{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:28:12Z","timestamp":1772119692259,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"The National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62077024"],"award-info":[{"award-number":["62077024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10922-025-09947-8","type":"journal-article","created":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T11:07:29Z","timestamp":1751886449000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Network Security Anomaly Node Detection Based on Graph Neural Network and Attention Mechanism"],"prefix":"10.1007","volume":"33","author":[{"given":"Deng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Juan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hanjun","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Zhou Wei","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,7]]},"reference":[{"key":"9947_CR1","doi-asserted-by":"publisher","unstructured":"Pastor-P\u00e9rez, J., Riera-Palou, F., Femenias, G.: Multi-objective optimization of comp-based mimo-ofdma networks with frequency reuse. In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 195\u2013202, (2015). Accessed https:\/\/doi.org\/10.1109\/WiMOB.2015.7347961","DOI":"10.1109\/WiMOB.2015.7347961"},{"key":"9947_CR2","doi-asserted-by":"publisher","unstructured":"Rahman, S., Dey, S.K., Bhawmick, B.K., Das, N.K.: Design and implementation of real time transformer health monitoring system using gsm technology. In: 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE), pp. 258\u2013261, (2017). Accessed https:\/\/doi.org\/10.1109\/ECACE.2017.7912915","DOI":"10.1109\/ECACE.2017.7912915"},{"key":"9947_CR3","doi-asserted-by":"publisher","unstructured":"P\u00f6ttner, W.-B., B\u00fcsching, F., von Zengen, G., Wolf, L.: Data elevators: applying the bundle protocol in delay tolerant wireless sensor networks. In: 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012), pp. 218\u2013226, (2012). Accessed https:\/\/doi.org\/10.1109\/MASS.2012.6502520","DOI":"10.1109\/MASS.2012.6502520"},{"key":"9947_CR4","doi-asserted-by":"publisher","unstructured":"Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P.-L., Iorkyase, E., Tachtatzis, C., Atkinson, R.: Threat analysis of iot networks using artificial neural network intrusion detection system. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1\u20136, (2016). Accessed https:\/\/doi.org\/10.1109\/ISNCC.2016.7746067","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"9947_CR5","doi-asserted-by":"publisher","unstructured":"Karimi, M., Sadough, S.M.S., Torabi, M.: On the reduction of background radiation for differential signaling fso systems. In: 2019 2nd West Asian Colloquium on Optical Wireless Communications (WACOWC), pp. 31\u201335, (2019). Accessed https:\/\/doi.org\/10.1109\/WACOWC.2019.8770190","DOI":"10.1109\/WACOWC.2019.8770190"},{"issue":"1","key":"9947_CR6","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TCOMM.2018.2869791","volume":"67","author":"M Aliasgari","year":"2019","unstructured":"Aliasgari, M., Kliewer, J., Simeone, O.: Coded computation against processing delays for virtualized cloud-based channel decoding. IEEE Trans. Commun. 67(1), 28\u201338 (2019). https:\/\/doi.org\/10.1109\/TCOMM.2018.2869791","journal-title":"IEEE Trans. Commun."},{"key":"9947_CR7","doi-asserted-by":"publisher","first-page":"102008","DOI":"10.1016\/j.cose.2020.102008","volume":"99","author":"A Rami Mustafa","year":"2020","unstructured":"Rami Mustafa, A., Mohammad, M.K., Alsmadi, I.A., Alzaqebah, M.: An improved rule induction based denial of service attacks classification model. Comput. Secur. 99, 102008 (2020)","journal-title":"Comput. Secur."},{"issue":"1","key":"9947_CR8","first-page":"37","volume":"50","author":"P Panagiotou","year":"2021","unstructured":"Panagiotou, P., Mengidis, N., Tsikrika, T., Vrochidis, S., Kompatsiaris, I.: Host-based intrusion detection using signature-based and AI-driven anomaly detection methods. Inf. Secur. Int. J. 50(1), 37\u201348 (2021)","journal-title":"Inf. Secur. Int. J."