{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T19:04:26Z","timestamp":1773687866877,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:00:00Z","timestamp":1773619200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:00:00Z","timestamp":1773619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100031631","name":"Siirt University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100031631","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Distributed IoT systems in critical infrastructure demand intrusion detection solutions that balance detection accuracy with the computational constraints of edge deployment. This study presents a lightweight Spiking Neural Network (SNN) framework for network intrusion detection, utilizing the computational properties of spike-based processing \u2014 namely, replacement of multiply-accumulate (MAC) operations with sparse accumulate (AC) operations and input-adaptive computation through natural spike sparsity \u2014 to explore neuromorphic-compatible architectures suited to resource-constrained edge deployment. The framework is validated on the Edge-IIoTset dataset [1] through five-fold stratified cross-validation. A multi-stage feature selection pipeline reduces the input space from 97 to 35 features (63.9% reduction), including removal of seven features exhibiting strong target correlation (|r| &gt; 0.70) to promote broader feature diversity. Task-scaled architectures match network capacity to classification granularity, ranging from 9,342 parameters (36.5 KB) for binary to 51,347 parameters (200.6 KB) for fifteen-class classification. Cross-validation results show consistent performance: binary 99.18% (\u00b1\u20090.03%), six-class 96.99% (\u00b1\u20090.11%), and fifteen-class 96.79% (\u00b1\u20090.08%) accuracy. Minority class detection remains a limitation, with Fingerprinting (54.04%) and Password (59.46%) recall indicating challenges from class imbalance and feature overlap. These results suggest that compact spiking architectures can provide effective intrusion detection within the memory budgets of edge processors, establishing architectural groundwork for future neuromorphic deployment.<\/jats:p>","DOI":"10.1007\/s10586-026-06064-2","type":"journal-article","created":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T18:20:09Z","timestamp":1773685209000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Task-scaled spiking neural networks with multi-stage feature selection for resource-constrained iot intrusion detection"],"prefix":"10.1007","volume":"29","author":[{"given":"\u00d6zlem Batur","family":"Dinler","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,16]]},"reference":[{"issue":"4","key":"6064_CR1","doi-asserted-by":"publisher","first-page":"571","DOI":"10.3390\/math12040571","volume":"12","author":"D Kilichev","year":"2024","unstructured":"Kilichev, D., Turimov, D., Kim, W.: Next-Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models. Mathematics. 12(4), 571 (2024)","journal-title":"Mathematics"},{"key":"6064_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419","volume":"50","author":"MA Ferrag","year":"2020","unstructured":"Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. Journal of Information Security and Applications 50, 102419 (2020)","journal-title":"Journal of Information Security and Applications"},{"issue":"2","key":"6064_CR3","doi-asserted-by":"publisher","first-page":"75","DOI":"10.3390\/a16020075","volume":"16","author":"M ElKashlan","year":"2023","unstructured":"ElKashlan, M., Aslan, H., Said Elsayed, M., Jurcut, A.D., Azer, M.A.: Intrusion Detection for Electric Vehicle Charging Systems (EVCS). Algorithms. 16(2), 75 (2023)","journal-title":"Algorithms"},{"issue":"5","key":"6064_CR4","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.3390\/electronics12041044","volume":"12","author":"M ElKashlan","year":"2023","unstructured":"ElKashlan, M., Elsayed, M.S., Jurcut, A.D., Azer, M.: A Machine Learning-Based Intrusion Detection System for IoT Electric Vehicle Charging Stations (EVCSs). Electronics. 12(4), 1044 (2023)","journal-title":"Electronics"},{"key":"6064_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-025-02513-3","author":"H Nandanwar","year":"2025","unstructured":"Nandanwar, H., Katarya, R.: Optimized intrusion detection and secure data management in IoT networks using GAO-Xgboost and ECC-integrated blockchain framework. Knowledge and Information Systems 67, 9531\u20139586 (2025). https:\/\/doi.org\/10.1007\/s10115-025-02513-3","journal-title":"Knowledge and Information Systems"},{"key":"6064_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123808","volume":"249","author":"H Nandanwar","year":"2024","unstructured":"Nandanwar, H., Katarya, R.: Deep learning enabled intrusion detection system for an Industrial IOT environment. Expert Systems with Applications 249, 123808 (2024)","journal-title":"Expert Systems with Applications"},{"key":"6064_CR7","doi-asserted-by":"publisher","first-page":"1657","DOI":"10.1093\/comjnl\/bxaf065","volume":"68","author":"H Nandanwar","year":"2025","unstructured":"Nandanwar, H., Katarya, R.: Privacy-preserving data sharing in blockchain-enabled IoT healthcare management system. Comput. J. 68, 1657\u20131681 (2025)","journal-title":"Comput. J."