{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:32:14Z","timestamp":1772119934030,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s11277-024-11002-9","type":"journal-article","created":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T04:02:12Z","timestamp":1714449732000},"page":"299-322","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Cyber Security Threats Detection in IoT Using Krill Based Deep Neural Network Stacked Auto Encoders"],"prefix":"10.1007","volume":"135","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-1544-4822","authenticated-orcid":false,"given":"Pragati","family":"Rana","sequence":"first","affiliation":[]},{"given":"Sanjeev","family":"Chauhan","sequence":"additional","affiliation":[]},{"given":"B. P.","family":"Patil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,30]]},"reference":[{"issue":"1","key":"11002_CR1","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MNET.2018.1700202","volume":"32","author":"He Li","year":"2018","unstructured":"Li, He., Ota, K., & Dong, M. (2018). Learning IoT in edge: Deep learning for the Internet of Things with edge computing. IEEE Network, 32(1), 96\u2013101.","journal-title":"IEEE Network"},{"issue":"4","key":"11002_CR2","doi-asserted-by":"publisher","first-page":"2432","DOI":"10.1109\/COMST.2017.2707140","volume":"19","author":"ZM Fadlullah","year":"2017","unstructured":"Fadlullah, Z. M., Tang, F., Mao, B., Kato, N., Akashi, O., Inoue, T., & Mizutani, K. (2017). State-of-the-art deep learning: Evolving machine intelligence toward tomorrow\u2019s intelligent network traffic control systems. IEEE Communications Surveys & Tutorials, 19(4), 2432\u20132455.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"3","key":"11002_CR3","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/MWC.2016.1600317WC","volume":"24","author":"N Kato","year":"2016","unstructured":"Kato, N., Fadlullah, Z. M., Mao, B., Tang, F., Akashi, O., Inoue, T., & Mizutani, K. (2016). The deep learning vision for heterogeneous network traffic control: Proposal, challenges, and future perspective. IEEE wireless communications, 24(3), 146\u2013153.","journal-title":"IEEE wireless communications"},{"key":"11002_CR4","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"DA Abeshu","year":"2018","unstructured":"Abeshu, D. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for the Internet of Things. Future Generation Computer Systems, 82, 761\u2013768.","journal-title":"Future Generation Computer Systems"},{"key":"11002_CR5","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.iot.2018.11.003","volume":"5","author":"PIR Grammatikis","year":"2019","unstructured":"Grammatikis, P. I. R., Sarigiannidis, P. G., & Moscholios, D. I. (2019). Securing the Internet of Things challenges, threats, and solutions. Internet of Things, 5, 41\u201370.","journal-title":"Internet of Things"},{"key":"11002_CR6","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Han, M., Liu, L., He, J. S., Wang, Y. (2018). Deep learning approach for cyberattack detection. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 262\u2013267). IEEE","DOI":"10.1109\/INFCOMW.2018.8407032"},{"issue":"2","key":"11002_CR7","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MC.2017.62","volume":"50","author":"E Bertino","year":"2017","unstructured":"Bertino, E., & Islam, N. (2017). Botnets and internet of things security. Computer, 50(2), 76\u201379.","journal-title":"Computer"},{"key":"11002_CR8","doi-asserted-by":"crossref","unstructured":"Kumar, S., Madhavan, L., Nagappan, M., & Sikdar B. (2016). Malware in pirated software: Case study of malware encounters in personal computers. In 2016 11th International Conference on Availability, Reliability, and Security (ARES) (pp. 423\u2013427). IEEE","DOI":"10.1109\/ARES.2016.101"},{"key":"11002_CR9","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.segan.2017.08.002","volume":"12","author":"P