},{"key":"9947_CR9","doi-asserted-by":"crossref","unstructured":"Loganathan, G., Samarabandu, J., Wang, X.: Sequence to sequence pattern learning algorithm for real-time anomaly detection in network traffic. In: 2018 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1\u20134. IEEE, (2018)","DOI":"10.1109\/CCECE.2018.8447597"},{"issue":"3","key":"9947_CR10","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1109\/TSG.2013.2258948","volume":"4","author":"R Mitchell","year":"2013","unstructured":"Mitchell, R., Chen, R.: Behavior-rule based intrusion detection systems for safety critical smart grid applications. IEEE Trans. Smart Grid 4(3), 1254\u20131263 (2013)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"1\u20132","key":"9947_CR11","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur. 28(1\u20132), 18\u201328 (2009)","journal-title":"Comput. Secur."},{"key":"9947_CR12","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954\u201321961 (2017)","journal-title":"IEEE Access"},{"key":"9947_CR13","doi-asserted-by":"crossref","unstructured":"Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp. 21\u201326, (2016)","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"9947_CR14","doi-asserted-by":"publisher","first-page":"102961","DOI":"10.1016\/j.cose.2022.102961","volume":"125","author":"Y Kumar","year":"2023","unstructured":"Kumar, Y., Subba, B.: Stacking ensemble-based hids framework for detecting anomalous system processes in windows based operating systems using multiple word embedding. Comput. Secur. 125, 102961 (2023)","journal-title":"Comput. Secur."},{"key":"9947_CR15","doi-asserted-by":"crossref","unstructured":"Hsieh, R.-J., Chou, J., Ho, C.-H.: Unsupervised online anomaly detection on multivariate sensing time series data for smart manufacturing. In: 2019 IEEE 12th Conference on Service-Oriented Computing and Applications (SOCA), pp. 90\u201397. IEEE, (2019)","DOI":"10.1109\/SOCA.2019.00021"},{"issue":"23","key":"9947_CR16","doi-asserted-by":"publisher","first-page":"6269","DOI":"10.3390\/en13236269","volume":"13","author":"I Alotaibi","year":"2020","unstructured":"Alotaibi, I., Abido, M.A., Khalid, M., Savkin, A.V.: A comprehensive review of recent advances in smart grids: A sustainable future with renewable energy resources. Energies 13(23), 6269 (2020)","journal-title":"Energies"},{"issue":"1","key":"9947_CR17","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1109\/COMST.2022.3233793","volume":"25","author":"K He","year":"2023","unstructured":"He, K., Kim, D.D., Asghar, M.R.: Adversarial machine learning for network intrusion detection systems: A comprehensive survey. IEEE Commun. Surv. Tutor. 25(1), 538\u2013566 (2023)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9947_CR18","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. Accessed arXiv:1609.02907, (2016)"},{"key":"9947_CR19","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., Bengio, Y.: Graph attention networks. Accessed arXiv:1710.10903, (2017)"},{"issue":"3","key":"9947_CR20","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s10922-021-09589-6","volume":"29","author":"Y Otoum","year":"2021","unstructured":"Otoum, Y., Nayak, A.: As-ids: Anomaly and signature based ids for the internet of things. J. Netw. Syst. Manage. 29(3), 23 (2021)","journal-title":"J. Netw. Syst. Manage."