{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:30:11Z","timestamp":1772119811458,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2024,3,21]],"date-time":"2024-03-21T00:00:00Z","timestamp":1710979200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,21]],"date-time":"2024-03-21T00:00:00Z","timestamp":1710979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s11227-024-06022-y","type":"journal-article","created":{"date-parts":[[2024,3,21]],"date-time":"2024-03-21T03:01:45Z","timestamp":1710990105000},"page":"14622-14644","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Quantum particle Swarm optimized extreme learning machine for intrusion detection"],"prefix":"10.1007","volume":"80","author":[{"given":"Han","family":"Qi","sequence":"first","affiliation":[]},{"given":"Xinyu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Abdullah","family":"Gani","sequence":"additional","affiliation":[]},{"given":"Changqing","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,21]]},"reference":[{"issue":"1","key":"6022_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/09540091.2023.2186316","volume":"35","author":"S Xu","year":"2023","unstructured":"Xu S, Zhong J, Wang L, He D, Zhang S, Shao W (2023) A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mhealth. Connect Sci 35(1):1. https:\/\/doi.org\/10.1080\/09540091.2023.2186316","journal-title":"Connect Sci"},{"issue":"9","key":"6022_CR2","doi-asserted-by":"publisher","first-page":"3489","DOI":"10.1007\/S11227-015-1615-5","volume":"72","author":"MM Rathore","year":"2016","unstructured":"Rathore MM, Ahmad A, Paul A (2016) Real time intrusion detection system for ultra-high-speed big data environments. J Supercomput 72(9):3489\u20133510. https:\/\/doi.org\/10.1007\/S11227-015-1615-5","journal-title":"J Supercomput"},{"issue":"1","key":"6022_CR3","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/S11227-019-03035-W","volume":"76","author":"G Kumar","year":"2020","unstructured":"Kumar G (2020) An improved ensemble approach for effective intrusion detection. J Supercomput 76(1):275\u2013291. https:\/\/doi.org\/10.1007\/S11227-019-03035-W","journal-title":"J Supercomput"},{"key":"6022_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103596","volume":"213","author":"M Sepczuk","year":"2023","unstructured":"Sepczuk M (2023) Dynamic web application firewall detection supported by cyber mimic defense approach. J Netw Comput Appl 213:103596. https:\/\/doi.org\/10.1016\/j.jnca.2023.103596","journal-title":"J Netw Comput Appl"},{"key":"6022_CR5","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.future.2023.04.025","volume":"147","author":"Y Zhao","year":"2023","unstructured":"Zhao Y, Pang Y, Ke X, Wang B, Zhu G, Cao M (2023) A metaverse-oriented CP-ABE scheme with cryptographic reverse firewall. Fut Gen Comput Syst 147:195\u2013206. https:\/\/doi.org\/10.1016\/j.future.2023.04.025","journal-title":"Fut Gen Comput Syst"},{"key":"6022_CR6","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1109\/ICCMC56507.2023.10083504","volume-title":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","author":"R Alexander","year":"2023","unstructured":"Alexander R, Kumar KPM (2023) Hybrid rule based classification of attacks in internet of things (iot) intrusion detection system. In: 2023 7th International Conference on Computing Methodologies and Communication (ICCMC). IEEE, pp 1249\u20131254"},{"issue":"9","key":"6022_CR7","doi-asserted-by":"publisher","first-page":"4376","DOI":"10.3390\/s23094376","volume":"23","author":"F Luo","year":"2023","unstructured":"Luo F, Yang Z, Zhang Z, Wang Z, Wang B, Wu M (2023) A multi-layer intrusion detection system for some\/ip-based in-vehicle network. Sensors 23(9):4376. https:\/\/doi.org\/10.3390\/s23094376","journal-title":"Sensors"},{"issue":"11","key":"6022_CR8","doi-asserted-by":"publisher","first-page":"2355","DOI":"10.3390\/electronics12112355","volume":"12","author":"K