{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:59:49Z","timestamp":1777658389113,"version":"3.51.4"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T00:00:00Z","timestamp":1768176000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T00:00:00Z","timestamp":1768176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s10586-025-05914-9","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T18:46:03Z","timestamp":1768243563000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Establishing an efficient security model using learning and optimization approaches"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5058-4313","authenticated-orcid":false,"given":"K. Srujan","family":"Raju","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7381-6284","authenticated-orcid":false,"given":"Pravin R.","family":"Kshirsagar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0578-7098","authenticated-orcid":false,"given":"Tan Kuan","family":"Tak","sequence":"additional","affiliation":[]},{"given":"Subba Rao","family":"Polamuri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,12]]},"reference":[{"issue":"7553","key":"5914_CR1","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436\u2013444 (2015)","journal-title":"Nature"},{"key":"5914_CR2","doi-asserted-by":"crossref","unstructured":"Reddy, Y., Ramadevi, Sunitha, K.V.N.: Effective discriminant function for intrusion detection using SVM. In\u00a0Proceedings of the International Conference on Advances in Computing, Communications and Informatics(ICAC), Sep. pp. 1148\u20131153 (2016)","DOI":"10.1109\/ICACCI.2016.7732199"},{"key":"5914_CR3","doi-asserted-by":"crossref","unstructured":"Ingre, Yadav, A.: Performance analysis of NSL-KDD dataset using ANN. In: Proceedings of the International Conference on Signal Processing, Communication, Engineering and Systems, Jan. pp. 92\u201396 (2015)","DOI":"10.1109\/SPACES.2015.7058223"},{"key":"5914_CR4","doi-asserted-by":"crossref","unstructured":"Farnaaz, Jabbar, M.A.: \u2018Random forest modelling for network intrusion detection system\u2019. Procedia Comput. Sci. 89, 213\u2013217 (Jan. 2016)","DOI":"10.1016\/j.procs.2016.06.047"},{"issue":"5","key":"5914_CR5","first-page":"202","volume":"2","author":"Khan","year":"2016","unstructured":"Khan, Jain, N.: \u2018A survey on intrusion detection systems and classification techniques\u2019. Int. J. Sci. Res. Sci. Eng. Technol. 2(5), 202\u2013208 (2016)","journal-title":"Int. J. Sci. Res. Sci. Eng. Technol."},{"key":"5914_CR6","doi-asserted-by":"crossref","unstructured":"Tang, L., Mhamdi, D., McLernon, S.A.R., Zaidi, Ghogho, M.: Deep learning approach for network intrusion detection in software-defined networking. In\u00a0Proceedings of the International Conference on Wireless Networks and Mobile Communications\u00a0(WINCOM), Oct. pp. 258\u2013263 (2016)","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"5914_CR7","doi-asserted-by":"crossref","unstructured":"Ashfaq, X.-Z., Wang, J.Z., Huang, H., Abbas, He, Y.-L.: Fuzziness based semi-supervised learning approach for an intrusion detection system. Inf. Sci. 378, 484\u2013497 (Feb. 2017)","DOI":"10.1016\/j.ins.2016.04.019"},{"key":"5914_CR8","doi-asserted-by":"crossref","unstructured":"Ashfaq, X.-Z., Wang, J.Z., Huang, H., Abbas, He, Y.-L.: Fuzziness based semi-supervised learning approach for an intrusion detection system. Inf. Sci, 378, pp. 484\u2013497, Feb. 20","DOI":"10.1016\/j.ins.2016.04.019"},{"key":"5914_CR9","doi-asserted-by":"crossref","unstructured":"Chang, W., Li, Yang, Z.: Network intrusion detection based on random forest and support vector machine. In:\u00a0Proceedings of the IEEE International Conference on Computational Science and Engineering \/ IEEE International Conference on Embedded and Ubiquitous Computing, Jul. pp. 635\u2013638 (2017)","DOI":"10.1109\/CSE-EUC.2017.118"},{"key":"5914_CR10","unstructured":"Zhao, R., Yan, Z., Chen, K., Mao, P., Wang, Gao, R.X.: Deep learning and its applications to machine health monitoring: A survey, Submitted to IEEE Trans. Neural Netw. Learn. Syst., [Online]. (2016). Available: http:\/\/arxiv.org\/abs\/1612.07640"},{"key":"5914_CR11","first-page":"3371","volume":"11","author":"H Vincent","year":"2010","unstructured":"Vincent, H., Larochelle, I., Lajoie, Y., Bengio, Y., Manzagol, P.