{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:54:46Z","timestamp":1775145286257,"version":"3.50.1"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s10586-025-05878-w","type":"journal-article","created":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:32:22Z","timestamp":1767713542000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ATS-IDS: an adaptive teacher-student framework for lightweight IDS in IoT using incremental learning"],"prefix":"10.1007","volume":"29","author":[{"given":"Maryam","family":"Habibipour","sequence":"first","affiliation":[]},{"given":"Seyed Reza","family":"Kamel Tabbakh","sequence":"additional","affiliation":[]},{"given":"Hossein Monshizadeh","family":"Naeen","sequence":"additional","affiliation":[]},{"given":"Mohammad Hossein","family":"Moattar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,6]]},"reference":[{"issue":"1","key":"5878_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-018-0123-6","volume":"7","author":"MF Elrawy","year":"2018","unstructured":"Elrawy, M.F., Awad, A.I., Hamed, H.F.: Intrusion detection systems for IoT-based smart environments: A survey. J. Cloud Comput. 7(1), 1\u201320 (2018)","journal-title":"J. Cloud Comput."},{"key":"5878_CR2","doi-asserted-by":"crossref","unstructured":"Khan, A.R., et al.: Deep learning for intrusion detection and security of Internet of things (IoT): current analysis, challenges, and possible solutions. Security and Communication Networks, 2022, (2022)","DOI":"10.1155\/2022\/4016073"},{"issue":"18","key":"5878_CR3","doi-asserted-by":"publisher","first-page":"8383","DOI":"10.3390\/app11188383","volume":"11","author":"MA Alsoufi","year":"2021","unstructured":"Alsoufi, M.A., et al.: Anomaly-based intrusion detection systems in Iot using deep learning: A systematic literature review. Appl. Sci. 11(18), 8383 (2021)","journal-title":"Appl. Sci."},{"key":"5878_CR4","doi-asserted-by":"publisher","first-page":"32031","DOI":"10.1109\/ACCESS.2020.2973178","volume":"8","author":"MA Ferrag","year":"2020","unstructured":"Ferrag, M.A., et al.: Security and privacy for green IoT-based agriculture: Review, blockchain solutions, and challenges. IEEE access. 8, 32031\u201332053 (2020)","journal-title":"IEEE access."},{"key":"5878_CR5","first-page":"100186","volume":"20","author":"FA Ghaleb","year":"2019","unstructured":"Ghaleb, F.A., et al.: Context-aware data-centric misbehaviour detection scheme for vehicular ad hoc networks using sequential analysis of the Temporal and Spatial correlation of the consistency between the cooperative awareness messages. Veh. Commun. 20, 100186 (2019)","journal-title":"Veh. Commun."},{"key":"5878_CR6","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.iotcps.2023.09.003","volume":"4","author":"A Aldhaheri","year":"2024","unstructured":"Aldhaheri, A., et al.: Deep learning for cyber threat detection in IoT networks: A review. Internet Things Cyber-Physical Syst. 4, 110\u2013128 (2024)","journal-title":"Internet Things Cyber-Physical Syst."},{"issue":"6","key":"5878_CR7","doi-asserted-by":"publisher","first-page":"4944","DOI":"10.1109\/JIOT.2020.3034156","volume":"8","author":"SI Popoola","year":"2020","unstructured":"Popoola, S.I., et al.: Hybrid deep learning for botnet attack detection in the internet-of-things networks. IEEE Internet Things J. 8(6), 4944\u20134956 (2020)","journal-title":"IEEE Internet Things J."},{"key":"5878_CR8","doi-asserted-by":"crossref","unstructured":"Dinh, P.V., et al.: Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems. IEEE Internet of Things Journal (2023)","DOI":"10.1109\/JIOT.2023.3344842"},{"key":"5878_CR9","doi-asserted-by":"crossref","unstructured":"Sharma, B., Sharma, L., Lal, C.: Anomaly detection techniques using deep learning in IoT: a survey. in 2019 International conference on computational intelligence and knowledge economy (ICCIKE). IEEE (2019)","DOI":"10.1109\/ICCIKE47802.2019.9004362"},{"key":"5878_CR10","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1016\/j.comcom.2020.01.016","volume":"151","author":"MA Amanullah","year":"2020","unstructured":"Amanullah, M.A., et al.: Deep learning and big data technologies for IoT security. Comput. Commun. 