{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:32:58Z","timestamp":1773520378015,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T00:00:00Z","timestamp":1739577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T00:00:00Z","timestamp":1739577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s12083-025-01911-2","type":"journal-article","created":{"date-parts":[[2025,2,15]],"date-time":"2025-02-15T09:56:31Z","timestamp":1739613391000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Intrusion defense: Leveraging ant colony optimization for enhanced multi-optimization in network security"],"prefix":"10.1007","volume":"18","author":[{"given":"Chetan","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Amit","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Neelesh Kumar","family":"Jain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,15]]},"reference":[{"key":"1911_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103261","author":"S Manimurugan","year":"2020","unstructured":"Manimurugan S, Majdi A-Q, Mustaffa Mohmmed C, Narmatha RV (2020) Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system. Microprocess Microsyst. https:\/\/doi.org\/10.1016\/j.micpro.2020.103261","journal-title":"Microprocess Microsyst"},{"key":"1911_CR2","doi-asserted-by":"publisher","unstructured":"Mhawi DN, Hashim SH (2023) Proposed Hybrid Ensemble Learning Algorithms for an Efficient Intrusion Detection System. Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE). 22(2). https:\/\/doi.org\/10.33103\/uot.ijccce.22.2.7.","DOI":"10.33103\/uot.ijccce.22.2.7"},{"key":"1911_CR3","doi-asserted-by":"publisher","first-page":"2921","DOI":"10.1007\/s12083-024-01721-y","volume":"17","author":"M Ramesh Kumar","year":"2024","unstructured":"Ramesh Kumar M, Sudhakaran P (2024) Securing IoT networks: A robust intrusion detection system leveraging feature selection and LGBM. Peer-to-Peer Networking Applications 17:2921\u20132943. https:\/\/doi.org\/10.1007\/s12083-024-01721-y","journal-title":"Peer-to-Peer Networking Applications"},{"key":"1911_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-024-01763-2","author":"AA Qasem","year":"2024","unstructured":"Qasem AA, Qutqut MH, Alhaj F et al (2024) SRFE: A stepwise recursive feature elimination approach for network intrusion detection systems. Peer-to-Peer Networking Appl. https:\/\/doi.org\/10.1007\/s12083-024-01763-2","journal-title":"Peer-to-Peer Networking Appl"},{"key":"1911_CR5","doi-asserted-by":"publisher","first-page":"2944","DOI":"10.1007\/s12083-024-01727-6","volume":"17","author":"U Nandhini","year":"2024","unstructured":"Nandhini U, SVN, S. (2024) An improved Harris Hawks optimizer based feature selection technique with effective two-staged classifier for network intrusion detection system. Peer-to-Peer Networking Appl 17:2944\u20132978. https:\/\/doi.org\/10.1007\/s12083-024-01727-6","journal-title":"Peer-to-Peer Networking Appl"},{"key":"1911_CR6","doi-asserted-by":"publisher","unstructured":"Mashuqur Rahman Mazumder AKM, Mohammed Kamruzzaman N, Akter N, Arbe N, Rahman MM. (2021) Network intrusion detection using hybrid machine learning model. International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT). https:\/\/doi.org\/10.1109\/icaect49130.2021.9392483.","DOI":"10.1109\/icaect49130.2021.9392483"},{"key":"1911_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08721-8","author":"S Narayanasami","year":"2021","unstructured":"Narayanasami S, Sengan S, Khurram S, Arslan F, Murugaiyan SK, Rajan R, Peroumal V, Dubey AK, Srinivasan S, Sharma DK (2021) Biological feature selection and classification techniques for intrusion detection on BAT. Wireless Pers Commun. https:\/\/doi.org\/10.1007\/s11277-021-08721-8","journal-title":"Wireless Pers Commun"},{"key":"1911_CR8","doi-asserted-by":"publisher","unstructured":"Ramaiah M, Chandrasekaran V, Ravi V, Kumar N (2021) An intrusion detection system using optimized deep neural network architecture. Transactions Emerg Telecommun Technol. 