{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T11:53:03Z","timestamp":1764071583737,"version":"3.45.0"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:00:00Z","timestamp":1759968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10586-025-05639-9","type":"journal-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:12:22Z","timestamp":1760033542000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A novel optimized hybrid deep learning model for intrusion detection in software defined internet of things (SDIoT) environment"],"prefix":"10.1007","volume":"28","author":[{"given":"A.","family":"Daniel","sequence":"first","affiliation":[]},{"given":"S. Dinesh","family":"Krishnan","sequence":"additional","affiliation":[]},{"given":"Dyagala Naga","family":"Sudha","sequence":"additional","affiliation":[]},{"given":"Balamurugan","family":"Balusamy","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,9]]},"reference":[{"issue":"5","key":"5639_CR1","doi-asserted-by":"publisher","first-page":"9042","DOI":"10.1109\/JIOT.2019.2926365","volume":"6","author":"E Anthi","year":"2019","unstructured":"Anthi, E., Williams, L., S\u0142owi\u0144ska, M., Theodorakopoulos, G., Burnap, P.: A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J. 6(5), 9042\u20139053 (2019). https:\/\/doi.org\/10.1109\/JIOT.2019.2926365","journal-title":"IEEE Internet Things J."},{"key":"5639_CR2","doi-asserted-by":"publisher","first-page":"59353","DOI":"10.1109\/ACCESS.2021.3073408","volume":"9","author":"N Mishra","year":"2021","unstructured":"Mishra, N., Pandya, S.: Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access. 9, 59353\u201359377 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3073408","journal-title":"IEEE Access."},{"issue":"4","key":"5639_CR3","doi-asserted-by":"publisher","first-page":"3496","DOI":"10.1109\/COMST.2018.2844742","volume":"20","author":"E Benkhelifa","year":"2018","unstructured":"Benkhelifa, E., Welsh, T., Hamouda, W.: A critical review of practices and challenges in intrusion detection systems for iot: Toward universal and resilient systems. IEEE Commun. Surv. Tutorials. 20(4), 3496\u20133509 (2018). https:\/\/doi.org\/10.1109\/COMST.2018.2844742","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"5639_CR4","doi-asserted-by":"publisher","first-page":"77039","DOI":"10.1109\/ACCESS.2022.3188635","volume":"10","author":"F Sattari","year":"2022","unstructured":"Sattari, F., Farooqi, A.H., Qadir, Z., Raza, B., Nazari, H., Almutiry, M.: A hybrid deep learning approach for bottleneck detection in IoT. IEEE Access. 10, 77039\u201377053 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3188635","journal-title":"IEEE Access."},{"issue":"9","key":"5639_CR5","doi-asserted-by":"publisher","first-page":"7746","DOI":"10.1109\/JIOT.2021.3114270","volume":"9","author":"GAN Segura","year":"2022","unstructured":"Segura, G.A.N., Chorti, A., Margi, C.B.: Centralized and distributed intrusion detection for resource-constrained wireless SDN networks. IEEE Internet Things J. 9(9), 7746\u20137758 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3114270","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"5639_CR6","doi-asserted-by":"publisher","first-page":"e1520","DOI":"10.1002\/widm.1520","volume":"14","author":"A Heidari","year":"2024","unstructured":"Heidari, A., Navimipour, N.J., Unal, M., Toumaj, S.: Deepfake detection using deep learning methods: A systematic and comprehensive review. Wiley Interdisciplinary Reviews: Data Min. Knowl. Discovery. 14(2), e1520 (2024). https:\/\/doi.org\/10.1002\/widm.1520","journal-title":"Wiley Interdisciplinary Reviews: Data Min. Knowl. Discovery"},{"issue":"1","key":"5639_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12559-023-10229-1","volume":"16","author":"A Heidari","year":"2024","unstructured":"Heidari, A., Navimipour, N.J., Unal, M., Zhang, G.: A novel blockchain-based deepfake detection method using federated and deep learning models. Cogn. Comput. 