},{"key":"9947_CR21","doi-asserted-by":"crossref","unstructured":"Byrnes, J., Hoang, T., Mehta, N.N., Cheng, Y.: A modern implementation of system call sequence based host-based intrusion detection systems. In: 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), pp. 218\u2013225. IEEE, (2020)","DOI":"10.1109\/TPS-ISA50397.2020.00037"},{"key":"9947_CR22","doi-asserted-by":"publisher","first-page":"57542","DOI":"10.1109\/ACCESS.2021.3071263","volume":"9","author":"Q Liu","year":"2021","unstructured":"Liu, Q., Hagenmeyer, V., Keller, H.B.: A review of rule learning-based intrusion detection systems and their prospects in smart grids. IEEE Access 9, 57542\u201357564 (2021)","journal-title":"IEEE Access"},{"issue":"19","key":"9947_CR23","doi-asserted-by":"publisher","first-page":"8333","DOI":"10.3390\/s23198333","volume":"23","author":"A Sharma","year":"2023","unstructured":"Sharma, A., Rani, S., Sah, D.K., Khan, Z., Boulila, W.: Homlc-hyperparameter optimization for multi-label classification of intrusion detection data for internet of things network. Sensors 23(19), 8333 (2023)","journal-title":"Sensors"},{"issue":"6","key":"9947_CR24","doi-asserted-by":"publisher","first-page":"867","DOI":"10.3390\/electronics11060867","volume":"11","author":"H-Y Kwon","year":"2022","unstructured":"Kwon, H.-Y., Kim, T., Lee, M.-K.: Advanced intrusion detection combining signature-based and behavior-based detection methods. Electronics 11(6), 867 (2022)","journal-title":"Electronics"},{"key":"9947_CR25","doi-asserted-by":"crossref","unstructured":"Uddin, M., Rahman, A.A.: Dynamic multi layer signature based intrusion detection system using mobile agents. Accessed arXiv:1010.5036, (2010)","DOI":"10.5121\/ijnsa.2010.2411"},{"issue":"3","key":"9947_CR26","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1145\/322510.322526","volume":"2","author":"T Lane","year":"1999","unstructured":"Lane, T., Brodley, C.E.: Temporal sequence learning and data reduction for anomaly detection. ACM Trans. Inf. Syst. Secur. 2(3), 295\u2013331 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"9947_CR27","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.-H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE, (2008)","DOI":"10.1109\/ICDM.2008.17"},{"issue":"15","key":"9947_CR28","first-page":"2021","volume":"10","author":"J Toldinas","year":"1854","unstructured":"Toldinas, J., Ven\u010dkauskas, A., Dama\u0161evi\u010dius, R., Grigali\u016bnas, \u0160, Morkevi\u010dius, N., Baranauskas, E.: A novel approach for network intrusion detection using multistage deep learning image recognition. Electronics 10(15), 2021 (1854)","journal-title":"Electronics"},{"key":"9947_CR29","first-page":"89","volume":"2015","author":"P Malhotra","year":"2015","unstructured":"Malhotra, P., Vig, L., Shroff, G., Agarwal, P., et al.: Long short term memory networks for anomaly detection in time series. ESANN 2015, 89 (2015)","journal-title":"ESANN"},{"key":"9947_CR30","unstructured":"Malhotra, P., Ramakrishnan, A., Anand, G., Vig, L., Agarwal, P., Shroff, G.: LSTM-based encoder-decoder for multi-sensor anomaly detection. Accessed arXiv:1607.00148, (2016)"},{"key":"9947_CR31","unstructured":"Lee, T.J., Gottschlich, J., Tatbul, N., Metcalf, E., Zdonik, S.: Greenhouse: A zero-positive machine learning system for time-series anomaly detection. Accessed arXiv:1801.03168, (2018)"},{"key":"9947_CR32","doi-asserted-by":"crossref","unstructured":"Vikram, A., et al.: Anomaly detection in network traffic using unsupervised machine learning approach. In: 2020 5th International Conference on Communication and Electronics Systems (ICCES), pp. 476\u2013479. IEEE, (2020)","DOI":"10.1109\/ICCES48766.2020.9137987"},{"issue":"13","key":"9947_CR33","doi-asserted-by":"publisher","first-page":"6442","DOI":"10.3390\/app12136442","volume":"12","author":"SR Ankita","year":"2022","unstructured":"Ankita, S.R., Singh, A., Elkamchouchi, D.H., Noya, I.D.: Lightweight hybrid deep learning architecture and model for security in iiot. Appl. Sci. 12(13), 6442 (2022)","journal-title":"Appl. Sci."