Uszko","year":"2023","unstructured":"Uszko K, Kasprzyk M, Natkaniec M, Cho\u0142da P (2023) Rule-based system with machine learning support for detecting anomalies in 5g wlans. Electronics 12(11):2355","journal-title":"Electronics"},{"key":"6022_CR9","doi-asserted-by":"publisher","unstructured":"Devi M, Nandal P, Sehrawat H (2023) A novel rule-based intrusion detection framework for secure wireless sensor networks. PREPRINT (Version 1) available at Research Square. https:\/\/doi.org\/10.21203\/rs.3.rs-2639778\/v1","DOI":"10.21203\/rs.3.rs-2639778\/v1"},{"key":"6022_CR10","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/IDCIoT56793.2023.10053505","volume-title":"2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT)","author":"A Kumar","year":"2023","unstructured":"Kumar A, Das TK (2023) Rule-based intrusion detection system using logical analysis of data. In: 2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT). IEEE, pp 129\u2013135"},{"issue":"6","key":"6022_CR11","doi-asserted-by":"publisher","first-page":"4286","DOI":"10.1109\/TII.2021.3133300","volume":"18","author":"B Hu","year":"2022","unstructured":"Hu B, Bi Y, Zhi M, Zhang K, Yan F, Zhang Q, Liu Z (2022) A deep one-class intrusion detection scheme in software-defined industrial networks. IEEE Trans Ind Inf 18(6):4286\u20134296. https:\/\/doi.org\/10.1109\/TII.2021.3133300","journal-title":"IEEE Trans Ind Inf"},{"key":"6022_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103405","volume":"72","author":"MA Talukder","year":"2023","unstructured":"Talukder MA, Hasan KF, Islam MM, Uddin A, Akhter A, Yousuf MA, Alharbi F, Moni MA (2023) A dependable hybrid machine learning model for network intrusion detection. J Inf Secur Appl 72:103405. https:\/\/doi.org\/10.1016\/j.jisa.2022.103405","journal-title":"J Inf Secur Appl"},{"key":"6022_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108626","volume":"107","author":"B Sharma","year":"2023","unstructured":"Sharma B, Sharma L, Lal C, Roy S (2023) Anomaly based network intrusion detection for iot attacks using deep learning technique. Comput Electr Eng 107:108626. https:\/\/doi.org\/10.1016\/j.compeleceng.2023.108626","journal-title":"Comput Electr Eng"},{"key":"6022_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119831","volume":"224","author":"R Chowdhury","year":"2023","unstructured":"Chowdhury R, Sen S, Goswami A, Purkait S, Saha B (2023) An implementation of bi-phase network intrusion detection system by using real-time traffic analysis. Expert Syst Appl 224:119831. https:\/\/doi.org\/10.1016\/j.eswa.2023.119831","journal-title":"Expert Syst Appl"},{"key":"6022_CR15","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.future.2022.08.011","volume":"138","author":"I Debicha","year":"2023","unstructured":"Debicha I, Bauwens R, Debatty T, Dricot J, Kenaza T, Mees W (2023) TAD: transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems. Fut Gen Comput Syst 138:185\u2013197. https:\/\/doi.org\/10.1016\/j.future.2022.08.011","journal-title":"Fut Gen Comput Syst"},{"issue":"3","key":"6022_CR16","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1080\/09540091.2016.1185392","volume":"28","author":"B Tran","year":"2016","unstructured":"Tran B, Xue B, Zhang M, Nguyen S (2016) Investigation on particle swarm optimisation for feature selection on high-dimensional data: local search and selection bias. Connect Sci 28(3):270\u2013294. https:\/\/doi.org\/10.1080\/09540091.2016.1185392","journal-title":"Connect Sci"},{"issue":"10","key":"6022_CR17","doi-asserted-by":"publisher","first-page":"1666","DOI":"10.3390\/SYM12101666","volume":"12","author":"MSA Daweri","year":"2020","unstructured":"Daweri MSA, Ariffin KAZ, Abdullah S, Senan MFEM (2020) An analysis of the KDD99 and UNSW-NB15 datasets for the intrusion detection system. Symmetry 