-A.: Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion. J. Mach. Learn\u2014Res. 11, 3371\u20133408 (2010)","journal-title":"J. Mach. Learn\u2014Res."},{"key":"5914_CR12","doi-asserted-by":"crossref","unstructured":"Proc, I., you, Li, Y., Wang, Y., Zhang, J., Yang, Y.: A deep learning-based RNNs model for automatic security audit of short messages. In\u00a0Proceedings of the 16th International Symposium on Communications and Information Technologies.\u00a0Qingdao, China, Sep. pp. 225\u2013229 (2016)","DOI":"10.1109\/ISCIT.2016.7751626"},{"key":"5914_CR13","doi-asserted-by":"crossref","unstructured":"Alrawashdeh, Purdy, C.: Toward an online anomaly intrusion detection system based on deep learning. In\u00a0Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, Anaheim, CA, USA, Dec. pp. 195\u2013200 (2016)","DOI":"10.1109\/ICMLA.2016.0040"},{"key":"5914_CR14","doi-asserted-by":"crossref","unstructured":"Potluri, Diedrich, C.: Accelerated deep neural networks for an enhanced intrusion detection system. In\u00a0Proceedings of the 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation, Berlin, Germany, Sep. pp. 1\u20138. (2016)","DOI":"10.1109\/ETFA.2016.7733515"},{"key":"5914_CR15","doi-asserted-by":"crossref","unstructured":"Tang, L., Mhamdi, D., McLernon, S.A.R., Zaidi, Ghogho, M.: Deep learning approach for network intrusion detection in software-defined networking, Proc. Int. Conf. Wireless Netw. Mobile Commun., Oct. pp. 258\u2013263 (2016)","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"5914_CR16","unstructured":"Hodo, X.J.A., Bellekens, A., Hamilton, C., Tachtatzis, Atkinson, R.C.: Shallow and deep networks intrusion detection system: A taxonomy and survey, Submitted to ACM Survey, 2017, [Online]. Available: http:\/\/arxiv.org\/abs\/1701.02145"},{"key":"5914_CR17","unstructured":"Kim, G., Yi, H., Lee, J., Paek, Y., Yoon, S.: Lstm-based system-call Language modelling and robust ensemble method for designing host-based intrusion detection systems. ArXiv Preprint arXiv:161101726 (2016)"},{"issue":"2","key":"5914_CR18","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials 18(2), 1153\u20131176 (2016)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"5914_CR19","doi-asserted-by":"crossref","unstructured":"Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), New York, NY, USA. Volume 35. 2126 (2015)","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"5914_CR20","doi-asserted-by":"crossref","unstructured":"Safa Otoum, B., Kantarci, Mouftah, H.T.: Adaptively supervised and intrusion-aware data aggregation for wireless sensor clusters in critical infrastructures, in IEEE International Conference on Communications (ICC), May 2018, pp. 1\u20136 (2018)","DOI":"10.1109\/ICC.2018.8422401"},{"key":"5914_CR21","doi-asserted-by":"crossref","unstructured":"Gouveia, A., Correia, M.: A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection, vol. 10305, 05 (2017)","DOI":"10.1007\/978-3-319-59153-7_38"},{"key":"5914_CR22","doi-asserted-by":"crossref","unstructured":"Beigh, Peer, M.A.: Performance evaluation of different intrusion detection system: An empirical approach, in Intl Conf. on Computer Communication and Informatics, Jan pp. 1\u20137 (2014)","DOI":"10.1109\/ICCCI.2014.6921740"},{"issue":"7","key":"5914_CR23","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130968","volume":"10","author":"W Zhou","year":"2015","unstructured":"Zhou, W., Wen, J., Koh, Y., Xiong, Q., Gao, M., Dobbie, G., Alam, S.: Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis. PLoS One 10(7), e0130968 (2015)","journal-title":"PLoS One"},{"issue":"4","key":"5914_CR24","first-page":"44","volume":"14","author":"T