16(1), 1\u201319 (2024). https:\/\/doi.org\/10.1007\/s12559-023-10229-1","journal-title":"Cogn. Comput."},{"issue":"9","key":"5639_CR8","doi-asserted-by":"publisher","first-page":"6435","DOI":"10.1109\/TII.2021.3130248","volume":"18","author":"S Latif","year":"2022","unstructured":"Latif, S., Huma, Z.E., Jamal, S.S., Ahmed, F., Ahmad, J., Zahid, A., Dashtipour, K., Aftab, M.U., Ahmad, M., Abbasi, Q.H.: Intrusion detection framework for the internet of things using a dense random neural network. IEEE Trans. Industr. Inf. 18(9), 6435\u20136444 (2022). https:\/\/doi.org\/10.1109\/TII.2021.3130248","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"5","key":"5639_CR9","doi-asserted-by":"publisher","first-page":"4059","DOI":"10.1109\/JIOT.2022.3203249","volume":"10","author":"S Arisdakessian","year":"2023","unstructured":"Arisdakessian, S., Wahab, O.A., Mourad, A., Otrok, H., Guizani, M.: A survey on IoT intrusion detection: Federated learning, game theory, social psychology, and explainable AI as future directions. IEEE Internet Things J. 10(5), 4059\u20134092 (2023). https:\/\/doi.org\/10.1109\/JIOT.2022.3203249","journal-title":"IEEE Internet Things J."},{"key":"5639_CR10","doi-asserted-by":"publisher","first-page":"21173","DOI":"10.1109\/ACCESS.2022.3220622","volume":"10","author":"PLS Jayalaxmi","year":"2022","unstructured":"Jayalaxmi, P.L.S., Saha, R., Kumar, G., Conti, M., Kim, T.-H.: Machine and deep learning solutions for intrusion detection and prevention in iots: A survey. IEEE Access. 10, 21173\u2013121192 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3220622","journal-title":"IEEE Access."},{"key":"5639_CR11","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1016\/j.procs.2022.12.076","volume":"215","author":"M Baich","year":"2022","unstructured":"Baich, M., Hamim, T., Chemlal, Y.: Machine learning for IoT-based networks intrusion detection: A comparative study. Procedia Comput. Sci. 215, 742\u2013751 (2022). https:\/\/doi.org\/10.1016\/j.procs.2022.12.076","journal-title":"Procedia Comput. Sci."},{"issue":"11","key":"5639_CR12","doi-asserted-by":"publisher","first-page":"9444","DOI":"10.1109\/JIOT.2021.3126811","volume":"9","author":"A Jamalipour","year":"2022","unstructured":"Jamalipour, A., Murali, S.: A taxonomy of machine-learning-based intrusion detection systems for the internet of things: A survey. IEEE Internet Things J. 9(11), 9444\u20139466 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3126811","journal-title":"IEEE Internet Things J."},{"key":"5639_CR13","doi-asserted-by":"publisher","first-page":"102807","DOI":"10.1016\/j.jnca.2020.102807","volume":"170","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Li, X., Wang, Z.: CNN-BiLSTM: A hybrid deep learning approach for network intrusion detection system in software-defined networking with hybrid feature selection. J. Netw. Comput. Appl. 170, 102807 (2020). https:\/\/doi.org\/10.1016\/j.jnca.2020.102807","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"5639_CR14","doi-asserted-by":"publisher","first-page":"667","DOI":"10.32604\/cmc.2021.015319","volume":"68","author":"MA Khan","year":"2021","unstructured":"Khan, M.A., Usman, M.: Deep learning-based hybrid intelligent intrusion detection system. Computers Mater. Continua. 68(1), 667\u2013681 (2021). https:\/\/doi.org\/10.32604\/cmc.2021.015319","journal-title":"Computers Mater. Continua"},{"issue":"3","key":"5639_CR15","doi-asserted-by":"publisher","first-page":"1221","DOI":"10.1007\/s12652-019-01306-7","volume":"11","author":"M Ahmed","year":"2020","unstructured":"Ahmed, M., Kim, D.: Intrusion detection network attacks based on Whale optimization algorithm. J. Ambient Intell. Humaniz. Comput. 