151, 495\u2013517 (2020)","journal-title":"Comput. Commun."},{"issue":"7","key":"5878_CR11","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/s42452-024-06044-4","volume":"6","author":"R Sinha","year":"2024","unstructured":"Sinha, R., et al.: Development of lightweight intrusion model in industrial internet of things using deep learning technique. Discover Appl. Sci. 6(7), 346 (2024)","journal-title":"Discover Appl. Sci."},{"key":"5878_CR12","doi-asserted-by":"publisher","first-page":"77396","DOI":"10.1109\/ACCESS.2020.2986013","volume":"8","author":"S Manimurugan","year":"2020","unstructured":"Manimurugan, S., et al.: Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access. 8, 77396\u201377404 (2020)","journal-title":"IEEE Access."},{"key":"5878_CR13","doi-asserted-by":"publisher","first-page":"121751","DOI":"10.1016\/j.eswa.2023.121751","volume":"238","author":"B Sharma","year":"2024","unstructured":"Sharma, B., et al.: Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach. Expert Syst. Appl. 238, 121751 (2024)","journal-title":"Expert Syst. Appl."},{"key":"5878_CR14","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.inffus.2022.09.026","volume":"90","author":"A Thakkar","year":"2023","unstructured":"Thakkar, A., Lohiya, R.: Fusion of statistical importance for feature selection in deep neural Network-based intrusion detection system. Inform. Fusion. 90, 353\u2013363 (2023)","journal-title":"Inform. Fusion"},{"key":"5878_CR15","first-page":"p","volume":"103402","author":"M Abd Elaziz","year":"2023","unstructured":"Abd Elaziz, M., et al.: Intrusion detection approach for cloud and IoT environments using deep learning and capuchin search algorithm. Adv. Eng. Softw. 103402, p (2023)","journal-title":"Adv. Eng. Softw."},{"issue":"5","key":"5878_CR16","doi-asserted-by":"publisher","first-page":"e12917","DOI":"10.1111\/exsy.12917","volume":"39","author":"RV Mendonca","year":"2022","unstructured":"Mendonca, R.V., et al.: A lightweight intelligent intrusion detection system for industrial internet of things using deep learning algorithms. Expert Syst. 39(5), e12917 (2022)","journal-title":"Expert Syst."},{"key":"5878_CR17","doi-asserted-by":"publisher","first-page":"e1569","DOI":"10.7717\/peerj-cs.1569","volume":"9","author":"Z Wang","year":"2023","unstructured":"Wang, Z., et al.: A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization. PeerJ Comput. Sci. 9, e1569 (2023)","journal-title":"PeerJ Comput. Sci."},{"issue":"3","key":"5878_CR18","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., et al.: N-baiot\u2014network-based detection of Iot botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12\u201322 (2018)","journal-title":"IEEE Pervasive Comput."},{"key":"5878_CR19","first-page":"100700","volume-title":"A New deep-learning with Swarm Based Feature Selection for Intelligent Intrusion Detection for the Internet of Things","author":"R Anushiya","year":"2023","unstructured":"Anushiya, R., Lavanya, V.: A New deep-learning with Swarm Based Feature Selection for Intelligent Intrusion Detection for the Internet of Things, p. 100700. Sensors, Measurement (2023)"},{"issue":"12","key":"5878_CR20","doi-asserted-by":"publisher","first-page":"4459","DOI":"10.3390\/s22124459","volume":"22","author":"S Baniasadi","year":"2022","unstructured":"Baniasadi, S., et al.: A novel deep supervised learning-based approach for intrusion detection in IoT systems. Sensors. 22(12), 4459 (2022)","journal-title":"Sensors"},{"key":"5878_CR21","doi-asserted-by":"publisher","first-page":"30387","DOI":"10.1109\/ACCESS.2020.2973023","volume":"8","author":"R-H Hwang","year":"2020","unstructured":"Hwang, R.