},{"key":"9947_CR34","doi-asserted-by":"publisher","first-page":"3825","DOI":"10.1109\/ACCESS.2023.3349248","volume":"12","author":"HM Saleh","year":"2024","unstructured":"Saleh, H.M., Marouane, H., Fakhfakh, A.: Stochastic gradient descent intrusions detection for wireless sensor network attack detection system using machine learning. IEEE Access 12, 3825\u20133836 (2024)","journal-title":"IEEE Access"},{"issue":"1","key":"9947_CR35","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1186\/s13677-024-00600-4","volume":"13","author":"M Asif","year":"2024","unstructured":"Asif, M., Al-Razgan, M., Ali, Y.A., Yunrong, L.: Graph convolution networks for social media trolls detection use deep feature extraction. J. Cloud Comput. 13(1), 33 (2024)","journal-title":"J. Cloud Comput."},{"key":"9947_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10489-024-05312-5","volume":"54","author":"Q Zhao","year":"2024","unstructured":"Zhao, Q., Zhang, Y., Feng, X.: Joint learning of structural and textual information on propagation network by graph attention networks for rumor detection. Appl. Intell. 54, 1\u201316 (2024)","journal-title":"Appl. Intell."},{"issue":"1","key":"9947_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42484-024-00143-6","volume":"6","author":"N Innan","year":"2024","unstructured":"Innan, N., Sawaika, A., Dhor, A., Dutta, S., Thota, S., Gokal, H., Patel, N., Khan, M.A.-Z., Theodonis, I., Bennai, M.: Financial fraud detection using quantum graph neural networks. Quantum Mach. Intell. 6(1), 1\u201318 (2024)","journal-title":"Quantum Mach. Intell."},{"issue":"1","key":"9947_CR38","doi-asserted-by":"publisher","first-page":"cnae001","DOI":"10.1093\/comnet\/cnae001","volume":"12","author":"H Zheng","year":"2024","unstructured":"Zheng, H., Zhao, H., Ahmadi, G.: Towards improving community detection in complex networks using influential nodes. J. Complex Netw. 12(1), cnae001 (2024)","journal-title":"J. Complex Netw."},{"key":"9947_CR39","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.future.2023.09.028","volume":"151","author":"H Guo","year":"2024","unstructured":"Guo, H., Zhou, Z., Zhao, D., Gaaloul, W.: EGNN: energy-efficient anomaly detection for IoT multivariate time series data using graph neural network. Future Gener. Comput. Syst. 151, 45\u201356 (2024)","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"9947_CR40","doi-asserted-by":"publisher","first-page":"7671","DOI":"10.1038\/s41598-024-57990-3","volume":"14","author":"H Zhang","year":"2024","unstructured":"Zhang, H., Li, S., Miao, Q., Fang, R., Xue, S., Qianchuan, H., Jie, H., Chan, S.: Surface defect detection of hot rolled steel based on multi-scale feature fusion and attention mechanism residual block. Sci. Rep. 14(1), 7671 (2024)","journal-title":"Sci. Rep."},{"key":"9947_CR41","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4792053","author":"E Amer","year":"2024","unstructured":"Amer, E.: Malicious behavioural detection in scada networks based on analyzing modbus\/tcp functions sequences. SSRN (2024). https:\/\/doi.org\/10.2139\/ssrn.4792053","journal-title":"SSRN"},{"key":"9947_CR42","first-page":"384","volume-title":"Science and Information Conference","author":"S Banik","year":"2024","unstructured":"Banik, S., Manicavasagam, R., Banik, T., Banik, S.: Simulation and analysis of cyber-attack on modbus protocol for smart grids in virtual environment. In: Science and Information Conference, pp. 384\u2013401. Springer, Cham (2024)"},{"key":"9947_CR43","doi-asserted-by":"publisher","first-page":"3903","DOI":"10.1109\/TFUZZ.2024.3385111","volume":"32","author":"S Fan","year":"2024","unstructured":"Fan, S., Yue, D., Yan, H., Xie, X., Deng, C.: Resilient cooperative optimization control for fuzzy nonlinear mass under dos attacks. IEEE Trans. Fuzzy Syst. 32, 3903 (2024)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"9947_CR44","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A., et al.