_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102644","volume":"113","author":"MM Kabir","year":"2025","unstructured":"Kabir, M.M., Jim, J.R., Istenes, Z.: Terrain detection and segmentation for autonomous vehicle navigation: A state-of-the-art systematic review. Information Fusion 113, 102644 (2025)","journal-title":"Information Fusion"},{"key":"5617_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125914","volume":"265","author":"MM Hussien","year":"2025","unstructured":"Hussien, M.M., Melo, A.N., Ballardini, A.L., Maldonado, C.S., Izquierdo, R., Sotelo, M.A.: Rag-based explainable prediction of road users behaviors for automated driving using knowledge graphs and large language models. Expert Syst. Appl. 265, 125914 (2025)","journal-title":"Expert Syst. Appl."},{"key":"5617_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2024.115464","volume":"239","author":"P Rachakonda","year":"2025","unstructured":"Rachakonda, P., Mane, A., Schlenoff, C., Saidi, K.: Methods to evaluate 3D lidars used for automated driving. Measurement 239, 115464 (2025)","journal-title":"Measurement"},{"key":"5617_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.109912","volume":"142","author":"T Xu","year":"2025","unstructured":"Xu, T., Baghaei, S.: Reshaping the future of sports with artificial intelligence: Challenges and opportunities in performance enhancement, fan engagement, and strategic decision-making. Eng. Appl. Artif. Intell. 142, 109912 (2025)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"8","key":"5617_CR43","doi-asserted-by":"publisher","first-page":"25005","DOI":"10.1007\/s11042-023-16451-1","volume":"83","author":"E Soylu","year":"2024","unstructured":"Soylu, E., Soylu, T.: A performance comparison of YOLOv8 models for traffic sign detection in the Robotaxi-full scale autonomous vehicle competition. Multimedia Tools and Applications 83(8), 25005\u201325035 (2024)","journal-title":"Multimedia Tools and Applications"},{"key":"5617_CR44","doi-asserted-by":"crossref","unstructured":"Babu, C. S., Anniyappa, C. A., & Raut, A. (2025). Toward seamless mobility: Integrating connected and autonomous vehicles in smart cities through digital twins. In\u00a0Digital Twins for Smart Cities and Villages\u00a0(pp. 169\u2013187). Elsevier.","DOI":"10.1016\/B978-0-443-28884-5.00008-7"},{"issue":"4","key":"5617_CR45","doi-asserted-by":"publisher","first-page":"42","DOI":"10.3390\/bdcc8040042","volume":"8","author":"D Garikapati","year":"2024","unstructured":"Garikapati, D., Shetiya, S.S.: Autonomous Vehicles: Evolution of Artificial Intelligence and the Current Industry Landscape. Big Data and Cognitive Computing 8(4), 42 (2024)","journal-title":"Big Data and Cognitive Computing"},{"key":"5617_CR46","doi-asserted-by":"crossref","unstructured":"Kiriyakere, A., & Nayyar, A. (2025). Redefining mobility: The convergence of autonomy, technology, and connected vehicles in smart cities. In\u00a0Digital Twins for Smart Cities and Villages\u00a0(pp. 189\u2013204). Elsevier.","DOI":"10.1016\/B978-0-443-28884-5.00009-9"},{"key":"5617_CR47","doi-asserted-by":"crossref","unstructured":"Moon, S., Woo, H., Park, H., Jung, H., Mahjourian, R., Chi, H. G.,... & Kim, J. (2025). Visiontrap: Vision-augmented trajectory prediction guided by textual descriptions. In\u00a0European Conference on Computer Vision\u00a0(pp. 361\u2013379). Springer, Cham.","DOI":"10.1007\/978-3-031-72658-3_21"},{"key":"5617_CR48","doi-asserted-by":"crossref","unstructured":"Casas, S., Agro, B., Mao, J., Gilles, T., Cui, A., Li, T., & Urtasun, R. (2025). Detra: A unified model for object detection and trajectory forecasting. In\u00a0European Conference on Computer Vision\u00a0(pp. 326\u2013342). Springer, Cham.","DOI":"10.1007\/978-3-031-73223-2_19"},{"key":"5617_CR49","doi-asserted-by":"crossref","unstructured":"Wang, Y., Jiang, H., Chen, G., Zhang, T., Zhou, J., Qing, Z.,... & Zhao, W. (2025). Efficient and robust multi-camera 3D object detection in bird-eye-view.\u00a0Image and Vision Computing, 105428.","DOI":"10.1016\/j.imavis.2025.105428"},{"key":"5617_CR50","doi-asserted-by":"crossref","unstructured":"Chang, W. J., Pittaluga, F., Tomizuka, M., Zhan, W., & Chandraker, M. (2025). SAFE-SIM: Safety-Critical Closed-Loop Traffic Simulation with Diffusion-Controllable Adversaries. In\u00a0European Conference on Computer Vision\u00a0(pp. 242\u2013258). Springer, Cham.","DOI":"10.1007\/978-3-031-72664-4_14"},{"key":"5617_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.yofte.2024.104045","volume":"89","author":"J Mirza","year":"2025","unstructured":"Mirza, J., Atieh, A., Kanwal, B., Ghafoor, S., Almogren, A., Kanwal, F., Aziz, I.: Relay aided UWOC-SMF-FSO based hybrid link for underwater wireless optical sensor network. Opt. Fiber Technol. 89, 104045 (2025)","journal-title":"Opt. Fiber Technol."},{"key":"5617_CR52","doi-asserted-by":"crossref","unstructured":"Adeke, J. M., Liu, G., Amoah, L., & Nwali, O. J. (2025). Investigating the impact of feature selection on adversarial transferability in intrusion detection system.\u00a0Computers & Security, 104327.","DOI":"10.1016\/j.cose.2025.104327"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05617-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05617-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05617-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:05:23Z","timestamp":1764237923000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05617-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,29]]},"references-count":52,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["5617"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05617-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,29]]},"assertion":[{"value":"8 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"884"}}