},{"key":"6064_CR8","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.neunet.2018.12.002","volume":"111","author":"A Tavanaei","year":"2019","unstructured":"Tavanaei, A., Ghodrati, M., Kheradpisheh, S.R., Masquelier, T., Maida, A.: Deep learning in spiking neural networks. Neural Networks 111, 47\u201363 (2019)","journal-title":"Neural Networks"},{"issue":"1","key":"6064_CR9","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MM.2018.112130359","volume":"38","author":"M Davies","year":"2018","unstructured":"Davies, M., Srinivasa, N., Lin, T.H., Chinya, G., Cao, Y., Choday, S.H. et al.: Loihi: A neuromorphic manycore processor with on-chip learning. IEEE Micro 38(1), 82\u201399 (2018). https:\/\/doi.org\/10.1109\/MM.2018.112130359","journal-title":"IEEE Micro"},{"issue":"6197","key":"6064_CR10","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1126\/science.1254642","volume":"345","author":"PA Merolla","year":"2014","unstructured":"Merolla, P.A., Arthur, J.V., Alvarez-Icaza, R., Cassidy, A.S., Sawada, J., Akopyan, F., Modha, D.S.: A million spiking-neuron integrated circuit with a scalable communication network and interface. Science 345(6197), 668\u2013673 (2014)","journal-title":"Science"},{"key":"6064_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2025.110161","volume":"123","author":"H Nandanwar","year":"2025","unstructured":"Nandanwar, H., Katarya, R.: Securing Industry 5.0: An explainable deep learning model for intrusion detection in cyber-physical systems. Computers and Electrical Engineering 123, 110161 (2025)","journal-title":"Computers and Electrical Engineering"},{"issue":"7","key":"6064_CR12","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10586-025-05135-0","volume":"28","author":"H Nandanwar","year":"2025","unstructured":"Nandanwar, H., Katarya, R.: A hybrid Blockchain-Based framework for securing intrusion detection systems in the Internet of Things. Cluster Computing 28(7), 471 (2025)","journal-title":"Cluster Computing"},{"key":"6064_CR13","doi-asserted-by":"crossref","unstructured":"Nandanwar, H., Katarya, R.: A secure and privacy-preserving ids for iot networks using hybrid blockchain and federated learning. In: Proceedings of International Conference on Next-Generation Communication and Computing (NGCCOM 2024). Lecture Notes in Networks and Systems, vol 1305, pp. 207\u2013219. Springer, Singapore. (2025)","DOI":"10.1007\/978-981-96-3725-6_18"},{"issue":"1","key":"6064_CR14","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.compeleceng.2013.11.024","volume":"40","author":"G Chandrashekar","year":"2014","unstructured":"Chandrashekar, G., Sahin, F.: A survey on feature selection methods. Computers & Electrical Engineering 40(1), 16\u201328 (2014)","journal-title":"Computers & Electrical Engineering"},{"issue":"1","key":"6064_CR15","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s00521-013-1368-0","volume":"24","author":"JR Vergara","year":"2014","unstructured":"Vergara, J.R., Est\u00e9vez, P.A.: A review of feature selection methods based on mutual information. Neural Computing and Applications 24(1), 175\u2013186 (2014)","journal-title":"Neural Computing and Applications"},{"key":"6064_CR16","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag, M.A., Friha, O., Hamouda, D., Maglaras, L., Janicke, H.: Edge-IIoTset: A new comprehensive, realistic cybersecurity dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 10, 40281\u201340306 (2022)","journal-title":"IEEE Access"},{"issue":"1","key":"6064_CR17","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1111\/j.1600-0587.2012.07348.x","volume":"36","author":"CF Dormann","year":"2013","unstructured":"Dormann, C.F., Elith, J., Bacher, S., Buchmann, C., Carl, G., Carr\u00e9, G. et al.: A review of methods to deal with it and a simulation study evaluating their performance. Ecography 36(1), 27\u201346 (2013). https:\/\/doi.org\/10.1111\/j.1600-0587.2012.07348.x","journal-title":"Ecography"},{"issue":"2","key":"6064_CR18","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1057\/jt.2009.5","volume":"17","author":"B Ratner","year":"2009","unstructured":"Ratner, B.: The correlation coefficient: Its values range between +\u20091\/\u22121, or do they? Journal of Targeting, Measurement and Analysis for Marketing 17(2), 139\u2013142 (2009)","journal-title":"Journal of Targeting, Measurement and Analysis for Marketing"},{"issue":"8\u201310","key":"6064_CR19","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1007\/s10994-018-5724-2","volume":"107","author":"P Cerda","year":"2018","unstructured":"Cerda, P., Varoquaux, G., K\u00e9gl, B.: Similarity encoding for learning with dirty categorical variables. Machine Learning 107(8\u201310), 1477\u20131494 (2018)","journal-title":"Machine Learning"},{"issue":"6","key":"6064_CR20","doi-asserted-by":"publisher","first-page":"916","DOI":"10.3390\/electronics9060916","volume":"9","author":"J Kim","year":"2020","unstructured":"Kim, J., Kim, J., Kim, H., Shim, M., Choi, E.: CNN-Based Network Intrusion Detection against Denial-of-Service Attacks. Electronics. 