{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T13:24:03Z","timestamp":1772025843667,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T00:00:00Z","timestamp":1642377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11227-021-04285-3","type":"journal-article","created":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T12:02:53Z","timestamp":1642420973000},"page":"9438-9455","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["RETRACTED ARTICLE: FSO-LSTM IDS: hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks"],"prefix":"10.1007","volume":"78","author":[{"given":"Abdulrahman Saad","family":"Alqahtani","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,17]]},"reference":[{"key":"4285_CR1","doi-asserted-by":"crossref","unstructured":"Khan R, Khan SU, Zaheer R, Khan S (2012) Future internet: the internet of things architecture, possible applications and key challenges. In: 10th International Conference on Frontiers of Information Technology (FIT). IEEE, pp 257\u2013260","DOI":"10.1109\/FIT.2012.53"},{"key":"4285_CR2","unstructured":"Simon T (2017) Chapter seven: critical infrastructure and the internet of things. Cyber security in a volatile world, pp 93"},{"key":"4285_CR3","doi-asserted-by":"publisher","unstructured":"Shanthamallu US, Spanias A, Tepedelenlioglu C, Stanley M (2017) A brief survey of machine learning methods and their sensor and IoT applications. In: 8th International Conference on Information, Intelligence, Systems and Applications (IISA). https:\/\/doi.org\/10.1109\/IISA.2017.8316459","DOI":"10.1109\/IISA.2017.8316459"},{"key":"4285_CR4","unstructured":"Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) IoT security techniques based on machine learning. arXiv preprint. https:\/\/arxiv.org\/abs\/1801.06275"},{"key":"4285_CR5","doi-asserted-by":"crossref","unstructured":"Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for consumer internet of things devices. arXiv preprint. https:\/\/arxiv.org\/abs\/1804.04159","DOI":"10.1109\/SPW.2018.00013"},{"key":"4285_CR6","doi-asserted-by":"publisher","unstructured":"Anand Sukumar JV, Pranav I, Neetish M, Narayanan J (2018) Network intrusion detection using improved genetic k-means algorithm. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI). https:\/\/doi.org\/10.1109\/icacci.2018.8554710","DOI":"10.1109\/icacci.2018.8554710"},{"issue":"10","key":"4285_CR7","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.3390\/s16101701","volume":"16","author":"T Ma","year":"2016","unstructured":"Ma T, Wang F, Cheng J, Yu Y, Chen X (2016) A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks. Sensors 16(10):1701","journal-title":"Sensors"},{"key":"4285_CR8","doi-asserted-by":"publisher","unstructured":"Nikolov D, Kordev I, Stefanova S (2018) Concept for network intrusion detection system based on recurrent neural network classifer. In: IEEE XXVII International Scientifc Conference Electronics-ET. https:\/\/doi.org\/10.1109\/et.2018.8549584","DOI":"10.1109\/et.2018.8549584"},{"key":"4285_CR9","doi-asserted-by":"publisher","unstructured":"Jayaprakash S, Kandasamy K (2018) Database intrusion detection system using octraplet and machine learning. In: Second International Conference on Inventive Communication and Computational Technologies (ICICCT). https:\/\/doi.org\/10.1109\/icicct.2018.8473029","DOI":"10.1109\/icicct.2018.8473029"},{"issue":"6","key":"4285_CR10","doi-asserted-by":"publisher","first-page":"e0155781","DOI":"10.1371\/journal.pone.0155781","volume":"11","author":"MJ Kang","year":"2016","unstructured":"Kang MJ, Kang JW (2016) Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6):e0155781","journal-title":"PLoS ONE"},{"key":"4285_CR11","doi-asserted-by":"crossref","unstructured":"Misra S, Krishna PV, Agarwal H, Saxena A, Obaidat MS (2011) A learning automata based solution for preventing distributed denial of service in Internet of Things. In: IEEE, 4th International Conference on Cyber, Physical and Social Computing, Internet of Things (ithings\/cpscom), pp 114\u2013122","DOI":"10.1109\/iThings\/CPSCom.2011.84"},{"key":"4285_CR12","doi-asserted-by":"publisher","unstructured":"Khan RU, Zhang X, Alazab M, Kumar R (2019) An improved convolutional neural network model for intrusion detection in networks. In: Cybersecurity and Cyberforensics Conference (CCC). https:\/\/doi.org\/10.1109\/ccc.2019.000-6","DOI":"10.1109\/ccc.2019.000-6"},{"key":"4285_CR13","doi-asserted-by":"crossref","unstructured":"Javaid A, Niyaz Q, Sun W, Alam M (2015) A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies, New York, NY, USA, vol 35, pp 21\u201326","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"4285_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2978035","author":"R Vijayanand","year":"2020","unstructured":"Vijayanand R, Devaraj D (2020) A novel feature selection method using whale optimization algorithm and genetic operators for intrusion detection system in wireless mesh network. IEEE Access. https:\/\/doi.org\/10.1109\/access.2020.2978035","journal-title":"IEEE Access"},{"key":"4285_CR15","doi-asserted-by":"crossref","unstructured":"Shukla P (2017) ML-IDS: A machine learning approach to detect wormhole attacks in internet of things. In: Intelligent Systems Conference (IntelliSys). IEEE, pp 234\u2013240","DOI":"10.1109\/IntelliSys.2017.8324298"},{"key":"4285_CR16","doi-asserted-by":"publisher","unstructured":"Verma A, Ranga V (2019) Machine learning based intrusion detection systems for IoT applications. In: Wireless personal communications. https:\/\/doi.org\/10.1007\/s11277-019-06986-8","DOI":"10.1007\/s11277-019-06986-8"},{"key":"4285_CR17","doi-asserted-by":"publisher","unstructured":"Alkahtani H, Aldhyani THH (2021) Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. In: Complexity, vol 2021, Article ID 5579851. https:\/\/doi.org\/10.1155\/2021\/5579851","DOI":"10.1155\/2021\/5579851"},{"key":"4285_CR18","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s10207-020-00508-5","volume":"20","author":"SN Mighan","year":"2021","unstructured":"Mighan SN, Kahani M (2021) A novel scalable intrusion detection system based on deep learning. Int J Inf Secur 20:387\u2013403. https:\/\/doi.org\/10.1007\/s10207-020-00508-5","journal-title":"Int J Inf Secur"},{"key":"4285_CR19","doi-asserted-by":"publisher","first-page":"111","DOI":"10.3390\/fi13050111","volume":"13","author":"AO Alzahrani","year":"2021","unstructured":"Alzahrani AO, Alenazi MJF (2021) Designing a network intrusion detection system based on machine learning for software defined networks. Future Internet 13:111. https:\/\/doi.org\/10.3390\/fi13050111","journal-title":"Future Internet"},{"issue":"3","key":"4285_CR20","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1089\/big.2020.0263","volume":"9","author":"I Al-Turaiki","year":"2021","unstructured":"Al-Turaiki I, Altwaijry N (2021) A convolutional neural network for improved anomaly-based network intrusion detection. Big Data 9(3):233\u2013252. https:\/\/doi.org\/10.1089\/big.2020.0263","journal-title":"Big Data"},{"issue":"1","key":"4285_CR21","first-page":"671","volume":"68","author":"MA Khan","year":"2021","unstructured":"Khan MA, Kim Y (2021) Deep learning-based hybrid intelligent intrusion detection system. Comput Mater Contin 68(1):671\u2013687","journal-title":"Comput Mater Contin"},{"key":"4285_CR22","doi-asserted-by":"crossref","unstructured":"Alkhatib N, Ghauch H, Danger J-L (2021) SOME\/IP intrusion detection using deep learning-based sequential models in automotive ethernet networks. In: Cryptography and security. https:\/\/arxiv.org\/abs\/2108.08262?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%253A+arxiv%252FQSXk+%2528ExcitingAds%2521+cs+updates+on+arXiv.org%2529","DOI":"10.1109\/IEMCON53756.2021.9623129"},{"issue":"3","key":"4285_CR23","doi-asserted-by":"publisher","first-page":"323","DOI":"10.18280\/ria.340310","volume":"34","author":"V Sstla","year":"2020","unstructured":"Sstla V, Kolli VKK, Voggu LK, Bhavanam R, Vallabhasoyula S (2020) Predictive model for network intrusion detection system using deep learning. Rev Intell Artif 34(3):323\u2013330. https:\/\/doi.org\/10.18280\/ria.340310","journal-title":"Rev Intell Artif"},{"issue":"6","key":"4285_CR24","doi-asserted-by":"publisher","first-page":"e0155781","DOI":"10.1371\/journal.pone.0155781","volume":"11","author":"M-J Kang","year":"2016","unstructured":"Kang M-J, Kang JW, Tang T (2016) Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6):e0155781\u2013e0155781","journal-title":"PLoS ONE"},{"issue":"4","key":"4285_CR25","doi-asserted-by":"publisher","first-page":"50","DOI":"10.9734\/ajrcos\/2021\/v9i430229","volume":"9","author":"AA Salih","year":"2021","unstructured":"Salih AA, Ameen