{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T11:02:41Z","timestamp":1773658961091,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T00:00:00Z","timestamp":1769990400000},"content-version":"vor","delay-in-days":1,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100006565","name":"University of Johannesburg","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100006565","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s12065-025-01133-8","type":"journal-article","created":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T04:44:19Z","timestamp":1770007459000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["GA-optimized deep learning intrusion detection framework with LIME explainability for IoT networks"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5684-5043","authenticated-orcid":false,"given":"Elijah M.","family":"Maseno","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3455-9625","authenticated-orcid":false,"given":"Yanxia","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3025-336X","authenticated-orcid":false,"given":"Zenghui","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,2]]},"reference":[{"issue":"March","key":"1133_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2025.101624","volume":"32","author":"H Benaddi","year":"2025","unstructured":"Benaddi H, Jouhari M, Elharrouss O (2025) A lightweight hybrid approach for intrusion detection systems using a chi-square feature selection approach in IoT. Internet of Things (The Netherlands) 32(March):101624. https:\/\/doi.org\/10.1016\/j.iot.2025.101624","journal-title":"Internet of Things (The Netherlands)"},{"issue":"June","key":"1133_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2025.104127","volume":"93","author":"V Ieropoulos","year":"2025","unstructured":"Ieropoulos V, Anthi E, Spyridopoulos T, Burnap P, Mavromatis I, Khan A, Carnelli P (2025) Collaborative intrusion detection in resource-constrained IoT environments: challenges, methods, and future directions a review. J Inf Secur Appl 93(June):104127. https:\/\/doi.org\/10.1016\/j.jisa.2025.104127","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"1133_CR3","doi-asserted-by":"publisher","first-page":"1554","DOI":"10.1038\/s41598-025-85248-z","volume":"15","author":"N Dash","year":"2025","unstructured":"Dash N, Chakravarty S, Rath AK, Giri NC, AboRas KM, Gowtham N (2025) An optimized LSTM-based deep learning model for anomaly network intrusion detection. Sci Rep 15(1):1554. https:\/\/doi.org\/10.1038\/s41598-025-85248-z","journal-title":"Sci Rep"},{"issue":"1","key":"1133_CR4","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1186\/s40537-020-00379-6","volume":"7","author":"SM Kasongo","year":"2020","unstructured":"Kasongo SM, Sun Y (2020) Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J Big Data 7(1):105. https:\/\/doi.org\/10.1186\/s40537-020-00379-6","journal-title":"J Big Data"},{"key":"1133_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-024-06209-1","author":"SA Elsaid","year":"2024","unstructured":"Elsaid SA, Shehab E, Mattar AM, Azar AT, Hameed IA (2024) Hybrid intrusion detection models based on GWO optimized deep learning. Discov Appl Sci. https:\/\/doi.org\/10.1007\/s42452-024-06209-1","journal-title":"Discov Appl Sci"},{"issue":"23","key":"1133_CR6","doi-asserted-by":"publisher","first-page":"9318","DOI":"10.3390\/s22239318","volume":"22","author":"S Sheikhi","year":"2022","unstructured":"Sheikhi S, Kostakos P (2022) A novel anomaly-based intrusion detection model using PSOGWO-optimized BP neural network and GA-based feature selection. Sensors 22(23):9318. https:\/\/doi.org\/10.3390\/s22239318","journal-title":"Sensors"},{"issue":"1","key":"1133_CR7","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/s43621-025-01141-9","volume":"6","author":"MZ Khan","year":"2025","unstructured":"Khan MZ, Reshi AA, Shafi S, Aljubayri I (2025) An adaptive hybrid framework for IIoT intrusion detection using neural networks and feature optimization using genetic algorithms. Discover Sustain 6(1):382. https:\/\/doi.org\/10.1007\/s43621-025-01141-9","journal-title":"Discover Sustain"},{"issue":"7","key":"1133_CR8","doi-asserted-by":"publisher","first-page":"2288","DOI":"10.3390\/s25072288","volume":"25","author":"TB Ogunseyi","year":"2025","unstructured":"Ogunseyi TB, Thiyagarajan G (2025) An explainable LSTM-based intrusion detection system optimized by Firefly algorithm for