{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:15:41Z","timestamp":1773155741643,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T00:00:00Z","timestamp":1736380800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T00:00:00Z","timestamp":1736380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s12083-024-01819-3","type":"journal-article","created":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T01:51:08Z","timestamp":1736387468000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Deep learning for intrusion detection in IoT networks"],"prefix":"10.1007","volume":"18","author":[{"given":"Mehdi","family":"Selem","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7511-1221","authenticated-orcid":false,"given":"Farah","family":"Jemili","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4462-1805","authenticated-orcid":false,"given":"Ouajdi","family":"Korbaa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,9]]},"reference":[{"key":"1819_CR1","doi-asserted-by":"publisher","first-page":"12699","DOI":"10.1109\/ACCESS.2024.3355312","volume":"12","author":"YY Ghadi","year":"2024","unstructured":"Ghadi YY et al (2024) Machine learning solutions for the security of wireless sensor networks: a review. IEEE Access 12:12699\u201312719. https:\/\/doi.org\/10.1109\/ACCESS.2024.3355312","journal-title":"IEEE Access"},{"key":"1819_CR2","doi-asserted-by":"publisher","first-page":"242","DOI":"10.3390\/electronics12010242","volume":"12","author":"T Mazhar","year":"2023","unstructured":"Mazhar T, Irfan HM, Haq I, Ullah I, Ashraf M, Shloul TA, Ghadi YY, Imran, Elkamchouchi DH (2023) Analysis of challenges and solutions of IoT in smart grids using AI and machine learning techniques: a review. Electronics 12:242. https:\/\/doi.org\/10.3390\/electronics12010242","journal-title":"Electronics"},{"key":"1819_CR3","doi-asserted-by":"publisher","first-page":"e1840","DOI":"10.7717\/peerj-cs.1840","volume":"10","author":"Y Yasin Ghadi","year":"2024","unstructured":"Yasin Ghadi Y, Mazhar T, Aurangzeb K, Haq I, Shahzad T, Ali Laghari A, Shahid AM (2024) Security risk models against attacks in smart grid using big data and artificial intelligence. PeerJ Comput Sci 10:e1840. https:\/\/doi.org\/10.7717\/peerj-cs.1840","journal-title":"PeerJ Comput Sci"},{"key":"1819_CR4","doi-asserted-by":"publisher","first-page":"83","DOI":"10.3390\/fi15020083","volume":"15","author":"T Mazhar","year":"2023","unstructured":"Mazhar T, Irfan HM, Khan S, Haq I, Ullah I, Iqbal M, Hamam H (2023) Analysis of cyber security attacks and its solutions for the smart grid using machine learning and blockchain methods. Future Internet 15:83. https:\/\/doi.org\/10.3390\/fi15020083","journal-title":"Future Internet"},{"issue":"4","key":"1819_CR5","doi-asserted-by":"publisher","first-page":"683","DOI":"10.3390\/brainsci13040683","volume":"13","author":"T Mazhar","year":"2023","unstructured":"Mazhar T, Talpur DB, Shloul TA, Ghadi YY, Haq I, Ullah I, Ouahada K, Hamam H (2023) Analysis of IoT security challenges and its solutions using artificial intelligence. Brain Sci 13(4):683. https:\/\/doi.org\/10.3390\/brainsci13040683","journal-title":"Brain Sci"},{"key":"1819_CR6","doi-asserted-by":"publisher","unstructured":"Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H (2022) Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE digital object identifier https:\/\/doi.org\/10.1109\/ACCESS.2022.3165809","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"1819_CR7","doi-asserted-by":"publisher","unstructured":"Abou El Houda Z, Brik B, Khoukhi L (2022) \"Why Should I Trust Your IDS?\" An explainable deep learning framework for intrusion detection systems in internet of things networks. IEEE Transactions Dependable Secure Comput 1\u20131. https:\/\/doi.org\/10.1109\/TDSC.2022.3190187","DOI":"10.1109\/TDSC.2022.3190187"},{"key":"1819_CR8","doi-asserted-by":"publisher","unstructured":"Banaamah, AM, Ahmad I (2022) Intrusion detection in IoT using deep learning. In advances in cybersecurity: principles, techniques, and applications (pp. 23\u201338). Springer. https:\/\/doi.org\/10.1007\/978-3-030-90435-1_2","DOI":"10.1007\/978-3-030-90435-1_2"},{"issue":"3","key":"1819_CR9","doi-asserted-by":"publisher","first-page":"272","DOI":"10.3390\/electronics11030272","volume":"11","author":"AR Khan","year":"2022","unstructured":"Khan AR, Kashif M, Jhaveri RH, Raut R, Saba T, Bahaj SA (2022) Deep learning for intrusion detection and security of internet of