32(4). https:\/\/doi.org\/10.1002\/ett.4221","DOI":"10.1002\/ett.4221"},{"issue":"3","key":"1911_CR9","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/s10207-020-00508-5","volume":"20","author":"SN Mighan","year":"2020","unstructured":"Mighan SN, Kahani M (2020) A novel scalable intrusion detection system based on deep learning. Int J Inf Secur 20(3):387\u2013403. https:\/\/doi.org\/10.1007\/s10207-020-00508-5","journal-title":"Int J Inf Secur"},{"key":"1911_CR10","doi-asserted-by":"publisher","first-page":"22351","DOI":"10.1109\/access.2021.3056614","volume":"9","author":"ZK Maseer","year":"2021","unstructured":"Maseer ZK, Yusof R, Bahaman N, Mostafa SA, Foozy CFM (2021) Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset. IEEE Access 9:22351\u201322370. https:\/\/doi.org\/10.1109\/access.2021.3056614","journal-title":"IEEE Access"},{"key":"1911_CR11","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.cose.2018.11.005","volume":"81","author":"B Selvakumar","year":"2019","unstructured":"Selvakumar B, Muneeswaran K (2019) Firefly algorithm based feature selection for network intrusion detection. Computers Secur 81:148\u2013155. https:\/\/doi.org\/10.1016\/j.cose.2018.11.005","journal-title":"Computers Secur"},{"key":"1911_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/ants47819.2019.9117966","author":"B Subba","year":"2019","unstructured":"Subba B (2019) A neural network based NIDS framework for intrusion detection in contemporary network traffic. IEEE Int Conference Adv Networks Telecommun Systems (ANTS). https:\/\/doi.org\/10.1109\/ants47819.2019.9117966","journal-title":"IEEE Int Conference Adv Networks Telecommun Systems (ANTS)"},{"key":"1911_CR13","doi-asserted-by":"publisher","unstructured":"Taher KA, Mohammed Yasin Jisan B, Rahman MM (2019) Network intrusion detection using supervised machine learning technique with feature selection. Int Confer Robotics, Electrical Signal Processing Techniques (ICREST). https:\/\/doi.org\/10.1109\/icrest.2019.8644161.","DOI":"10.1109\/icrest.2019.8644161"},{"key":"1911_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/icrse.2017.8030774","author":"Y Shao","year":"2017","unstructured":"Shao Y, Liu B, Li G, Wang S (2017) Software defect prediction based on class-association rules. Second Int Conference Reliability Systems Eng (ICRSE). https:\/\/doi.org\/10.1109\/icrse.2017.8030774","journal-title":"Second Int Conference Reliability Systems Eng (ICRSE)"},{"issue":"16","key":"1911_CR15","doi-asserted-by":"publisher","first-page":"12499","DOI":"10.1007\/s00521-020-04708-x","volume":"32","author":"P Devan","year":"2020","unstructured":"Devan P, Khare N (2020) An efficient XGBoost\u2013DNN-based classification model for network intrusion detection system. Neural Comput Appl 32(16):12499\u201312514. https:\/\/doi.org\/10.1007\/s00521-020-04708-x","journal-title":"Neural Comput Appl"},{"key":"1911_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-04986-5","author":"H Rajadurai","year":"2020","unstructured":"Rajadurai H, Gandhi UD (2020) A stacked ensemble learning model for intrusion detection in wireless network. