{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T11:09:43Z","timestamp":1772276983959,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T00:00:00Z","timestamp":1764201600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T00:00:00Z","timestamp":1764201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s11276-025-04047-6","type":"journal-article","created":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:18:40Z","timestamp":1764238720000},"page":"363-387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Trajectory of Targeted Attack by Hidden Markov Model"],"prefix":"10.1007","volume":"32","author":[{"given":"Ya-Hui","family":"Ou","sequence":"first","affiliation":[]},{"given":"Yi-Lang","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Zhen-Yu","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,27]]},"reference":[{"key":"4047_CR1","first-page":"163","volume":"2","author":"K Tsiknas","year":"2021","unstructured":"Tsiknas, K., Taketzis, D., Demertzis, K., & Skianis, C. (2021). Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures. Preprint - Computer Science and Mathematics, 2, 163\u2013186.","journal-title":"Preprint - Computer Science and Mathematics"},{"key":"4047_CR2","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1007\/s11280-020-00855-2","volume":"24","author":"Y Al-Hadhrami","year":"2021","unstructured":"Al-Hadhrami, Y., & Hussain, F. K. (2021). Ddos attacks in IoT networks: A comprehensive systematic literature review. World Wide Web, 24, 971\u20131001.","journal-title":"World Wide Web"},{"issue":"1","key":"4047_CR3","doi-asserted-by":"publisher","first-page":"65","DOI":"10.13052\/jcsm2245-1439.414","volume":"4","author":"M Abomhara","year":"2015","unstructured":"Abomhara, M., et al. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65\u201388.","journal-title":"Journal of Cyber Security and Mobility"},{"key":"4047_CR4","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2014.120","volume":"12","author":"F Kargl","year":"2014","unstructured":"Kargl, F., van der Heijden, R. W., Konig, H., Valdes, A., & Dacier, M. C. (2014). Insights on the security and dependability of industrial control systems. IEEE security & privacy, 12, 75\u201378.","journal-title":"IEEE security & privacy"},{"key":"4047_CR5","doi-asserted-by":"publisher","first-page":"13251","DOI":"10.1007\/s00521-021-05952-5","volume":"33","author":"CD Xuan","year":"2021","unstructured":"Xuan, C. D., & Dao, M. H. (2021). A novel approach for APT attack detection based on combined deep learning model. Neural Computing and Applications, 33, 13251\u201313264.","journal-title":"Neural Computing and Applications"},{"key":"4047_CR6","doi-asserted-by":"publisher","first-page":"2383","DOI":"10.1007\/s11227-020-03323-w","volume":"77","author":"A Banitalebi Dehkordi","year":"2021","unstructured":"Banitalebi Dehkordi, A., Soltanaghaei, M., & Boroujeni, F. Z. (2021). The DDoS attacks detection through machine learning and statistical methods in SDN. The Journal of Supercomputing, 77, 2383\u20132415.","journal-title":"The Journal of Supercomputing"},{"issue":"1","key":"4047_CR7","first-page":"54","volume":"11","author":"AK Sood","year":"2012","unstructured":"Sood, A. K., & Enbody, R. J. (2012). Targeted cyber attacks: A superset of advanced persistent threats. IEEE Security & Privacy, 11(1), 54\u201361.","journal-title":"IEEE Security & Privacy"},{"key":"4047_CR8","unstructured":"Trend Micro, \u201cThe Storybook Approach to MITRE ATT&CK,\u201d from: https:\/\/www.trendmicro.com\/en_us\/research\/21\/d\/the-storybook-approach-to-mitre-attack.html, 2021."},{"key":"4047_CR9","doi-asserted-by":"crossref","unstructured":"X. Shen, Z. Li, G. Burleigh, L. Wang, and Y. Chen, \u201cDecoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments,\u201d Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024.","DOI":"10.1145\/3634737.3645012"},{"key":"4047_CR10","volume-title":"Proposed Approach for Targeted Attacks Detection","author":"I Ghafir","year":"2015","unstructured":"Ghafir, I., & Prenosil, V. (2015). Proposed Approach for Targeted Attacks Detection. Springer."},{"issue":"2","key":"4047_CR11","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1111\/j.1467-9868.2005.00503.x","volume":"67","author":"H Zou","year":"2005","unstructured":"Zou, H., & Hastie, T. (2005). Regularization and variable selection via the elastic net. Journal of the Royal Statistical Society, 67(2), 301\u2013320.","journal-title":"Journal of the Royal Statistical Society"},{"key":"4047_CR12","unstructured":"J.N.S.S Janardhana Naidu, E.N. Ganesh, N. D. Reddy, and M. Sankaran, \u201cA Robust medical data sharing application with a collaborative hypothesis and Elastic net regression model\u201d, 2021 5th International Conference on Electronics, Communication and Aerospace Technology, 2021."