{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:18:13Z","timestamp":1772554693045,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T00:00:00Z","timestamp":1744243200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T00:00:00Z","timestamp":1744243200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01933-w","type":"journal-article","created":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T08:47:22Z","timestamp":1744274842000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Optimizing cybercrime detection: A hybrid deep learning approach for enhanced intrusion detection systems"],"prefix":"10.1007","volume":"18","author":[{"given":"Rima","family":"Alshaya","sequence":"first","affiliation":[]},{"given":"Salim E. L.","family":"khediri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,10]]},"reference":[{"key":"1933_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103065","volume":"126","author":"Y Alaca","year":"2023","unstructured":"Alaca Y, \u00c7elik Y (2023) Cyber attack detection with qr code images using lightweight deep learning models. Comput Sec 126:103065","journal-title":"Comput Sec"},{"key":"1933_CR2","doi-asserted-by":"publisher","first-page":"65520","DOI":"10.1109\/ACCESS.2020.2985089","volume":"8","author":"SJ Lee","year":"2020","unstructured":"Lee SJ et al (2020) Impact: Impersonation attack detection via edge computing using deep autoencoder and feature abstraction. IEEE Access 8:65520\u201365529. https:\/\/doi.org\/10.1109\/ACCESS.2020.2985089","journal-title":"IEEE Access"},{"issue":"4","key":"1933_CR3","doi-asserted-by":"publisher","first-page":"1674","DOI":"10.3390\/app11041674","volume":"11","author":"N Oliveira","year":"2021","unstructured":"Oliveira N, Pra\u00e7a I, Maia E, Sousa O (2021) Intelligent cyber attack detection and classification for network-based intrusion detection systems. Appl Sci 11(4):1674","journal-title":"Appl Sci"},{"key":"1933_CR4","doi-asserted-by":"crossref","unstructured":"Al-talak K, Abbass O (2021) Detecting server-side request forgery (ssrf) attack by using deep learning techniques. Int J Adv Comput Sci Appl 12(12)","DOI":"10.14569\/IJACSA.2021.0121230"},{"issue":"4","key":"1933_CR5","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1109\/TDSC.2021.3050101","volume":"19","author":"M Kravchik","year":"2021","unstructured":"Kravchik M, Shabtai A (2021) Efficient cyber attack detection in industrial control systems using lightweight neural networks and pca. IEEE Trans Dependable Secure Comput 19(4):2179\u20132197","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"1","key":"1933_CR6","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/s10462-021-10037-9","volume":"55","author":"A Thakkar","year":"2022","unstructured":"Thakkar A, Lohiya R (2022) A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions. Artif Intell Rev 55(1):453\u2013563","journal-title":"Artif Intell Rev"},{"key":"1933_CR7","doi-asserted-by":"publisher","DOI":"10.1002\/alz.065077","volume":"19","author":"F Mohammadian","year":"2023","unstructured":"Mohammadian F, Motamed M, Zavieh A, Heidari A (2023) Investigating adhd and asd features in dementia patients referred to a memory clinic in iran. Alzheimer\u2019s Dementia 19:065077","journal-title":"Alzheimer\u2019s Dementia"},{"key":"1933_CR8","doi-asserted-by":"crossref","unstructured":"Pallavi C, Girija R, Jayalakshmi S (2021) An analysis on network security tools and systems. In: Proceedings of the international conference on innovative computing & communication (ICICC)","DOI":"10.2139\/ssrn.3833455"},{"key":"1933_CR9","doi-asserted-by":"crossref","unstructured":"Heidari A, Navimipour NJ, Zeadally S, Chamola V (2025) Everything you wanted to know about chatgpt: Components, capabilities, applications, and opportunities. Int Technol Lett 530","DOI":"10.1002\/itl2.530"},{"issue":"11","key":"1933_CR10","doi-asserted-by":"publisher","first-page":"5056","DOI":"10.1002\/ett.5056","volume":"35","author":"M Asadi","year":"2024","unstructured":"Asadi M, Jamali MAJ, Heidari A, Navimipour NJ (2024) Botnets unveiled: A comprehensive survey on evolving threats and defense strategies. Trans Emerg Telecommun Technol 35(11):5056","journal-title":"Trans Emerg Telecommun Technol"},{"key":"1933_CR11","doi-asserted-by":"crossref","unstructured":"Heidari A, Amiri Z, Jamali MAJ, Navimipour