{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T06:40:21Z","timestamp":1728888021600},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s10836-024-06129-3","type":"journal-article","created":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T20:01:38Z","timestamp":1722369698000},"page":"469-485","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Smartcard Protection and SSELUR-GRU-Based Attack Stage Identification in Industrial IoT"],"prefix":"10.1007","volume":"40","author":[{"given":"S. K.","family":"Mouleeswaran","sequence":"first","affiliation":[]},{"given":"K.","family":"Ramesh","sequence":"additional","affiliation":[]},{"given":"K.","family":"Manikandan","sequence":"additional","affiliation":[]},{"given":"VivekYoganand","family":"Anbalagan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"issue":"2","key":"6129_CR1","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1109\/TII.2021.3126728","volume":"19","author":"P Ruzafa-Alcazar","year":"2023","unstructured":"Ruzafa-Alcazar P, Fernandez-Saura P, Marmol-Campos E, Gonzalez-Vidal A, Hernandez-Ramos JL, Bernal-Bernabe J, Skarmeta AF (2023) Intrusion Detection Based on Privacy-Preserving Federated Learning for the Industrial IoT. IEEE Trans Industr Inf 19(2):1145\u20131154. https:\/\/doi.org\/10.1109\/TII.2021.3126728","journal-title":"IEEE Trans Industr Inf"},{"issue":"1","key":"6129_CR2","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1109\/TII.2022.3156642","volume":"19","author":"O Aouedi","year":"2023","unstructured":"Aouedi O, Piamrat K, Muller G, Singh K (2023) Federated Semisupervised Learning for Attack Detection in Industrial Internet of Things. IEEE Trans Industr Inf 19(1):286\u2013295. https:\/\/doi.org\/10.1109\/TII.2022.3156642","journal-title":"IEEE Trans Industr Inf"},{"key":"6129_CR3","doi-asserted-by":"publisher","first-page":"101322","DOI":"10.1016\/j.jestch.2022.101322","volume":"38","author":"HC Altuna","year":"2023","unstructured":"Altuna HC, Albayrak Z (2023) Eng Sci Technol Int J 38:101322. https:\/\/doi.org\/10.1016\/j.jestch.2022.101322","journal-title":"Eng Sci Technol Int J"},{"issue":"11","key":"6129_CR4","doi-asserted-by":"publisher","first-page":"7704","DOI":"10.1109\/TII.2020.3025755","volume":"17","author":"M Abdel-Basset","year":"2021","unstructured":"Abdel-Basset M, Chang V, Hawash H, Chakrabortty RK, Ryan M (2021) Deep-IFS: Intrusion detection approach for industrial internet of things traffic in fog environment. IEEE Trans Industr Inf 17(11):7704\u20137715. https:\/\/doi.org\/10.1109\/TII.2020.3025755","journal-title":"IEEE Trans Industr Inf"},{"issue":"4","key":"6129_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s21041528","volume":"21","author":"I Essop","year":"2021","unstructured":"Essop I, Ribeiro JC, Papaioannou M, Rodriguez J, Zachos G, Mantas G (2021) Generating datasets for anomaly-based intrusion detection systems in iot and industrial iot networks. Sensors 21(4):1\u201331. https:\/\/doi.org\/10.3390\/s21041528","journal-title":"Sensors"},{"key":"6129_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/9023719","volume":"2022","author":"S Tharewal","year":"2022","unstructured":"Tharewal S, Ashfaque MW, Banu SS, Uma P, Hassen SM, Shabaz M (2022) Intrusion detection system for industrial internet of things based on deep reinforcement learning. Wirel Commun Mob Comput 2022:1\u20138. https:\/\/doi.org\/10.1155\/2022\/9023719","journal-title":"Wirel Commun Mob Comput"},{"key":"6129_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/UCET51115.2020.9205361","volume":"2020","author":"S Latif","year":"2020","unstructured":"Latif S, Idrees Z, Zou Z, Ahmad J (2020) Drann: A deep random neural network model for intrusion detection in industrial iot. International Conference on UK-China Emerging Technologies UCET 2020:1\u20134. https:\/\/doi.org\/10.1109\/UCET51115.2020.9205361","journal-title":"International Conference on UK-China Emerging Technologies UCET"},{"issue":"8","key":"6129_CR8","doi-asserted-by":"publisher","first-page":"5087","DOI":"10.1109\/TII.2021.3116085","volume":"18","author":"W Liang","year":"2022","unstructured":"Liang