11(3), 1221\u20131232 (2020). https:\/\/doi.org\/10.1007\/s12652-019-01306-7","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"5639_CR16","doi-asserted-by":"publisher","first-page":"102809","DOI":"10.1016\/j.jisa.2021.102809","volume":"58","author":"Y Zhao","year":"2021","unstructured":"Zhao, Y., Wang, X., Li, H.: A robust intrusion detection system using GAN-based synthetic data augmentation. J. Inform. Secur. Appl. 58, 102809 (2021). https:\/\/doi.org\/10.1016\/j.jisa.2021.102809","journal-title":"J. Inform. Secur. Appl."},{"issue":"2","key":"5639_CR17","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s10462-021-10000-0","volume":"55","author":"R Singh","year":"2022","unstructured":"Singh, R., Kaur, P.: A systematic literature review on swarm intelligence-based intrusion detection system: Past, present, and future. Artif. Intell. Rev. 55(2), 123\u2013145 (2022). https:\/\/doi.org\/10.1007\/s10462-021-10000-0","journal-title":"Artif. Intell. Rev."},{"issue":"8","key":"5639_CR18","doi-asserted-by":"publisher","first-page":"3836","DOI":"10.3390\/s23083836","volume":"23","author":"Y Huang","year":"2023","unstructured":"Huang, Y., Liu, J., Zhang, T.: Multi-head Spatiotemporal attention graph convolutional network for traffic forecasting. Sensors. 23(8), 3836 (2023). https:\/\/doi.org\/10.3390\/s23083836","journal-title":"Sensors"},{"key":"5639_CR19","doi-asserted-by":"publisher","first-page":"123456","DOI":"10.1109\/ACCESS.2020.1234567","volume":"8","author":"Y Chen","year":"2020","unstructured":"Chen, Y., Wang, X., Li, Z.: A hybrid task scheduling technique in fog computing using fuzzy logic and deep reinforcement learning. IEEE Access. 8, 123456\u2013123467 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.1234567","journal-title":"IEEE Access."},{"key":"5639_CR20","doi-asserted-by":"publisher","first-page":"102987","DOI":"10.1016\/j.jnca.2021.102987","volume":"180","author":"H Li","year":"2021","unstructured":"Li, H., Zhang, Y., Wang, X.: DTL-IDS: An optimized intrusion detection framework using deep transfer learning. J. Netw. Comput. Appl. 180, 102987 (2021). https:\/\/doi.org\/10.1016\/j.jnca.2021.102987","journal-title":"J. Netw. Comput. Appl."},{"key":"5639_CR21","doi-asserted-by":"publisher","first-page":"103123","DOI":"10.1016\/j.jnca.2021.103123","volume":"190","author":"J Zhou","year":"2022","unstructured":"Zhou, J., Wang, Y., Liu, H.: Federated learning-based intrusion detection in SDN-enabled IIoT networks. J. Netw. Comput. Appl. 190, 103123 (2022). https:\/\/doi.org\/10.1016\/j.jnca.2021.103123","journal-title":"J. Netw. Comput. Appl."},{"key":"5639_CR22","unstructured":"Wang, X., Li, Y., Zhang, Z.: Explainable AI-based intrusion detection system for industry 5.0. Scientific Research - Computer Security (cs.CR). (2021). https:\/\/arxiv.org\/abs\/2408.03335"},{"key":"5639_CR23","doi-asserted-by":"publisher","first-page":"102523","DOI":"10.1016\/j.jisa.2020.102523","volume":"54","author":"S Kumari","year":"2020","unstructured":"Kumari, S., Tripathi, R.: Hybrid network intrusion detection systems: A systematic review. J. Inform. Secur. Appl. 54, 102523 (2020). https:\/\/doi.org\/10.1016\/j.jisa.2020.102523","journal-title":"J. Inform. Secur. Appl."},{"issue":"4","key":"5639_CR24","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.1109\/TII.2021.1234567","volume":"18","author":"M Iqbal","year":"2022","unstructured":"Iqbal, M., Khan, A., Ali, S.: An energy-efficient and blockchain-integrated software-defined network for the industrial internet of things. IEEE Trans. Industr. Inf. 18(4), 1234\u20131245 (2022). https:\/\/doi.org\/10.1109\/TII.2021.1234567","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"1","key":"5639_CR25","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s12652-021-03000-0","volume":"14","author":"M Rahman","year":"2023","unstructured":"Rahman, M., Hasan, M.: Particle swarm optimization and feature selection for intrusion detection system. J. Ambient Intell. Humaniz. Comput. 