things (IoT): current analysis, challenges, and possible solutions. Electronics 11(3):272. https:\/\/doi.org\/10.3390\/electronics11030272","journal-title":"Electronics"},{"issue":"1","key":"1819_CR10","doi-asserted-by":"publisher","first-page":"92","DOI":"10.3390\/electronics11010092","volume":"11","author":"MI Alghamdi","year":"2022","unstructured":"Alghamdi MI (2022) A hybrid model for intrusion detection in IoT applications. Electronics 11(1):92. https:\/\/doi.org\/10.3390\/electronics11010092","journal-title":"Electronics"},{"key":"1819_CR11","doi-asserted-by":"publisher","first-page":"73446","DOI":"10.1109\/ACCESS.2021.3086677","volume":"9","author":"H Alkahtani","year":"2021","unstructured":"Alkahtani H, Aldhyani THH (2021) Botnet attack detection by using CNN-LSTM model for internet of things applications. IEEE Access 9:73446\u201373456. https:\/\/doi.org\/10.1109\/ACCESS.2021.3086677","journal-title":"IEEE Access"},{"key":"1819_CR12","doi-asserted-by":"publisher","unstructured":"Radhi Hadi M, Saher A, David M, Wyld C (2022) A novel approach to network intrusion detection system using deep learning for SDN:. https:\/\/doi.org\/10.5121\/csit.2022.121106","DOI":"10.5121\/csit.2022.121106"},{"key":"1819_CR13","doi-asserted-by":"publisher","unstructured":"Said El Sayed M, Le-Khac N-A, Albahar MA, Jurcut A (2021) A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique. https:\/\/doi.org\/10.1016\/j.jnca.2021.103160","DOI":"10.1016\/j.jnca.2021.103160"},{"key":"1819_CR14","doi-asserted-by":"publisher","unstructured":"Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H (2021) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. vol 9. IEEE Access, pp 134130-134145. https:\/\/doi.org\/10.1109\/ACCESS.2021.3112524","DOI":"10.1109\/ACCESS.2021.3112524"},{"key":"1819_CR15","doi-asserted-by":"publisher","unstructured":"Fedorchenko E, Novikova E, Shulepov A (2022). Comparative review of the intrusion detection systems based on federated learning: advantages and open challenges. https:\/\/doi.org\/10.3390\/a15070247","DOI":"10.3390\/a15070247"},{"key":"1819_CR16","doi-asserted-by":"publisher","unstructured":"Alnuaim AA, Zakariah M, Shashidhar C, Hatamleh WA, Tarazi H, Shukla PK, Ratna R (2022). Speaker gender recognition based on deep neural networks and ResNet50. https:\/\/doi.org\/10.1155\/2022\/4444388","DOI":"10.1155\/2022\/4444388"},{"key":"1819_CR17","doi-asserted-by":"publisher","unstructured":"Toldinas J, Venckauskas A, Liutkevicius A, Morkevicius N (2022) Framing network flow for anomaly detection using image recognition and federated learning. https:\/\/doi.org\/10.3390\/electronics11193138","DOI":"10.3390\/electronics11193138"},{"key":"1819_CR18","doi-asserted-by":"publisher","unstructured":"Yasui T, Tanaka T, Malik A, Kuribayashi M (2022) Coded DNN watermark: robustness against pruning models using constant weight code. https:\/\/doi.org\/10.3390\/jimaging8060152","DOI":"10.3390\/jimaging8060152"},{"key":"1819_CR19","doi-asserted-by":"publisher","unstructured":"Maseer ZK, Yusof R, Mostafa SA, Bahaman N, Musa O, Saleh Al-rimy BA (2021) DeepIoT.IDS: hybrid deep learning for enhancing IoT network intrusion detection. https:\/\/doi.org\/10.32604\/cmc.2021.016074","DOI":"10.32604\/cmc.2021.016074"},{"key":"1819_CR20","doi-asserted-by":"publisher","unstructured":"Lagkas T, Rantos K (2022) Deep learning in IoT intrusion detection Stefanos Tsimenidis1. \u00b7https:\/\/doi.org\/10.1007\/s10922-021-09621-9","DOI":"10.1007\/s10922-021-09621-9"},{"key":"1819_CR21","doi-asserted-by":"publisher","unstructured":"Ullah S, Khan MA, Ahmad J, Jamal SS, Huma Z, Hassan MT, Pitropakis N, Arshad, Buchanan WJ (2022) HDL-IDS: a hybrid deep learning architecture for intrusion detection in the internet of vehicles. https:\/\/doi.org\/10.3390\/s22041340","DOI":"10.3390\/s22041340"},{"key":"1819_CR22","unstructured":"Alzamily JYI, Ariffin SB, Abu Naser SS (2022) Classification of encrypted images using deep Learning \u2013Resnet50 E-ISSN: 1817\u20133195. www.jatit.org"},{"key":"1819_CR23","doi-asserted-by":"publisher","unstructured":"Jemili F (2022) Intelligent intrusion detection based on fuzzy big data classification. Cluster Comput. https:\/\/doi.org\/10.1007\/s10586-022-03769-y","DOI":"10.1007\/s10586-022-03769-y"},{"key":"1819_CR24","doi-asserted-by":"publisher","unstructured":"Baniasadi S, Rostami O, Mart\u00edn D, Kaveh M (2022). A novel deep supervised learning-based approach for intrusion detection in IoT systems. https:\/\/doi.org\/10.3390\/s22124459","DOI":"10.3390\/s22124459"},{"key":"1819_CR25","doi-asserted-by":"publisher","unstructured":"Farhan BI, Jasim AD (2022) Survey of intrusion detection using deep learning in the internet of things. https:\/\/doi.org\/10.52866\/ijcsm.2022.01.01.009","DOI":"10.52866\/ijcsm.2022.01.01.009"},{"key":"1819_CR26","doi-asserted-by":"publisher","unstructured":"Abid A, Jemili F, Korbaa O (2022) Distributed architecture of an Intrusion Detection System in Industrial Control Systems, ICCCI 2022 14th International Conference on Computational Collective Intelligence.