{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:58:17Z","timestamp":1773521897792,"version":"3.50.1"},"reference-count":84,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T00:00:00Z","timestamp":1710892800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T00:00:00Z","timestamp":1710892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s11227-024-06021-z","type":"journal-article","created":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T17:01:26Z","timestamp":1710954086000},"page":"14489-14519","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Securing IoT networks in cloud computing environments: a real-time IDS"],"prefix":"10.1007","volume":"80","author":[{"given":"Soham","family":"Biswas","sequence":"first","affiliation":[]},{"given":"Md. Sarfaraj Alam","family":"Ansari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,20]]},"reference":[{"issue":"2","key":"6021_CR1","doi-asserted-by":"crossref","first-page":"22","DOI":"10.3390\/jsan8020022","volume":"8","author":"HA Abdul-Ghani","year":"2019","unstructured":"Abdul-Ghani HA, Konstantas D (2019) A comprehensive study of security and privacy guidelines, threats, and countermeasures: an IoT perspective. J Sens Actuator Netw 8(2):22","journal-title":"J Sens Actuator Netw"},{"key":"6021_CR2","unstructured":"Cisco Annual Internet Report (2018\u20132023) White Paper., https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/executive-perspectives\/annual-internet-report\/white-paper-c11-741490.html. Accessed 30 Jan 2023"},{"key":"6021_CR3","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1007\/s11235-017-0345-9","volume":"67","author":"V Adat","year":"2018","unstructured":"Adat V, Gupta BB (2018) Security in Internet of Things: issues, challenges, taxonomy, and architecture. Telecommun Syst 67:423\u2013441","journal-title":"Telecommun Syst"},{"issue":"3","key":"6021_CR4","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1108\/IJIUS-06-2019-0029","volume":"9","author":"AF Khan","year":"2020","unstructured":"Khan AF, Anandharaj G (2020) A multi-layer security approach for DDoS detection in Internet of Things. Int J Intell Unmanned Syst 9(3):178\u2013191","journal-title":"Int J Intell Unmanned Syst"},{"key":"6021_CR5","doi-asserted-by":"crossref","unstructured":"Sagar S, Choudhary A, Ansari MSA, Govil MC (2023) A survey of energy-aware server consolidation in cloud computing. In: Evolution in computational intelligence: proceedings of the 10th international conference on frontiers in intelligent computing: theory and applications (FICTA 2022). Springer Nature, Singapore, pp 381\u2013391","DOI":"10.1007\/978-981-19-7513-4_34"},{"key":"6021_CR6","doi-asserted-by":"crossref","unstructured":"Anthi E, Williams L, Burnap P (2018) Pulse: an adaptive intrusion detection for the internet of things. 35-4","DOI":"10.1049\/cp.2018.0035"},{"issue":"2","key":"6021_CR7","doi-asserted-by":"crossref","first-page":"197","DOI":"10.3390\/a6020197","volume":"6","author":"S Cirani","year":"2013","unstructured":"Cirani S, Ferrari G, Veltri L (2013) Enforcing security mechanisms in the IP-based internet of things: an algorithmic overview. Algorithms 6(2):197\u2013226","journal-title":"Algorithms"},{"key":"6021_CR8","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1016\/j.comcom.2019.12.015","volume":"150","author":"C Thirumalai","year":"2020","unstructured":"Thirumalai C, Mohan S, Srivastava G (2020) An efficient public key secure scheme for cloud and IoT security. Comput Commun 150:634\u2013643","journal-title":"Comput Commun"},{"issue":"2","key":"6021_CR9","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.dcan.2017.04.003","volume":"4","author":"AR Sfar","year":"2018","unstructured":"Sfar AR, Natalizio E, Challal Y, Chtourou Z (2018) A