{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T14:40:23Z","timestamp":1775313623841,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T00:00:00Z","timestamp":1717027200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T00:00:00Z","timestamp":1717027200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100004895","name":"European Social Fund Plus","doi-asserted-by":"publisher","award":["2022-PRED-20677"],"award-info":[{"award-number":["2022-PRED-20677"]}],"id":[{"id":"10.13039\/501100004895","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004895","name":"European Social Fund Plus","doi-asserted-by":"publisher","award":["2023-GRIN-34056"],"award-info":[{"award-number":["2023-GRIN-34056"]}],"id":[{"id":"10.13039\/501100004895","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011698","name":"Junta de Comunidades de Castilla-La Mancha","doi-asserted-by":"publisher","award":["SBPLY\/21\/180501\/000195"],"award-info":[{"award-number":["SBPLY\/21\/180501\/000195"]}],"id":[{"id":"10.13039\/501100011698","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["PID2021-123627OB-C52"],"award-info":[{"award-number":["PID2021-123627OB-C52"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"name":"European Union Next Generation","award":["TED2021-131115A-I00"],"award-info":[{"award-number":["TED2021-131115A-I00"]}]},{"DOI":"10.13039\/501100008767","name":"Fundaci\u00f3n Agencia Aragonesa para la Investigaci\u00f3n y el Desarrollo","doi-asserted-by":"publisher","award":["T21-23R"],"award-info":[{"award-number":["T21-23R"]}],"id":[{"id":"10.13039\/501100008767","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003759","name":"Universidad Polit\u00e9cnica de Madrid","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003759","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The industrial internet of things (IIoT) has undergone rapid growth in recent years, which has resulted in an increase in the number of threats targeting both IIoT devices and their connecting technologies. However, deploying tools to counter these threats involves tackling inherent limitations, such as limited processing power, memory, and network bandwidth. As a result, traditional solutions, such as the ones used for desktop computers or servers, cannot be applied directly in the IIoT, and the development of new technologies is essential to overcome this issue. One approach that has shown potential for this new paradigm is the implementation of intrusion detection system (IDS) that rely on machine learning (ML) techniques. These IDSs can be deployed in the industrial control system or even at the edge layer of the IIoT topology. However, one of their drawbacks is that, depending on the factory\u2019s specifications, it can be quite challenging to locate sufficient traffic data to train these models. In order to address this problem, this study introduces a novel IDS based on the TabPFN model, which can operate on small datasets of IIoT traffic and protocols, as not in general much traffic is generated in this environment. To assess its efficacy, it is compared against other ML algorithms, such as random forest, XGBoost, and LightGBM, by evaluating each method with different training set sizes and varying numbers of classes to classify. Overall, TabPFN produced the most promising outcomes, with a 10\u201320% differentiation in each metric. The best performance was observed when working with 1000 training set samples, obtaining an F1 score of 81% for 6-class classification and 72% for 10-class classification.