-H., et al.: An unsupervised deep learning model for early network traffic anomaly detection. IEEE Access. 8, 30387\u201330399 (2020)","journal-title":"IEEE Access."},{"issue":"2","key":"5878_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-024-04775-y","volume":"28","author":"S Sattarpour","year":"2025","unstructured":"Sattarpour, S., Barati, A., Barati, H.: EBIDS: Efficient BERT-based intrusion detection system in the network and application layers of IoT. Cluster Comput. 28(2), 1\u201321 (2025)","journal-title":"Cluster Comput."},{"issue":"6","key":"5878_CR23","doi-asserted-by":"publisher","first-page":"e0299666","DOI":"10.1371\/journal.pone.0299666","volume":"19","author":"N Khan","year":"2024","unstructured":"Khan, N., et al.: Advancements in intrusion detection: A lightweight hybrid RNN-RF model. Plos One. 19(6), e0299666 (2024)","journal-title":"Plos One"},{"key":"5878_CR24","doi-asserted-by":"crossref","unstructured":"Zhao, R., et al.: An efficient and lightweight approach for intrusion detection based on knowledge distillation. In: ICC 2021-IEEE International Conference on Communications. IEEE (2021)","DOI":"10.1109\/ICC42927.2021.9500574"},{"issue":"8","key":"5878_CR25","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1587\/transcom.2022EBP3169","volume":"E106-B","author":"G Zhao","year":"2023","unstructured":"Zhao, G., Wang, Y., Wang, J.: Intrusion detection model of internet of things based on LightGBM. IEICE Trans. Commun. E106-B(8), 622\u2013634 (2023). https:\/\/doi.org\/10.1587\/transcom.2022EBP3169","journal-title":"IEICE Trans. Commun."},{"issue":"2","key":"5878_CR26","doi-asserted-by":"publisher","first-page":"2935","DOI":"10.1109\/JIOT.2023.3294259","volume":"11","author":"M He","year":"2023","unstructured":"He, M., et al.: A lightweight and efficient IoT intrusion detection method based on feature grouping. IEEE Internet Things J. 11(2), 2935\u20132949 (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3294259","journal-title":"IEEE Internet Things J."},{"key":"5878_CR27","doi-asserted-by":"publisher","unstructured":"Jouhari, M., Guizani, M.: Lightweight CNN-BiLSTM based intrusion detection systems for Resource-Constrained IoT devices. In: 2024 International Wireless Communications and Mobile Computing (IWCMC) (pp. 1558-1563). IEEE. arXiv preprint arXiv:2406.02768 (2024). https:\/\/doi.org\/10.1109\/IWCMC61514.2024.10592352","DOI":"10.1109\/IWCMC61514.2024.10592352"},{"key":"5878_CR28","doi-asserted-by":"crossref","unstructured":"Zhao, G., Wang, Y., Wang, J.: Lightweight intrusion detection model of the Internet of Things with hybrid cloud-fog computing. Security and Communication Networks. 2023, (2023)","DOI":"10.1155\/2023\/7107663"},{"issue":"12","key":"5878_CR29","doi-asserted-by":"publisher","first-page":"9960","DOI":"10.1109\/JIOT.2021.3119055","volume":"9","author":"R Zhao","year":"2021","unstructured":"Zhao, R., et al.: A novel intrusion detection method based on lightweight neural network for internet of things. IEEE Internet Things J. 9(12), 9960\u20139972 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"5878_CR30","doi-asserted-by":"publisher","first-page":"432","DOI":"10.3390\/s22020432","volume":"22","author":"X-H Nguyen","year":"2022","unstructured":"Nguyen, X.-H., et al.: Realguard: A lightweight network intrusion detection system for IoT gateways. Sensors. 22(2), 432 (2022)","journal-title":"Sensors"},{"key":"5878_CR31","doi-asserted-by":"crossref","unstructured":"Lopez, M.M., et al.: Machine learning for intrusion detection: Stream classification guided by clustering for sustainable security in iot. In: Proceedings of the Great Lakes Symposium on VLSI 2023. (2023)","DOI":"10.1145\/3583781.3590271"},{"key":"5878_CR32","doi-asserted-by":"publisher","first-page":"1524286","DOI":"10.3389\/fmed.2025.1524286","volume":"12","author":"JA Shaikh","year":"2025","unstructured":"Shaikh, J.A., et al.: A deep reinforcement learning-based robust intrusion detection system for Securing IoMT healthcare networks. Front. Med. 12, 1524286 (2025)","journal-title":"Front. Med."