roadmap for security challenges in the Internet of Things. Digital Commun Netw 4(2):118\u2013137","journal-title":"Digital Commun Netw"},{"key":"6021_CR10","doi-asserted-by":"crossref","unstructured":"Ansari MSA, Govil MC, Pal K, Samaddar SG (2020) Tools and techniques in optimization of network resources. In: 2020 3rd international conference on emerging technologies in computer engineering: machine learning and internet of things (ICETCE). IEEE, pp 1\u20137","DOI":"10.1109\/ICETCE48199.2020.9091776"},{"key":"6021_CR11","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/j.future.2017.01.029","volume":"79","author":"E Kabir","year":"2018","unstructured":"Kabir E, Hu J, Wang H, Zhuo G (2018) A novel statistical technique for intrusion detection systems. Futur Gener Comput Syst 79:303\u2013318","journal-title":"Futur Gener Comput Syst"},{"key":"6021_CR12","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"Ahmed M, Mahmood AN, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19\u201331","journal-title":"J Netw Comput Appl"},{"key":"6021_CR13","doi-asserted-by":"crossref","unstructured":"Ansari MSA, Chattopadhayay A, Das S (2010) A kernel level VFS logger for building efficient file system intrusion detection system. In: 2010 second international conference on computer and network technology. IEEE, pp 273\u2013279","DOI":"10.1109\/ICCNT.2010.47"},{"key":"6021_CR14","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Futur Gener Comput Syst 82:761\u2013768","journal-title":"Futur Gener Comput Syst"},{"issue":"7","key":"6021_CR15","first-page":"150","volume":"16","author":"SR Nabavi","year":"2016","unstructured":"Nabavi SR, Mousavi SM (2016) A novel cluster-based key management scheme to improve scalability in wireless sensor networks. IJCSNS 16(7):150","journal-title":"IJCSNS"},{"key":"6021_CR16","first-page":"73","volume":"5","author":"SD Babar","year":"2016","unstructured":"Babar SD, Mahalle PN (2016) A hash key-based key management mechanism for cluster-based wireless sensor network. J Cyber Secur Mobil 5:73\u201388","journal-title":"J Cyber Secur Mobil"},{"key":"6021_CR17","doi-asserted-by":"crossref","unstructured":"Kasinathan P, Pastrone C, Spirito MA, Vinkovits M (2013) Denial-of-service detection in 6LoWPAN based Internet of Things. In: 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp 600\u2013607","DOI":"10.1109\/WiMOB.2013.6673419"},{"issue":"9","key":"6021_CR18","doi-asserted-by":"crossref","first-page":"2609","DOI":"10.3390\/s20092609","volume":"20","author":"JH Anajemba","year":"2020","unstructured":"Anajemba JH, Tang Y, Iwendi C, Ohwoekevwo A, Srivastava G, Jo O (2020) Realizing efficient security and privacy in IoT networks. Sensors 20(9):2609","journal-title":"Sensors"},{"issue":"12","key":"6021_CR19","doi-asserted-by":"crossref","first-page":"1575","DOI":"10.1007\/s42452-019-1628-4","volume":"1","author":"AB Feroz Khan","year":"2019","unstructured":"Feroz Khan AB, Anandharaj G (2019) A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT. SN Appl Sci 1(12):1575","journal-title":"SN Appl Sci"},{"key":"6021_CR20","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1007\/s10597-017-0185-9","volume":"54","author":"L Wood","year":"2018","unstructured":"Wood L, Alsawy S (2018) Recovery in psychosis from a service user perspective: a systematic review and thematic synthesis of current qualitative evidence. Community Ment Health J 54:793\u2013804","journal-title":"Community Ment Health J"},{"key":"6021_CR21","volume":"59","author":"MSA Ansari","year":"2023","unstructured":"Ansari MSA, Pal K, Govil P, Govil MC, Chaurasia N, Vidyarthi A, Alharbi M (2023) Identification of vulnerable selfish peer in P2P network using nature-inspired optimization techniques. Phys Commun 