9(6), 916 (2020)","journal-title":"Electronics"},{"issue":"12","key":"6064_CR21","doi-asserted-by":"publisher","first-page":"10188","DOI":"10.7717\/peerj-cs.1569","volume":"10","author":"Y Zhao","year":"2023","unstructured":"Wang, Z., Chen, H., Yang, S., Luo, X., Li, D., Wang, J.: A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization. PeerJ Computer Science 9, e1569 (2023). https:\/\/doi.org\/10.7717\/peerj-cs.1569","journal-title":"IEEE Internet of Things Journal"},{"key":"6064_CR22","doi-asserted-by":"crossref","unstructured":"Zhou, S., Li, X.: Spiking neural networks with single-spike temporal-coded neurons for network intrusion detection. In: Proceedings of the 25th International Conference on Pattern Recognition (ICPR), 8148\u20138155. IEEE. (2021)","DOI":"10.1109\/ICPR48806.2021.9412580"},{"issue":"2","key":"6064_CR23","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.11591\/ijece.v13i2.pp2278-2288","volume":"13","author":"AR Zarzoor","year":"2023","unstructured":"Zarzoor, A.R., Al-Jamali, N.A.S., Qader, D.A.A.: Intrusion detection method for internet of things based on the spiking neural network and decision tree method. International Journal of Electrical and Computer Engineering 13(2), 2278\u20132288 (2023)","journal-title":"International Journal of Electrical and Computer Engineering"},{"key":"6064_CR24","doi-asserted-by":"crossref","unstructured":"\u017divadinovi\u0107, M., Simi\u0107, D.: Resource efficient Internet-of-Things intrusion detection with spiking neural networks. In: Proceedings of the 19th Conference on Computer Science and Intelligence Systems (FedCSIS) (FedCSIS), 73\u201378. (2024)","DOI":"10.15439\/2024F8800"},{"key":"6064_CR25","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-57691-x","volume":"14","author":"Z Wang","year":"2024","unstructured":"Wang, Z., Ghaleb, F.A., Zainal, A., Siraj, M.M., Lu, X.: An efficient intrusion detection model based on convolutional spiking neural network. Scientific Reports 14, 7054 (2024)","journal-title":"Scientific Reports"},{"key":"6064_CR26","doi-asserted-by":"crossref","unstructured":"Aouedi, O., Piamrat, K.: SURFS: Sustainable intrusion detection with hierarchical federated spiking neural networks. ICC 2024 - IEEE International Conference on Communications, Denver, USA, pp. 2173\u20132178. (2024)","DOI":"10.1109\/ICC51166.2024.10622560"},{"key":"6064_CR27","first-page":"52","volume":"6","author":"MG Vishwanath","year":"2025","unstructured":"Vishwanath, M.G., Jayachandra, A.B., Chen, C.-L., Liu, L.-C.: Feature-Optimized Intrusion Detection Based on a Hybrid Spiking Neural Network for the Internet of Things. Journal of Artificial Intelligence and Technology 6, 52\u201363 (2025)","journal-title":"Journal of Artificial Intelligence and Technology"},{"key":"6064_CR28","unstructured":"Raschka, S.: Model evaluation, model selection, and algorithm selection in machine learning. arXiv preprint arXiv:1811.12808. (2018)"},{"key":"6064_CR29","doi-asserted-by":"publisher","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: The elements of statistical learning: data mining, inference, and prediction, 2nd edn. Springer Series in Statistics. Springer, New York (2009). https:\/\/doi.org\/10.1007\/978-0-387-84858-7","DOI":"10.1007\/978-0-387-84858-7"},{"key":"6064_CR30","doi-asserted-by":"crossref","unstructured":"Japkowicz, N., Shah, M.: Evaluating learning algorithms: a classification perspective. Cambridge University Press (2011)","DOI":"10.1017\/CBO9780511921803"},{"issue":"9","key":"6064_CR31","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","volume":"21","author":"H He","year":"2009","unstructured":"He, H., Garcia, E.A.: Learning from imbalanced data. IEEE Transactions on Knowledge and Data Engineering 21(9), 1263\u20131284 (2009)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"6064_CR32","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., et al.: Scikit-learn: Machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"issue":"9","key":"6064_CR33","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.1109\/JPROC.2023.3308088","volume":"111","author":"JK Eshraghian","year":"2023","unstructured":"Eshraghian, J.K., Ward, M., Neftci, E.O., Wang, X., Lenz, G., Dwivedi, G., Bennamoun, M., Jeong, D.S., Lu, W.D.: Training spiking neural networks using lessons from deep learning. Proc. IEEE. 111(9), 1016\u20131054 (2023)","journal-title":"Proc. IEEE"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-06064-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-026-06064-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-06064-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T18:20:12Z","timestamp":1773685212000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-026-06064-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,16]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["6064"],"URL":"https:\/\/doi.org\/10.1007\/s10586-026-06064-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,16]]},"assertion":[{"value":"3 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2026","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"This article does not contain any studies with human participants or animals performed by the author.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"198"}}