{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T19:45:10Z","timestamp":1771875910916,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T00:00:00Z","timestamp":1771804800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T00:00:00Z","timestamp":1771804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10586-026-05997-y","type":"journal-article","created":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T18:34:00Z","timestamp":1771871640000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Namib beetle migration optimization based hybrid model for network intrusion detection using deep stacked auto encoder"],"prefix":"10.1007","volume":"29","author":[{"given":"Subhash V.","family":"Pingale","sequence":"first","affiliation":[]},{"given":"Vikas S.","family":"Kadam","sequence":"additional","affiliation":[]},{"given":"Gopal D.","family":"Upadhye","sequence":"additional","affiliation":[]},{"given":"Sanjay R.","family":"Sutar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,23]]},"reference":[{"key":"5997_CR1","volume":"58","author":"YN Kunang","year":"2021","unstructured":"Kunang, Y.N., Nurmaini, S., Stiawan, D., Suprapto, B.Y.: Attack classification of an intrusion detection system using deep learning and hyperparameter optimization. J. Inf. Secur. Appl. 58, 102804 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"5997_CR2","doi-asserted-by":"publisher","first-page":"107044","DOI":"10.1016\/j.compeleceng.2021.107044","volume":"91","author":"S Thakur","year":"2021","unstructured":"Thakur, S., Chakraborty, A., De, R., Kumar, N., Sarkar, R.: Intrusion detection in cyber physical systems using a generic and domain specific deep autoencoder model. Comput. Electr. Eng. 91, 107044 (2021)","journal-title":"Comput. Electr. Eng."},{"key":"5997_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101752","volume":"92","author":"SM Kasongo","year":"2020","unstructured":"Kasongo, S.M., Sun, Y.: A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Comput. Secur. 92, 101752 (2020)","journal-title":"Comput. Secur."},{"key":"5997_CR4","doi-asserted-by":"publisher","first-page":"115524","DOI":"10.1016\/j.eswa.2021.115524","volume":"185","author":"Y Imrana","year":"2021","unstructured":"Imrana, Y., Xiang, Y., Ali, L., Abdul-Rauf, Z.: A bidirectional LSTM deep learning approach for intrusion detection. Expert Syst. Appl. 185, 115524 (2021)","journal-title":"Expert Syst. Appl."},{"key":"5997_CR5","doi-asserted-by":"publisher","first-page":"29575","DOI":"10.1109\/ACCESS.2020.2972627","volume":"8","author":"T Su","year":"2020","unstructured":"Su, T., Sun, H., Zhu, J., Wang, S., Li, Y.: Bat: deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access 8, 29575\u201329585 (2020)","journal-title":"IEEE Access"},{"issue":"3","key":"5997_CR6","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s10207-020-00508-5","volume":"20","author":"SN Mighan","year":"2021","unstructured":"Mighan, S.N., Kahani, M.: A novel scalable intrusion detection system based on deep learning. Int. J. Inf. Secur. 20(3), 387\u2013403 (2021)","journal-title":"Int. J. Inf. Secur."},{"key":"5997_CR7","doi-asserted-by":"publisher","first-page":"17265","DOI":"10.1007\/s00500-020-05017-0","volume":"24","author":"B Riyaz","year":"2020","unstructured":"Riyaz, B., Ganapathy, S.: A deep learning approach for effective intrusion detection in wireless networks using CNN. Soft. Comput. 24, 17265\u201317278 (2020)","journal-title":"Soft. Comput."