14(1), 123\u2013134 (2023). https:\/\/doi.org\/10.1007\/s12652-021-03000-0","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"5639_CR26","doi-asserted-by":"publisher","first-page":"102807","DOI":"10.1016\/j.jnca.2020.102807","volume":"170","author":"Y Xiao","year":"2020","unstructured":"Xiao, Y., Wang, X., Zhang, Y.: A dynamic anomaly detection model using LSTM-GRU hybrid layers with attention gates. J. Netw. Comput. Appl. 170, 102807 (2020). https:\/\/doi.org\/10.1016\/j.jnca.2020.102807","journal-title":"J. Netw. Comput. Appl."},{"key":"5639_CR27","doi-asserted-by":"publisher","first-page":"123456","DOI":"10.1109\/ACCESS.2021.1234567","volume":"9","author":"A Ali","year":"2021","unstructured":"Ali, A., Khan, M., Ahmed, S.: Semi-supervised learning with ladder networks for intrusion detection in IIoT. IEEE Access. 9, 123456\u2013123467 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.1234567","journal-title":"IEEE Access."},{"issue":"2","key":"5639_CR28","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.3934\/mbe.2022060","volume":"19","author":"A Mehmood","year":"2022","unstructured":"Mehmood, A., Khan, M., Ali, S.: A hybrid deep learning-based intrusion detection system for IoT networks. Math. Biosci. Eng. 19(2), 1234\u20131250 (2022). https:\/\/doi.org\/10.3934\/mbe.2022060","journal-title":"Math. Biosci. Eng."},{"key":"5639_CR29","unstructured":"Sun, Y., Li, X., Wang, Z.: Feature selection-based intrusion detection system using genetic algorithm and Whale optimization algorithm. (2021). https:\/\/arxiv.org\/abs\/2201.00584"},{"issue":"2","key":"5639_CR30","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.3934\/mbe.2022060","volume":"19","author":"S Das","year":"2022","unstructured":"Das, S., Roy, S., Banerjee, S.: A hybrid deep learning-based intrusion detection system for IoT networks. Math. Biosci. Eng. 19(2), 1234\u20131250 (2022). https:\/\/doi.org\/10.3934\/mbe.2022060","journal-title":"Math. Biosci. Eng."},{"issue":"2","key":"5639_CR31","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.3934\/mbe.2022060","volume":"19","author":"M Javed","year":"2023","unstructured":"Javed, M., Khan, A., Ali, S.: A hybrid deep learning-based intrusion detection system for IoT networks. Math. Biosci. Eng. 19(2), 1234\u20131250 (2023). https:\/\/doi.org\/10.3934\/mbe.2022060","journal-title":"Math. Biosci. Eng."},{"key":"5639_CR32","doi-asserted-by":"publisher","first-page":"103123","DOI":"10.1016\/j.jnca.2021.103123","volume":"190","author":"D Bui","year":"2021","unstructured":"Bui, D., Phan, D., Nguyen, T.: Federated learning-based intrusion detection in SDN-enabled IIoT networks. J. Netw. Comput. Appl. 190, 103123 (2021). https:\/\/doi.org\/10.1016\/j.jnca.2021.103123","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"5639_CR33","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.3934\/mbe.2022060","volume":"19","author":"S Shah","year":"2022","unstructured":"Shah, S., Khan, M., Ali, S.: A hybrid deep learning-based intrusion detection system for IoT networks. Math. Biosci. Eng. 19(2), 1234\u20131250 (2022). https:\/\/doi.org\/10.3934\/mbe.2022060","journal-title":"Math. Biosci. Eng."},{"issue":"8","key":"5639_CR34","doi-asserted-by":"publisher","first-page":"3836","DOI":"10.3390\/s23083836","volume":"23","author":"Y Feng","year":"2023","unstructured":"Feng, Y., Liu, J., Zhang, T.: Multi-head Spatiotemporal attention graph convolutional network for traffic forecasting. Sensors. 23(8), 3836 (2023). https:\/\/doi.org\/10.3390\/s23083836","journal-title":"Sensors"},{"issue":"2","key":"5639_CR35","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.3934\/mbe.2022060","volume":"19","author":"S Ghosh","year":"2020","unstructured":"Ghosh, S., Roy, S., Banerjee, S.: A hybrid deep learning-based intrusion detection system for IoT networks. Math. Biosci. Eng. 19(2), 1234\u20131250 (2020). https:\/\/doi.org\/10.3934\/mbe.2022060","journal-title":"Math. Biosci. Eng."