59:102110","journal-title":"Phys Commun"},{"issue":"5","key":"6021_CR22","doi-asserted-by":"crossref","first-page":"7861","DOI":"10.1007\/s11042-022-13613-5","volume":"82","author":"P Kumar","year":"2023","unstructured":"Kumar P, Babulal KS (2023) Hematological image analysis for segmentation and characterization of erythrocytes using FC-TriSDR. Multimed Tools Appl 82(5):7861\u20137886","journal-title":"Multimed Tools Appl"},{"key":"6021_CR23","doi-asserted-by":"crossref","unstructured":"\u00d6zg\u00fcr A, Erdem H (2016) A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015","DOI":"10.7287\/peerj.preprints.1954v1"},{"key":"6021_CR24","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications. IEEE, pp 1\u20136","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"4","key":"6021_CR25","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J McHugh","year":"2000","unstructured":"McHugh J (2000) Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans Inf Syst Secur (TISSEC) 3(4):262\u2013294","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"key":"6021_CR26","doi-asserted-by":"crossref","unstructured":"Alsharif N (2021) Ensembling PCA-based feature selection with random tree classifier for intrusion detection on IoT network. In: 2021 8th international conference on electrical engineering, computer science and informatics (EECSI). IEEE","DOI":"10.23919\/EECSI53397.2021.9624298"},{"issue":"1","key":"6021_CR27","first-page":"702","volume":"72","author":"Srinath Venkatesan","year":"2023","unstructured":"Venkatesan Srinath (2023) Design an intrusion detection system based on feature selection using ML algorithms. Math Stat Eng Appl 72(1):702\u2013710","journal-title":"Math Stat Eng Appl"},{"issue":"1","key":"6021_CR28","first-page":"3","volume":"19","author":"B Venkatesh","year":"2019","unstructured":"Venkatesh B, Anuradha J (2019) A review of feature selection and its methods. Cybern Inf Technol 19(1):3\u201326","journal-title":"Cybern Inf Technol"},{"key":"6021_CR29","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103438","volume":"134","author":"C Kumar","year":"2023","unstructured":"Kumar C, Biswas S, Ansari MSA, Govil MC (2023) Nature-inspired intrusion detection system for protecting software-defined networks controller. Comput Secur 134:103438","journal-title":"Comput Secur"},{"key":"6021_CR30","doi-asserted-by":"crossref","first-page":"842","DOI":"10.1016\/j.procs.2015.07.490","volume":"57","author":"P Aggarwal","year":"2015","unstructured":"Aggarwal P, Sharma SK (2015) Analysis of KDD dataset attributes-class wise for intrusion detection. Proc Comput Sci 57:842\u2013851","journal-title":"Proc Comput Sci"},{"issue":"5","key":"6021_CR31","doi-asserted-by":"crossref","first-page":"23","DOI":"10.14257\/ijdta.2013.6.5.03","volume":"6","author":"MK Siddiqui","year":"2013","unstructured":"Siddiqui MK, Naahid S (2013) Analysis of KDD CUP 99 dataset using clustering based data mining. Int J Database Theory Appl 6(5):23\u201334","journal-title":"Int J Database Theory Appl"},{"key":"6021_CR32","doi-asserted-by":"crossref","unstructured":"Ingre B, Yadav A (2015) Performance analysis of NSL-KDD dataset using ANN. In: 2015 international conference on signal processing and communication engineering systems. IEEE, pp 92\u201396","DOI":"10.1109\/SPACES.2015.7058223"},{"key":"6021_CR33","doi-asserted-by":"crossref","unstructured":"Sahu S, Mehtre BM (2015) Network intrusion detection system using J48 decision tree. In: 2015 international conference on advances in computing, communications and informatics (ICACCI). IEEE, pp 2023\u20132026","DOI":"10.1109\/ICACCI.2015.7275914"},{"key":"6021_CR34","doi-asserted-by":"crossref","unstructured":"Subba B, Biswas S, Karmakar S (2016) Enhancing performance of anomaly based