<\/jats:p>","DOI":"10.1007\/s11227-024-06166-x","type":"journal-article","created":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T17:02:14Z","timestamp":1717088534000},"page":"20080-20117","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["A TabPFN-based intrusion detection system for the industrial internet of things"],"prefix":"10.1007","volume":"80","author":[{"given":"Sergio","family":"Ruiz-Villafranca","sequence":"first","affiliation":[]},{"given":"Jos\u00e9","family":"Rold\u00e1n-G\u00f3mez","sequence":"additional","affiliation":[]},{"given":"Juan Manuel Castelo","family":"G\u00f3mez","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Carrillo-Mond\u00e9jar","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Luis","family":"Martinez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,30]]},"reference":[{"key":"6166_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/00207543.2020.1798035","volume":"59","author":"D Ivanov","year":"2020","unstructured":"Ivanov D, Tang C, Dolgui A, Battini D, Das A (2020) Researchers\u2019 perspectives on industry 4.0: multi-disciplinary analysis and opportunities for operations management. Int J Prod Res 59:1\u201324. https:\/\/doi.org\/10.1080\/00207543.2020.1798035","journal-title":"Int J Prod Res"},{"key":"6166_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2021.100257","volume":"26","author":"PKR Maddikunta","year":"2022","unstructured":"Maddikunta PKR, Pham Q-V, Prabadevi B, Deepa N, Dev K, Gadekallu TR, Ruby R, Liyanage M (2022) Industry 5.0: a survey on enabling technologies and potential applications. J Ind Inf Integr 26:100257. https:\/\/doi.org\/10.1016\/j.jii.2021.100257","journal-title":"J Ind Inf Integr"},{"key":"6166_CR3","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.procs.2022.12.206","volume":"217","author":"M Golovianko","year":"2023","unstructured":"Golovianko M, Terziyan V, Branytskyi V, Malyk D (2023) Industry 4.0 vs. industry 5.0: co-existence, transition, or a hybrid. Procedia Comput Sci 217:102\u2013113. https:\/\/doi.org\/10.1016\/j.procs.2022.12.206. (4th International Conference on Industry 4.0 and Smart Manufacturing)","journal-title":"Procedia Comput Sci"},{"key":"6166_CR4","doi-asserted-by":"publisher","unstructured":"M\u00f6ller DPF, Vakilzadian H, Haas RE (2022) From industry 4.0 towards industry 5.0. In: 2022 IEEE International Conference on Electro Information Technology (eIT), pp 61\u201368. https:\/\/doi.org\/10.1109\/eIT53891.2022.9813831","DOI":"10.1109\/eIT53891.2022.9813831"},{"issue":"11","key":"6166_CR5","doi-asserted-by":"publisher","first-page":"3901","DOI":"10.3390\/s21113901","volume":"21","author":"LL Dhirani","year":"2021","unstructured":"Dhirani LL, Armstrong E, Newe T (2021) Industrial IoT, cyber threats, and standards landscape: evaluation and roadmap. Sensors 21(11):3901","journal-title":"Sensors"},{"key":"6166_CR6","doi-asserted-by":"publisher","first-page":"19572","DOI":"10.1109\/ACCESS.2022.3151248","volume":"10","author":"A Halbouni","year":"2022","unstructured":"Halbouni A, Gunawan TS, Habaebi MH, Halbouni M, Kartiwi M, Ahmad R (2022) Machine learning and deep learning approaches for cybersecurity: a review. IEEE Access 10:19572\u201319585. https:\/\/doi.org\/10.1109\/ACCESS.2022.3151248","journal-title":"IEEE Access"},{"key":"6166_CR7","doi-asserted-by":"publisher","first-page":"4483","DOI":"10.1007\/s00521-020-05275-x","volume":"33","author":"X Cao","year":"2021","unstructured":"Cao X, Wang Y, Chen B, Zeng N (2021) Domain-adaptive intelligence for fault diagnosis based on deep transfer learning from scientific test rigs to industrial applications. Neural Comput Appl 33:4483\u20134499","journal-title":"Neural Comput Appl"},{"key":"6166_CR8","unstructured":"Hollmann N, M\u00fcller S, Eggensperger K, Hutter F (2022) Meta-learning a real-time tabular autoML method for small data. arXiv e-prints, arXiv:2207.01848"},{"key":"6166_CR9","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.ins.2021.09.014","volume":"581","author":"L Li","year":"2021","unstructured":"Li L, Kumar Damarla S, Wang Y, Huang B (2021) A gaussian mixture model based virtual sample generation approach for small datasets in industrial processes. Inf Sci 581:262\u2013277. https:\/\/doi.org\/10.1016\/j.ins.2021.09.014","journal-title":"Inf Sci"},{"key":"6166_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2022.108711","volume":"145","author":"SD Mili\u0107","year":"2023","unstructured":"Mili\u0107 