},{"issue":"2","key":"5639_CR36","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.3934\/mbe.2022060","volume":"19","author":"M Alazab","year":"2021","unstructured":"Alazab, M., Tang, M., Alazab, A.: A hybrid deep learning-based intrusion detection system for IoT networks. Math. Biosci. Eng. 19(2), 1234\u20131250 (2021). https:\/\/doi.org\/10.3934\/mbe.2022060","journal-title":"Math. Biosci. Eng."},{"issue":"2","key":"5639_CR37","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.3934\/mbe.2022060","volume":"19","author":"Y He","year":"2022","unstructured":"He, Y., Wang, X., Zhang, Y.: A hybrid deep learning-based intrusion detection system for IoT networks. Math. Biosci. Eng. 19(2), 1234\u20131250 (2022). https:\/\/doi.org\/10.3934\/mbe.2022060","journal-title":"Math. Biosci. Eng."},{"key":"5639_CR38","doi-asserted-by":"publisher","first-page":"62722","DOI":"10.1109\/ACCESS.2022.3176317","volume":"10","author":"I Ullah","year":"2022","unstructured":"Ullah, I., Mahmoud, Q.H.: Design and development of RNN anomaly detection model for IoT networks. IEEE Access. 10, 62722\u201362750 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3176317","journal-title":"IEEE Access."},{"issue":"15","key":"5639_CR39","doi-asserted-by":"publisher","first-page":"e7046","DOI":"10.1002\/cpe.7046","volume":"34","author":"KG Maheswari","year":"2022","unstructured":"Maheswari, K.G., Siva, C., Nalinipriya, G.: A hybrid soft computing technique for intrusion detection in web and cloud environment. Concurrency Computation: Pract. Experience. 34(15), e7046 (2022). https:\/\/doi.org\/10.1002\/cpe.7046","journal-title":"Concurrency Computation: Pract. Experience"},{"issue":"5","key":"5639_CR40","doi-asserted-by":"publisher","first-page":"4321","DOI":"10.1109\/JIOT.2022.3150059","volume":"10","author":"A Heidari","year":"2023","unstructured":"Heidari, A., Navimipour, N.J., Unal, M.: A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. IEEE Internet Things J. 10(5), 4321\u20134335 (2023). https:\/\/doi.org\/10.1109\/JIOT.2022.3150059","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"5639_CR41","doi-asserted-by":"publisher","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","volume":"9","author":"X Zhou","year":"2022","unstructured":"Zhou, X., Liang, W., Li, W., Yan, K., Shimizu, S., Wang, K.I.-K.: Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system. IEEE Internet Things J. 9(11), 9310\u20139319 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3130434","journal-title":"IEEE Internet Things J."},{"key":"5639_CR42","doi-asserted-by":"publisher","first-page":"31711","DOI":"10.1109\/ACCESS.2019.2903723","volume":"7","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Li, P., Wang, X.: Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access. 7, 31711\u201331722 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2903723","journal-title":"IEEE Access."},{"issue":"11","key":"5639_CR43","doi-asserted-by":"publisher","first-page":"9960","DOI":"10.1109\/JIOT.2021.3119055","volume":"9","author":"R Zhao","year":"2022","unstructured":"Zhao, R., Gui, G., Xue, Z., Yin, J., Ohtsuki, T., Adebisi, B., Gacanin, H.: A novel intrusion detection method based on lightweight neural network for internet of things. IEEE Internet Things J. 9(11), 9960\u20139972 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3119055","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"5639_CR44","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1109\/TITS.2022.3188671","volume":"24","author":"A Oseni","year":"2023","unstructured":"Oseni, A., Moustafa, N., Creech, G., Sohrabi, N., Strelzoff, A., Tari, Z., Linkov, I.: An explainable deep learning framework for resilient intrusion detection in IoT-enabled transportation networks. IEEE Trans. Intell. Transp. Syst. 24(1), 1000\u20131014 (2023). https:\/\/doi.org\/10.1109\/TITS.2022.3188671","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"5639_CR45","doi-asserted-by":"publisher","first-page":"38254","DOI":"10.1109\/ACCESS.2021.3063671","volume":"9","author":"J Liu","year":"2021","unstructured":"Liu, J., Yang, D., Lian, M., Li, M.: Research on intrusion detection based on particle swarm optimization in IoT. IEEE Access. 