12(10):1666. https:\/\/doi.org\/10.3390\/SYM12101666","journal-title":"Symmetry"},{"issue":"6","key":"6022_CR18","doi-asserted-by":"publisher","first-page":"7310","DOI":"10.1007\/S10489-022-03770-3","volume":"53","author":"W Shu","year":"2023","unstructured":"Shu W, Yan Z, Yu J, Qian W (2023) Information gain-based semi-supervised feature selection for hybrid data. Appl Intell 53(6):7310\u20137325. https:\/\/doi.org\/10.1007\/S10489-022-03770-3","journal-title":"Appl Intell"},{"key":"6022_CR19","doi-asserted-by":"publisher","unstructured":"Sun J, Xu W, Feng B (2005) Adaptive parameter control for quantum-behaved particle swarm optimization on individual level. In: Proceedings of the IEEE International Conference on Systems, man and Cybernetics, Waikoloa, Hawaii, USA, October 10\u201312, 2005, pp 3049\u20133054. https:\/\/doi.org\/10.1109\/ICSMC.2005.1571614","DOI":"10.1109\/ICSMC.2005.1571614"},{"key":"6022_CR20","doi-asserted-by":"publisher","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE symposium on computational intelligence for security and defense applications, CISDA 2009, Ottawa, Canada, July 8\u201310, 2009, pp 1\u20136 . https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"6022_CR21","doi-asserted-by":"publisher","unstructured":"Vitorino J, Andrade R, Pra\u00e7a I, Sousa O, Maia E (2021) A comparative analysis of machine learning techniques for iot intrusion detection. In: A\u00efmeur E, Laurent M, Yaich R, Dupont B, Garc\u00eda-Alfaro J (eds) Foundations and Practice of Security\u201414th International Symposium, FPS 2021, Paris, France, December 7\u201310, 2021, Revised Selected Papers. Lecture Notes in Computer Science, vol 13291, pp 191\u2013207. https:\/\/doi.org\/10.1007\/978-3-031-08147-7_13","DOI":"10.1007\/978-3-031-08147-7_13"},{"key":"6022_CR22","doi-asserted-by":"crossref","unstructured":"Shilpashree S, Lingareddy S, Bhat N, Kumar G (2019) Decision tree: a machine learning for intrusion detection. Int J Innov Technol Explor Eng (IJITEE) 8(6S4):1126\u20131130","DOI":"10.35940\/ijitee.F1234.0486S419"},{"issue":"2","key":"6022_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/SPY2.147","volume":"4","author":"M Ajdani","year":"2021","unstructured":"Ajdani M, Ghaffary HR (2021) Introduced a new method for enhancement of intrusion detection with random forest and PSO algorithm. Secur Priv 4(2):1. https:\/\/doi.org\/10.1002\/SPY2.147","journal-title":"Secur Priv"},{"key":"6022_CR24","doi-asserted-by":"publisher","unstructured":"Mokbal FMM, Wang D, Osman M, Yang P, Alsamhi SH (2022) An efficient intrusion detection framework based on embedding feature selection and ensemble learning technique. Int Arab J Inf Technol 19(2):237\u2013248 https:\/\/doi.org\/10.34028\/IAJIT\/19\/2\/11","DOI":"10.34028\/IAJIT\/19\/2\/11"},{"key":"6022_CR25","doi-asserted-by":"publisher","unstructured":"Ali MH, Fadlizolkipi M, Firdaus A, Khidzir NZ (2018) A hybrid particle swarm optimization\u2014extreme learning machine approach for intrusion detection system. In: 2018 IEEE Student Conference on Research and Development (SCOReD), pp 1\u20134. https:\/\/doi.org\/10.1109\/SCORED.2018.8711287","DOI":"10.1109\/SCORED.2018.8711287"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06022-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06022-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06022-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T07:07:53Z","timestamp":1718003273000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06022-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,21]]},"references-count":25,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["6022"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06022-y","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3739449\/v1","asserted-by":"object"}]},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,21]]},"assertion":[{"value":"23 February 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}