intrusion detection systems through dimensionality reduction using principal component analysis. In: 2016 IEEE international conference on advanced networks and telecommunications systems (ANTS). IEEE, pp 1\u20136","DOI":"10.1109\/ANTS.2016.7947776"},{"key":"6021_CR35","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.comnet.2018.02.028","volume":"136","author":"V Hajisalem","year":"2018","unstructured":"Hajisalem V, Babaie S (2018) A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput Netw 136:37\u201350","journal-title":"Comput Netw"},{"key":"6021_CR36","doi-asserted-by":"crossref","unstructured":"Kayac\u0131k HG, Zincir-Heywood N (2005) Analysis of three intrusion detection system benchmark datasets using machine learning algorithms. In: Intelligence and security informatics: IEEE international conference on intelligence and security informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings 3 (pp 362\u2013367). Springer, Berlin, Heidelberg","DOI":"10.1007\/11427995_29"},{"key":"6021_CR37","unstructured":"Parsazad S, Saboori E, Allahyar A (2012) Fast feature reduction in intrusion detection datasets. In: 2012 Proceedings of the 35th international convention MIPRO. IEEE, pp 1023\u20131029"},{"issue":"1","key":"6021_CR38","doi-asserted-by":"crossref","first-page":"149","DOI":"10.14257\/ijdta.2015.8.1.16","volume":"8","author":"V Rampure","year":"2015","unstructured":"Rampure V, Tiwari A (2015) A rough set based feature selection on KDD CUP 99 data set. Int J Database Theory Appl 8(1):149\u2013156","journal-title":"Int J Database Theory Appl"},{"issue":"3","key":"6021_CR39","first-page":"129","volume":"7","author":"MAM Hasan","year":"2016","unstructured":"Hasan MAM, Nasser M, Ahmad S, Molla KI (2016) Feature selection for intrusion detection using random forest. J Inf Secur 7(3):129\u2013140","journal-title":"J Inf Secur"},{"key":"6021_CR40","doi-asserted-by":"crossref","unstructured":"Janarthanan T, Zargari S (2017) Feature selection in UNSW-NB15 and KDDCUP\u201999 datasets. In: 2017 IEEE 26th international symposium on industrial electronics (ISIE). IEEE, pp 1881\u20131886","DOI":"10.1109\/ISIE.2017.8001537"},{"issue":"1","key":"6021_CR41","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1109\/COMST.2015.2402161","volume":"18","author":"C Kolias","year":"2015","unstructured":"Kolias C, Kambourakis G, Stavrou A, Gritzalis S (2015) Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun Surv Tutor 18(1):184\u2013208","journal-title":"IEEE Commun Surv Tutor"},{"key":"6021_CR42","doi-asserted-by":"crossref","unstructured":"Kim K, Aminanto ME (2017) Deep learning in intrusion detection perspective: overview and further challenges. In: 2017 international workshop on big data and information security (IWBIS). IEEE, pp 5\u201310","DOI":"10.1109\/IWBIS.2017.8275095"},{"key":"6021_CR43","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.knosys.2018.02.015","volume":"147","author":"CR Wang","year":"2018","unstructured":"Wang CR, Xu RF, Lee SJ, Lee CH (2018) Network intrusion detection using equality constrained-optimization-based extreme learning machines. Knowl-Based Syst 147:68\u201380","journal-title":"Knowl-Based Syst"},{"issue":"4","key":"6021_CR44","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1109\/TBDATA.2017.2715166","volume":"5","author":"N Moustafa","year":"2017","unstructured":"Moustafa N, Slay J, Creech G (2017) Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks. IEEE Trans Big Data 5(4):481\u2013494","journal-title":"IEEE Trans Big Data"},{"key":"6021_CR45","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.cose.2017.06.005","volume":"70","author":"C Khammassi","year":"2017","unstructured":"Khammassi C, Krichen S (2017) A GA-LR wrapper approach for feature selection