SD, Durovic Z, Stojanovi\u0107 MD (2023) Data science and machine learning in the IIoT concepts of power plants. Int J Electr Power Energy Syst 145:108711. https:\/\/doi.org\/10.1016\/j.ijepes.2022.108711","journal-title":"Int J Electr Power Energy Syst"},{"key":"6166_CR11","first-page":"381","volume":"9","author":"B Mahesh","year":"2020","unstructured":"Mahesh B (2020) Machine learning algorithms-a review. Int J Sci Res IJSR 9:381\u2013386","journal-title":"Int J Sci Res IJSR"},{"key":"6166_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113251","volume":"149","author":"J Rold\u00e1n","year":"2020","unstructured":"Rold\u00e1n J, Boubeta-Puig J, Luis Mart\u00ednez J, Ortiz G (2020) Integrating complex event processing and machine learning: an intelligent architecture for detecting IoT security attacks. Expert Syst Appl 149:113251. https:\/\/doi.org\/10.1016\/j.eswa.2020.113251","journal-title":"Expert Syst Appl"},{"key":"6166_CR13","doi-asserted-by":"publisher","unstructured":"Suthishni DNP, Kumar KSS (2022) A review on machine learning based security approaches in intrusion detection system. In: 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom), pp 341\u2013348. https:\/\/doi.org\/10.23919\/INDIACom54597.2022.9763261","DOI":"10.23919\/INDIACom54597.2022.9763261"},{"issue":"03","key":"6166_CR14","doi-asserted-by":"publisher","first-page":"186","DOI":"10.36548\/jscp.2020.3.007","volume":"2","author":"S Smys","year":"2020","unstructured":"Smys S, Chen JIZ, Shakya S (2020) Survey on neural network architectures with deep learning. J Soft Comput Paradig JSCP 2(03):186\u2013194","journal-title":"J Soft Comput Paradig JSCP"},{"key":"6166_CR15","unstructured":"Grinsztajn L, Oyallon E, Varoquaux G (2022) Why do tree-based models still outperform deep learning on typical tabular data? In: Koyejo S, Mohamed S, Agarwal A, Belgrave D, Cho K, Oh A (eds) Advances in neural information processing systems, vol 35. Curran Associates, Inc., pp 507\u2013520 .https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2022\/file\/0378c7692da36807bdec87ab043cdadc-Paper-Datasets_and_Benchmarks.pdf"},{"issue":"16","key":"6166_CR16","doi-asserted-by":"publisher","first-page":"8162","DOI":"10.3390\/app12168162","volume":"12","author":"L Mohammadpour","year":"2022","unstructured":"Mohammadpour L, Ling TC, Liew CS, Aryanfar A (2022) A survey of CNN-based network intrusion detection. Appl Sci 12(16):8162. https:\/\/doi.org\/10.3390\/app12168162","journal-title":"Appl Sci"},{"key":"6166_CR17","first-page":"1","volume":"2020","author":"P Sun","year":"2020","unstructured":"Sun P, Liu P, Li Q, Liu C, Lu X, Hao R, Chen J (2020) DL-IDS: extracting features using CNN-LSTM hybrid network for intrusion detection system. Secur Commun Netw 2020:1\u201311","journal-title":"Secur Commun Netw"},{"key":"6166_CR18","doi-asserted-by":"publisher","unstructured":"Attia A, Faezipour M, Abuzneid A (2020) Network intrusion detection with XGBoost and deep learning algorithms: an evaluation study. In: 2020 International Conference on Computational Science and Computational Intelligence (CSCI), pp 138\u2013143. https:\/\/doi.org\/10.1109\/CSCI51800.2020.00031","DOI":"10.1109\/CSCI51800.2020.00031"},{"key":"6166_CR19","first-page":"18932","volume":"34","author":"Y Gorishniy","year":"2021","unstructured":"Gorishniy Y, Rubachev I, Khrulkov V, Babenko A (2021) Revisiting deep learning models for tabular data. Adv Neural Inf Process Syst 34:18932\u201318943","journal-title":"Adv Neural Inf Process Syst"},{"key":"6166_CR20","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.inffus.2021.11.011","volume":"81","author":"R Shwartz-Ziv","year":"2022","unstructured":"Shwartz-Ziv R, Armon A (2022) Tabular data: deep learning is not all you need. Inf Fusion 81:84\u201390. https:\/\/doi.org\/10.1016\/j.inffus.2021.11.011. (Accessed 2022-12-29)","journal-title":"Inf Fusion"},{"issue":"6","key":"6166_CR21","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.1007\/s10586-022-03776-z","volume":"26","author":"A