{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T21:01:04Z","timestamp":1771534864185,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10586-026-05972-7","type":"journal-article","created":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T18:52:55Z","timestamp":1771527175000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["X-SecureNet: A Security-Driven Intelligent Framework for Intrusion Detection in Smart Industrial Infrastructures"],"prefix":"10.1007","volume":"29","author":[{"given":"Amreen","family":"Shafique","sequence":"first","affiliation":[]},{"given":"Guowei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Muhammad Shahid","family":"Saeed","sequence":"additional","affiliation":[]},{"given":"Danish","family":"Javeed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,19]]},"reference":[{"issue":"2","key":"5972_CR1","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1109\/TNSM.2025.3527810","volume":"22","author":"C Lin","year":"2025","unstructured":"Lin, C., Tang, J., Dang, S., Chen, G.: Priority-based blockchain packing for dependent industrial iot transactions. IEEE Trans. Netw. Service Manag. 22(2), 1618\u20131628 (2025)","journal-title":"IEEE Trans. Netw. Service Manag."},{"key":"5972_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2024.102649","volume":"78","author":"BD Sarkar","year":"2024","unstructured":"Sarkar, B.D., Shardeo, V., Dwivedi, A., Pamucar, D.: Digital transition from industry 4.0 to industry 5.0 in smart manufacturing: a framework for sustainable future. Technol. Soc. 78, 102649 (2024)","journal-title":"Technol. Soc."},{"key":"5972_CR3","volume":"39","author":"M Toussaint","year":"2024","unstructured":"Toussaint, M., Krima, S., Panetto, H.: Industry 4.0 data security: a cybersecurity frameworks review. J. Ind. Inf. Intergr. 39, 100604 (2024)","journal-title":"J. Ind. Inf. Intergr."},{"issue":"5","key":"5972_CR4","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MCE.2024.3355189","volume":"13","author":"P Maurya","year":"2024","unstructured":"Maurya, P., Tummala, V.M.R., Hazra, A., Mohanty, S.P.: Advancing industry 5.0 with uav-driven transformations: future prospectives. IEEE Consumer Electron. Mag. 13(5), 30\u201335 (2024)","journal-title":"IEEE Consumer Electron. Mag."},{"issue":"2","key":"5972_CR5","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1109\/TII.2023.3274224","volume":"20","author":"W Xiang","year":"2023","unstructured":"Xiang, W., Yu, K., Han, F., Fang, L., He, D., Han, Q.-L.: Advanced manufacturing in industry 5.0: a survey of key enabling technologies and future trends. IEEE Trans. Ind. Inf. 20(2), 1055\u20131068 (2023)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"5972_CR6","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.comcom.2023.06.020","volume":"208","author":"SH Mekala","year":"2023","unstructured":"Mekala, S.H., Baig, Z., Anwar, A., Zeadally, S.: Cybersecurity for industrial iot (iiot): threats, countermeasures, challenges and future directions. Comput. Commun. 208, 294\u2013320 (2023)","journal-title":"Comput. Commun."},{"issue":"2","key":"5972_CR7","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MIE.2023.3292988","volume":"18","author":"R Ma","year":"2023","unstructured":"Ma, R., Hu, Z., Yang, H., Jiang, Y., Huo, M., Luo, H., Yang, R.: Adversarial fdi attack monitoring: toward secure defense of industrial electronics. IEEE Ind. Electron. Mag. 18(2), 48\u201357 (2023)","journal-title":"IEEE Ind. Electron. Mag."},{"key":"5972_CR8","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.future.2023.11.027","volume":"153","author":"X Lianpeng Li","year":"2024","unstructured":"Lianpeng Li, X., Zhao, J.F., Liu, F., Liu, N., Zhao, H.: A trustworthy security model for iiot attacks on industrial robots. Futur. Gener. Comput. Syst. 153, 340\u2013349 (2024)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5972_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.101037","volume":"25","author":"N Mishra","year":"2024","unstructured":"Mishra, N., Islam, S.K.H., Zeadally, S.: A survey on security and cryptographic perspective of industrial-internet-of-things. Int. Things 25, 101037 (2024)","journal-title":"Int. Things"},{"issue":"15","key":"5972_CR10","first-page":"25568","volume":"11","author":"G Rathee","year":"2024","unstructured":"Rathee, G., Iqbal, R., Kerrache, C.A., Song, H.: Trustnextgen: security aspects of trustworthy next generation industrial internet of things (iiot). IEEE Int. Things J. 11(15), 25568\u201325576 (2024)","journal-title":"IEEE Int. Things J."