in network intrusion detection. Comput Secur 70:255\u2013277","journal-title":"Comput Secur"},{"key":"6021_CR46","doi-asserted-by":"crossref","first-page":"3255","DOI":"10.1007\/s10462-019-09762-z","volume":"53","author":"MR Gauthama Raman","year":"2020","unstructured":"Gauthama Raman MR, Somu N, Jagarapu S, Manghnani T, Selvam T, Krithivasan K, Shankar Sriram VS (2020) An efficient intrusion detection technique based on support vector machine and improved binary gravitational search algorithm. Artif Intell Rev 53:3255\u20133286","journal-title":"Artif Intell Rev"},{"key":"6021_CR47","doi-asserted-by":"crossref","first-page":"132911","DOI":"10.1109\/ACCESS.2020.3009843","volume":"8","author":"D Stiawan","year":"2020","unstructured":"Stiawan D, Idris MYB, Bamhdi AM, Budiarto R (2020) CICIDS-2017 dataset feature analysis with information gain for anomaly detection. IEEE Access 8:132911\u2013132921","journal-title":"IEEE Access"},{"issue":"3.24","key":"6021_CR48","first-page":"479","volume":"7","author":"R Panigrahi","year":"2018","unstructured":"Panigrahi R, Borah S (2018) A detailed analysis of CICIDS2017 dataset for designing intrusion detection systems. Int J Eng Technol 7(3.24):479\u2013482","journal-title":"Int J Eng Technol"},{"issue":"3","key":"6021_CR49","first-page":"1307","volume":"26","author":"A Verma","year":"2018","unstructured":"Verma A, Ranga V (2018) On evaluation of network intrusion detection systems: statistical analysis of CIDDS-001 dataset using machine learning techniques. Pertanika J Sci Technol 26(3):1307\u20131332","journal-title":"Pertanika J Sci Technol"},{"issue":"1","key":"6021_CR50","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-022-00674-4","volume":"10","author":"Y Yin","year":"2023","unstructured":"Yin Y, Jang-Jaccard J, Xu W, Singh A, Zhu J, Sabrina F, Kwak J (2023) IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset. J Big Data 10(1):1\u201326","journal-title":"J Big Data"},{"key":"6021_CR51","volume":"5","author":"M Vishwakarma","year":"2022","unstructured":"Vishwakarma M, Kesswani N (2022) DIDS: a deep neural network based real-time intrusion detection system for IoT. Decision Anal J 5:100142","journal-title":"Decision Anal J"},{"key":"6021_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.08.012","author":"M Sarhan","year":"2022","unstructured":"Sarhan M, Layeghy S, Moustafa N, Gallagher M, Portmann M (2022) Feature extraction for machine learning-based intrusion detection in IoT networks. Digital Commun Netw. https:\/\/doi.org\/10.1016\/j.dcan.2022.08.012","journal-title":"Digital Commun Netw"},{"key":"6021_CR53","doi-asserted-by":"crossref","unstructured":"Chen YW, Sheu JP, Kuo YC, Van Cuong N (2020) Design and implementation of IoT DDoS attacks detection system based on machine learning. In: 2020 European conference on networks and communications (EuCNC). IEEE, pp 122\u2013127","DOI":"10.1109\/EuCNC48522.2020.9200909"},{"key":"6021_CR54","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.jpdc.2018.03.006","volume":"119","author":"R Kozik","year":"2018","unstructured":"Kozik R, Chora\u015b M, Ficco M, Palmieri F (2018) A scalable distributed machine learning approach for attack detection in edge computing environments. J Parallel Distrib Comput 119:18\u201326","journal-title":"J Parallel Distrib Comput"},{"issue":"2","key":"6021_CR55","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1109\/TETC.2016.2633228","volume":"7","author":"HH Pajouh","year":"2016","unstructured":"Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo KKR (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Top Comput 7(2):314\u2013323","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"6021_CR56","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.comcom.2016.12.001","volume":"98","author":"H