Heidari","year":"2023","unstructured":"Heidari A, Jabraeil Jamali MA (2023) Internet of things intrusion detection systems: a comprehensive review and future directions. Clust Comput 26(6):3753\u20133780","journal-title":"Clust Comput"},{"issue":"4","key":"6166_CR22","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s42979-023-01849-3","volume":"4","author":"A Rosay","year":"2023","unstructured":"Rosay A, Cheval E, Ghanmi M, Carlier F, Leroux P (2023) Study of network ids in IoT devices. SN Comput Sci 4(4):407","journal-title":"SN Comput Sci"},{"key":"6166_CR23","doi-asserted-by":"publisher","unstructured":"Qurashi MA, Angelopoulos CM, Katos V (2020) An architecture for resilient intrusion detection in IoT networks. In: ICC 2020\u20142020 IEEE International Conference on Communications (ICC), pp 1\u20137. https:\/\/doi.org\/10.1109\/ICC40277.2020.9148868","DOI":"10.1109\/ICC40277.2020.9148868"},{"key":"6166_CR24","doi-asserted-by":"publisher","first-page":"66374","DOI":"10.1109\/ACCESS.2022.3185049","volume":"10","author":"M Alabadi","year":"2022","unstructured":"Alabadi M, Habbal A, Wei X (2022) Industrial internet of things: requirements, architecture, challenges, and future research directions. IEEE Access 10:66374\u201366400. https:\/\/doi.org\/10.1109\/ACCESS.2022.3185049","journal-title":"IEEE Access"},{"issue":"2","key":"6166_CR25","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/s10922-023-09723-6","volume":"31","author":"AA Fr\u00f6hlich","year":"2023","unstructured":"Fr\u00f6hlich AA, Horstmann LP, Hoffmann JLC (2023) A secure IIoT gateway architecture based on trusted execution environments. J Netw Syst Manag 31(2):32","journal-title":"J Netw Syst Manag"},{"key":"6166_CR26","doi-asserted-by":"publisher","unstructured":"Choudhry MD, Jeevanandham S, Rose B, Sruthi MP (2022) Machine learning frameworks for industrial internet of things (IIoT): a comprehensive analysis. In: 2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICEEICT53079.2022.9768630","DOI":"10.1109\/ICEEICT53079.2022.9768630"},{"key":"6166_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103637","volume":"215","author":"M Nuaimi","year":"2023","unstructured":"Nuaimi M, Fourati LC, Hamed BB (2023) Intelligent approaches toward intrusion detection systems for industrial internet of things: a systematic comprehensive review. J Netw Comput Appl 215:103637. https:\/\/doi.org\/10.1016\/j.jnca.2023.103637","journal-title":"J Netw Comput Appl"},{"key":"6166_CR28","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V et al (2011) Scikit-learn: machine learning in python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"issue":"6","key":"6166_CR29","doi-asserted-by":"publisher","first-page":"2131","DOI":"10.1109\/TCBB.2019.2911071","volume":"17","author":"A Ogunleye","year":"2019","unstructured":"Ogunleye A, Wang Q-G (2019) XGBoost model for chronic kidney disease diagnosis. IEEE\/ACM Trans Comput Biol Bioinform 17(6):2131\u20132140","journal-title":"IEEE\/ACM Trans Comput Biol Bioinform"},{"key":"6166_CR30","first-page":"1","volume":"30","author":"G Ke","year":"2017","unstructured":"Ke G, Meng Q, Finley T, Wang T, Chen W, Ma W, Ye Q, Liu T-Y (2017) LightGBM: a highly efficient gradient boosting decision tree. Adv Neural Inf Process Syst 30:1\u20139","journal-title":"Adv Neural Inf Process Syst"},{"issue":"8","key":"6166_CR31","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1587\/transcom.2022EBP3169","volume":"E106.B","author":"G ZHAO","year":"2023","unstructured":"ZHAO G, WANG Y, WANG J (2023) Intrusion detection model of internet of things based on LightGBM. IEICE Trans Commun E106.B(8):622\u2013634. https:\/\/doi.org\/10.1587\/transcom.2022EBP3169","journal-title":"IEICE Trans Commun"},{"key":"6166_CR32","doi-asserted-by":"publisher","unstructured":"M\u00fcller S, Hollmann N, Arango SP, Grabocka J, Hutter F. Transformers can do Bayesian inference. arXiv. https:\/\/doi.org\/10.48550\/arXiv.2112.10510. http:\/\/arxiv.org\/abs\/2112.10510 