{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T15:24:57Z","timestamp":1772205897708,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Innovations Syst Softw Eng"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s11334-025-00619-z","type":"journal-article","created":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T08:13:32Z","timestamp":1757405612000},"page":"1543-1557","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Converting tabular to image data to design IDS applying deep learning techniques"],"prefix":"10.1007","volume":"21","author":[{"given":"Phool","family":"Kumari","sequence":"first","affiliation":[]},{"given":"Arpita","family":"Srivastava","sequence":"additional","affiliation":[]},{"given":"Ditipriya","family":"Sinha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,8]]},"reference":[{"key":"619_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-022-00305-6","volume":"11","author":"E Onyema","year":"2022","unstructured":"Onyema E et al (2022) Design of intrusion detection system based on cyborg intelligence for security of cloud network traffic of smart cities. J Cloud Comput 11:1\u201320. https:\/\/doi.org\/10.1186\/s13677-022-00305-6","journal-title":"J Cloud Comput"},{"key":"619_CR2","doi-asserted-by":"publisher","first-page":"102324","DOI":"10.1016\/j.scs.2020.102324","volume":"61","author":"Md Arafatur Rahman","year":"2020","unstructured":"Arafatur Rahman Md et al (2020) Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustain Cities Soci 61:102324. https:\/\/doi.org\/10.1016\/j.scs.2020.102324","journal-title":"Sustain Cities Soci"},{"key":"619_CR3","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1016\/j.future.2024.06.051","volume":"160","author":"T Zoppi","year":"2024","unstructured":"Zoppi T, Gazzini S, Ceccarelli A (2024) Anomaly-based error and intrusion detection in tabular data: no DNN outperforms tree-based classifiers. Future Gener Comput Syst 160:951\u2013965","journal-title":"Future Gener Comput Syst"},{"key":"619_CR4","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.future.2023.09.035","volume":"151","author":"Z Ye","year":"2024","unstructured":"Ye Z, Luo J, Zhou W, Wang M, He Q (2024) An ensemble framework with improved hybrid breeding optimization-based feature selection for intrusion detection. Future Gener Comput Syst 151:124\u2013136","journal-title":"Future Gener Comput Syst"},{"key":"619_CR5","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1016\/j.future.2022.01.026","volume":"131","author":"H Ding","year":"2022","unstructured":"Ding H, Chen L, Dong L, Fu Z, Cui X (2022) Imbalanced data classification: a KNN and generative adversarial networks-based hybrid approach for intrusion detection. Future Gener Comput Syst 131:240\u2013254","journal-title":"Future Gener Comput Syst"},{"key":"619_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117144","volume":"201","author":"G Andresini","year":"2022","unstructured":"Andresini G, Appice A, Caforio FP, Malerba D, Vessio G (2022) Roulette: a neural attention multi-output model for explainable network intrusion detection. Expert Syst Appl 201:117144","journal-title":"Expert Syst Appl"},{"key":"619_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103432","volume":"134","author":"A Srivastava","year":"2023","unstructured":"Srivastava A, Sinha D, Kumar V (2023) WCGAN-GP based synthetic attack data generation with GA based feature selection for IDS. Comput Secur 134:103432","journal-title":"Comput Secur"},{"key":"619_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100699","volume":"22","author":"AS Dina","year":"2023","unstructured":"Dina AS, Siddique AB, Manivannan D (2023) A deep learning approach for intrusion detection in Internet of Things using focal loss function. Internet Things 22:100699","journal-title":"Internet Things"},{"issue":"10","key":"619_CR9","doi-asserted-by":"publisher","first-page":"14835","DOI":"10.1007\/s10586-024-04673-3","volume":"27","author":"A Srivastava","year":"2024","unstructured":"Srivastava A, Sinha D (2024) PSO-ACO-based bi-phase lightweight intrusion detection system combined with GA optimized ensemble classifiers. Cluster Comput 27(10):14835\u201314890","journal-title":"Cluster Comput"},{"key":"619_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102717","volume":"118","author":"D Aksu","year":"2022","unstructured":"Aksu D, Aydin MA (2022) MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach. Comput Secur 118:102717","journal-title":"Comput Secur"},{"key":"619_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121751","volume":"238","author":"B Sharma","year":"2024","unstructured":"Sharma B, Sharma L, Lal C, Roy S (2024) Explainable artificial intelligence for intrusion detection in IoT networks: a deep learning based approach. Expert Syst Appl 238:121751","journal-title":"Expert Syst Appl"},{"key":"619_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103733","volume":"139","author":"W Lim","year":"2024","unstructured":"Lim W, Chek KYS, Theng LB, Lin CTC (2024) Future of generative adversarial networks (GAN) for anomaly detection in network security: a review. Comput Secur 139:103733","journal-title":"Comput Secur"},{"issue":"8","key":"619_CR13","doi-asserted-by":"publisher","first-page":"4921","DOI":"10.3390\/app13084921","volume":"13","author":"EUH