{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:22:35Z","timestamp":1763749355039,"version":"3.41.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:00:00Z","timestamp":1731283200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:00:00Z","timestamp":1731283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SOCA"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s11761-024-00435-6","type":"journal-article","created":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T07:18:58Z","timestamp":1731309538000},"page":"107-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Leveraging machine learning for enhanced cybersecurity: an intrusion detection system"],"prefix":"10.1007","volume":"19","author":[{"given":"Wurood Mahdi","family":"Sahib","sequence":"first","affiliation":[]},{"given":"Zainab Ali Abd","family":"Alhuseen","sequence":"additional","affiliation":[]},{"given":"Iman Dakhil Idan","family":"Saeedi","sequence":"additional","affiliation":[]},{"given":"Abdulkadhem A.","family":"Abdulkadhem","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,11]]},"reference":[{"issue":"2","key":"435_CR1","doi-asserted-by":"publisher","first-page":"198","DOI":"10.3390\/electronics11020198","volume":"11","author":"M Abdullahi","year":"2022","unstructured":"Abdullahi M et al (2022) Detecting cybersecurity attacks in internet of things using artificial intelligence methods: a systematic literature review. Electronics 11(2):198","journal-title":"Electronics"},{"key":"435_CR2","doi-asserted-by":"crossref","unstructured":"Khan MS, Siam RSF, Adnan MA (2024) A framework for checking and mitigating the security vulnerabilities of cloud service RESTful APIs. Serv Oriented Comput Appl, 1\u201322","DOI":"10.1007\/s11761-024-00404-z"},{"issue":"10","key":"435_CR3","doi-asserted-by":"publisher","first-page":"10733","DOI":"10.1007\/s10462-023-10437-z","volume":"56","author":"R Ahmad","year":"2023","unstructured":"Ahmad R, Alsmadi I, Alhamdani W, Tawalbeh L (2023) Zero-day attack detection: a systematic literature review. Artif Intell Rev 56(10):10733\u201310811","journal-title":"Artif Intell Rev"},{"key":"435_CR4","doi-asserted-by":"crossref","unstructured":"Zukaib U, Cui X, Zheng C, Liang D, Din SU, Meta-Fed IDS (2024) Meta-learning and Federated Learning Based Fog-Cloud Approach to detect known and zero-day Cyber attacks in IoMT Networks. J Parallel Distrib Comput 192:104934","DOI":"10.1016\/j.jpdc.2024.104934"},{"issue":"1","key":"435_CR5","first-page":"181","volume":"5","author":"NA Husin","year":"2024","unstructured":"Husin NA, Zolkepli MB, Manshor N, Al-Hchaimi AAJ, Albahri AS (2024) Routing techniques in Network-On-Chip based Multiprocessor-System-on-chip for IOT: a systematic review. Iraqi J Comput Sci Math 5(1):181\u2013204","journal-title":"Iraqi J Comput Sci Math"},{"issue":"2","key":"435_CR6","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.eij.2023.05.005","volume":"24","author":"AAJ Al-Hchaimi","year":"2023","unstructured":"Al-Hchaimi AAJ, Bin Sulaiman N, Bin Mustafa MA, Bin Mohtar MN, Mohd Hassan SLB, Muhsen YR (2023) A comprehensive evaluation approach for efficient countermeasure techniques against timing side-channel attack on MPSoC-based IoT using multi-criteria decision-making methods. Egypt Inf J 24(2):351\u2013364. https:\/\/doi.org\/10.1016\/j.eij.2023.05.005","journal-title":"Egypt Inf J"},{"key":"435_CR7","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/ACCESS.2022.3232395","volume":"11","author":"AAJ Al-Hchaimi","year":"2023","unstructured":"Al-Hchaimi AAJ, Sulaiman NB, Mustafa MAB, Mohtar MNB, Hassan SLBM, Muhsen YR (2023) Evaluation Approach for Efficient Countermeasure Techniques against Denial-of-Service Attack on MPSoC-Based IoT using Multi-criteria decision-making. IEEE Access 11:89\u2013106. https:\/\/doi.org\/10.1109\/ACCESS.2022.3232395","journal-title":"IEEE Access"},{"key":"435_CR8","doi-asserted-by":"crossref","unstructured":"Azad MA, Abdullah S, Arshad J, Lallie H, Ahmed YH (2024) Verify and trust: a multidimensional survey of zero-trust security in the age of IoT. Internet Things 27:101227","DOI":"10.1016\/j.iot.2024.101227"},{"issue":"2","key":"435_CR9","doi-asserted-by":"publisher","first-page":"64","DOI":"10.3390\/a17020064","volume":"17","author":"S More","year":"2024","unstructured":"More S, Idrissi M, Mahmoud H, Asyhari AT (2024) Enhanced intrusion detection systems performance with UNSW-NB15 Data Analysis. Algorithms 17(2):64","journal-title":"Algorithms"},{"issue":"7","key":"435_CR10","first-page":"993","volume":"13","author":"AG Wadday","year":"2020","unstructured":"Wadday AG, Al-hchaimi AAJ, Ibrahim AJ (2020) IOT Energy Consumption based on PSO-shortest path techniques. Recent Adv Electr