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-020-04986-5","journal-title":"Neural Comput Appl"},{"key":"1911_CR17","doi-asserted-by":"publisher","first-page":"106522","DOI":"10.1016\/j.asoc.2020.106522","volume":"95","author":"W Wei","year":"2020","unstructured":"Wei W, Chen S, Lin Q, Ji J, Chen J (2020) A multi-objective immune algorithm for intrusion feature selection. Appl Soft Comput 95:106522. https:\/\/doi.org\/10.1016\/j.asoc.2020.106522","journal-title":"Appl Soft Comput"},{"issue":"1","key":"1911_CR18","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.dcan.2020.06.001","volume":"7","author":"S Baek","year":"2021","unstructured":"Baek S, Kwon D, Suh SC, Kim H, Kim I, Kim J (2021) Clustering-based label estimation for network anomaly detection. Digital Commun Networks 7(1):37\u201344. https:\/\/doi.org\/10.1016\/j.dcan.2020.06.001","journal-title":"Digital Commun Networks"},{"key":"1911_CR19","doi-asserted-by":"publisher","first-page":"102532","DOI":"10.1016\/j.jisa.2020.102532","volume":"53","author":"GS Kushwah","year":"2020","unstructured":"Kushwah GS, Ranga V (2020) Voting extreme learning machine based distributed denial of service attack detection in cloud computing. J Inform Security Appl 53:102532. https:\/\/doi.org\/10.1016\/j.jisa.2020.102532","journal-title":"J Inform Security Appl"},{"key":"1911_CR20","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1016\/j.procs.2020.03.367","volume":"167","author":"S Choudhary","year":"2020","unstructured":"Choudhary S, Kesswani N (2020) Analysis of KDD-Cup\u201999, NSL-KDD and UNSW-NB15 datasets using deep learning in IoT. Procedia Computer Science 167:1561\u20131573. https:\/\/doi.org\/10.1016\/j.procs.2020.03.367","journal-title":"Procedia Computer Science"},{"key":"1911_CR21","doi-asserted-by":"publisher","first-page":"102031","DOI":"10.1016\/j.simpat.2019.102031","volume":"101","author":"M Almiani","year":"2020","unstructured":"Almiani M, AbuGhazleh A, Al-Rahayfeh A, Atiewi S, Razaque A (2020) Deep recurrent neural network for IoT intrusion detection system. Simulation Modeling Practice Theory 101:102031. https:\/\/doi.org\/10.1016\/j.simpat.2019.102031","journal-title":"Simulation Modeling Practice Theory"},{"key":"1911_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/iccsp48568.2020.9182197","author":"S Singh","year":"2020","unstructured":"Singh S, Banerjee S (2020) Machine learning mechanisms for network anomaly detection system: A review. Int Conference Commun Signal Processing (ICCSP). https:\/\/doi.org\/10.1109\/iccsp48568.2020.9182197","journal-title":"Int Conference Commun Signal Processing (ICCSP)"},{"key":"1911_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/icosec49089.2020.9215232","author":"I Abrar","year":"2020","unstructured":"Abrar I, Ayub Z, Masoodi F, Bamhdi AM (2020) A machine learning approach for intrusion detection system on NSL-KDD dataset. Int Conference Smart Electronics Commun (ICOSEC). https:\/\/doi.org\/10.1109\/icosec49089.2020.9215232","journal-title":"Int Conference Smart Electronics Commun (ICOSEC)"},{"key":"1911_CR24","doi-asserted-by":"publisher","first-page":"29575","DOI":"10.1109\/access.2020.2972627","volume":"8","author":"T Su","year":"2020","unstructured":"Su T, Sun H, Zhu J, Wang S, Li Y (2020) BAT: deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access 8:29575\u201329585. https:\/\/doi.org\/10.1109\/access.2020.2972627","journal-title":"IEEE Access"},{"key":"1911_CR25","doi-asserted-by":"publisher","first-page":"1230","DOI":"10.1016\/j.procs.2020.03.438","volume":"167","author":"FH Almasoudy","year":"2020","unstructured":"Almasoudy FH, Al-Yaseen WL, Idrees