Eder-Neuhauser","year":"2017","unstructured":"Eder-Neuhauser, P., Zseby, T., Fabini, J., & Vormayr, G. (2017). Cyber attack models for smart grid environments. Sustainable Energy, Grids and Networks, 12, 10\u201329.","journal-title":"Sustainable Energy, Grids and Networks"},{"key":"11002_CR10","doi-asserted-by":"crossref","unstructured":"Tobiyama, S., Yamaguchi, Y., Shimada, H., Ikuse, T., & Yagi, T. (2016) Malware detection with deep neural network using process behavior. In 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC) (2, pp. 577\u2013582). IEEE","DOI":"10.1109\/COMPSAC.2016.151"},{"issue":"4","key":"11002_CR11","doi-asserted-by":"publisher","first-page":"158","DOI":"10.3390\/ijgi7040158","volume":"7","author":"S Han","year":"2018","unstructured":"Han, S., Ren, Fu., Chao, Wu., Chen, Y., Qingyun, Du., & Ye, X. (2018). Using the tensorflow deep neural network to classify mainland china visitor behaviours in hong kong from check-in data. ISPRS International Journal of Geo-Information, 7(4), 158.","journal-title":"ISPRS International Journal of Geo-Information"},{"issue":"11","key":"11002_CR12","doi-asserted-by":"publisher","first-page":"2528","DOI":"10.3390\/s19112528","volume":"19","author":"Y Yang","year":"2019","unstructured":"Yang, Y., Zheng, K., Chunhua, Wu., & Yang, Y. (2019). Improving the classification effectiveness of intrusion detection by using improved conditional variational autoencoder and deep neural network. Sensors, 19(11), 2528.","journal-title":"Sensors"},{"key":"11002_CR13","doi-asserted-by":"crossref","unstructured":"Campos, V., Sastre, F., Yag\u00fces, M., Torres, J., & Gir\u00f3-i-Nieto, X. (2017). Scaling a convolutional neural network for classification of adjective noun pairs with tensorflow on gpu clusters. In 2017 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID) (pp. 677\u2013682). IEEE","DOI":"10.1109\/CCGRID.2017.110"},{"key":"11002_CR14","unstructured":"Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., & Devin M., et al. (2016). Tensorflow: A system for large-scale machine learning. In 12th {USENIX} symposium on operating systems design and implementation ({OSDI} (16, pp. 265\u2013283)"},{"key":"11002_CR15","volume-title":"Style analysis for source code plagiarism detection","author":"OM Mirza","year":"2018","unstructured":"Mirza, O. M., & Joy, M. (2018). Style analysis for source code plagiarism detection. University of Warwick, Coventry, UK."},{"key":"11002_CR16","doi-asserted-by":"publisher","first-page":"141987","DOI":"10.1109\/ACCESS.2019.2943639","volume":"7","author":"F Ullah","year":"2019","unstructured":"Ullah, F., Wang, J., Jabbar, S., Al-Turjman, F., & Alazab, M. (2019). Source code authorship attribution using hybrid approach of program dependence graph and deep learning model. IEEE Access, 7, 141987\u2013141999.","journal-title":"IEEE Access"},{"key":"11002_CR17","doi-asserted-by":"crossref","unstructured":"Gorshkov, S., Nered, M., Ilyushin, E., Namiot, D., & Sukhomlin. V. (2018). Source code authorship identification using tokenization and boosting algorithms. In International Conference on Modern Information Technology and IT Education (pp. 295\u2013308). Springer, Cham","DOI":"10.1007\/978-3-030-46895-8_23"},{"key":"11002_CR18","doi-asserted-by":"crossref","unstructured":"Alrabaee, S., Shirani, P., Debbabi, M., & Wang L. (2016). On the feasibility of malware authorship attribution. In International Symposium on Foundations and Practice of Security (pp. 256\u2013272). Springer, Cham","DOI":"10.1007\/978-3-319-51966-1_17"},{"issue":"8","key":"11002_CR19","doi-asserted-by":"publisher","first-page":"3035","DOI":"10.1007\/s12652-018-0803-6","volume":"10","author":"W Wang","year":"2019","unstructured":"Wang, W., Zhao, M., & Wang, J. (2019). Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network. Journal of Ambient Intelligence and Humanized Computing, 10(8), 3035\u20133043.