},{"key":"5878_CR33","doi-asserted-by":"publisher","first-page":"1467241","DOI":"10.3389\/fdgth.2024.1467241","volume":"6","author":"JA Shaikh","year":"2024","unstructured":"Shaikh, J.A., et al.: RCLNet: An effective Anomaly-based intrusion detection for Securing the IoMT system. Front. Digit. Health. 6, 1467241 (2024)","journal-title":"Front. Digit. Health"},{"key":"5878_CR34","doi-asserted-by":"crossref","unstructured":"Sorkhpour, M., Yazdinejad, A., Dehghantanha, A.: Auto-CIDS: An autonomous intrusion detection system for vehicular networks. In: Proceedings of the Workshop on Autonomous Cybersecurity. (2023)","DOI":"10.1145\/3689933.3690837"},{"key":"5878_CR35","doi-asserted-by":"publisher","first-page":"107688","DOI":"10.1016\/j.comnet.2020.107688","volume":"184","author":"A Yazdinejadna","year":"2021","unstructured":"Yazdinejadna, A., et al.: A kangaroo-based intrusion detection system on software-defined networks. Comput. Netw. 184, 107688 (2021)","journal-title":"Comput. Netw."},{"issue":"3","key":"5878_CR36","doi-asserted-by":"publisher","first-page":"3491","DOI":"10.1109\/TVT.2020.2971001","volume":"69","author":"Y Wang","year":"2020","unstructured":"Wang, Y., et al.: LightAMC: Lightweight automatic modulation classification via deep learning and compressive sensing. IEEE Trans. Veh. Technol. 69(3), 3491\u20133495 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"15","key":"5878_CR37","doi-asserted-by":"publisher","first-page":"11935","DOI":"10.1109\/JIOT.2021.3063497","volume":"8","author":"K Zhang","year":"2021","unstructured":"Zhang, K., et al.: Compacting deep neural networks for internet of things: Methods and applications. IEEE Internet Things J. 8(15), 11935\u201311959 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"5878_CR38","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10515-021-00298-7","volume":"28","author":"D Selvapandian","year":"2021","unstructured":"Selvapandian, D., Santhosh, R.: Deep learning approach for intrusion detection in IoT-multi cloud environment. Automated Softw. Eng. 28(2), 19 (2021)","journal-title":"Automated Softw. Eng."},{"issue":"5","key":"5878_CR39","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi, W., et al.: Edge computing: Vision and challenges. IEEE Internet Things J. 3(5), 637\u2013646 (2016)","journal-title":"IEEE Internet Things J."},{"key":"5878_CR40","doi-asserted-by":"crossref","unstructured":"Bonomi, F., et al.: Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing. (2012)","DOI":"10.1145\/2342509.2342513"},{"issue":"16","key":"5878_CR41","doi-asserted-by":"publisher","first-page":"26866","DOI":"10.1109\/JIOT.2023.3288544","volume":"11","author":"D Javeed","year":"2024","unstructured":"Javeed, D., et al.: An intrusion detection system for Edge-Envisioned smart agriculture in extreme environment. IEEE Internet Things J. 11(16), 26866\u201326876 (2024)","journal-title":"IEEE Internet Things J."},{"key":"5878_CR42","doi-asserted-by":"crossref","unstructured":"Alsharif, M., Rawat, D.B.: Machine Learning Enabled Intrusion Detection for Edge Devices in the Internet of Things. In: IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC). 2023. (2023)","DOI":"10.1109\/CCWC57344.2023.10099276"},{"issue":"8","key":"5878_CR43","doi-asserted-by":"publisher","first-page":"6882","DOI":"10.1109\/JIOT.2020.2970501","volume":"7","author":"M Eskandari","year":"2020","unstructured":"Eskandari, M., et al.: Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet Things J. 7(8), 6882\u20136897 (2020)","journal-title":"IEEE Internet Things J."},{"key":"5878_CR44","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.jpdc.2018.03.006","volume":"119","author":"R Kozik","year":"2018","unstructured":"Kozik, R., et al.: A scalable distributed machine learning approach for attack detection in edge computing environments. J. Parallel Distrib. Comput. 