Kumari","year":"2017","unstructured":"Kumari, T., Bedi, P.: A Comprehensive Study of Shilling Attacks in Recommender Systems. IJCSI International Journal of Computer Science Issues 14(4), 44\u201350 (2017)","journal-title":"IJCSI International Journal of Computer Science Issues"},{"issue":"5\u20136","key":"5914_CR25","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1007\/s11280-012-0164-6","volume":"16","author":"J Cao","year":"2013","unstructured":"Cao, J., Wu, Z., Mao, B., Zhang, Y.: Shilling attack detection utilizing semi-supervised learning method for attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web Journal 16(5\u20136), 729\u2013748 (2013)","journal-title":"World Wide Web Journal"},{"issue":"3","key":"5914_CR26","first-page":"2101","volume":"32","author":"H Yu","year":"2017","unstructured":"Yu, H., Gao, R., Wang, K., Zhang, F.: A novel robust recommendation method based on kernel matrix factorization. Journal of Intelligent & Fuzzy Systems 32(3), 2101\u20132109 (2017)","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"3","key":"5914_CR27","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s10844-016-0424-5","volume":"48","author":"Z Yang","year":"2017","unstructured":"Yang, Z., Cai, Z.: Detecting abnormal profiles in collaborative filtering recommender systems. J. Intell. Inform. Syst. 48(3), 499\u2013518 (2017)","journal-title":"J. Intell. Inform. Syst."},{"key":"5914_CR28","doi-asserted-by":"crossref","unstructured":"Nazir, A., He, J., Zhu, N., Wajahat, A., Ma, X., Ullah, F., Pathan, M.S.: Advancing IoT Security: a Systematic Review of Machine Learning Approaches for IoT Botnet Detection. J. King Saud Univ. \u2013 Computer and Information Sciences (2023)","DOI":"10.1016\/j.jksuci.2023.101820"},{"key":"5914_CR29","doi-asserted-by":"crossref","unstructured":"Nazir, A., He, J., Zhu, N., Anwar, M.S., Pathan, M.S.: Collaborative Threat Intelligence: Enhancing IoT Security Through Blockchain and Machine Learning Integration. J. King Saud Univ. \u2013 Computer and Information Sciences (2024)","DOI":"10.1016\/j.jksuci.2024.101939"},{"key":"5914_CR30","doi-asserted-by":"crossref","unstructured":"Nazir, A., He, J., Zhu, N., Wajahat, A., Ullah, F., Qureshi, S., Pathan, M.S.: Empirical Evaluation of Ensemble Learning and Hybrid CNN-LSTM for IoT Threat Detection on Heterogeneous Datasets. The Journal of Supercomputing (2025)","DOI":"10.1007\/s11227-025-07255-1"},{"key":"5914_CR31","doi-asserted-by":"publisher","unstructured":"Saheed, Y.K., Chukwuere, J.E.: CPS-IIoT-P2Attention: Explainable Privacy-Preserving with scaled Dot-Product attention in Cyber-Physical System\u2013Industrial IoT networks. IEEE Access 13, 81118\u201381142 (2025). https:\/\/doi.org\/10.1109\/access.2025.3566980","DOI":"10.1109\/access.2025.3566980"},{"key":"5914_CR32","unstructured":"Saheed, Y.K., Misra, S.: Autoencoder via DCNN and LSTM Models for Intrusion Detection in Industrial Control Systems of Critical Infrastructures (2025)"},{"key":"5914_CR33","unstructured":"Xue, Y., et al.: Hybrid ResNet\u2013LSTM architecture with improved autoencoder preprocessing for ICS datasets. (2025)"},{"key":"5914_CR34","unstructured":"Alzahrani, A., et al.: Optimizer-augmented deep learning pipeline for botnet detection using a population-based metaheuristic. (2024)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05914-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05914-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05914-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T18:46:06Z","timestamp":1768243566000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05914-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,12]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["5914"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05914-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,12]]},"assertion":[{"value":"1 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"112"}}