\u00a0Cham: Springer International Publishing,\u00a0pp 472\u2013484. https:\/\/doi.org\/10.1007\/978-3-031-16210-7_39","DOI":"10.1007\/978-3-031-16210-7_39"},{"key":"1819_CR27","doi-asserted-by":"publisher","unstructured":"Dhahbi R, Jemili F (n.d.) A deep learning approach for intrusion detection, HPCC 2021 IEEE 23rd International Conference on High Performance Computing & Communications, pp 1234\u20131240. https:\/\/doi.org\/10.1109\/HPCC50897.2021.00183","DOI":"10.1109\/HPCC50897.2021.00183"},{"key":"1819_CR28","doi-asserted-by":"publisher","first-page":"101322","DOI":"10.1016\/j.jestch.2023.101322","volume":"38","author":"HC Altunay","year":"2023","unstructured":"Altunay HC, Albayrak Z (2023) A hybrid CNN + LSTM-based intrusion detection system for industrial IoT networks. Eng Sci Technol Int J 38:101322. https:\/\/doi.org\/10.1016\/j.jestch.2023.101322","journal-title":"Eng Sci Technol Int J"},{"issue":"1","key":"1819_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.51201\/ctc.v2i1.19","volume":"2","author":"HC Altunay","year":"2022","unstructured":"Altunay HC, Albayrak Z, \u00c7akmak M (2022) Autoencoder-based intrusion detection in critical infrastructures. Curr Trends Comput 2(1):1\u201312. https:\/\/doi.org\/10.51201\/ctc.v2i1.19","journal-title":"Curr Trends Comput"},{"key":"1819_CR30","doi-asserted-by":"publisher","unstructured":"\u00d6zalp AN, Kili\u00e7 E, Kele\u015f A (2022) Layer-based examination of cyber-attacks in IoT. In 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (pp. 1\u20136). IEEE. https:\/\/doi.org\/10.1109\/HORA55464.2022.9826267","DOI":"10.1109\/HORA55464.2022.9826267"},{"issue":"10","key":"1819_CR31","doi-asserted-by":"publisher","first-page":"8467","DOI":"10.1109\/JIOT.2022.3200048","volume":"10","author":"IA Khan","year":"2023","unstructured":"Khan IA, Pi D, Abbas MZ, Zia U, Hussain Y, Soliman H (2023) Federated-SRUs: a federated-simple-recurrent-units-based IDS for accurate detection of Cyber Attacks against IoT-Augmented industrial control systems. IEEE Internet Things J 10(10):8467\u20138476. https:\/\/doi.org\/10.1109\/JIOT.2022.3200048","journal-title":"IEEE Internet Things J"},{"issue":"13","key":"1819_CR32","doi-asserted-by":"publisher","first-page":"11604","DOI":"10.1109\/JIOT.2021.3130156","volume":"9","author":"IA Khan","year":"2022","unstructured":"Khan IA, Moustafa N, Pi D, Sallam KM, Zomaya AY, Li B (2022) A new explainable deep learning framework for cyber threat discovery in industrial IoT networks. IEEE Internet Things J 9(13):11604\u201311613. https:\/\/doi.org\/10.1109\/JIOT.2021.3130156","journal-title":"IEEE Internet Things J"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01819-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01819-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01819-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T09:54:02Z","timestamp":1746179642000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01819-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,9]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1819"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01819-3","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-4306367\/v1","asserted-by":"object"}]},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,9]]},"assertion":[{"value":"22 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that this manuscript is original, has not been published before and is not currently being considered for publication elsewhere.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have read and agree to the Terms and Conditions of Peer-to-Peer Networking and Applications journal.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors give their consent for the publication of identifiable details to be published in Peer-to-Peer Networking and Applications journal.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"22"}}