AK (2020) Differential evolution wrapper feature selection for intrusion detection system. Procedia Computer Sci 167:1230\u20131239. https:\/\/doi.org\/10.1016\/j.procs.2020.03.438","journal-title":"Procedia Computer Sci"},{"key":"1911_CR26","doi-asserted-by":"publisher","unstructured":"Kunal, Dua M (2020). Attribute selection and ensemble classifier based novel approach to intrusion detection system. Procedia Computer Sci. 167:2191\u20132199https:\/\/doi.org\/10.1016\/j.procs.2020.03.271","DOI":"10.1016\/j.procs.2020.03.271"},{"key":"1911_CR27","doi-asserted-by":"publisher","first-page":"49730","DOI":"10.1109\/access.2020.2980136","volume":"8","author":"Y Yu","year":"2020","unstructured":"Yu Y, Bian N (2020) An intrusion detection method using few-shot learning. IEEE Access 8:49730\u201349740. https:\/\/doi.org\/10.1109\/access.2020.2980136","journal-title":"IEEE Access"},{"key":"1911_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/cisda.2009.5356528","author":"M Tavallaee","year":"2009","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. Computational Intell Security. https:\/\/doi.org\/10.1109\/cisda.2009.5356528","journal-title":"Computational Intell Security"},{"key":"1911_CR29","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.procs.2016.05.170","volume":"85","author":"S Behal","year":"2016","unstructured":"Behal S, Kumar K (2016) Trends in validation of DDoS research. Procardia Computer Sci 85:7\u201315. https:\/\/doi.org\/10.1016\/j.procs.2016.05.170","journal-title":"Procardia Computer Sci"},{"key":"1911_CR30","doi-asserted-by":"publisher","unstructured":"Khraisat A, Gondal I, Vamplew P, Kamruzzaman J (2019) Survey of intrusion detection systems techniques, datasets and challenges. Cyber Security. 2(1). https:\/\/doi.org\/10.1186\/s42400-019-0038-7.","DOI":"10.1186\/s42400-019-0038-7"},{"issue":"4","key":"1911_CR31","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s41650-017-0033-7","volume":"2","author":"VR Balasaraswathi","year":"2017","unstructured":"Balasaraswathi VR, Sugumaran M, Hamid Y (2017) Feature selection techniques for intrusion detection using non-bio-inspired and bio-inspired optimization algorithms. J Commun Inform Networks 2(4):107\u2013119. https:\/\/doi.org\/10.1007\/s41650-017-0033-7","journal-title":"J Commun Inform Networks"},{"issue":"10","key":"1911_CR32","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"C Tsai","year":"2009","unstructured":"Tsai C, Hsu YF, Lin C, Lin W (2009) Intrusion detection by machine learning: A review. Expert Syst Appl 36(10):11994\u201312000. https:\/\/doi.org\/10.1016\/j.eswa.2009.05.029","journal-title":"Expert Syst Appl"},{"key":"1911_CR33","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.procs.2016.05.170","volume":"85","author":"S Behal","year":"2016","unstructured":"Behal S, Kumar K (2016) Trends in validation of DDoS research. Procedia Computer Sci 85:7\u201315. https:\/\/doi.org\/10.1016\/j.procs.2016.05.170","journal-title":"Procedia Computer Sci"},{"key":"1911_CR34","doi-asserted-by":"publisher","unstructured":"Ibrahim ZK, Thanon MY (2021) Performance comparison of intrusion detection system using three different machine learning algorithms. 6th International Conference on Inventive Computation Technologies (ICICT). 1116\u20131124, https:\/\/doi.org\/10.1109\/ICICT50816.2021.9358775.","DOI":"10.1109\/ICICT50816.2021.9358775"},{"key":"1911_CR35","doi-asserted-by":"publisher","unstructured":"Parimala G, Kayalvizhi R (2021). An effective intrusion detection system for securing IoT using feature selection and deep learning. Int Conference Comp Commun Informatics (ICCCI). 