{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T17:08:12Z","timestamp":1776186492049,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T00:00:00Z","timestamp":1656028800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T00:00:00Z","timestamp":1656028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Process Lett"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s11063-022-10892-9","type":"journal-article","created":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T16:10:41Z","timestamp":1656087041000},"page":"459-479","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["Hybrid Optimized Deep Neural Network with Enhanced Conditional Random Field Based Intrusion Detection on Wireless Sensor Network"],"prefix":"10.1007","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0968-8468","authenticated-orcid":false,"given":"S.","family":"Karthic","sequence":"first","affiliation":[]},{"given":"S. Manoj","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,24]]},"reference":[{"key":"10892_CR1","doi-asserted-by":"publisher","first-page":"5540895","DOI":"10.1155\/2021\/5540895","volume":"2021","author":"JS Pan","year":"2021","unstructured":"Pan JS, Fan F, Chu SC, Zhao HQ, Liu GY (2021) A lightweight intelligent intrusion detection model for wireless sensor networks. Secur Commun Netw 2021:5540895. https:\/\/doi.org\/10.1155\/2021\/5540895","journal-title":"Secur Commun Netw"},{"issue":"1","key":"10892_CR2","doi-asserted-by":"publisher","first-page":"305","DOI":"10.22075\/ijnaa.2022.5491","volume":"13","author":"M Sadeghizadeh","year":"2022","unstructured":"Sadeghizadeh M (2022) A lightweight intrusion detection system based on RSSI for sybil attack detection in wireless sensor networks. Int J Nonlinear Anal Appl 13(1):305\u2013320. https:\/\/doi.org\/10.22075\/ijnaa.2022.5491","journal-title":"Int J Nonlinear Anal Appl"},{"key":"10892_CR3","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-193449\/v1","author":"D Prabakar","year":"2021","unstructured":"Prabakar D, Swaminathan G, Sasikala S, Saravanan TR, Ramesh S (2021) Enhanced simulating annealing and SVM for intrusion detection system in wireless sensor networks. Res Square. https:\/\/doi.org\/10.21203\/rs.3.rs-193449\/v1","journal-title":"Res Square"},{"key":"10892_CR4","doi-asserted-by":"publisher","first-page":"52843","DOI":"10.1109\/ACCESS.2018.2869577","volume":"6","author":"M Al-Qatf","year":"2018","unstructured":"Al-Qatf M, Lasheng Y, Al-Habib M, Al-Sabahi K (2018) \u2018Deep learning approach combining sparse autoencoder with SVM for network intrusion detection.\u2019 IEEE Access 6:52843\u201352856","journal-title":"IEEE Access"},{"key":"10892_CR5","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) \u2018Deep learning approach for intelligent intrusion detection system.\u2019 IEEE Access 7:41525\u201341550","journal-title":"IEEE Access"},{"key":"10892_CR6","doi-asserted-by":"publisher","first-page":"107440","DOI":"10.1016\/j.compeleceng.2021.107440","volume":"96","author":"KS Kumar","year":"2021","unstructured":"Kumar KS, Nair SAH, Roy DG, Rajalingam B, Kumar RS (2021) Security and privacy-aware artificial intrusion detection system using federated machine learning. Comput Electr Eng 96:107440","journal-title":"Comput Electr Eng"},{"key":"10892_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102435","volume":"110","author":"S Al","year":"2021","unstructured":"Al S, Dener M (2021) STL-HDL: a new hybrid network intrusion detection system for imbalanced dataset on big data environment. Comput Secur 110:102435","journal-title":"Comput Secur"},{"key":"10892_CR8","doi-asserted-by":"publisher","first-page":"102084","DOI":"10.1016\/j.cose.2020.102084","volume":"100","author":"B Subba","year":"2021","unstructured":"Subba B, Gupta P (2021) A tfidfvectorizer and singular value decomposition based host intrusion detection system framework for detecting