},{"issue":"3","key":"5972_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3651991","volume":"5","author":"VSC Putrevu","year":"2024","unstructured":"Putrevu, V.S.C., Mukhopadhyay, S., Manna, S., Rani, N., Vaid, A., Chunduri, H., Putrevu, M.A., Shukla, S.: Adapt: adaptive camouflage based deception orchestration for trapping advanced persistent threats. Digital Threats: Res. Practice 5(3), 1\u201335 (2024)","journal-title":"Digital Threats: Res. Practice"},{"key":"5972_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110376","volume":"245","author":"J Zhang","year":"2024","unstructured":"Zhang, J., Zheng, J., Zhang, Z., Chen, T., Tan, Y., Zhang, Q., Li, Y.: Att&ck-based advanced persistent threat attacks risk propagation assessment model for zero trust networks. Comput. Netw. 245, 110376 (2024)","journal-title":"Comput. Netw."},{"key":"5972_CR13","first-page":"1","volume":"99","author":"S Shoukat","year":"2025","unstructured":"Shoukat, S., Gao, T., Javeed, D., Adil, M., Kumar, P.: Spatio-temporal conditioning with dynamic multi-head attention for iot intrusion detection. IEEE Int. Things J. 99, 1\u20131 (2025)","journal-title":"IEEE Int. Things J."},{"key":"5972_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121255","volume":"236","author":"C Gan","year":"2024","unstructured":"Gan, C., Lin, J., Huang, D.-W., Zhu, Q., Tian, L., Jain, D.K.: Equipment classification based differential game method for advanced persistent threats in industrial internet of things. Expert Syst. Appl. 236, 121255 (2024)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"5972_CR15","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.1007\/s11036-023-02143-5","volume":"28","author":"C-C Lin","year":"2023","unstructured":"Lin, C.-C., Tsai, C.-T., Liu, Y.-L., Chang, T.-T., Chang, Y.-S.: Security and privacy in 5g-iiot smart factories: Novel approaches, trends, and challenges. Mobile Netw. Appl. 28(3), 1043\u20131058 (2023)","journal-title":"Mobile Netw. Appl."},{"issue":"5","key":"5972_CR16","doi-asserted-by":"publisher","first-page":"1633","DOI":"10.1007\/s10796-022-10243-y","volume":"26","author":"S Berger","year":"2024","unstructured":"Berger, S., Van Dun, C., H\u00e4ckel, B.: It availability risks in smart factory networks-analyzing the effects of it threats on production processes using petri nets. Inf. Syst. Front. 26(5), 1633\u20131652 (2024)","journal-title":"Inf. Syst. Front."},{"key":"5972_CR17","volume":"41","author":"R Mustofa","year":"2024","unstructured":"Mustofa, R., Rafiquzzaman, M., Hossain, N.U.I.: Analyzing the impact of cyber-attacks on the performance of digital twin-based industrial organizations. J. Ind. Inf. Integr. 41, 100633 (2024)","journal-title":"J. Ind. Inf. Integr."},{"key":"5972_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2024.107064","volume":"184","author":"S Cai","year":"2025","unstructured":"Cai, S., Zhao, Y., Lyu, J., Wang, S., Yikai, H., Cheng, M., Zhang, G.: Ddp-dar: network intrusion detection based on denoising diffusion probabilistic model and dual-attention residual network. Neural Netw. 184, 107064 (2025)","journal-title":"Neural Netw."},{"issue":"1","key":"5972_CR19","doi-asserted-by":"publisher","first-page":"2049","DOI":"10.1109\/TCE.2024.3350231","volume":"70","author":"JA Alzubi","year":"2024","unstructured":"Alzubi, J.A., Alzubi, O.A., Qiqieh, I., Singh, A.: A blended deep learning intrusion detection framework for consumable edge-centric iomt industry. IEEE Trans. Consumer Electron. 70(1), 2049\u20132057 (2024)","journal-title":"IEEE Trans. Consumer Electron."