119, 18\u201326 (2018)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"3","key":"5878_CR45","doi-asserted-by":"publisher","first-page":"60","DOI":"10.3390\/computers12030060","volume":"12","author":"Z Li","year":"2023","unstructured":"Li, Z., Li, H., Meng, L.: Model compression for deep neural networks: A survey. Computers. 12(3), 60 (2023)","journal-title":"Computers"},{"issue":"3","key":"5878_CR46","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1109\/TETC.2023.3322033","volume":"12","author":"A Burrello","year":"2024","unstructured":"Burrello, A., et al.: Enhancing neural architecture search with multiple hardware constraints for deep learning model deployment on tiny IoT devices. IEEE Trans. Emerg. Top. Comput. 12(3), 780\u2013794 (2024)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"5878_CR47","unstructured":"Han, S., Mao, H., Dally, W.J.: Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding. arXiv preprint arXiv:1510.00149 (2015)"},{"key":"5878_CR48","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1109\/TMLCN.2024.3395419","volume":"2","author":"MF Saiyed","year":"2024","unstructured":"Saiyed, M.F., Al-Anbagi, I.: Deep ensemble learning with pruning for DDoS attack detection in IoT networks. IEEE Trans. Mach. Learn. Commun. Netw. 2, 596\u2013616 (2024). https:\/\/doi.org\/10.1109\/TMLCN.2024.3395419","journal-title":"IEEE Trans. Mach. Learn. Commun. Netw."},{"key":"5878_CR49","doi-asserted-by":"publisher","first-page":"e13793","DOI":"10.1111\/exsy.13793","volume":"42","author":"S Das","year":"2024","unstructured":"Das, S., et al.: Intrusion detection using CTGAN and lightweight neural network for internet of things. Expert Syst. 42, e13793 (2024). https:\/\/doi.org\/10.1111\/exsy.13793","journal-title":"Expert Syst."},{"key":"5878_CR50","doi-asserted-by":"crossref","unstructured":"Ericson, A., Forsstr\u00f6m, S., Thar, K.: IIoT Intrusion Detection using Lightweight Deep Learning Models on Edge Devices. In: IEEE 20th International Conference on Factory Communication Systems (WFCS) 2024. IEEE. (2024)","DOI":"10.1109\/WFCS60972.2024.10540991"},{"issue":"10","key":"5878_CR51","doi-asserted-by":"publisher","first-page":"8645","DOI":"10.1109\/JIOT.2022.3175918","volume":"10","author":"R Zhao","year":"2022","unstructured":"Zhao, R., et al.: Semisupervised federated-learning-based intrusion detection method for internet of things. IEEE Internet Things J. 10(10), 8645\u20138657 (2022)","journal-title":"IEEE Internet Things J."},{"key":"5878_CR52","doi-asserted-by":"publisher","first-page":"102662","DOI":"10.1016\/j.jnca.2020.102662","volume":"163","author":"GDLT Parra","year":"2020","unstructured":"Parra, G.D.L.T., et al.: Detecting internet of things attacks using distributed deep learning. J. Netw. Comput. Appl. 163, 102662 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"5878_CR53","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro, A.A., Chilamkurti, N.: Distributed attack detection scheme using deep learning approach for internet of things. Future Generation Comput. Syst. 82, 761\u2013768 (2018)","journal-title":"Future Generation Comput. Syst."},{"key":"5878_CR54","doi-asserted-by":"crossref","unstructured":"Fan, C., et al.: Auto-Updating Intrusion Detection System for Vehicular Network: A Deep Learning Approach Based on Cloud-Edge-Vehicle Collaboration. IEEE Transactions on Vehicular Technology (2024)","DOI":"10.1109\/TVT.2024.3399219"},{"issue":"2","key":"5878_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.61187\/ita.v1i2.36","volume":"1","author":"Z Gong","year":"2023","unstructured":"Gong, Z., et al.: A review of neural network lightweighting techniques. Innov. Technol. Adv. 1(2), 1\u201324 (2023)","journal-title":"Innov. Technol. Adv."