Accessed 17 May 2023","DOI":"10.48550\/arXiv.2112.10510"},{"key":"6166_CR33","doi-asserted-by":"publisher","unstructured":"Hollmann N, M\u00fcller S, Eggensperger K, Hutter F. TabPFN: a transformer that solves small tabular classification problems in a second. arXiv. https:\/\/doi.org\/10.48550\/arXiv.2207.01848. http:\/\/arxiv.org\/abs\/2207.01848 Accessed 17 May 2023","DOI":"10.48550\/arXiv.2207.01848"},{"issue":"1","key":"6166_CR34","first-page":"64","volume":"80","author":"WH Jefferys","year":"1992","unstructured":"Jefferys WH, Berger JO (1992) Ockham\u2019s razor and Bayesian analysis. Am Sci 80(1):64\u201372 (Accessed 2023-08-14)","journal-title":"Am Sci"},{"key":"6166_CR35","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s10115-017-1116-3","volume":"54","author":"P Adler","year":"2018","unstructured":"Adler P, Falk C, Friedler SA, Nix T, Rybeck G, Scheidegger C, Smith B, Venkatasubramanian S (2018) Auditing black-box models for indirect influence. Knowl Inf Syst 54:95\u2013122","journal-title":"Knowl Inf Syst"},{"issue":"1","key":"6166_CR36","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10922-022-09697-x","volume":"31","author":"S Mahadik","year":"2023","unstructured":"Mahadik S, Pawar PM, Muthalagu R (2023) Efficient intelligent intrusion detection system for heterogeneous Internet of Things (HetIoT). J Netw Syst Manag 31(1):2","journal-title":"J Netw Syst Manag"},{"key":"6166_CR37","doi-asserted-by":"publisher","unstructured":"Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp 1\u20138. https:\/\/doi.org\/10.1109\/CCST.2019.8888419","DOI":"10.1109\/CCST.2019.8888419"},{"key":"6166_CR38","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/9870345","volume-title":"Innovative artificial intelligence-based Internet of Things for smart cities and smart homes","author":"T-W Sung","year":"2023","unstructured":"Sung T-W, Lee C-Y, Gaber T, Nassar H et al (2023) Innovative artificial intelligence-based Internet of Things for smart cities and smart homes. Hindawi, London"},{"key":"6166_CR39","doi-asserted-by":"publisher","unstructured":"Zolanvari M (2021) Wustl-IIoT-2021 dataset. https:\/\/doi.org\/10.21227\/yftq-n229","DOI":"10.21227\/yftq-n229"},{"issue":"4","key":"6166_CR40","doi-asserted-by":"publisher","first-page":"2479","DOI":"10.3390\/app13042479","volume":"13","author":"JB Awotunde","year":"2023","unstructured":"Awotunde JB, Folorunso SO, Imoize AL, Odunuga JO, Lee C-C, Li C-T, Do D-T (2023) An ensemble tree-based model for intrusion detection in industrial internet of things networks. Appl Sci 13(4):2479. https:\/\/doi.org\/10.3390\/app13042479","journal-title":"Appl Sci"},{"key":"6166_CR41","unstructured":"Moustafa N (2020) ToN-IoT dataset. https:\/\/cloudstor.aarnet.edu.au\/plus\/s\/ds5zW91vdgjEj9i"},{"key":"6166_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-022-00456-9","volume":"19","author":"M Mohy-eddine","year":"2022","unstructured":"Mohy-eddine M, Guezzaz A, Benkirane S, Azrour M (2022) An effective intrusion detection approach based on ensemble learning for IIoT edge computing. J Comput Virol Hack Tech 19:1\u201313","journal-title":"J Comput Virol Hack Tech"},{"key":"6166_CR43","doi-asserted-by":"publisher","unstructured":"Peterson JM, Leevy JL, Khoshgoftaar TM (2021) A review and analysis of the Bot-IoT dataset. In: 2021 IEEE International Conference on Service-Oriented System Engineering (SOSE), pp 20\u201327. https:\/\/doi.org\/10.1109\/SOSE52839.2021.00007","DOI":"10.1109\/SOSE52839.2021.00007"},{"issue":"14","key":"6166_CR44","doi-asserted-by":"publisher","first-page":"8707","DOI":"10.3390\/su14148707","volume":"14","author":"T-T-H Le","year":"2022","unstructured":"Le T-T-H, Oktian YE, Kim H (2022) XGBoost for imbalanced multiclass classification-based industrial internet of things intrusion detection systems. Sustainability 14(14):8707. https:\/\/doi.org\/10.3390\/su14148707","journal-title":"Sustainability"},{"issue":"5","key":"6166_CR45","doi-asserted-by":"publisher","first-page":"3962","DOI":"10.1109\/JIOT.2021.3102056","volume":"9","author":"M