},{"key":"5997_CR8","doi-asserted-by":"publisher","first-page":"7550","DOI":"10.1109\/ACCESS.2020.3048198","volume":"9","author":"L Liu","year":"2020","unstructured":"Liu, L., Wang, P., Lin, J., Liu, L.: Intrusion detection of imbalanced network traffic based on machine learning and deep learning. IEEE Access 9, 7550\u20137563 (2020)","journal-title":"IEEE Access"},{"key":"5997_CR9","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3029638","author":"D D\u00edaz L\u00f3pez","year":"2018","unstructured":"D\u00edaz L\u00f3pez, D., Blanco Uribe, M., Santiago Cely, C., Vega Torres, A., Moreno Guataquira, N., Moron Castro, S., Nespoli, P., G\u00f3mez M\u00e1rmol, F.: Shielding IoT against cyber-attacks: an event-based approach using SIEM. Wirel. Commun. Mob. Comput. (2018). https:\/\/doi.org\/10.1155\/2018\/3029638","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"5997_CR10","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"Zarpel\u00e3o, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84, 25\u201337 (2017)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"5997_CR11","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.eswa.2005.05.002","volume":"29","author":"O Depren","year":"2005","unstructured":"Depren, O., Topallar, M., Anarim, E., Ciliz, M.K.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Syst. Appl. 29(4), 713\u2013722 (2005)","journal-title":"Expert Syst. Appl."},{"key":"5997_CR12","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.eswa.2022.118476","volume":"210","author":"SV Pingale","year":"2022","unstructured":"Pingale, S.V., Sutar, S.R.: Remora whale optimization based deep hybrid learning for network intrusion detection using CNN features. Expert Syst. Appl. 210, 385\u2013398 (2022)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"5997_CR13","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2015","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys tutorials 18(2), 1153\u20131176 (2015)","journal-title":"IEEE Communications surveys tutorials"},{"key":"5997_CR14","doi-asserted-by":"publisher","first-page":"50850","DOI":"10.1109\/ACCESS.2018.2868993","volume":"6","author":"K Wu","year":"2018","unstructured":"Wu, K., Chen, Z., Li, W.: A novel intrusion detection model for a massive network using convolutional neural networks. IEEE Access 6, 50850\u201350859 (2018)","journal-title":"IEEE Access"},{"key":"5997_CR15","doi-asserted-by":"crossref","unstructured":"Nguyen, S.N., Nguyen, V.Q., Choi, J., Kim, K.: \u201cDesign and implementation of intrusion detection system using convolutional neural network for DoS detection\u201d, In: Proceedings of the 2nd international conference on machine learning and soft computing, 34\u201338 (2018)","DOI":"10.1145\/3184066.3184089"},{"issue":"1","key":"5997_CR16","first-page":"136","volume":"56","author":"RC Staudemeyer","year":"2015","unstructured":"Staudemeyer, R.C.: Applying long short-term memory recurrent neural networks to intrusion detection. S. Afr. Comput. J. 56(1), 136\u2013154 (2015)","journal-title":"S. Afr. Comput. J."},{"key":"5997_CR17","unstructured":"CICIDS 2018 dataset taken from, \u201chttps:\/\/www.kaggle.com\/solarmainframe\/ids-intrusion-csv\u201d, accessed on December (2021)"},{"key":"5997_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115665","volume":"185","author":"H Jia","year":"2021","unstructured":"Jia, H., Peng, X., Lang, C.: Remora optimization algorithm. Expert Syst. Appl. 185, 115665 (2021)","journal-title":"Expert Syst. Appl."},{"key":"5997_CR19","doi-asserted-by":"crossref","unstructured":"Shejul, A.A., Kinage, K.S., Reddy, B.E.: \"Facial based human age estimation using deep belief network\", In Proceedings of EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing: BDCC 2018, Springer International Publishing, 269\u2013277 (2020).","DOI":"10.1007\/978-3-030-19562-5_27"},{"issue":"14","key":"5997_CR20","doi-asserted-by":"publisher","DOI":"10.3390\/app12146875","volume":"12","author":"MA Duhayyim","year":"2022","unstructured":"Duhayyim, M.A., Alissa, K.A., Alrayes, F.S., Alotaibi, S.S., Tag El Din, E.M., Abdelmageed, A.A., Yaseen, I., Motwakel, A.: Evolutionary-based deep stacked autoencoder for intrusion detection in a cloud-based cyber-physical system. Appl. Sci. 12(14), 6875 (2022)","journal-title":"Appl. Sci."