W, Hu Y, Zhou X, Pan Y, Wang KIK (2022) variational few-shot learning for microservice-oriented intrusion detection in distributed industrial IoT. IEEE Trans Industr Inf 18(8):5087\u20135095. https:\/\/doi.org\/10.1109\/TII.2021.3116085","journal-title":"IEEE Trans Industr Inf"},{"key":"6129_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ymssp.2019.106436","volume":"136","author":"J Arshad","year":"2020","unstructured":"Arshad J, Azad MA, Abdeltaif MM, Salah K (2020) An intrusion detection framework for energy constrained IoT devices. Mech Syst Signal Process 136:1\u201312. https:\/\/doi.org\/10.1016\/j.ymssp.2019.106436","journal-title":"Mech Syst Signal Process"},{"issue":"6","key":"6129_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/sym13061011","volume":"13","author":"A Adnan","year":"2021","unstructured":"Adnan A, Muhammed A, Ghani AAA, Abdullah A, Hakim F (2021) An intrusion detection system for the internet of things based on machine learning: Review and challenges. Symmetry 13(6):1\u201313. https:\/\/doi.org\/10.3390\/sym13061011","journal-title":"Symmetry"},{"key":"6129_CR11","doi-asserted-by":"publisher","first-page":"113199","DOI":"10.1109\/ACCESS.2021.3104113","volume":"9","author":"SM Kasongo","year":"2021","unstructured":"Kasongo SM (2021) An advanced intrusion detection system for IIoT Based on GA and tree based algorithms. IEEE Access 9:113199\u2013113212. https:\/\/doi.org\/10.1109\/ACCESS.2021.3104113","journal-title":"IEEE Access"},{"issue":"1","key":"6129_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00077-7","volume":"4","author":"A Khraisat","year":"2021","unstructured":"Khraisat A, Alazab A (2021) A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity 4(1):1\u201327. https:\/\/doi.org\/10.1186\/s42400-021-00077-7","journal-title":"Cybersecurity"},{"key":"6129_CR13","doi-asserted-by":"publisher","first-page":"38254","DOI":"10.1109\/ACCESS.2021.3063671","volume":"9","author":"J Liu","year":"2021","unstructured":"Liu J, Yang D, Lian M, Li M (2021) Research on intrusion detection based on particle swarm optimization in IoT. IEEE Access 9:38254\u201338268. https:\/\/doi.org\/10.1109\/ACCESS.2021.3063671","journal-title":"IEEE Access"},{"issue":"14","key":"6129_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/su14148707","volume":"14","author":"TTH Le","year":"2022","unstructured":"Le TTH, Oktian YE, Kim H (2022) XGBoost for imbalanced multiclass classification-based industrial internet of things intrusion detection systems. Sustainability (Switzerland) 14(14):1\u201321. https:\/\/doi.org\/10.3390\/su14148707","journal-title":"Sustainability (Switzerland)"},{"issue":"1","key":"6129_CR15","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/s10586-021-03426-w","volume":"25","author":"W Wang","year":"2022","unstructured":"Wang W, Harrou F, Bouyeddou B, Senouci SM, Sun Y (2022) A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems. Clust Comput 25(1):561\u2013578. https:\/\/doi.org\/10.1007\/s10586-021-03426-w","journal-title":"Clust Comput"},{"issue":"3","key":"6129_CR16","doi-asserted-by":"publisher","first-page":"2063","DOI":"10.1109\/TII.2019.2946791","volume":"16","author":"W Liang","year":"2020","unstructured":"Liang W, Li KC, Long J, Kui X, Zomaya AY (2020) An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans Industr Inf 16(3):2063\u20132071. https:\/\/doi.org\/10.1109\/TII.2019.2946791","journal-title":"IEEE Trans Industr Inf"},{"issue":"1","key":"6129_CR17","doi-asserted-by":"publisher","first-page":"209","DOI":"10.12785\/ijcds\/110117","volume":"11","author":"I Idrissi","year":"2022","unstructured":"Idrissi I, Azizi M, Moussaoui O (2022) A lightweight optimized deep learning-based host-intrusion detection system deployed on the edge for IoT. Int J Comput Digit Syst 11(1):209\u2013216. https:\/\/doi.org\/10.12785\/ijcds\/110117","journal-title":"Int J Comput Digit Syst"},{"issue":"21","key":"6129_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics10212662","volume":"10","author":"H Vargas","year":"2021","unstructured":"Vargas H, Lozano-GarzonC MGA, Donoso Y (2021) Detection