},{"key":"5972_CR20","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.comcom.2022.12.010","volume":"199","author":"SM Kasongo","year":"2023","unstructured":"Kasongo, S.M.: A deep learning technique for intrusion detection system using a recurrent neural networks based framework. Comput. Commun. 199, 113\u2013125 (2023)","journal-title":"Comput. Commun."},{"key":"5972_CR21","doi-asserted-by":"crossref","unstructured":"Sanagana, D.P.R., Tummalachervu, C.K.: Securing cloud computing environment via optimal deep learning-based intrusion detection systems. In 2024 Second International Conference on Data Science and Information System (ICDSIS), pages 1\u20136. IEEE, (2024)","DOI":"10.1109\/ICDSIS61070.2024.10594404"},{"key":"5972_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2024.102685","volume":"62","author":"M Shahin","year":"2024","unstructured":"Shahin, M., Maghanaki, M., Hosseinzadeh, A., Chen, F.F.: Advancing network security in industrial iot: a deep dive into ai-enabled intrusion detection systems. Adv. Eng. Inf. 62, 102685 (2024)","journal-title":"Adv. Eng. Inf."},{"key":"5972_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104191","volume":"149","author":"S Shoukat","year":"2025","unstructured":"Shoukat, S., Gao, T., Javeed, D., Saeed, M.S., Adil, M.: Trust my ids: an explainable ai integrated deep learning-based transparent threat detection system for industrial networks. Comput. & Secur. 149, 104191 (2025)","journal-title":"Comput. & Secur."},{"key":"5972_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2025.110161","volume":"123","author":"H Nandanwar","year":"2025","unstructured":"Nandanwar, H., Katarya, R.: Securing industry 5.0: an explainable deep learning model for intrusion detection in cyber-physical systems. Comput. Electr. Eng. 123, 110161 (2025)","journal-title":"Comput. Electr. Eng."},{"key":"5972_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104146","volume":"148","author":"SS Bamber","year":"2025","unstructured":"Bamber, S.S., Katkuri, A.V.R., Sharma, S., Angurala, M.: A hybrid cnn-lstm approach for intelligent cyber intrusion detection system. Comput. & Secur. 148, 104146 (2025)","journal-title":"Comput. & Secur."},{"key":"5972_CR26","doi-asserted-by":"crossref","unstructured":"Nandanwar, H., Katarya, R.: Privacy-preserving data sharing in blockchain-enabled iot healthcare management system. Comput. J., bxaf065 (2025)","DOI":"10.1093\/comjnl\/bxaf065"},{"issue":"1","key":"5972_CR27","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/TCE.2024.3475823","volume":"71","author":"P Suman","year":"2024","unstructured":"Suman, P., Padhy, S., Kumar, N., Suman, A., Singh, A., Singh, K.K., Castilla, \u00c1.K., AL-Zahrani, T.S.S.: An improved deep learning-based intrusion detection for reliable communication in vanet. IEEE Trans. Consumer Electron. 71(1), 209\u2013217 (2024)","journal-title":"IEEE Trans. Consumer Electron."},{"key":"5972_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123808","volume":"249","author":"H Nandanwar","year":"2024","unstructured":"Nandanwar, H., Katarya, R.: Deep learning enabled intrusion detection system for industrial iot environment. Expert Syst. Appl. 249, 123808 (2024)","journal-title":"Expert Syst. Appl."},{"key":"5972_CR29","doi-asserted-by":"crossref","unstructured":"Khan, I.A., Pi, D., Kamal, S., Alsuhaibani, M., Alshammari, B.M.: Federated-boosting: a distributed and dynamic boosting-powered cyber-attack detection scheme for security and privacy of consumer iot. IEEE Trans. Consum. Electron. (2024)","DOI":"10.1109\/TCE.2024.3499942"},{"key":"5972_CR30","doi-asserted-by":"publisher","first-page":"28911","DOI":"10.1109\/ACCESS.2024.3368392","volume":"12","author":"K Zhang","year":"2024","unstructured":"Zhang, K., Yang, J., Shao, Y., Hu, L., Ou, W., Han, W., Zhang, Q.: Intrusion detection model for internet of vehicles using gripca and owelm. IEEE Access 12, 28911\u201328925 (2024)","journal-title":"IEEE Access"},{"issue":"6","key":"5972_CR31","doi-asserted-by":"publisher","first-page":"3228","DOI":"10.1109\/JBHI.2024.3352013","volume":"28","author":"IA Khan","year":"2024","unstructured":"Khan, I.A., Razzak, I., Pi, D., Zia, U., Kamal, S., Hussain, Y.: A novel collaborative sru network with dynamic behaviour aggregation, reduced communication overhead and explainable features. IEEE J. Biomed. Health Inform. 