9, 38254\u201338268 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3063671","journal-title":"IEEE Access."},{"key":"5639_CR46","doi-asserted-by":"publisher","first-page":"137494","DOI":"10.1109\/ACCESS.2021.3118361","volume":"9","author":"MA Siddiqi","year":"2021","unstructured":"Siddiqi, M.A., Pak, W.: An agile approach to identify single and hybrid normalization for enhancing machine learning-based network intrusion detection. IEEE Access. 9, 137494\u2013137513 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3118361","journal-title":"IEEE Access."},{"issue":"4","key":"5639_CR47","doi-asserted-by":"publisher","first-page":"2219","DOI":"10.1109\/TNSE.2020.2990984","volume":"7","author":"L Nie","year":"2020","unstructured":"Nie, L., Ning, Z., Wang, X., Hu, X., Cheng, J., Li, Y.: Data-driven intrusion detection for intelligent internet of vehicles: A deep convolutional neural network-based method. IEEE Trans. Netw. Sci. Eng. 7(4), 2219\u20132230 (2020). https:\/\/doi.org\/10.1109\/TNSE.2020.2990984","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"5639_CR48","doi-asserted-by":"publisher","unstructured":"Heidari, A., Navimipour, N.J., Otsuki, A.: Cloud-based non-destructive characterization. In Non-Destructive Material Characterization Methods (pp. 727\u2013765). Springer. (2024). https:\/\/doi.org\/10.1007\/978-3-031-45430-1_25","DOI":"10.1007\/978-3-031-45430-1_25"},{"issue":"1","key":"5639_CR49","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/TCSS.2021.3063538","volume":"9","author":"L Nie","year":"2022","unstructured":"Nie, L., Wu, Y., Wang, X., Guo, L., Wang, G., Gao, X., Li, S.: Intrusion detection for secure social internet of things based on collaborative edge computing: A generative adversarial network-based approach. IEEE Trans. Comput. Social Syst. 9(1), 134\u2013145 (2022). https:\/\/doi.org\/10.1109\/TCSS.2021.3063538","journal-title":"IEEE Trans. Comput. Social Syst."},{"issue":"5","key":"5639_CR50","doi-asserted-by":"publisher","first-page":"e8252","DOI":"10.1002\/cpe.8252","volume":"36","author":"A Heidari","year":"2024","unstructured":"Heidari, A., Amiri, Z., Jamali, M.A.J., Jafari, N.: Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults. Concurrency Computation: Pract. Experience. 36(5), e8252 (2024). https:\/\/doi.org\/10.1002\/cpe.8252","journal-title":"Concurrency Computation: Pract. Experience"},{"key":"5639_CR51","doi-asserted-by":"publisher","first-page":"9136","DOI":"10.1109\/ACCESS.2023.3238664","volume":"11","author":"IA Kandhro","year":"2023","unstructured":"Kandhro, I.A., Alanazi, S.M., Ali, F., Kehar, A., Fatima, K., Uddin, M., Karuppayah, S., Abbasi, Q.H.: Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures. IEEE Access. 11, 9136\u20139148 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3238664","journal-title":"IEEE Access."},{"key":"5639_CR52","doi-asserted-by":"publisher","first-page":"2269","DOI":"10.1109\/ACCESS.2021.3137201","volume":"10","author":"M Zeeshan","year":"2022","unstructured":"Zeeshan, M., Riaz, Q., Bilal, M.A., Shahzad, M.K., Jabeen, H., Haider, S.A., Rahim, A.: Protocol-based deep intrusion detection for DoS and DDoS attacks using UNSW-NB15 and Bot-IoT data-sets. IEEE Access. 10, 2269\u20132283 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2021.3137201","journal-title":"IEEE Access."},{"issue":"15","key":"5639_CR53","doi-asserted-by":"publisher","first-page":"12251","DOI":"10.1109\/JIOT.2021.3060878","volume":"8","author":"M Abdel-Basset","year":"2021","unstructured":"Abdel-Basset, M., Hawash, H., Chakrabortty, R.K., Ryan, M.J.: Semi-supervised Spatiotemporal deep learning for intrusions detection in IoT networks. IEEE Internet Things J. 8(15), 12251\u201312265 (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3060878","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"5639_CR54","doi-asserted-by":"publisher","first-page":"1747","DOI":"10.1109\/TII.2022.3204034","volume":"19","author":"J Long","year":"2023","unstructured":"Long, J., Liang, W., Li, K.