anomalous system processes. Comput Secur 100:102084","journal-title":"Comput Secur"},{"issue":"2","key":"10892_CR9","doi-asserted-by":"publisher","first-page":"1559","DOI":"10.1007\/s12652-020-02228-z","volume":"12","author":"M Safaldin","year":"2021","unstructured":"Safaldin M, Otair M, Abualigah L (2021) Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J Ambient Intell Humaniz Comput 12(2):1559\u20131576","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"10892_CR10","doi-asserted-by":"publisher","first-page":"114603","DOI":"10.1016\/j.eswa.2021.114603","volume":"172","author":"A Singh","year":"2021","unstructured":"Singh A, Nagar J, Sharma S, Kotiyal V (2021) A Gaussian process regression approach to predict the k-barrier coverage probability for intrusion detection in wireless sensor networks. Expert Syst Appl 172:114603","journal-title":"Expert Syst Appl"},{"key":"10892_CR11","doi-asserted-by":"publisher","first-page":"107688","DOI":"10.1016\/j.comnet.2020.107688","volume":"184","author":"A Yazdinejadna","year":"2021","unstructured":"Yazdinejadna A, Parizi RM, Dehghantanha A, Khan MS (2021) A kangaroo-based intrusion detection system on software-defined networks. Comput Netw 184:107688","journal-title":"Comput Netw"},{"issue":"2","key":"10892_CR12","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/LNET.2019.2901792","volume":"1","author":"S Otoum","year":"2019","unstructured":"Otoum S, Kantarci B, Mouftah HT (2019) On the feasibility of deep learning in sensor network intrusion detection. IEEE Netw Lett 1(2):68\u201371","journal-title":"IEEE Netw Lett"},{"key":"10892_CR13","doi-asserted-by":"publisher","first-page":"42450","DOI":"10.1109\/ACCESS.2019.2907965","volume":"7","author":"SU Jan","year":"2019","unstructured":"Jan SU, Ahmed S, Shakhov V, Koo I (2019) Toward a lightweight intrusion detection system for the internet of things. IEEE Access 7:42450\u201342471","journal-title":"IEEE Access"},{"issue":"4","key":"10892_CR14","doi-asserted-by":"publisher","first-page":"583","DOI":"10.3390\/sym11040583","volume":"11","author":"MA Khan","year":"2019","unstructured":"Khan MA, Karim M, Kim Y (2019) A scalable and hybrid intrusion detection system based on the convolutional-LSTM network. Symmetry 11(4):583","journal-title":"Symmetry"},{"issue":"5","key":"10892_CR15","doi-asserted-by":"publisher","first-page":"9042","DOI":"10.1109\/JIOT.2019.2926365","volume":"6","author":"E Anthi","year":"2019","unstructured":"Anthi E, Williams L, S\u0142owi\u0144ska M, Theodorakopoulos G, Burnap P (2019) A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J 6(5):9042\u20139053","journal-title":"IEEE Internet Things J"},{"key":"10892_CR16","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.comcom.2020.05.048","volume":"160","author":"RM Swarna Priya","year":"2020","unstructured":"Swarna Priya RM, Maddikunta PKR, Parimala M, Koppu S, Gadekallu TR, Chowdhary CL, Alazab M (2020) An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Comput Commun 160:139\u2013149","journal-title":"Comput Commun"},{"key":"10892_CR17","doi-asserted-by":"publisher","first-page":"69498","DOI":"10.1109\/ACCESS.2021.3065571","volume":"9","author":"Y Du","year":"2021","unstructured":"Du Y, Xia J, Ma J, Zhang W (2021) An optimal decision method for intrusion detection system in wireless sensor networks with enhanced cooperation mechanism. IEEE Access 9:69498\u201369512","journal-title":"IEEE Access"},{"issue":"2","key":"10892_CR18","doi-asserted-by":"publisher","first-page":"461","DOI":"10.3390\/s20020461","volume":"20","author":"A Amouri","year":"2020","unstructured":"Amouri A, Alaparthy VT, Morgera SD (2020) A machine learning based intrusion detection system for mobile Internet of Things. Sensors 20(2):461","journal-title":"Sensors"},{"key":"10892_CR19","first-page":"1","volume":"2019","author":"R Zhang","year":"2019","unstructured":"Zhang R, Xiao X (2019) \u2018Intrusion detection in wireless sensor networks with an improved NSA based on space division.