Electron Eng (Formerly Recent Pat Electr Electron Eng 13(7):993\u20131000","journal-title":"Recent Adv Electr Electron Eng (Formerly Recent Pat Electr Electron Eng"},{"key":"435_CR11","doi-asserted-by":"crossref","unstructured":"Muhsen YR, Husin NA, Zolkepli MB, Manshor N, Al-Hchaimi AAJ, Ridha HM (2023) Enhancing NoC-based MPSoC performance: a predictive approach with ANN and guaranteed convergence arithmetic optimization algorithm. IEEE Access","DOI":"10.1109\/ACCESS.2023.3305669"},{"key":"435_CR12","doi-asserted-by":"crossref","unstructured":"Muhsen YR, Husin NA, Zolkepli MB, Manshor N, Al-Hchaimi AAJ (2023) Evaluation of the routing algorithms for NoC-based MPSoC: a fuzzy multi-criteria decision-making approach. IEEE Access 11:102806\u2013102827","DOI":"10.1109\/ACCESS.2023.3310246"},{"issue":"4","key":"435_CR13","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s11761-023-00377-5","volume":"17","author":"UR Saxena","year":"2023","unstructured":"Saxena UR, Alam T (2023) Recommendation-based trust computation and rating prediction model for security enhancement in cloud computing systems. Serv Oriented Comput Appl 17(4):239\u2013257","journal-title":"Serv Oriented Comput Appl"},{"key":"435_CR14","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1016\/j.procs.2020.03.367","volume":"167","author":"S Choudhary","year":"2020","unstructured":"Choudhary S, Kesswani N (2020) Analysis of KDD-Cup\u201999, NSL-KDD and UNSW-NB15 datasets using deep learning in IoT. Procedia Comput Sci 167:1561\u20131573","journal-title":"Procedia Comput Sci"},{"key":"435_CR15","doi-asserted-by":"publisher","unstructured":"Al-Hchaimi AAJ, Flayyih WN, Hashim F, Rusli MS, Rokhani FZ (2021) Review of 3D Networks-On-Chip Simulators and Plugins, in IEEE Asia Pacific Conference on Postgraduate Research in Microelectronics and Electronics (PrimeAsia), 2021, pp. 17\u201320. https:\/\/doi.org\/10.1109\/PrimeAsia51450.2021.9701472","DOI":"10.1109\/PrimeAsia51450.2021.9701472"},{"issue":"4","key":"435_CR16","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s11761-021-00327-z","volume":"15","author":"Y Badr","year":"2021","unstructured":"Badr Y, Zhu X, Alraja MN (2021) Security and privacy in the internet of things: threats and challenges. Serv Oriented Comput Appl 15(4):257\u2013271","journal-title":"Serv Oriented Comput Appl"},{"issue":"10","key":"435_CR17","doi-asserted-by":"publisher","first-page":"1666","DOI":"10.3390\/sym12101666","volume":"12","author":"MS Al-Daweri","year":"2020","unstructured":"Al-Daweri MS, Zainol Ariffin KA, Abdullah S, Md MFE, Senan (2020) An analysis of the KDD99 and UNSW-NB15 datasets for the intrusion detection system. Symmetry (Basel) 12(10):1666","journal-title":"Symmetry (Basel)"},{"key":"435_CR18","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.procs.2016.06.016","volume":"89","author":"MC Belavagi","year":"2016","unstructured":"Belavagi MC, Muniyal B (2016) Performance evaluation of supervised machine learning algorithms for intrusion detection. Procedia Comput Sci 89:117\u2013123","journal-title":"Procedia Comput Sci"},{"key":"435_CR19","doi-asserted-by":"crossref","unstructured":"Kumar K, Batth JS (2016) Network intrusion detection with feature selection techniques using machine-learning algorithms. Int J Comput Appl, 150, 12","DOI":"10.5120\/ijca2016910764"},{"key":"435_CR20","doi-asserted-by":"crossref","unstructured":"Kumar I, Mohd N, Bhatt C, Sharma SK (2020) Development of IDS using supervised machine learning, in Soft Computing: Theories and Applications: Proceedings of SoCTA 2019, pp. 565\u2013577","DOI":"10.1007\/978-981-15-4032-5_52"},{"issue":"5","key":"435_CR21","doi-asserted-by":"publisher","first-page":"419","DOI":"10.3103\/S0146411619050043","volume":"53","author":"N Bindra","year":"2019","unstructured":"Bindra N, Sood M (2019) Detecting DDoS attacks using machine learning techniques and contemporary intrusion detection dataset. Autom Control Comput Sci 53(5):419\u2013428","journal-title":"Autom Control Comput Sci"},{"issue":"3","key":"435_CR22","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1109\/JAS.2021.1004344","volume":"9","author":"MA Ferrag","year":"2021","unstructured":"Ferrag MA, Shu L, Friha O, Yang X (2021) Cyber security intrusion detection for agriculture 4.0: machine learning-based solutions, datasets, and future directions. IEEE\/CAA J Autom Sin 9(3):407\u2013436","journal-title":"IEEE\/CAA J Autom Sin"},{"key":"435_CR23","doi-asserted-by":"crossref","unstructured":"Nskh P, Varma MN, Naik RR (2016) Principle component analysis based intrusion detection system using support vector machine, in IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2016, pp. 