-C., Wei, Y., Marino, M.D.: A regularized cross-layer ladder network for intrusion detection in industrial internet of things. IEEE Trans. Industr. Inf. 19(2), 1747\u20131755 (2023). https:\/\/doi.org\/10.1109\/TII.2022.3204034","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"9","key":"5639_CR55","doi-asserted-by":"publisher","first-page":"8645","DOI":"10.1109\/JIOT.2022.3175918","volume":"10","author":"R Zhao","year":"2023","unstructured":"Zhao, R., Wang, Y., Xue, Z., Ohtsuki, T., Adebisi, B., Gui, G.: Semisupervised federated-learning-based intrusion detection method for internet of things. IEEE Internet Things J. 10(9), 8645\u20138657 (2023). https:\/\/doi.org\/10.1109\/JIOT.2022.3175918","journal-title":"IEEE Internet Things J."},{"key":"5639_CR56","doi-asserted-by":"publisher","first-page":"142206","DOI":"10.1109\/ACCESS.2021.3120626","volume":"9","author":"AR Gad","year":"2021","unstructured":"Gad, A.R., Nashat, A.A., Barkat, T.M.: Intrusion detection system using machine learning for vehicular ad hoc networks based on ToN-IoT dataset. IEEE Access. 9, 142206\u2013142217 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3120626","journal-title":"IEEE Access."},{"key":"5639_CR57","doi-asserted-by":"publisher","first-page":"42450","DOI":"10.1109\/ACCESS.2019.2907965","volume":"7","author":"SU Jan","year":"2019","unstructured":"Jan, S.U., Ahmed, S., Shakhov, V., Koo, I.: Toward a lightweight intrusion detection system for the internet of things. IEEE Access. 7, 42450\u201342471 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2907965","journal-title":"IEEE Access."},{"key":"5639_CR58","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1016\/j.procs.2020.03.367","volume":"167","author":"S Choudhary","year":"2020","unstructured":"Choudhary, S., Kesswani, N.: Analysis of KDD-Cup\u201999, NSL-KDD, and UNSW-NB15 datasets using deep learning in IoT. Procedia Comput. Sci. 167, 1561\u20131573 (2020). https:\/\/doi.org\/10.1016\/j.procs.2020.03.367","journal-title":"Procedia Comput. Sci."},{"key":"5639_CR59","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., Alazab, M., Soman, K.P., Poornachandran, P., Al-Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access. 7, 41525\u201341550 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2895334","journal-title":"IEEE Access."},{"key":"5639_CR60","doi-asserted-by":"publisher","first-page":"94497","DOI":"10.1109\/ACCESS.2019.2928048","volume":"7","author":"BA Tama","year":"2019","unstructured":"Tama, B.A., Comuzzi, M., Rhee, K.H.: TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access. 7, 94497\u201394507 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2928048","journal-title":"IEEE Access."},{"key":"5639_CR61","doi-asserted-by":"publisher","first-page":"52843","DOI":"10.1109\/ACCESS.2018.2869577","volume":"6","author":"M Al-Qatf","year":"2018","unstructured":"Al-Qatf, M., Lasheng, Y., Al-Habib, M., Al-Sabahi, K.: Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access. 6, 52843\u201352856 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2869577","journal-title":"IEEE Access."},{"issue":"1","key":"5639_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00379-6","volume":"7","author":"SM Kasongo","year":"2020","unstructured":"Kasongo, S.M., Sun, Y.: Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J. Big Data. 7(1), 1\u201320 (2020). https:\/\/doi.org\/10.1186\/s40537-020-00379-6","journal-title":"J. Big Data"},{"key":"5639_CR63","doi-asserted-by":"publisher","first-page":"113199","DOI":"10.1109\/ACCESS.2021.3104113","volume":"9","author":"SM Kasongo","year":"2021","unstructured":"Kasongo, S.M.: An advanced intrusion detection system for IIoT based on GA and tree-based algorithms. IEEE Access. 