28(6), 3228\u20133235 (2024)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"5972_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101336","volume":"28","author":"S Hizal","year":"2024","unstructured":"Hizal, S., Cavusoglu, U., Akgun, D.: A novel deep learning-based intrusion detection system for iot ddos security. Int. Things 28, 101336 (2024)","journal-title":"Int. Things"},{"key":"5972_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121751","volume":"238","author":"B Sharma","year":"2024","unstructured":"Sharma, B., Sharma, L., Lal, C., Roy, S.: Explainable artificial intelligence for intrusion detection in iot networks: a deep learning based approach. Expert Syst. Appl. 238, 121751 (2024)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"5972_CR34","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1007\/s10207-023-00787-8","volume":"23","author":"H Nandanwar","year":"2024","unstructured":"Nandanwar, H., Katarya, R.: Tl-bilstm iot: transfer learning model for prediction of intrusion detection system in iot environment. Int. J. Inf. Secur. 23(2), 1251\u20131277 (2024)","journal-title":"Int. J. Inf. Secur."},{"key":"5972_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102002","volume":"101","author":"IA Khan","year":"2024","unstructured":"Khan, I.A., Razzak, I., Pi, D., Khan, N., Hussain, Y., Li, B., Kousar, T.: Fed-inforce-fusion: a federated reinforcement-based fusion model for security and privacy protection of iomt networks against cyber-attacks. Inf. Fusion 101, 102002 (2024)","journal-title":"Inf. Fusion"},{"key":"5972_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2024.100673","volume":"9","author":"HQ Gheni","year":"2024","unstructured":"Gheni, H.Q., Al-Yaseen, W.L.: Two-step data clustering for improved intrusion detection system using ciciot2023 dataset. e-Prime-Adv. Electr. Eng., Electron. Energy 9, 100673 (2024)","journal-title":"e-Prime-Adv. Electr. Eng., Electron. Energy"},{"key":"5972_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103381","volume":"132","author":"R Yang","year":"2023","unstructured":"Yang, R., He, H., Wang, Y., Yue, Q., Zhang, W.: Dependable federated learning for iot intrusion detection against poisoning attacks. Comput. & Secur. 132, 103381 (2023)","journal-title":"Comput. & Secur."},{"key":"5972_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100966","volume":"24","author":"PT Duy","year":"2023","unstructured":"Duy, P.T., Quyen, N.H., Khoa, N.H., Tran, T.-D., Pham, V.-H.: Fedchain-hunter: a reliable and privacy-preserving aggregation for federated threat hunting framework in sdn-based iiot. Int. Things 24, 100966 (2023)","journal-title":"Int. Things"},{"issue":"13","key":"5972_CR39","first-page":"11888","volume":"10","author":"A Thakkar","year":"2023","unstructured":"Thakkar, A., Lohiya, R.: Attack classification of imbalanced intrusion data for iot network using ensemble-learning-based deep neural network. IEEE Int. Things J. 10(13), 11888\u201311895 (2023)","journal-title":"IEEE Int. Things J."},{"key":"5972_CR40","doi-asserted-by":"crossref","unstructured":"Raju, V.S.A., Suma, B.: Network intrusion detection for iot-botnet attacks using ml algorithms. In 2023 7th International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), pages 1\u20136. IEEE, (2023)","DOI":"10.1109\/CSITSS60515.2023.10334188"},{"key":"5972_CR41","doi-asserted-by":"crossref","unstructured":"Mughaid, A., AlJamal, M., Issa, A.-A., AlJamal, M., Alquran, R., AlZu\u2019bi, S., Abutabanjeh, A.A.: Enhancing cybersecurity in scada iot systems: a novel machine learning-based approach for man-in-the-middle attack detection. In 2023 3rd Intelligent Cybersecurity Conference (ICSC), pages 74\u201379. IEEE, (2023)","DOI":"10.1109\/ICSC60084.2023.10349993"},{"key":"5972_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102930","volume":"134","author":"IA Khan","year":"2022","unstructured":"Khan, I.A., Keshk, M., Pi, D., Khan, N., Hussain, Y., Soliman, H.: Enhancing iiot networks protection: a robust security model for attack detection in internet industrial control systems. Ad Hoc Netw. 134, 102930 (2022)","journal-title":"Ad Hoc Netw."