SY, Zeebaree SR, Sadeeq MA, Kak SF, Omar N, Ibrahim IM, Yasin HM, Rashid ZN, Ageed ZS (2021) Deep learning approaches for intrusion detection. Asian J Res Comput Sci 9(4):50\u201364","journal-title":"Asian J Res Comput Sci"},{"issue":"10","key":"4285_CR26","doi-asserted-by":"publisher","first-page":"1168","DOI":"10.24018\/ejers.2020.5.10.2128","volume":"5","author":"SM Istiaque","year":"2020","unstructured":"Istiaque SM, Khan AI, Waheed S (2020) Smart intrusion detection system comprised of machine learning and deep learning. EJERS Eur J Eng Res Sci 5(10):1168\u20131173","journal-title":"EJERS Eur J Eng Res Sci"},{"issue":"7","key":"4285_CR27","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50(7):80\u201384","journal-title":"Computer"},{"key":"4285_CR28","unstructured":"UNSW-NB15 dataset. Retrieved November 3, 2019, from https:\/\/www.unsw.adfa.edu.au\/australian-centre-for-cyber-security\/cybersecurity\/ADFA-NB15-Datasets\/"},{"key":"4285_CR29","unstructured":"Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) IoT security techniques based on machine learning. arXiv preprint. https:\/\/arxiv.org\/abs\/1801.06275"},{"key":"4285_CR30","unstructured":"CIDDS-001 dataset (2017). Retrieved November 3, 2019, from https:\/\/www.hs-coburg.de\/forschungkooperation\/forschungsprojekte-fentlich\/ingenieurwissenschaften\/cidds-coburg-intrusion-detectiondata-sets.html"},{"key":"4285_CR31","unstructured":"NSL-KDD dataset (2017). Retrieved November 3, 2019, from http:\/\/nsl.cs.unb.ca\/nsl-kdd\/"},{"issue":"3","key":"4285_CR32","first-page":"48","volume":"9","author":"S Murugan","year":"2017","unstructured":"Murugan S, Ganesh Babu TR, Srinivasan C (2017) Underwater object recognition using KNN classifier. Int J MC Square Sci Res 9(3):48\u201352","journal-title":"Int J MC Square Sci Res"},{"issue":"3","key":"4285_CR33","first-page":"16","volume":"10","author":"G Prakash","year":"2018","unstructured":"Prakash G (2018) Secure and efficient block chain based protocol for food beverages. Int J MC Square Sci Res 10(3):16\u201327","journal-title":"Int J MC Square Sci Res"},{"key":"4285_CR34","doi-asserted-by":"crossref","unstructured":"Roy B, Cheung H (2018) A deep learning approach for intrusion detection in internet of things using bi-directional long short-term memory recurrent neural networks. In: International Telecommunication Conference. IEEE","DOI":"10.1109\/ATNAC.2018.8615294"},{"key":"4285_CR35","doi-asserted-by":"publisher","unstructured":"Hassan MM, Gumaei A, Alsanad A, Alrubaian M, Fortino G (2019) A hybrid deep learning model for efficient intrusion detection in big data environment.https:\/\/doi.org\/10.1016\/j.ins.2019.10.069","DOI":"10.1016\/j.ins.2019.10.069"},{"key":"4285_CR36","doi-asserted-by":"publisher","unstructured":"Jothi B, Pushpalatha M (2021) WILS-TRS-IDS- a novel optimized deep learning algorithm for intrusion detection system.https:\/\/doi.org\/10.1007\/s00779-021-01578s","DOI":"10.1007\/s00779-021-01578s"}],"updated-by":[{"DOI":"10.1007\/s11227-024-05975-4","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T00:00:00Z","timestamp":1707868800000},"record-id":"52877"},{"DOI":"10.1007\/s11227-024-05975-4","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T00:00:00Z","timestamp":1707868800000}}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04285-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04285-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04285-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,18]],"date-time":"2024-02-18T23:27:19Z","timestamp":1708298839000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04285-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,17]]},"references-count":36,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["4285"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04285-3","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,17]]},"assertion":[{"value":"21 December 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2024","order":3,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":4,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This article has been retracted. Please see the Retraction Notice for more detail:","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11227-024-05975-4","URL":"https:\/\/doi.org\/10.1007\/s11227-024-05975-4","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}