},{"key":"4047_CR13","doi-asserted-by":"crossref","unstructured":"J. Liu, G. Liang, K. D. Siegmund, and J. P. Lewinger, \u201cData integration by multi-tuning parameter elastic net regression,\u201d BMC Bioinformatics, Springer. vol.19(369), 2018.","DOI":"10.1186\/s12859-018-2401-1"},{"key":"4047_CR14","doi-asserted-by":"publisher","first-page":"3709","DOI":"10.1109\/TIFS.2021.3087332","volume":"16","author":"J Wen","year":"2021","unstructured":"Wen, J., Zhao, B. Z. H., Xue, M., Oprea, A., & Qian, H. (2021). With great dispersion comes greater resilience: Efficient poisoning attacks and defenses for linear regression models. IEEE Transactions on Information Forensics and Security, 16, 3709\u20133723.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"4047_CR15","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.eswa.2017.09.053","volume":"92","author":"Z Katzir","year":"2018","unstructured":"Katzir, Z., & Elovici, Y. (2018). Quantifying the resilience of machine learning classifiers used for cyber security. Expert Systems with Applications, 92, 419\u2013429.","journal-title":"Expert Systems with Applications"},{"key":"4047_CR16","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.eswa.2017.08.043","volume":"91","author":"WN Robinson","year":"2018","unstructured":"Robinson, W. N., & Andrea, A. (2018). Sequential fraud detection for prepaid cards using hidden Markov model divergence. Expert Systems with Applications, 91, 235\u2013251.","journal-title":"Expert Systems with Applications"},{"key":"4047_CR17","doi-asserted-by":"crossref","unstructured":"S. Zhicai, X. Yongxiang, \u201cNovel Hidden Markov Model for Detecting Complicate Network Attacks,\u201d Wireless Communications, Networking and Information Security(WCNIS), 2010 IEEE International Conference, 2010.","DOI":"10.1109\/WCINS.2010.5541790"},{"key":"4047_CR18","doi-asserted-by":"crossref","unstructured":"Safeer M. Saifudeen, S. Selvam, A. Serma Saravana Pandian, R. Venkataramanan and A. Mohamed Safiullah, \u201cDetection of Progression of Clinical Mastitis in Cows Using Hidden Markov Model. \u201d Int. J. Pure App, pp.436\u2013441, 2017.","DOI":"10.18782\/2320-7051.2877"},{"key":"4047_CR19","doi-asserted-by":"crossref","unstructured":"P. Sirinam,M. Imani, M. Juarez, and M. Wright, \u201cDeep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning,\u201d Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1928\u20131943, 2018.","DOI":"10.1145\/3243734.3243768"},{"key":"4047_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2762825","author":"Z Zhuo","year":"2018","unstructured":"Zhuo, Z., Zhang, Y., Zhang, Z. L., Zhang, X., & Zhang, J. (2018). Website fingerprinting attack on anonymity networks based on profile hidden markov model. IEEE Transactions on Information Forensics and Security. https:\/\/doi.org\/10.1109\/TIFS.2017.2762825","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"4047_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.109143","volume":"137","author":"MA Shyaa","year":"2024","unstructured":"Shyaa, M. A., Ibrahim, N. F., Zainol, Z., Abdullah, R., Anbar, M., & Alzubaidi, L. (2024). Evolving cybersecurity frontiers: A comprehensive survey on concept drift and feature dynamics aware machine and deep learning in intrusion detection systems. Engineering Applications of Artificial Intelligence, 137, Article 109143.","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"4047_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103675","volume":"139","author":"Y Fang","year":"2024","unstructured":"Fang, Y., Yao, Y., Lin, X., Wang, J., & Zhai, H. (2024). A feature selection based on genetic algorithm for intrusion detection of industrial control systems. Computers & Security, 139, Article 103675.","journal-title":"Computers & Security"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-04047-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-025-04047-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-04047-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T06:55:56Z","timestamp":1772261756000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-025-04047-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,27]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["4047"],"URL":"https:\/\/doi.org\/10.1007\/s11276-025-04047-6","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,27]]},"assertion":[{"value":"1 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflicts of interest or competing interests associated with this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}