},{"issue":"1","key":"5997_CR21","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6524","volume":"34","author":"M Chahardoli","year":"2022","unstructured":"Chahardoli, M., Eraghi, N.O., Nazari, S.: Namib beetle optimization algorithm: a new meta\u2010heuristic method for feature selection and dimension reduction. Concurrency Computat. Pract. Exper. 34(1), e6524 (2022)","journal-title":"Concurrency Computat. Pract. Exper."},{"key":"5997_CR22","first-page":"1","volume":"2021","author":"X Liu","year":"2021","unstructured":"Liu, X., Li, T., Zhang, R., Wu, D., Liu, Y., Yang, Z.: A GAN and feature selection-based oversampling technique for intrusion detection. Secur. Commun. Networks 2021, 1\u201315 (2021)","journal-title":"Secur. Commun. Networks"},{"key":"5997_CR23","doi-asserted-by":"crossref","unstructured":"Farahnakian, F., Heikkonen, J.: \u201cA deep auto-encoder based approach for intrusion detection system\u201d, In proceedings of 2018 20th International Conference on Advanced Communication Technology (ICACT), 178\u2013183, (2018)","DOI":"10.23919\/ICACT.2018.8323688"},{"issue":"1","key":"5997_CR24","first-page":"5191758","volume":"20","author":"H Wu","year":"2022","unstructured":"Wu, H., Zhang, X., Song, L., Zhang, Y., Gu, L., Zhao, X.: Wild Geese Migration Optimization Algorithm: A New Meta-Heuristic Algorithm for Solving Inverse Kinematics of Robot. Comp. Intel. Neurosci 20(1), 5191758 (2022)","journal-title":"Comp. Intel. Neurosci"},{"key":"5997_CR25","doi-asserted-by":"crossref","unstructured":"Fei, N., Gao, Y., Lu, Z., Xiang, T.: \"Z-score normalization, hubness, and few-shot learning\", In Proceedings of the IEEE\/CVF International Conference on Computer Vision, 142\u2013151 (2021)","DOI":"10.1109\/ICCV48922.2021.00021"},{"key":"5997_CR26","unstructured":"UNSW-NB15 dataset taken from, \u201dhttps:\/\/research.unsw.edu.au\/projects\/unsw-nb15-dataset\u201d, accessed on January (2022)"},{"issue":"1","key":"5997_CR27","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1186\/s13677-023-00574-9","volume":"13","author":"Z Long","year":"2024","unstructured":"Long, Z., Yan, H., Shen, G., Zhang, X., He, H., Cheng, L.: A Transformer-based network intrusion detection approach for cloud security. J. Cloud. Comput. Adv. Syst. Appl 13(1), 5 (2024)","journal-title":"J. Cloud. Comput. Adv. Syst. Appl"},{"key":"5997_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108831","author":"SV Pingale","year":"2023","unstructured":"Pingale, S.V., Sutar, S.R.: Remora based deep maxout network model for network intrusion detection using convolutional neural network features. Comput. Electr. Eng. (2023). https:\/\/doi.org\/10.1016\/j.compeleceng.2023.108831","journal-title":"Comput. Electr. Eng."},{"key":"5997_CR29","doi-asserted-by":"crossref","unstructured":"Hariharan, S., Annie Jerusha, Y., Suganeshwari, G., Syed Ibrahim, S. P., Tupakula, Uday, Varadharajan, Vijay : \u201c Hybrid Deep Learning Model for Network Intrusion Detection System Using Seq2Seq,and ConvLSTM-Subnets\u201d , Volume 13, IEEE Explore, (2025)","DOI":"10.1109\/ACCESS.2025.3541399"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05997-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-026-05997-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05997-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T18:34:03Z","timestamp":1771871643000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-026-05997-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,23]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["5997"],"URL":"https:\/\/doi.org\/10.1007\/s10586-026-05997-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,23]]},"assertion":[{"value":"30 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics declaration"}}],"article-number":"186"}}