\u2019 J Sensors 2019:1\u201320","journal-title":"J Sensors"},{"issue":"2","key":"10892_CR20","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1007\/s11277-021-08101-2","volume":"118","author":"M Maheswari","year":"2021","unstructured":"Maheswari M, Karthika RA (2021) A novel QoS based secure unequal clustering protocol with intrusion detection system in wireless sensor networks. Wirel Pers Commun 118(2):1535\u20131557","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"10892_CR21","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1504\/IJAHUC.2021.112980","volume":"36","author":"W Wen","year":"2021","unstructured":"Wen W, Shang C, Dong Z, Keh HC, Roy DS (2021) An intrusion detection model using improved convolutional deep belief networks for wireless sensor networks. Int J Ad Hoc Ubiquitous Comput 36(1):20\u201331","journal-title":"Int J Ad Hoc Ubiquitous Comput"},{"issue":"1","key":"10892_CR22","doi-asserted-by":"publisher","first-page":"439","DOI":"10.32604\/iasc.2022.025153","volume":"34","author":"S Karthic","year":"2022","unstructured":"Karthic S, Manoj Kumar S (2022) Wireless intrusion detection based on optimized lstm with stacked auto encoder network. Intell Autom Soft Comput 34(1):439\u2013453","journal-title":"Intell Autom Soft Comput"},{"key":"10892_CR23","doi-asserted-by":"crossref","unstructured":"Krishnan R, Krishnan RS, Robinson YH, Julie EG, Long HV, Sangeetha A, Subramanian M, Kumar R (2021) An intrusion detection and prevention protocol for Internet of Things based wireless sensor networks","DOI":"10.21203\/rs.3.rs-554397\/v1"},{"issue":"6","key":"10892_CR24","doi-asserted-by":"publisher","first-page":"1922","DOI":"10.1109\/TCBB.2018.2844256","volume":"16","author":"L Hu","year":"2018","unstructured":"Hu L, Yuan X, Liu X, Xiong S, Luo X (2018) Efficiently detecting protein complexes from protein interaction networks via alternating direction method of multipliers. IEEE\/ACM Trans Comput Biol Bioinf 16(6):1922\u20131935","journal-title":"IEEE\/ACM Trans Comput Biol Bioinf"},{"issue":"7","key":"10892_CR25","doi-asserted-by":"publisher","first-page":"4285","DOI":"10.1109\/TSMC.2019.2931393","volume":"51","author":"D Wu","year":"2019","unstructured":"Wu D, Luo X, Shang M, He Y, Wang G, Zhou M (2019) A deep latent factor model for high-dimensional and sparse matrices in recommender systems. IEEE Trans Syst Man Cybern Syst 51(7):4285\u20134296","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"1","key":"10892_CR26","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TDSC.2008.20","volume":"7","author":"K Gupta","year":"2010","unstructured":"Gupta K, Nath B, Kotagiri R (2010) Layered approach using conditional random fields for intrusion detection. IEEE Trans Dependable Secure Comput 7(1):35\u201349","journal-title":"IEEE Trans Dependable Secure Comput"}],"container-title":["Neural Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-022-10892-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11063-022-10892-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11063-022-10892-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T14:29:20Z","timestamp":1678112960000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11063-022-10892-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,24]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["10892"],"URL":"https:\/\/doi.org\/10.1007\/s11063-022-10892-9","relation":{},"ISSN":["1370-4621","1573-773X"],"issn-type":[{"value":"1370-4621","type":"print"},{"value":"1573-773X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,24]]},"assertion":[{"value":"23 May 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Mr. S. Karthic declares that he has no conflict of interest. Dr. S. Manoj Kumar declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}