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"11002_CR20","doi-asserted-by":"publisher","first-page":"165607","DOI":"10.1109\/ACCESS.2019.2953095","volume":"7","author":"J Lee","year":"2019","unstructured":"Lee, J., Kim, J., Kim, I., & Han, K. (2019). Cyber threat detection based on artificial neural networks using event profiles. IEEE Access, 7, 165607\u2013165626.","journal-title":"IEEE Access"},{"key":"11002_CR21","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access, 5, 21954\u201321961.","journal-title":"Ieee Access"},{"issue":"7","key":"11002_CR22","doi-asserted-by":"publisher","first-page":"3187","DOI":"10.1109\/TII.2018.2822680","volume":"14","author":"Z Cui","year":"2018","unstructured":"Cui, Z., Xue, F., Cai, X., Cao, Y., Wang, G.-g, & Chen, J. (2018). Detection of malicious code variants based on deep learning. IEEE Transactions on Industrial Informatics, 14(7), 3187\u20133196.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"11002_CR23","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1093\/jigpal\/jzu038","volume":"23","author":"M Chora\u015b","year":"2015","unstructured":"Chora\u015b, M., & Kozik, R. (2015). Machine learning techniques applied to detect cyber attacks on web applications. Logic Journal of the IGPL, 23(1), 45\u201356. https:\/\/doi.org\/10.1093\/jigpal\/jzu038","journal-title":"Logic Journal of the IGPL"},{"key":"11002_CR24","doi-asserted-by":"crossref","unstructured":"Meng, F., Fang L., Fu, Y., & Tian, Z. (2018). Deep learning based attribute classification insider threat detection for data security. In 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC) (pp. 576\u2013581). IEEE","DOI":"10.1109\/DSC.2018.00092"},{"key":"11002_CR25","doi-asserted-by":"publisher","first-page":"107810","DOI":"10.1016\/j.compeleceng.2022.107810","volume":"99","author":"T Saba","year":"2022","unstructured":"Saba, T., Rehman, A., Sadad, T., Kolivand, H., & Bahaj, S. A. (2022). Anomaly-based intrusion detection system for IoT networks through deep learning model. Computers and Electrical Engineering, 99, 107810.","journal-title":"Computers and Electrical Engineering"},{"issue":"4","key":"11002_CR26","doi-asserted-by":"publisher","first-page":"524","DOI":"10.3390\/electronics11040524","volume":"11","author":"K-H Le","year":"2022","unstructured":"Le, K.-H., Nguyen, M.-H., Tran, T.-D., & Tran, N.-D. (2022). IMIDS: An intelligent intrusion detection system against cyber threats in IoT. Electronics, 11(4), 524.","journal-title":"Electronics"},{"key":"11002_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108626","volume":"107","author":"B Sharma","year":"2023","unstructured":"Sharma, B., Sharma, L., Lal, C., & Roy, S. (2023). Anomaly based network intrusion detection for IoT attacks using deep learning technique. Computers and Electrical Engineering, 107, 108626.","journal-title":"Computers and Electrical Engineering"},{"key":"11002_CR28","doi-asserted-by":"publisher","first-page":"9136","DOI":"10.1109\/ACCESS.2023.3238664","volume":"11","author":"IA Kandhro","year":"2023","unstructured":"Kandhro, I. A., Alanazi, S. M., Ali, F., Kehar, A., Fatima, K., Uddin, M., & Karuppayah, S. (2023). Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures. IEEE Access, 11, 9136\u20139148.","journal-title":"IEEE Access"},{"key":"11002_CR29","doi-asserted-by":"crossref","unstructured":"Lashkari, A. H., Draper-Gil, G., Mamun, M. S. I., & Ghorbani, A. A. (2017). Characterization of tor traffic using time based features. In ICISSp (pp. 253\u2013262)","DOI":"10.5220\/0005740704070414"},{"key":"11002_CR30","doi-asserted-by":"crossref","unstructured":"Hamdani, T. M., Alimi, A. M., & Karray, F. (2006). Distributed genetic algorithm with bi-coded chromosomes and a new evaluation function for features selection. In 2006 IEEE International Conference on Evolutionary Computation. IEEE","DOI":"10.1109\/CEC.2006.1688362"},{"key":"11002_CR31","doi-asserted-by":"crossref","unstructured":"Saharkhizan, M., et