Bostani","year":"2017","unstructured":"Bostani H, Sheikhan M (2017) Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Comput Commun 98:52\u201371","journal-title":"Comput Commun"},{"key":"6021_CR57","doi-asserted-by":"crossref","unstructured":"Hodo E, Bellekens X, Hamilton A, Dubouilh PL, Iorkyase E, Tachtatzis C, Atkinson R (2016) Threat analysis of IoT networks using artificial neural network intrusion detection system. In: 2016 international symposium on networks, computers and communications (ISNCC). IEEE, pp 1\u20136","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"6021_CR58","unstructured":"Niyaz Q, Sun W, Javaid AY, Alam M (2015) A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (Formerly BIONETICS), BICT-15 (Vol 15, No. 2015, pp 21\u201326)"},{"key":"6021_CR59","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Futur Gener Comput Syst 82:761\u2013768","journal-title":"Futur Gener Comput Syst"},{"key":"6021_CR60","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s12195-020-00629-w","volume":"13","author":"M Tsikala Vafea","year":"2020","unstructured":"Tsikala Vafea M, Atalla E, Georgakas J, Shehadeh F, Mylona EK, Kalligeros M, Mylonakis E (2020) Emerging technologies for use in the study, diagnosis, and treatment of patients with COVID-19. Cell Mol Bioeng 13:249\u2013257","journal-title":"Cell Mol Bioeng"},{"key":"6021_CR61","doi-asserted-by":"crossref","DOI":"10.1016\/j.bspc.2020.102149","volume":"62","author":"M Otoom","year":"2020","unstructured":"Otoom M, Otoum N, Alzubaidi MA, Etoom Y, Banihani R (2020) An IoT-based framework for early identification and monitoring of COVID-19 cases. Biomed Signal Process Control 62:102149","journal-title":"Biomed Signal Process Control"},{"issue":"12","key":"6021_CR62","doi-asserted-by":"crossref","first-page":"2114","DOI":"10.3390\/electronics9122114","volume":"9","author":"Murtaza Ahmed Siddiqi","year":"2020","unstructured":"Siddiqi Murtaza Ahmed, Pak Wooguil (2020) Optimizing filter-based feature selection method flow for intrusion detection system. Electronics 9(12):2114","journal-title":"Electronics"},{"issue":"3","key":"6021_CR63","volume":"33","author":"Yazan Otoum","year":"2022","unstructured":"Otoum Yazan, Liu Dandan, Nayak Amiya (2022) DL-IDS: a deep learning-based intrusion detection framework for securing IoT. Trans Emerg Telecommun Technol 33(3):e3803","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"16","key":"6021_CR64","doi-asserted-by":"crossref","first-page":"8162","DOI":"10.3390\/app12168162","volume":"12","author":"Leila Mohammadpour","year":"2022","unstructured":"Mohammadpour Leila et al (2022) A survey of CNN-based network intrusion detection. Appl Sci 12(16):8162","journal-title":"Appl Sci"},{"issue":"5","key":"6021_CR65","doi-asserted-by":"crossref","first-page":"3033","DOI":"10.3390\/app13053033","volume":"13","author":"Tariq Emad Ali","year":"2023","unstructured":"Ali Tariq Emad, Chong Yung-Wey, Manickam Selvakumar (2023) Comparison of ML\/DL approaches for detecting DDoS attacks in SDN. Appl Sci 13(5):3033","journal-title":"Appl Sci"},{"issue":"1","key":"6021_CR66","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.eswa.2011.06.013","volume":"39","author":"Siva S. Sivatha Sindhu","year":"2012","unstructured":"Sindhu Siva S. Sivatha, Geetha Suryakumar, Kannan Arputharaj (2012) Decision tree based light weight intrusion detection using a wrapper approach. Expert Syst Appl 39(1):129\u2013141","journal-title":"Expert Syst Appl"},{"key":"6021_CR67","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2021.016140","author":"AH Mohammad","year":"2021","unstructured":"Mohammad AH (2021) Intrusion detection using a new hybrid feature selection model. Intell Autom Soft