of security attacks in industrial iot networks: A blockchain and machine learning approach. Electronics (Switzerland) 10(21):1\u201318. https:\/\/doi.org\/10.3390\/electronics10212662","journal-title":"Electronics (Switzerland)"},{"issue":"1","key":"6129_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s22010140","volume":"22","author":"A Fatani","year":"2021","unstructured":"Fatani A, Dahou A, Al-Qaness MA, Lu S, Elaziz MA (2021) Advanced feature extraction and selection approach using deep learning and Aquila optimizer for IoT intrusion detection system. Sensors 22(1):1\u201320. https:\/\/doi.org\/10.3390\/s22010140","journal-title":"Sensors"},{"issue":"4","key":"6129_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/ett.4228","volume":"32","author":"G Altan","year":"2021","unstructured":"Altan G (2021) SecureDeepNet-IoT: A deep learning application for invasion detection in industrial Internet of Things sensing systems. Trans Emerg Telecommun Technol 32(4):1\u201313. https:\/\/doi.org\/10.1002\/ett.4228","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"1","key":"6129_CR21","first-page":"711","volume":"16","author":"AM Aleesa","year":"2021","unstructured":"Aleesa AM, Younis M, Mohammed AA, Sahar NM (2021) Deep-intrusion detection system with enhanced UNSW-NB15 dataset based on deep learning techniques. J Eng Sci Technol 16(1):711\u2013727","journal-title":"J Eng Sci Technol"},{"key":"6129_CR22","doi-asserted-by":"publisher","unstructured":"Patel P, Gunja H, Ebrahim D (2022) Smart network intrusion detection system for cyber security of industrial IoT. TechRxiv. Preprin 1\u201316. https:\/\/doi.org\/10.36227\/techrxiv.21431889.v1","DOI":"10.36227\/techrxiv.21431889.v1"},{"issue":"1","key":"6129_CR23","doi-asserted-by":"publisher","first-page":"23","DOI":"10.52866\/ijcsm.2019.01.01.004","volume":"1","author":"SN Abd","year":"2020","unstructured":"Abd SN, Alsajri M, Ibraheem HR (2020) Rao-SVM machine learning algorithm for intrusion detection system. Iraqi J Comput Sci Math 1(1):23\u201327. https:\/\/doi.org\/10.52866\/ijcsm.2019.01.01.004","journal-title":"Iraqi J Comput Sci Math"},{"key":"6129_CR24","doi-asserted-by":"publisher","first-page":"103609","DOI":"10.1016\/j.compind.2022.103609","volume":"137","author":"B Liu","year":"2022","unstructured":"Liu B, Chen J, Yong Hu (2022) Mode division-based anomaly detection against integrity and availability attacks in industrial cyber-physical systems. Comput Ind 137:103609","journal-title":"Comput Ind"},{"key":"6129_CR25","doi-asserted-by":"publisher","unstructured":"Awotunde JB, Chakraborty C, Adeniyi AE (2021) Intrusion detection in industrial internet of things network-based on deep learning model with rule-based feature selection. Wirel Commun Mob Com 1\u201317. https:\/\/doi.org\/10.1155\/2021\/7154587","DOI":"10.1155\/2021\/7154587"},{"issue":"August","key":"6129_CR26","doi-asserted-by":"publisher","first-page":"102831","DOI":"10.1109\/ACCESS.2022.3208573","volume":"10","author":"H Lundberg","year":"2022","unstructured":"Lundberg H, Mowla NI, Abedin SF, Thar K, Mahmood A, Gidlund M, Raza S (2022) Experimental Analysis of Trustworthy In-Vehicle Intrusion Detection System Using eXplainable Artificial Intelligence (XAI). IEEE Access 10(August):102831\u2013102841. https:\/\/doi.org\/10.1109\/ACCESS.2022.3208573","journal-title":"IEEE Access"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06129-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-024-06129-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06129-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T06:06:56Z","timestamp":1728886016000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-024-06129-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["6129"],"URL":"https:\/\/doi.org\/10.1007\/s10836-024-06129-3","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"type":"print","value":"0923-8174"},{"type":"electronic","value":"1573-0727"}],"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent of Publication"}},{"value":"The authors declare that they have no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}