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"key":"9947_CR45","doi-asserted-by":"crossref","unstructured":"Engelen, G., Rimmer, V., Joosen, W.: Troubleshooting an intrusion detection dataset: the cicids2017 case study. In: 2021 IEEE Security and Privacy Workshops (SPW), pp. 7\u201312. IEEE, (2021)","DOI":"10.1109\/SPW53761.2021.00009"},{"issue":"76","key":"9947_CR46","first-page":"445","volume":"8","author":"R Sanjeetha","year":"2021","unstructured":"Sanjeetha, R., Raj, A., Saivenu, K., Ahmed, M.I., Sathvik, B., Kanavalli, A.: Detection and mitigation of botnet based DDoS attacks using catboost machine learning algorithm in SDN environment. Int. J. Adv. Technol. Eng. Explor. 8(76), 445 (2021)","journal-title":"Int. J. Adv. Technol. Eng. Explor."},{"key":"9947_CR47","doi-asserted-by":"crossref","unstructured":"Mei, L.: Internet abnormal traffic detection based on woa-bilstm-attention. In: 2024 IEEE 2nd International Conference on Control, Electronics and Computer Technology (ICCECT), pp. 799\u2013804. IEEE, (2024)","DOI":"10.1109\/ICCECT60629.2024.10545754"},{"issue":"1","key":"9947_CR48","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s12083-023-01595-6","volume":"17","author":"F Li","year":"2024","unstructured":"Li, F., Shen, H., Mai, J., Wang, T., Dai, Y., Miao, X.: Pre-trained language model-enhanced conditional generative adversarial networks for intrusion detection. Peer-to-Peer Netw. Appl. 17(1), 227\u2013245 (2024)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"9947_CR49","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.jpdc.2022.10.002","volume":"172","author":"P Kumar","year":"2023","unstructured":"Kumar, P., Kumar, R., Gupta, G.P., Tripathi, R., Jolfaei, A., Najmul Islam, A.: A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare system. J. Parallel Distrib. Comput. 172, 69\u201383 (2023)","journal-title":"J. Parallel Distrib. Comput."},{"key":"9947_CR50","doi-asserted-by":"publisher","first-page":"103210","DOI":"10.1016\/j.cose.2023.103210","volume":"129","author":"M Catillo","year":"2023","unstructured":"Catillo, M., Pecchia, A., Villano, U.: Cps-guard: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders. Comput. Secur. 129, 103210 (2023)","journal-title":"Comput. Secur."},{"key":"9947_CR51","doi-asserted-by":"publisher","first-page":"5895","DOI":"10.1109\/TIFS.2024.3402439","volume":"19","author":"Y Zhong","year":"2024","unstructured":"Zhong, Y., Wang, Z., Shi, X., Yang, J., Li, K.: Rfg-helad: A robust fine-grained network traffic anomaly detection model based on heterogeneous ensemble learning. IEEE Trans. Inf. Forensics Secur. 19, 5895 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"9947_CR52","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/TNET.2023.3298253","volume":"32","author":"T Voronov","year":"2023","unstructured":"Voronov, T., Raz, D., Rottenstreich, O.: A framework for anomaly detection in blockchain networks with sketches. IEEE\/ACM Trans. Netw. 32(1), 686\u2013698 (2023)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"9947_CR53","doi-asserted-by":"publisher","first-page":"4272","DOI":"10.1109\/TIFS.2024.3377548","volume":"19","author":"X Zhang","year":"2024","unstructured":"Zhang, X., Jiao, P., Gao, M., Li, T., Wu, Y., Wu, H., Zhao, Z.: Vggm: Variational graph gaussian mixture model for unsupervised change point detection in dynamic networks. IEEE Trans. Inf. Forensics Secur. 19, 4272 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-09947-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-025-09947-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-09947-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T08:16:21Z","timestamp":1758788181000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-025-09947-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,7]]},"references-count":53,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["9947"],"URL":"https:\/\/doi.org\/10.1007\/s10922-025-09947-8","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-4787225\/v1","asserted-by":"object"}]},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,7]]},"assertion":[{"value":"23 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}],"article-number":"87"}}