IoT networks. Sensors 25(7):2288. https:\/\/doi.org\/10.3390\/s25072288","journal-title":"Sensors"},{"key":"1133_CR9","doi-asserted-by":"publisher","DOI":"10.7759\/s44389-025-06001-1","author":"R Chinnasamy","year":"2025","unstructured":"Chinnasamy R, Subramanian M, Sengupta N, MP, R. (2025) Contextual Internet of Things intrusion detection: a sliding window convolutional neural network-gated recurrent unit model enhanced by graph neural networks. Cureus J Comput Sci. https:\/\/doi.org\/10.7759\/s44389-025-06001-1","journal-title":"Cureus J Comput Sci"},{"issue":"1","key":"1133_CR10","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s10791-025-09632-z","volume":"28","author":"SKR Mallidi","year":"2025","unstructured":"Mallidi SKR, Ramisetty RR (2025) A multi-level intrusion detection system for industrial IoT using bowerbird courtship-inspired feature selection and hybrid data balancing. Discover Comput 28(1):109. https:\/\/doi.org\/10.1007\/s10791-025-09632-z","journal-title":"Discover Comput"},{"issue":"June","key":"1133_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2025.110541","volume":"126","author":"M Mir","year":"2025","unstructured":"Mir M, Trik M (2025) A novel intrusion detection framework for industrial IoT\u202f: GCN-GRU architecture optimized with ant colony optimization. Comput Electr Eng 126(June):110541. https:\/\/doi.org\/10.1016\/j.compeleceng.2025.110541","journal-title":"Comput Electr Eng"},{"key":"1133_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2025.101675","volume":"33","author":"Z Turgut","year":"2025","unstructured":"Turgut Z, Ba\u015farslan MS (2025) XBiDeep: a novel explainable artificial intelligence based intrusion detection system for internet of medical things environment. Internet Things 33:101675. https:\/\/doi.org\/10.1016\/j.iot.2025.101675","journal-title":"Internet Things"},{"issue":"22","key":"1133_CR13","doi-asserted-by":"publisher","first-page":"4607","DOI":"10.3390\/math11224607","volume":"11","author":"R AlGhamdi","year":"2023","unstructured":"AlGhamdi R (2023) Design of network intrusion detection system using Lion optimization-based feature selection with deep learning model. Mathematics 11(22):4607. https:\/\/doi.org\/10.3390\/math11224607","journal-title":"Mathematics"},{"issue":"May 2021","key":"1133_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116545","volume":"194","author":"PR Kanna","year":"2022","unstructured":"Kanna PR, Santhi P (2022) Hybrid intrusion detection using MapReduce based black widow optimized convolutional long short-term memory neural networks. Expert Syst Appl 194(May 2021):116545. https:\/\/doi.org\/10.1016\/j.eswa.2022.116545","journal-title":"Expert Syst Appl"},{"issue":"17","key":"1133_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/math11173724","volume":"11","author":"D Kilichev","year":"2023","unstructured":"Kilichev D, Kim W (2023) Hyperparameter optimization for 1D-CNN-based network intrusion detection using GA and PSO. Mathematics 11(17):1\u201331. https:\/\/doi.org\/10.3390\/math11173724","journal-title":"Mathematics"},{"issue":"February","key":"1133_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111434","volume":"155","author":"YK Saheed","year":"2024","unstructured":"Saheed YK, Abdulganiyu OH, Tchakoucht TA (2024) Modified genetic algorithm and fine-tuned long short-term memory network for intrusion detection in the internet of things networks with edge capabilities. Appl Soft Comput 155(February):111434. https:\/\/doi.org\/10.1016\/j.asoc.2024.111434","journal-title":"Appl Soft Comput"},{"issue":"August","key":"1133_CR17","doi-asserted-by":"publisher","first-page":"135535","DOI":"10.1109\/ACCESS.2024.3464529","volume":"12","author":"Z Xia","year":"2024","unstructured":"Xia Z, He S, Liu C, Liu Y, Yang X, Bu H (2024) PSO-GA hyperparameter optimized ResNet-BiGRU based intrusion detection method. IEEE Access 12(August):135535\u2013135550. https:\/\/doi.org\/10.1109\/ACCESS.2024.3464529","journal-title":"IEEE Access"},{"key":"1133_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-025-09946-9","volume":"9","author":"O Boubertakh","year":"2025","unstructured":"Boubertakh O, Sahnoun A, Zitouni A, Harous S (2025) HyMD2I\u202f: hybrid metaheuristic \u2011 deep learning approach for intrusion detection in IoT. J Netw Syst Manage 9:74. https:\/\/doi.org\/10.1007\/s10922-025-09946-9","journal-title":"J Netw Syst