Qazi","year":"2023","unstructured":"Qazi EUH, Faheem MH, Zia T (2023) HDLNIDS: hybrid deep-learning-based network intrusion detection system. Appl Sci 13(8):4921","journal-title":"Appl Sci"},{"issue":"18","key":"619_CR14","doi-asserted-by":"publisher","first-page":"3639","DOI":"10.3390\/electronics13183639","volume":"13","author":"J Chen","year":"2024","unstructured":"Chen J, Xiao J, Xu J (2024) VGGIncepNet: enhancing network intrusion detection and network security through non-image-to-image conversion and deep learning. Electronics 13(18):3639","journal-title":"Electronics"},{"key":"619_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3459015","author":"VL Nguyen","year":"2024","unstructured":"Nguyen VL, Tsai HP, Shin H, Duong TQ (2024) Spatial data transformation and vision learning for elevating intrusion detection in IoT networks. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2024.3459015","journal-title":"IEEE Internet Things J"},{"key":"619_CR16","unstructured":"Yang L (2022) Optimized and automated machine learning techniques towards IoT data analytics and cybersecurity\u00a0(doctoral dissertation, the university of western ontario (Canada))"},{"key":"619_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103784","volume":"221","author":"S Latif","year":"2024","unstructured":"Latif S, Boulila W, Koubaa A, Zou Z, Ahmad J (2024) Dtl-ids: an optimized intrusion detection framework using deep transfer learning and genetic algorithm. J Netw Comput Appl 221:103784","journal-title":"J Netw Comput Appl"},{"key":"619_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122045","volume":"238","author":"Z Wang","year":"2024","unstructured":"Wang Z, Li J, Yang S, Luo X, Li D, Mahmoodi S (2024) A lightweight IoT intrusion detection model based on improved BERT-of-Theseus. Expert Syst Appl 238:122045","journal-title":"Expert Syst Appl"},{"key":"619_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123808","volume":"249","author":"H Nandanwar","year":"2024","unstructured":"Nandanwar H, Katarya R (2024) Deep learning enabled intrusion detection system for industrial IOT environment. Expert Syst Appl 249:123808","journal-title":"Expert Syst Appl"},{"issue":"1","key":"619_CR20","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/COMST.2021.3127267","volume":"24","author":"E Bout","year":"2022","unstructured":"Bout E, Loscri V, Gallais A (2022) How machine learning changes the nature of cyberattacks on IoT networks: a survey. IEEE Commun Surv Tutor 24(1):248\u2013279. https:\/\/doi.org\/10.1109\/COMST.2021.3127267","journal-title":"IEEE Commun Surv Tutor"},{"key":"619_CR21","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1016\/j.ins.2019.10.014","volume":"512","author":"M Zheng","year":"2020","unstructured":"Zheng M, Li T, Zhu R, Tang Y, Tang M, Lin L, Ma Z (2020) Conditional Wasserstein generative adversarial network-gradient penalty-based approach to alleviating imbalanced data classification. Inf Sci 512:1009\u20131102","journal-title":"Inf Sci"},{"key":"619_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3323927","author":"N Briner","year":"2023","unstructured":"Briner N, Cullen D, Halladay J, Miller D, Primeau R, Avila A, Basnet R, Doleck T (2023) Tabular-to-image transformations for the classification of anonymous network traffic using deep residual networks. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2023.3323927","journal-title":"IEEE Access"},{"key":"619_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110875","volume":"148","author":"H Huang","year":"2023","unstructured":"Huang H, Li T, Ding Y, Li B, Liu A (2023) An artificial immunity based intrusion detection system for unknown cyberattacks. Appl Soft Comput 148:110875","journal-title":"Appl Soft Comput"},{"key":"619_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.07.049","volume":"162","author":"Q Fan","year":"2025","unstructured":"Fan Q, Li X, Wang P, Jin X, Yao S, Miao S, An M, Zhao Y (2025) IDAD: An improved tensor train based distributed DDoS attack detection framework and its application in complex networks. Future Gener Comput Syst 162:107471","journal-title":"Future Gener Comput Syst"},{"key":"619_CR25","volume":"89","author":"A Srivastava","year":"2025","unstructured":"Srivastava A, Sinha D (2025) FP-growth-based signature extraction and unknown variants of DoS\/DDoS attack detection on real-time data stream. J Inf Secur Appl 89:103996","journal-title":"J Inf Secur Appl"}],"container-title":["Innovations in Systems and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-025-00619-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11334-025-00619-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-025-00619-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T03:04:36Z","timestamp":1760497476000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11334-025-00619-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["619"],"URL":"https:\/\/doi.org\/10.1007\/s11334-025-00619-z","relation":{},"ISSN":["1614-5046","1614-5054"],"issn-type":[{"value":"1614-5046","type":"print"},{"value":"1614-5054","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,8]]},"assertion":[{"value":"15 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}