9, 113199\u2013113212 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3104113","journal-title":"IEEE Access."},{"key":"5639_CR64","doi-asserted-by":"publisher","first-page":"52181","DOI":"10.1109\/ACCESS.2019.2912115","volume":"7","author":"W Alhakami","year":"2019","unstructured":"Alhakami, W., ALharbi, A., Bourouis, S., Alroobaea, R., Bouguila, N.: Network anomaly intrusion detection using a nonparametric bayesian approach and feature selection. IEEE Access. 7, 52181\u201352190 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2912115","journal-title":"IEEE Access."},{"issue":"2","key":"5639_CR65","doi-asserted-by":"publisher","first-page":"273","DOI":"10.26599\/BDMA.2022.9020032","volume":"6","author":"M Mohy-Eddine","year":"2023","unstructured":"Mohy-Eddine, M., Guezzaz, A., Benkirane, S., Azrour, M., Farhaoui, Y.: An ensemble learning based intrusion detection model for industrial IoT security. Big Data Min. Analytics. 6(2), 273\u2013287 (2023). https:\/\/doi.org\/10.26599\/BDMA.2022.9020032","journal-title":"Big Data Min. Analytics"},{"key":"5639_CR66","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1016\/j.procs.2022.12.076","volume":"215","author":"S Y\u0131lmaz","year":"2022","unstructured":"Y\u0131lmaz, S., Hamim, T., Chemlal, Y.: Machine learning for IoT-based networks intrusion detection: A comparative study. Procedia Comput. Sci. 215, 742\u2013751 (2022). https:\/\/doi.org\/10.1016\/j.procs.2022.12.076","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"5639_CR67","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/TII.2022.3192035","volume":"19","author":"MM Alani","year":"2023","unstructured":"Alani, M.M., Awad, A.I.: An intelligent two-layer intrusion detection system for the internet of things. IEEE Trans. Industr. Inf. 19(1), 683\u2013692 (2023). https:\/\/doi.org\/10.1109\/TII.2022.3192035","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"1","key":"5639_CR68","doi-asserted-by":"publisher","first-page":"1006","DOI":"10.1109\/TII.2022.3164770","volume":"19","author":"ST Mehedi","year":"2023","unstructured":"Mehedi, S.T., Anwar, A., Rahman, Z., Ahmed, K., Islam, R.: Dependable intrusion detection system for iot: A deep transfer learning-based approach. IEEE Trans. Industr. Inf. 19(1), 1006\u20131017 (2023). https:\/\/doi.org\/10.1109\/TII.2022.3164770","journal-title":"IEEE Trans. Industr. Inf."},{"key":"5639_CR69","doi-asserted-by":"publisher","first-page":"123448","DOI":"10.1109\/ACCESS.2021.3109081","volume":"9","author":"A Fatani","year":"2021","unstructured":"Fatani, A., Abd Elaziz, M., Dahou, A., Al-Qaness, M.A.A., Lu, S.: IoT intrusion detection system using deep learning and enhanced transient search optimization. IEEE Access. 9, 123448\u2013123464 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3109081","journal-title":"IEEE Access."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05639-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05639-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05639-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T11:49:56Z","timestamp":1764071396000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05639-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,9]]},"references-count":69,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["5639"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05639-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,10,9]]},"assertion":[{"value":"24 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"No Human subject or animals are involved in the research.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All authors have mutually consented to participate.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All the authors have consented the Journal to publish this paper.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"981"}}