Manage"},{"issue":"March","key":"1133_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100717","volume":"27","author":"E Vetrimani","year":"2023","unstructured":"Vetrimani E, Arulselvi M, Ramesh G (2023) Building convolutional neural network parameters using genetic algorithm for the croup cough classification problem. Meas Sensors 27(March):100717. https:\/\/doi.org\/10.1016\/j.measen.2023.100717","journal-title":"Meas Sensors"},{"key":"1133_CR20","doi-asserted-by":"publisher","unstructured":"Singh U, Saurabh K, Trehan N, Vyas R, Vyas OP (2024) GA-LSTM: performance optimization of LSTM driven time series forecasting: GA-LSTM: Performance Optimization..: U. Singh et al. In Computational Economics (Issue 0123456789). Springer US. https:\/\/doi.org\/10.1007\/s10614-024-10769-0","DOI":"10.1007\/s10614-024-10769-0"},{"issue":"3","key":"1133_CR21","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1007\/s11269-023-03713-8","volume":"38","author":"YD Jhong","year":"2024","unstructured":"Jhong YD, Chen CS, Jhong BC, Tsai CH, Yang SY (2024) Optimization of LSTM parameters for flash flood forecasting using genetic algorithm. Water Resour Manage 38(3):1141\u20131164. https:\/\/doi.org\/10.1007\/s11269-023-03713-8","journal-title":"Water Resour Manage"},{"issue":"8","key":"1133_CR22","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780. https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735","journal-title":"Neural Comput"},{"key":"1133_CR23","doi-asserted-by":"publisher","unstructured":"Chao K, Merri\u00a8enboer van, B, Dzmitry B, Yoshua, B (2014) On the Properties of Neural Machine Translation: Encoder\u2013Decoder Approaches. In D. and Wu, M. and Carpuat, X. and Carreras, & E. M. Vecchi (Eds.), Proceedings of SSST-8, Eighth Workshop on Syntax, Semantics and Structure in Statistical Translation, pages 103\u2013111, October 25, 2014, Doha, Qatar. c 2014 Association for Computational Linguistics (Vol. 1, pp. 103\u2013111). Association for Computational Linguistics. https:\/\/doi.org\/10.3115\/v1\/W14-4012","DOI":"10.3115\/v1\/W14-4012"},{"key":"1133_CR24","doi-asserted-by":"publisher","DOI":"10.1002\/aisy.202400304","author":"AM Salih","year":"2025","unstructured":"Salih AM, Raisi-Estabragh Z, Galazzo IB, Radeva P, Petersen SE, Lekadir K, Menegaz G (2025) A perspective on explainable artificial intelligence methods: SHAP and LIME. Adv Intell Syst. https:\/\/doi.org\/10.1002\/aisy.202400304","journal-title":"Adv Intell Syst"},{"key":"1133_CR25","doi-asserted-by":"publisher","unstructured":"Ribeiro MT, Singh S, Guestrin C (2016) \u201cWhy Should I Trust You?\u201d Explaining the predictions of any classifier. In: NAACL-HLT 2016-2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Proceedings of the Demonstrations Session, pp 97\u2013101. https:\/\/doi.org\/10.18653\/v1\/n16-3020","DOI":"10.18653\/v1\/n16-3020"},{"key":"1133_CR26","unstructured":"Lundberg SM, Lee SI (2017) A unified approach to interpreting model predictions. In: Advances in neural information processing systems, 2017-Decem(Section 2), 4766\u20134775"},{"issue":"February","key":"1133_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102994","volume":"72","author":"N Moustafa","year":"2021","unstructured":"Moustafa N (2021) A new distributed architecture for evaluating AI-based security systems at the edge: network TON_IoT datasets. Sustain Cities Soc 72(February):102994. https:\/\/doi.org\/10.1016\/j.scs.2021.102994","journal-title":"Sustain Cities Soc"},{"key":"1133_CR28","doi-asserted-by":"publisher","unstructured":"Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference, MilCIS 2015 - Proceedings, pp 1\u20136. https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"2","key":"1133_CR29","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/s10207-023-00767-y","volume":"23","author":"H Zouhri","year":"2024","unstructured":"Zouhri H, Idri A, Ratnani A (2024) Evaluating the impact of filter-based feature selection in intrusion detection systems. Int J Inf Secur 23(2):759\u2013785. https:\/\/doi.org\/10.1007\/s10207-023-00767-y","journal-title":"Int J Inf Secur"},{"issue":"3","key":"1133_CR30","doi-asserted-by":"publisher","first-page":"2365","DOI":"10.1007\/s10586-023-04089-5","volume":"27","author":"VD Ngo","year":"2024","unstructured":"Ngo VD, Vuong TC, Van Luong T, Tran H (2024) Machine learning-based intrusion detection: feature selection versus feature extraction. Cluster Comput 