Al-Hawawreh","year":"2022","unstructured":"Al-Hawawreh M, Sitnikova E, Aboutorab N (2022) X-IIoTID: a connectivity-agnostic and device-agnostic intrusion data set for industrial internet of things. IEEE Internet Things J 9(5):3962\u20133977. https:\/\/doi.org\/10.1109\/JIOT.2021.3102056","journal-title":"IEEE Internet Things J"},{"key":"6166_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2022.101322","volume":"38","author":"HC Altunay","year":"2023","unstructured":"Altunay HC, Albayrak Z (2023) A hybrid CNN+LSTM-based intrusion detection system for industrial IoT networks. Eng Sci Technol Int J 38:101322. https:\/\/doi.org\/10.1016\/j.jestch.2022.101322","journal-title":"Eng Sci Technol Int J"},{"key":"6166_CR47","doi-asserted-by":"publisher","unstructured":"Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp 1\u20136. https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"6166_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109868","volume":"233","author":"S Ruiz-Villafranca","year":"2023","unstructured":"Ruiz-Villafranca S, Rold\u00e1n-G\u00f3mez J, Carrillo-Mond\u00e9jar J, G\u00f3mez JMC, Villal\u00f3n JM (2023) A MEC-IIoT intelligent threat detector based on machine learning boosted tree algorithms. Comput Netw 233:109868. https:\/\/doi.org\/10.1016\/j.comnet.2023.109868","journal-title":"Comput Netw"},{"issue":"1","key":"6166_CR49","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2017.1600363CM","volume":"55","author":"J Zhou","year":"2017","unstructured":"Zhou J, Cao Z, Dong X, Vasilakos AV (2017) Security and privacy for cloud-based IoT: challenges. IEEE Commun Mag 55(1):26\u201333. https:\/\/doi.org\/10.1109\/MCOM.2017.1600363CM","journal-title":"IEEE Commun Mag"},{"key":"6166_CR50","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H (2022) Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 10:40281\u201340306. https:\/\/doi.org\/10.1109\/ACCESS.2022.3165809","journal-title":"IEEE Access"},{"key":"6166_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102675","volume":"116","author":"Z Yang","year":"2022","unstructured":"Yang Z, Liu X, Li T, Wu D, Wang J, Zhao Y, Han H (2022) A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput Secur 116:102675. https:\/\/doi.org\/10.1016\/j.cose.2022.102675","journal-title":"Comput Secur"},{"key":"6166_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.ab.2021.114335","volume":"630","author":"Y Liang","year":"2021","unstructured":"Liang Y, Zhang S, Qiao H, Yao Y (2021) iPromoter-ET: identifying promoters and their strength by extremely randomized trees-based feature selection. Anal Biochem 630:114335. https:\/\/doi.org\/10.1016\/j.ab.2021.114335","journal-title":"Anal Biochem"},{"key":"6166_CR53","unstructured":"Liashchynskyi P, Liashchynskyi P (2019) Grid search, random search, genetic algorithm: a big comparison for NAS"},{"key":"6166_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-023-05098-2","volume":"79","author":"S Ruiz-Villafranca","year":"2023","unstructured":"Ruiz-Villafranca S, Carrillo-Mond\u00e9jar J, G\u00f3mez J, Rold\u00e1n-G\u00f3mez J (2023) MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats. J Supercomput 79:1\u201339. https:\/\/doi.org\/10.1007\/s11227-023-05098-2","journal-title":"J Supercomput"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06166-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06166-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06166-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T13:46:41Z","timestamp":1722606401000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06166-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,30]]},"references-count":54,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["6166"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06166-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,30]]},"assertion":[{"value":"26 April 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}