Comput. https:\/\/doi.org\/10.32604\/iasc.2021.016140","journal-title":"Intell Autom Soft Comput"},{"key":"6021_CR68","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.future.2022.02.011","volume":"132","author":"Taehoon Kim","year":"2022","unstructured":"Kim Taehoon, Pak Wooguil (2022) Real-time network intrusion detection using deferred decision and hybrid classifier. Futur Gener Comput Syst 132:51\u201366","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"6021_CR69","doi-asserted-by":"crossref","first-page":"621","DOI":"10.33411\/IJIST\/2022040306","volume":"4","author":"Shafqat Ali Siyyal","year":"2022","unstructured":"Siyyal Shafqat Ali et al (2022) Analyzing ml-based ids over real-traffic. Inte J Innov Sci Technol 4(3):621\u2013640","journal-title":"Inte J Innov Sci Technol"},{"issue":"6","key":"6021_CR70","doi-asserted-by":"crossref","first-page":"8507","DOI":"10.1007\/s11042-022-13556-x","volume":"82","author":"MSA Ansari","year":"2023","unstructured":"Ansari MSA, Pal K, Govil P, Govil MC, Awasthi LK (2023) A statistical analysis of SAMPARK dataset for peer-to-peer traffic and selfish-peer identification. Multimed Tools Appl 82(6):8507\u20138535","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"6021_CR71","volume":"35","author":"Polydoros N Kampaktsis","year":"2021","unstructured":"Kampaktsis Polydoros N et al (2021) State-of-the-art machine learning algorithms for the prediction of outcomes after contemporary heart transplantation: results from the UNOS database. Clin Transplant 35(8):e14388","journal-title":"Clin Transplant"},{"issue":"1","key":"6021_CR72","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13054-018-2293-5","volume":"23","author":"Zhongheng Zhang","year":"2019","unstructured":"Zhang Zhongheng, Ho Kwok M, Hong Yucai (2019) Machine learning for the prediction of volume responsiveness in patients with oliguric acute kidney injury in critical care. Crit Care 23(1):1\u201310","journal-title":"Crit Care"},{"issue":"5","key":"6021_CR73","doi-asserted-by":"crossref","first-page":"1323","DOI":"10.1016\/j.athoracsur.2019.09.042","volume":"109","author":"Arman Kilic","year":"2020","unstructured":"Kilic Arman (2020) Artificial intelligence and machine learning in cardiovascular health care. Ann Thorac Surg 109(5):1323\u20131329","journal-title":"Ann Thorac Surg"},{"key":"6021_CR74","doi-asserted-by":"crossref","first-page":"38367","DOI":"10.1109\/ACCESS.2018.2854599","volume":"6","author":"Zheng Wang","year":"2018","unstructured":"Wang Zheng (2018) Deep learning-based intrusion detection with adversaries. IEEE Access 6:38367\u201338384","journal-title":"IEEE Access"},{"key":"6021_CR75","doi-asserted-by":"publisher","DOI":"10.12785\/ijcds\/1001117","author":"M Ansari","year":"2021","unstructured":"Ansari M, Alam S, Pal K, Govil MC, Govil P, Srivastava A (2021) Ensemble machine learning for P2P traffic identification. Int J Comput Digital Syst. https:\/\/doi.org\/10.12785\/ijcds\/1001117","journal-title":"Int J Comput Digital Syst"},{"key":"6021_CR76","doi-asserted-by":"crossref","DOI":"10.1016\/j.impact.2019.100179","volume":"15","author":"A Bahl","year":"2019","unstructured":"Bahl A, Hellack B, Balas M, Dinischiotu A, Wiemann M, Brinkmann J, Haase A (2019) Recursive feature elimination in random forest classification supports nanomaterial grouping. NanoImpact 15:100179","journal-title":"NanoImpact"},{"key":"6021_CR77","doi-asserted-by":"crossref","unstructured":"Ansari MSA, Pal K, Govil MC, Govil P, Srivastava A (2022) P2P traffic identification using machine learning and feature selection techniques. In: Edge analytics: select proceedings of 26th international conference-ADCOM 2020. Springer, Singapore, pp 393\u2013407","DOI":"10.1007\/978-981-19-0019-8_30"},{"key":"6021_CR78","unstructured":"Elmachtoub