27(3):2365\u20132379. https:\/\/doi.org\/10.1007\/s10586-023-04089-5","journal-title":"Cluster Comput"},{"issue":"3","key":"1133_CR31","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1007\/s43538-024-00372-0","volume":"91","author":"R Ji","year":"2024","unstructured":"Ji R, Kumar N, Padha D (2024) CNN-GWO-voting & hybrid: ensemble learning inspired intrusion detection approaches for cyber-physical systems. Proc Indian Natl Sci Acad 91(3):848\u2013862. https:\/\/doi.org\/10.1007\/s43538-024-00372-0","journal-title":"Proc Indian Natl Sci Acad"},{"issue":"1","key":"1133_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/spy2.497","volume":"8","author":"R Ji","year":"2025","unstructured":"Ji R, Selwal A, Kumar N, Padha D (2025) Cascading bagging and boosting ensemble methods for intrusion detection in cyber-physical systems. Secur Priv 8(1):1\u201311. https:\/\/doi.org\/10.1002\/spy2.497","journal-title":"Secur Priv"},{"issue":"3","key":"1133_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/spy2.70031","volume":"8","author":"R Ji","year":"2025","unstructured":"Ji R, Kumar N, Padha D (2025) Optimized intrusion detection approach for cyber-physical system using meta-learning with stacked generalization: an ensemble learning inspired approach. Secur Privacy 8(3):1\u201318. https:\/\/doi.org\/10.1002\/spy2.70031","journal-title":"Secur Privacy"},{"issue":"30","key":"1133_CR34","doi-asserted-by":"publisher","first-page":"3069","DOI":"10.17485\/IJST\/v17i30.1794","volume":"17","author":"R Ji","year":"2024","unstructured":"Ji R, Kumar N, Padha D (2024) Hybrid enhanced intrusion detection frameworks for cyber-physical systems via optimal features selection. Indian J Sci Technol 17(30):3069\u20133079","journal-title":"Indian J Sci Technol"},{"key":"1133_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.111018","volume":"150","author":"J Liu","year":"2024","unstructured":"Liu J, Li D, Shan W, Liu S (2024) A feature selection method based on multiple feature subsets extraction and result fusion for improving classification performance. Appl Soft Comput 150:111018. https:\/\/doi.org\/10.1016\/j.asoc.2023.111018","journal-title":"Appl Soft Comput"},{"key":"1133_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108162","volume":"133","author":"E Zorarpaci","year":"2024","unstructured":"Zorarpaci E (2024) A fast intrusion detection system based on swift wrapper feature selection and speedy ensemble classifier. Eng Appl Artif Intell 133:108162. https:\/\/doi.org\/10.1016\/j.engappai.2024.108162","journal-title":"Eng Appl Artif Intell"},{"key":"1133_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111578","volume":"291","author":"A Chaudhuri","year":"2024","unstructured":"Chaudhuri A (2024) Search space division method for wrapper feature selection on high-dimensional data classification. Knowl Based Syst 291:111578. https:\/\/doi.org\/10.1016\/j.knosys.2024.111578","journal-title":"Knowl Based Syst"},{"key":"1133_CR38","doi-asserted-by":"publisher","unstructured":"Pal KK, Eriksen AV, Dinh N (2025) XGBoost feature selection for multi-class and binary classification on UNSW-NB15 dataset. In: Digest of Technical Papers-IEEE International Conference on Consumer Electronics, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICCE63647.2025.10930023","DOI":"10.1109\/ICCE63647.2025.10930023"},{"key":"1133_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2024.100520","volume":"27","author":"TA Kumari","year":"2024","unstructured":"Kumari TA, Mishra S (2024) Tachyon: enhancing stacked models using Bayesian optimization for intrusion detection using different sampling approaches. Egypt Inform J 27:100520. https:\/\/doi.org\/10.1016\/j.eij.2024.100520","journal-title":"Egypt Inform J"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-025-01133-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12065-025-01133-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-025-01133-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:09:08Z","timestamp":1773655748000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12065-025-01133-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1133"],"URL":"https:\/\/doi.org\/10.1007\/s12065-025-01133-8","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"value":"1864-5909","type":"print"},{"value":"1864-5917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]},"assertion":[{"value":"27 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"23"}}