},{"key":"5878_CR56","doi-asserted-by":"crossref","unstructured":"Zhao, R., et al.: A novel approach based on lightweight deep neural network for network intrusion detection. In: 2021 IEEE wireless communications and networking conference (WCNC). IEEE (2021)","DOI":"10.1109\/WCNC49053.2021.9417568"},{"key":"5878_CR57","doi-asserted-by":"crossref","unstructured":"Huo, Y., et al.: LightGuard: A Lightweight Malicious Traffic Detection Method for Internet of Things. IEEE Internet of Things Journal (2024)","DOI":"10.1109\/JIOT.2024.3403650"},{"key":"5878_CR58","doi-asserted-by":"crossref","unstructured":"Yan, S., et al.: Lightweight Deep Learning Method based on Group Convolution: Detecting DDoS Attacks in IoT Environments. In: 2024 10th International Symposium on System Security, Safety, and Reliability (ISSSR). IEEE (2024)","DOI":"10.1109\/ISSSR61934.2024.00027"},{"key":"5878_CR59","unstructured":"Hinton, G.: Distilling the Knowledge in a Neural Network. arXiv preprint arXiv:1503.02531 (2015)"},{"key":"5878_CR60","doi-asserted-by":"crossref","unstructured":"Yang, S., et al.: A Lightweight Approach for Network Intrusion Detection based on Self-Knowledge Distillation. In: ICC 2023-IEEE International Conference on Communications. IEEE (2023)","DOI":"10.1109\/ICC45041.2023.10279691"},{"issue":"4","key":"5878_CR61","doi-asserted-by":"publisher","first-page":"6438","DOI":"10.1109\/JIOT.2023.3310794","volume":"11","author":"S Zhu","year":"2023","unstructured":"Zhu, S., et al.: Lkd-stnn: A lightweight malicious traffic detection method for internet of things based on knowledge distillation. IEEE Internet Things J. 11(4), 6438\u20136453 (2023)","journal-title":"IEEE Internet Things J."},{"key":"5878_CR62","doi-asserted-by":"crossref","unstructured":"Ali, T., et al.: Lightweight Intrusion Detection System with GAN-Based Knowledge Distillation. In: 2024 International Conference on Smart Applications, Communications and Networking (SmartNets). (2024)","DOI":"10.1109\/SmartNets61466.2024.10577682"},{"key":"5878_CR63","doi-asserted-by":"publisher","first-page":"112118","DOI":"10.1016\/j.asoc.2024.112118","volume":"165","author":"L-H Wang","year":"2024","unstructured":"Wang, L.-H., et al.: Lightweight intrusion detection model based on CNN and knowledge distillation. Appl. Soft Comput. 165, 112118 (2024)","journal-title":"Appl. Soft Comput."},{"issue":"1\u20133","key":"5878_CR64","first-page":"18","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa, N., Slay, J.: The evaluation of network anomaly detection systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inform. Secur. Journal: Global Perspective. 25(1\u20133), 18\u201331 (2016)","journal-title":"Inform. Secur. Journal: Global Perspective"},{"key":"5878_CR65","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp. 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"issue":"1","key":"5878_CR66","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/JIOT.2021.3085194","volume":"9","author":"TM Booij","year":"2021","unstructured":"Booij, T.M., et al.: ToN_IoT: The role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets. IEEE Internet Things J. 9(1), 485\u2013496 (2021)","journal-title":"IEEE Internet Things J."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05878-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05878-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05878-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T17:02:49Z","timestamp":1767718969000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05878-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,6]]},"references-count":66,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["5878"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05878-w","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,6]]},"assertion":[{"value":"20 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics declaration"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"101"}}