},{"key":"5972_CR43","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.patrec.2022.02.013","volume":"156","author":"E Balamurugan","year":"2022","unstructured":"Balamurugan, E., Mehbodniya, A., Kariri, E., Yadav, K., Kumar, A., Haq, M.A.: Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (idsgt-dnn). Pattern Recognit. Lett. 156, 142\u2013151 (2022)","journal-title":"Pattern Recognit. Lett."},{"issue":"1","key":"5972_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJISP.311466","volume":"16","author":"R Lalduhsaka","year":"2022","unstructured":"Lalduhsaka, R., Bora, N., Khan, A.K.: Anomaly-based intrusion detection using machine learning: an ensemble approach. Int. J. Inf. Secur. Privacy (IJISP) 16(1), 1\u201315 (2022)","journal-title":"Int. J. Inf. Secur. Privacy (IJISP)"},{"key":"5972_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2021.110145","volume":"186","author":"MM Althobaiti","year":"2021","unstructured":"Althobaiti, M.M., Kumar, K.P.M., Gupta, D., Kumar, S., Mansour, R.F.: An intelligent cognitive computing based intrusion detection for industrial cyber-physical systems. Measurement 186, 110145 (2021)","journal-title":"Measurement"},{"key":"5972_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107784","volume":"186","author":"M Ge","year":"2021","unstructured":"Ge, M., Syed, N.F., Fu, X., Baig, Z., Robles-Kelly, A.: Towards a deep learning-driven intrusion detection approach for internet of things. Comput. Netw. 186, 107784 (2021)","journal-title":"Comput. Netw."},{"key":"5972_CR47","doi-asserted-by":"crossref","unstructured":"Jeong, H., Yu, J., Lee, W.: A semi-supervised approach for network intrusion detection using generative adversarial networks. In IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pages 1\u20132. IEEE, (2021)","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484569"},{"key":"5972_CR48","doi-asserted-by":"crossref","unstructured":"Kauhsik, B., Nandanwar, H., Katarya, R.: Iot security: a deep learning-based approach for intrusion detection and prevention. In 2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques (EASCT), 1\u20137. IEEE, (2023)","DOI":"10.1109\/EASCT59475.2023.10392490"},{"key":"5972_CR49","doi-asserted-by":"crossref","unstructured":"Nandanwar, H., Katarya, R.: A systematic literature review: approach toward blockchain future research trends. In 2023 International Conference on Device Intelligence, Computing and Communication Technologies,(DICCT), 259\u2013264. IEEE, (2023)","DOI":"10.1109\/DICCT56244.2023.10110088"},{"key":"5972_CR50","unstructured":"Lundberg, S.: A unified approach to interpreting model predictions. arXiv preprint arXiv:1705.07874, (2017)"},{"issue":"2018","key":"5972_CR51","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A., et al.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1(2018), 108\u2013116 (2018)","journal-title":"ICISSp"},{"issue":"13","key":"5972_CR52","doi-asserted-by":"publisher","first-page":"5941","DOI":"10.3390\/s23135941","volume":"23","author":"ECP Neto","year":"2023","unstructured":"Neto, E.C.P., Dadkhah, S., Ferreira, R., Zohourian, A., Lu, R., Ghorbani, A.A.: Ciciot 2023: a real-time dataset and benchmark for large-scale attacks in iot environment. Sensors 23(13), 5941 (2023)","journal-title":"Sensors"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05972-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-026-05972-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05972-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T20:03:10Z","timestamp":1771531390000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-026-05972-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,19]]},"references-count":52,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["5972"],"URL":"https:\/\/doi.org\/10.1007\/s10586-026-05972-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,19]]},"assertion":[{"value":"29 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"168"}}