1\u20134. https:\/\/doi.org\/10.1109\/ICCCI50826.2021.9402562.","DOI":"10.1109\/ICCCI50826.2021.9402562"},{"key":"1911_CR36","doi-asserted-by":"publisher","first-page":"6930","DOI":"10.1109\/ACCESS.2020.3046246","volume":"9","author":"D Stiawan","year":"2021","unstructured":"Stiawan D et al (2021) An approach for optimizing ensemble intrusion detection systems. IEEE Access 9:6930\u20136947. https:\/\/doi.org\/10.1109\/ACCESS.2020.3046246","journal-title":"IEEE Access"},{"key":"1911_CR37","doi-asserted-by":"publisher","unstructured":"Li L-H, Ahmad R, Tsai W-C, Sharma AK (2021) A feature selection based DNN for intrusion detection system. 15th International Conference on Ubiquitous Information Management and Communication (IMCOM). 1\u20138, https:\/\/doi.org\/10.1109\/IMCOM51814.2021.9377405.","DOI":"10.1109\/IMCOM51814.2021.9377405"},{"key":"1911_CR38","doi-asserted-by":"publisher","unstructured":"Ibrahim ZK, Thanon MY (2021) Performance comparison of intrusion detection system using three different machine learning algorithms. International Conference on Inventive Computation Technologies (ICICT). 1116\u20131124. https:\/\/doi.org\/10.1109\/ICICT50816.2021.9358775.","DOI":"10.1109\/ICICT50816.2021.9358775"},{"key":"1911_CR39","doi-asserted-by":"publisher","unstructured":"Saber A, Abbas M, Fergani B (2021) Two-dimensional intrusion detection system: a new feature selection technique. 2nd International Workshop on Human-Centric Smart Environments for Health and Well-being (IHSH), 69\u201374. https:\/\/doi.org\/10.1109\/IHSH51661.2021.9378721.","DOI":"10.1109\/IHSH51661.2021.9378721"},{"key":"1911_CR40","doi-asserted-by":"publisher","DOI":"10.1109\/ICJECE.2021.3053231","author":"M Sharma","year":"2021","unstructured":"Sharma M, Sharma M, Elmiligi H, Gebali F (2021) A novel intrusion detection system for RPL-based cyber-physical systems. IEEE Canadian J Elec Comp Eng. https:\/\/doi.org\/10.1109\/ICJECE.2021.3053231","journal-title":"IEEE Canadian J Elec Comp Eng"},{"key":"1911_CR41","doi-asserted-by":"publisher","first-page":"4983","DOI":"10.1109\/ACCESS.2020.3047933","volume":"9","author":"N Ahmad HamdiQaiwmchi","year":"2021","unstructured":"Ahmad HamdiQaiwmchi N, Amintoosi H, Mohajerzadeh A (2021) Intrusion detection system based on gradient corrected online sequential extreme learning machine. IEEE Access 9:4983\u20134999. https:\/\/doi.org\/10.1109\/ACCESS.2020.3047933","journal-title":"IEEE Access"},{"issue":"3","key":"1911_CR42","doi-asserted-by":"publisher","first-page":"1747","DOI":"10.1109\/TSMC.2019.2904662","volume":"51","author":"L Jiang","year":"2021","unstructured":"Jiang L, Kong G, Li C (2021) Wrapper framework for test-cost-sensitive feature selection. IEEE Transactions on Systems, Man, and Cybernetics: Systems 51(3):1747\u20131756. https:\/\/doi.org\/10.1109\/TSMC.2019.2904662","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"1911_CR43","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1016\/j.procs.2023.03.106","volume":"220","author":"O Lifandali","year":"2023","unstructured":"Lifandali O, Abghour N, Chiba Z (2023) Feature selection using a combination of ant colony optimization and random forest algorithms applied to isolation forest based intrusion detection system. Procedia Computer Science 220:796\u2013805. https:\/\/doi.org\/10.1016\/j.procs.2023.03.106","journal-title":"Procedia Computer Science"},{"key":"1911_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-02963-x","author":"A Alsarhan","year":"2021","unstructured":"Alsarhan A, Alauthman M, Alshdaifat E, Al-Ghuwairi AR, Al-Dubai A (2021) Machine learning-driven optimization for svm-based intrusion detection system in vehicular ad hoc networks. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-021-02963-x","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1911_CR45","doi-asserted-by":"publisher","unstructured":"Oleiwi HW, Mhawi DN, Al-Raweshidy H (2022). MLTs-ADCNs: Machine Learning Techniques for Anomaly Detection in Communication Networks. In IEEE Access, 10:91006\u201391017. https:\/\/doi.org\/10.1109\/ACCESS.2022.3201869.","DOI":"10.1109\/ACCESS.2022.3201869"},{"issue":"7","key":"1911_CR46","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.3390\/sym14071461","volume":"14","author":"DN Mhawi","year":"2022","unstructured":"Mhawi DN, Aldallal A, Hassan S (2022) Advanced Feature-Selection-Based Hybrid Ensemble Learning Algorithms for Network Intrusion Detection Systems. Symmetry 14(7):1461. https:\/\/doi.org\/10.3390\/sym14071461","journal-title":"Symmetry"},{"key":"1911_CR47","doi-asserted-by":"publisher","first-page":"9731","DOI":"10.1007\/s00500-021-05893-0","volume":"25","author":"G Kocher","year":"2021","unstructured":"Kocher G, Kumar G (2021) Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges. Soft Comput 25:9731\u20139763. https:\/\/doi.org\/10.1007\/s00500-021-05893-0","journal-title":"Soft Comput"},{"key":"1911_CR48","doi-asserted-by":"publisher","first-page":"2214","DOI":"10.1016\/j.vehcom.2022.100471","volume":"100471","author":"W Lo","year":"2022","unstructured":"Lo W, Alqahtani H, Thakur K, Almadhor A, Chander S, Kumar G (2022) A hybrid deep learning based intrusion detection system using spatial-temporal representation of in-vehicle network traffic, Vehicular Communications, Volume 35. ISSN 100471:2214\u20132096. https:\/\/doi.org\/10.1016\/j.vehcom.2022.100471","journal-title":"ISSN"},{"key":"1911_CR49","doi-asserted-by":"publisher","unstructured":"Gulshan Kumar, Hamed Alqahtani (2022). Machine Learning Techniques for Intrusion Detection Systems in SDN-Recent Advances, Challenges and Future Directions, CMES - Computer Modeling in Engineering and Sciences. 134(1):89\u2013119, ISSN 1526\u20131492, https:\/\/doi.org\/10.32604\/cmes.2022.020724","DOI":"10.32604\/cmes.2022.020724"},{"key":"1911_CR50","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s10462-010-9179-5","volume":"34","author":"G Kumar","year":"2010","unstructured":"Kumar G, Kumar K, Sachdeva M (2010) The use of artificial intelligence based techniques for intrusion detection: a review. Artif Intell Rev 34:369\u2013387. https:\/\/doi.org\/10.1007\/s10462-010-9179-5","journal-title":"Artif Intell Rev"},{"key":"1911_CR51","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1002\/sec.303","volume":"5","author":"G Kumar","year":"2011","unstructured":"Kumar G, Kumar K (2011) An information theoretic approach for feature selection. Security Commun Networks J 5:178\u2013185. https:\/\/doi.org\/10.1002\/sec.303","journal-title":"Security Commun Networks J"},{"key":"1911_CR52","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/962185","author":"G Kumar","year":"2013","unstructured":"Kumar G, Kumar K (2013) Design of an Evolutionary Approach for Intrusion Detection. Scientific World J. https:\/\/doi.org\/10.1155\/2013\/962185","journal-title":"Scientific World J"},{"issue":"3","key":"1911_CR53","doi-asserted-by":"publisher","first-page":"1881","DOI":"10.1007\/s10586-020-03229-5","volume":"24","author":"S Dwivedi","year":"2021","unstructured":"Dwivedi S, Vardhan M, Tripathi S (2021) Building an Efficient Intrusion detection system using grasshopper optimization algorithm for anomaly detection. Clust Comput 24(3):1881\u20131900. https:\/\/doi.org\/10.1007\/s10586-020-03229-5","journal-title":"Clust Comput"},{"key":"1911_CR54","doi-asserted-by":"publisher","unstructured":"Sumaiya Thaseen I, Saira Banu J, Lavanya K, Rukunuddin Ghalib M, Abhishek K (2020) An integrated intrusion detection system using correlation based attribute selection and artificial neural network. Transact Emerg Telecommun Technol. 