AN, Liang JCN, McNellis R (2020) Decision trees for decision-making under the predict-then-optimize framework. In: International conference on machine learning. PMLR, pp 2858\u20132867"},{"issue":"14","key":"6021_CR79","first-page":"5947","volume":"10","author":"LM Gladence","year":"2015","unstructured":"Gladence LM, Karthi M, Anu VM (2015) A statistical comparison of logistic regression and different Bayes classification methods for machine learning. ARPN J Eng Appl Sci 10(14):5947\u20135953","journal-title":"ARPN J Eng Appl Sci"},{"key":"6021_CR80","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1016\/j.jclepro.2018.08.207","volume":"203","author":"MW Ahmad","year":"2018","unstructured":"Ahmad MW, Reynolds J, Rezgui Y (2018) Predictive modelling for solar thermal energy systems: a comparison of support vector regression, random forest, extra trees and regression trees. J Clean Prod 203:810\u2013821","journal-title":"J Clean Prod"},{"issue":"19","key":"6021_CR81","doi-asserted-by":"crossref","first-page":"6254","DOI":"10.1080\/01431161.2012.682661","volume":"33","author":"S Shataee","year":"2012","unstructured":"Shataee S, Kalbi S, Fallah A, Pelz D (2012) Forest attribute imputation using machine-learning methods and ASTER data: comparison of k-NN, SVR and random forest regression algorithms. Int J Remote Sens 33(19):6254\u20136280","journal-title":"Int J Remote Sens"},{"issue":"7","key":"6021_CR82","doi-asserted-by":"crossref","first-page":"314","DOI":"10.3390\/info13070314","volume":"13","author":"Yang Zhang","year":"2022","unstructured":"Zhang Yang, Zhang Hongpo, Zhang Bo (2022) An effective ensemble automatic feature selection method for network intrusion detection. Information 13(7):314","journal-title":"Information"},{"key":"6021_CR83","doi-asserted-by":"crossref","first-page":"8561","DOI":"10.3233\/JIFS-222120","volume":"44","author":"S Gokul Pran","year":"2023","unstructured":"Gokul Pran S, Sivakami Raja (2023) An efficient feature selection and classification approach for an intrusion detection system using optimal neural network. J Intell Fuzzy Syst 44:8561\u20138571","journal-title":"J Intell Fuzzy Syst"},{"key":"6021_CR84","doi-asserted-by":"crossref","unstructured":"Elhanashi A, et al (2022) Machine learning techniques for anomaly-based detection system on CSE-CIC-IDS2018 dataset. In: International conference on applications in electronics pervading industry, environment and society. Springer, Cham","DOI":"10.1007\/978-3-031-30333-3_17"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06021-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06021-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06021-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T11:07:49Z","timestamp":1718017669000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06021-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,20]]},"references-count":84,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["6021"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06021-z","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,20]]},"assertion":[{"value":"22 February 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no Conflict of interest or conflicts of interest to declare.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The content presented in this article represents the original work of the author and has not been previously published.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All authors have reviewed and consented to the submitted version of the paper, acknowledging their inclusion as co-authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"The author(s) hereby provide permission to publish the work.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}