al. (2020). An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2020.2996425"},{"key":"11002_CR32","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., et al. (2019). Deep learning approach for intelligent intrusion detection system. IEEE Access, 7, 41525\u201341550.","journal-title":"IEEE Access"},{"key":"11002_CR33","doi-asserted-by":"crossref","unstructured":"Jahromi, A. N., Karimipour, H., Dehghantanha, A. & Choo,K. K. R. (2021). Toward detection and attribution of cyber-attacks in IoT-enabled cyber-physical Systems. In IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2021.3067667"},{"issue":"4","key":"11002_CR34","first-page":"975","volume":"16","author":"JCS Sicato","year":"2020","unstructured":"Sicato, J. C. S., Singh, S. K., Rathore, S., & Park, J. H. (2020). A comprehensive analyses of intrusion detection system for IoT environment. Journal of Information Processing Systems, 16(4), 975\u2013990.","journal-title":"Journal of Information Processing Systems"},{"issue":"9","key":"11002_CR35","doi-asserted-by":"publisher","first-page":"8852","DOI":"10.1109\/JIOT.2020.2996425","volume":"7","author":"M Saharkhizan","year":"2020","unstructured":"Saharkhizan, M., Azmoodeh, A., Dehghantanha, A., Choo, K.-K., & Parizi, R. M. (2020). An ensemble of deep recurrent neural networks for detecting iot cyber-attacks using network traffic. IEEE Internet of Things Journal, 7(9), 8852\u20138859.","journal-title":"IEEE Internet of Things Journal"},{"key":"11002_CR36","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1016\/j.future.2020.07.042","volume":"113","author":"MT Nguyen","year":"2020","unstructured":"Nguyen, M. T., & Kim, K. (2020). Genetic convolutional neural network for intrusion detection systems. Future Generation Computer Systems, 113, 418\u2013427.","journal-title":"Future Generation Computer Systems"},{"key":"11002_CR37","doi-asserted-by":"publisher","first-page":"82512","DOI":"10.1109\/ACCESS.2019.2923640","volume":"7","author":"X Gao","year":"2019","unstructured":"Gao, X., Shan, C., Changzhen, Hu., Niu, Z., & Liu, Z. (2019). An adaptive ensemble machine learning model for intrusion detection. IEEE Access, 7, 82512\u201382521.","journal-title":"IEEE Access"},{"key":"11002_CR38","doi-asserted-by":"publisher","first-page":"64366","DOI":"10.1109\/ACCESS.2019.2917299","volume":"7","author":"H Yang","year":"2019","unstructured":"Yang, H., & Wang, F. (2019). Wireless network intrusion detection based on improved convolutional neural network. Ieee Access, 7, 64366\u201364374.","journal-title":"Ieee Access"},{"key":"11002_CR39","doi-asserted-by":"publisher","first-page":"38597","DOI":"10.1109\/ACCESS.2019.2905633","volume":"7","author":"SM Kasongo","year":"2019","unstructured":"Kasongo, S. M., & Sun, Y. (2019). A deep learning method with filter based feature engineering for wireless intrusion detection system. IEEE Access, 7, 38597\u201338607.","journal-title":"IEEE Access"},{"key":"11002_CR40","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., Mamoun Alazab, K. P., Soman, P. P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for intelligent intrusion detection system. IEEE Access, 7, 41525\u201341550.","journal-title":"IEEE Access"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11002-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11002-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11002-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T04:19:46Z","timestamp":1715141986000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11002-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["11002"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11002-9","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-349982\/v1","asserted-by":"object"}]},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"20 March 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors do not have any conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}]}}