32(2). https:\/\/doi.org\/10.1002\/ett.4014","DOI":"10.1002\/ett.4014"},{"key":"1911_CR55","doi-asserted-by":"publisher","unstructured":"Ahmad Z, Shahid Khan A, Wai Shiang C, Abdullah J, Ahmad F (2020) Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transact Emerg Telecommun Technol. 32(1), https:\/\/doi.org\/10.1002\/ett.4150.","DOI":"10.1002\/ett.4150"},{"key":"1911_CR56","doi-asserted-by":"publisher","unstructured":"Dubey S, Gupta C (2024) An Effective Model for Binary and Multi-classification Based on RFE and XGBoost Methods in Intrusion Detection System. Cyber Security and Digital Forensics. Lecture Notes in Networks and Systems, vol. 896. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-99-9811-1_3.","DOI":"10.1007\/978-981-99-9811-1_3"},{"key":"1911_CR57","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s11277-024-10880-3","volume":"134","author":"C Gupta","year":"2024","unstructured":"Gupta C, Kumar A, Jain NK (2024) An Enhanced Hybrid Intrusion Detection Based on Crow Search Analysis Optimizations and Artificial Neural Network. Wireless Personal Commun 134:43\u201368. https:\/\/doi.org\/10.1007\/s11277-024-10880-3","journal-title":"Wireless Personal Commun"},{"key":"1911_CR58","doi-asserted-by":"publisher","unstructured":"Gupta C, Kumar A, Jain NK (2023) A Detailed Analysis on Intrusion Detection Systems, Datasets, and Challenges. Advances in Data Science and Computing Technologies. ADSC 2022. Lecture Notes in Electrical Engineering, vol 1056. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-99-3656-4_26.","DOI":"10.1007\/978-981-99-3656-4_26"},{"key":"1911_CR59","doi-asserted-by":"publisher","first-page":"2772","DOI":"10.1016\/j.prime.2024.100673","volume":"100673","author":"HQ Gheni","year":"2024","unstructured":"Gheni HQ, Al-Yaseen WL (2024) Two-step data clustering for improved intrusion detection system using CICIoT2023 dataset, e-Prime - Advances in Electrical Engineering, Electronics and Energy, Volume 9. ISSN 100673:2772\u20136711. https:\/\/doi.org\/10.1016\/j.prime.2024.100673","journal-title":"ISSN"},{"issue":"13","key":"1911_CR60","doi-asserted-by":"publisher","first-page":"5941","DOI":"10.3390\/s23135941","volume":"23","author":"ECP Neto","year":"2023","unstructured":"Neto ECP, Dadkhah S, Ferreira R, Zohourian A, Lu R, Ghorbani AA (2023) CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment. Sensors 23(13):5941. https:\/\/doi.org\/10.3390\/s23135941","journal-title":"Sensors"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01911-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01911-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01911-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T13:56:44Z","timestamp":1746194204000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01911-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,15]]},"references-count":60,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1911"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01911-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,15]]},"assertion":[{"value":"6 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}],"article-number":"98"}}