1344\u20131350","DOI":"10.1109\/RTEICT.2016.7808050"},{"key":"435_CR24","doi-asserted-by":"crossref","unstructured":"Waskle S, Parashar L, Singh U (2020) Intrusion detection system using PCA with random forest approach, in 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), pp. 803\u2013808","DOI":"10.1109\/ICESC48915.2020.9155656"},{"key":"435_CR25","doi-asserted-by":"crossref","unstructured":"Aboueata N, Alrasbi S, Erbad A, Kassler A, Bhamare D (2019) Supervised machine learning techniques for efficient network intrusion detection, in 28th international conference on computer communication and networks (ICCCN), 2019, pp. 1\u20138","DOI":"10.1109\/ICCCN.2019.8847179"},{"key":"435_CR26","doi-asserted-by":"crossref","unstructured":"Salo F, Injadat M, Moubayed A, Nassif AB, Essex A (2019) Clustering enabled classification using ensemble feature selection for intrusion detection, in International Conference on Computing, Networking and Communications (ICNC), 2019, pp. 276\u2013281","DOI":"10.1109\/ICCNC.2019.8685636"},{"key":"435_CR27","doi-asserted-by":"crossref","unstructured":"Juvonen A, Hamalainen T (2014) An efficient network log anomaly detection system using random projection dimensionality reduction, in 6th international conference on new technologies, mobility and security (NTMS), 2014, pp. 1\u20135","DOI":"10.1109\/NTMS.2014.6814006"},{"key":"435_CR28","doi-asserted-by":"crossref","unstructured":"Al-hchaimi AAJ, Alomari MF, Muhsen YR, Sulaiman NB, Ali SH (2024) Explainable Machine Learning for Real-Time Payment Fraud Detection: Building Trustworthy Models to Protect Financial Transactions, in International Conference on Explainable Artificial Intelligence in the Digital Sustainability, pp. 1\u201325","DOI":"10.1007\/978-3-031-63717-9_1"},{"key":"435_CR29","doi-asserted-by":"crossref","unstructured":"Muhsen YR, Al-hchaimi AAJ (2024) Modelling Intelligent Agriculture Decision Support Tools to Boost Sustainable Digitalization: Evidence from MCDM Methods, in International Conference on Explainable Artificial Intelligence in the Digital Sustainability, pp. 93\u2013105","DOI":"10.1007\/978-3-031-63717-9_6"},{"issue":"1","key":"435_CR30","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1186\/s40537-023-00694-8","volume":"10","author":"Y Yin","year":"2023","unstructured":"Yin Y et al (2023) IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset. J Big data 10(1):15","journal-title":"J Big data"},{"key":"435_CR31","doi-asserted-by":"publisher","first-page":"2227","DOI":"10.1016\/j.procs.2024.04.211","volume":"235","author":"AD Vibhute","year":"2024","unstructured":"Vibhute AD, Khan M, Patil CH, Gaikwad SV, Mane AV, Patel KK (2024) Network anomaly detection and performance evaluation of convolutional neural networks on UNSW-NB15 dataset. Procedia Comput Sci 235:2227\u20132236","journal-title":"Procedia Comput Sci"},{"issue":"5","key":"435_CR32","doi-asserted-by":"publisher","first-page":"e300","DOI":"10.1002\/spy2.300","volume":"6","author":"YF Sallam","year":"2023","unstructured":"Sallam YF et al (2023) Efficient implementation of image representation, visual geometry group with 19 layers and residual network with 152 layers for intrusion detection from UNSW-NB15 dataset. Secur Priv 6(5):e300","journal-title":"Secur Priv"},{"key":"435_CR33","doi-asserted-by":"publisher","first-page":"102248","DOI":"10.1016\/j.cose.2021.102248","volume":"105","author":"HS Lallie","year":"2021","unstructured":"Lallie HS et al (2021) Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput Secur 105:102248","journal-title":"Comput Secur"},{"key":"435_CR34","doi-asserted-by":"crossref","unstructured":"Al-Enzi SHZ, Abbas S, Abbood AA, Muhsen YR, Al-Hchaimi AAJ, Almosawi Z (2023) Exploring Research Trends of Metaverse: A Bibliometric Analysis BT - Beyond Reality: Navigating the Power of Metaverse and Its Applications, pp. 21\u201334","DOI":"10.1007\/978-3-031-51716-7_2"}],"container-title":["Service Oriented Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-024-00435-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11761-024-00435-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-024-00435-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T06:05:57Z","timestamp":1749017157000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11761-024-00435-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,11]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["435"],"URL":"https:\/\/doi.org\/10.1007\/s11761-024-00435-6","relation":{},"ISSN":["1863-2386","1863-2394"],"issn-type":[{"type":"print","value":"1863-2386"},{"type":"electronic","value":"1863-2394"}],"subject":[],"published":{"date-parts":[[2024,11,11]]},"assertion":[{"value":"4 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}