NJ (2024) Enhancing solar convection analysis with multi-core processors and gpus. Eng Report 13050","DOI":"10.1002\/eng2.13050"},{"key":"1933_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115659","volume":"185","author":"CH Karadal","year":"2021","unstructured":"Karadal CH, Kaya MC, Tuncer T, Dogan S, Acharya UR (2021) Automated classification of remote sensing images using multileveled mobilenetv2 and dwt techniques. Expert Syst Appl 185:115659","journal-title":"Expert Syst Appl"},{"key":"1933_CR13","doi-asserted-by":"crossref","unstructured":"AlOwais A, Naseem S, Dawdi T, Abdisalam M, Elkalyoubi Y, Adwan A, Hassan K, Fernini I (2019) Meteorite hunting using deep learning and uavs. In: 2019 2nd international conference on signal processing and information security (ICSPIS), IEEE, pp 1\u20134","DOI":"10.1109\/ICSPIS48135.2019.9045905"},{"issue":"7","key":"1933_CR14","first-page":"324","volume":"21","author":"A Alsayed","year":"2021","unstructured":"Alsayed A, Alsabei A, Arif M (2021) Classification of apple tree leaves diseases using deep learning methods. Int J Comput Sci Netw Sec 21(7):324\u2013330","journal-title":"Int J Comput Sci Netw Sec"},{"key":"1933_CR15","doi-asserted-by":"crossref","unstructured":"Patel R, Chaware A (2020) Transfer learning with fine-tuned mobilenetv2 for diabetic retinopathy. In: 2020 International conference for emerging technology (INCET), IEEE, pp 1\u20134","DOI":"10.1109\/INCET49848.2020.9154014"},{"key":"1933_CR16","doi-asserted-by":"crossref","unstructured":"Noever DA, Noever SEM (2021) Deep learning classification methods applied to tabular cybersecurity benchmarks. Int J Netw Sec Appl (IJNSA) Vol. 13","DOI":"10.5121\/ijnsa.2021.13301"},{"key":"1933_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101976","volume":"97","author":"Y Zhou","year":"2020","unstructured":"Zhou Y, Cheng G, Jiang S, Zhao Y, Chen Z (2020) Cost-effective moving target defense against ddos attacks using trilateral game and multi-objective markov decision processes. Comput Sec 97:101976","journal-title":"Comput Sec"},{"key":"1933_CR18","doi-asserted-by":"publisher","unstructured":"Wahsheh H, Al-zahrani MS (2021) Secure real-time computational intelligence system against malicious qr code links. Int J Comput Commun Control 16. https:\/\/doi.org\/10.15837\/ijccc.2021.3.4186","DOI":"10.15837\/ijccc.2021.3.4186"},{"key":"1933_CR19","unstructured":"European Union Agency for Cybersecurity: ENISA Threat Landscape 2023. Accessed: 2024-05-15 (2023). https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2023"},{"key":"1933_CR20","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5540670","author":"MS Al-zahrani","year":"2021","unstructured":"Al-zahrani MS, Wahsheh H, Alsaade FW (2021) Secure real-time artificial intelligence system against malicious qr code links. Sec Commun Netw. https:\/\/doi.org\/10.1155\/2021\/5540670","journal-title":"Sec Commun Netw"},{"key":"1933_CR21","doi-asserted-by":"publisher","unstructured":"Wardak AB, Rasheed J, Yahyaoui A, Waziry S, Alimovski E, Yesiltepe M (2022) Noise presence detection in qr code images. In: 2022 12th International conference on advanced computer information technologies (ACIT), 489\u2013492. https:\/\/doi.org\/10.1109\/ACIT54803.2022.9912751","DOI":"10.1109\/ACIT54803.2022.9912751"},{"key":"1933_CR22","unstructured":"Sadiq S (2024) Benign and Malicious URLs Dataset. Kaggle. Accessed: June 2024. https:\/\/www.kaggle.com\/datasets\/samahsadiq\/benign-and-malicious-urls"},{"key":"1933_CR23","doi-asserted-by":"publisher","unstructured":"Andrejc\u00edk S, Ovsen\u00edk L\u2019, Oravec J, Zdraveck\u00fd N, Lap\u010d\u00e1k M (2022) Image steganography with using qr code. In: 2022 IEEE 16th international scientific conference on informatics (Informatics), pp 29\u201332. https:\/\/doi.org\/10.1109\/Informatics57926.2022.10083471","DOI":"10.1109\/Informatics57926.2022.10083471"},{"key":"1933_CR24","doi-asserted-by":"publisher","unstructured":"Howard AG, Sandler M, Chu G, Chen L-C, Chen B, Tan M, Wang W, Zhu Y, Pang R, Vasudevan V, Le QV, Adam H (2019) Searching for mobilenetv3. In: 2019 IEEE\/CVF international conference on computer vision (ICCV), pp 1314\u20131324. https:\/\/doi.org\/10.1109\/ICCV.2019.00140","DOI":"10.1109\/ICCV.2019.00140"},{"key":"1933_CR25","doi-asserted-by":"crossref","unstructured":"Sandler M, Howard A, Zhu M, Zhmoginov A, Chen L-C (2018) Mobilenetv2: Inverted residuals and linear bottlenecks. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), pp 4510\u20134520","DOI":"10.1109\/CVPR.2018.00474"},{"key":"1933_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-39303-8_3","author":"Y-W Chow","year":"2019","unstructured":"Chow Y-W, Susilo W, Baek J, Kim J (2019). Qr code watermarking for digital images. https:\/\/doi.org\/10.1007\/978-3-030-39303-8_3","journal-title":"Qr code watermarking for digital images."},{"key":"1933_CR27","doi-asserted-by":"crossref","unstructured":"Saputra MFA, Widiyaningtyas T, Wibawa AP (2018) Illiteracy classification using k means-na\u00e3 ve bayes algorithm. JOIV: Int J Inf Visualization 2(3):153\u2013158","DOI":"10.30630\/joiv.2.3.129"},{"key":"1933_CR28","unstructured":"Spark algorithm tutorial. https:\/\/www.simplilearn.com\/spark-algorithm-tutorial (2019)"},{"key":"1933_CR29","doi-asserted-by":"publisher","first-page":"57023","DOI":"10.1109\/ACCESS.2019.2912072","volume":"7","author":"S Ma","year":"2019","unstructured":"Ma S, Liu W, Cai W, Shang Z, Liu G (2019) Lightweight deep residual cnn for fault diagnosis of rotating machinery based on depthwise separable convolutions. IEEE Access 7:57023\u201357036. https:\/\/doi.org\/10.1109\/ACCESS.2019.2912072","journal-title":"IEEE Access"},{"issue":"21","key":"1933_CR30","doi-asserted-by":"publisher","first-page":"6305","DOI":"10.3390\/s20216305","volume":"20","author":"Z Guo","year":"2020","unstructured":"Guo Z, Zheng H, You C, Xu X, Wu X, Zheng Z, Ju J (2020) Digital forensics of scanned qr code images for printer source identification using bottleneck residual block. Sensors 20(21):6305","journal-title":"Sensors"},{"key":"1933_CR31","doi-asserted-by":"crossref","unstructured":"Toldinas J, Ven\u010dkauskas A, Dama\u0161evi\u010dius R, Grigali\u016bnas R, Morkevi\u010dius N, Baranauskas E (2021) A novel approach for network intrusion detection using multistage deep learning image recognition. Electronics 10(15):1854","DOI":"10.3390\/electronics10151854"},{"key":"1933_CR32","doi-asserted-by":"crossref","unstructured":"Noever DA, Noever SEM (2021) Deep learning classification methods applied to tabular cybersecurity benchmarks. Int J Netw Sec Appl (IJNSA) Vol. 13","DOI":"10.5121\/ijnsa.2021.13301"},{"key":"1933_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-021-00444-8","volume":"8","author":"L Alzubaidi","year":"2021","unstructured":"Alzubaidi L, Zhang J, Humaidi AJ, Al-Dujaili A, Duan Y, Al-Shamma O, Santamar\u00eda J, Fadhel MA, Al-Amidie M, Farhan L (2021) Review of deep learning: Concepts, cnn architectures, challenges, applications, future directions. J Big Data 8:1\u201374","journal-title":"J Big Data"},{"issue":"2","key":"1933_CR34","doi-asserted-by":"publisher","first-page":"656","DOI":"10.3390\/s23020656","volume":"23","author":"RO Ogundokun","year":"2023","unstructured":"Ogundokun RO, Misra S, Akinrotimi AO, Ogul H (2023) Mobilenet-svm: A lightweight deep transfer learning model to diagnose bch scans for iomt-based imaging sensors. Sensors 23(2):656","journal-title":"Sensors"},{"issue":"19","key":"1933_CR35","doi-asserted-by":"publisher","first-page":"4134","DOI":"10.3390\/electronics12194134","volume":"12","author":"R Chen","year":"2023","unstructured":"Chen R, Huang Y, Lan K, Li J, Ren Y, Hu X, Lu X (2023) A fast adaptive binarization method for qr code images based on dynamic illumination equalization. Electronics 12(19):4134","journal-title":"Electronics"},{"key":"1933_CR36","doi-asserted-by":"publisher","unstructured":"Abidani SR, Zulkifley MA, Zulkifley NH (2020) A lightweight deep learning model for covid-19 detection. In: 2020 IEEE Symposium on industrial electronics & applications (ISIEA), pp 1\u20135. https:\/\/doi.org\/10.1109\/ISIEA49364.2020.9188133","DOI":"10.1109\/ISIEA49364.2020.9188133"},{"issue":"3","key":"1933_CR37","doi-asserted-by":"publisher","first-page":"160","DOI":"10.3390\/a16030160","volume":"16","author":"M-J Tsai","year":"2023","unstructured":"Tsai M-J, Lee Y-C, Chen T-M (2023) Implementing deep convolutional neural networks for qr code-based printed source identification. Algorithms 16(3):160. https:\/\/doi.org\/10.3390\/a16030160","journal-title":"Algorithms"},{"key":"1933_CR38","doi-asserted-by":"publisher","first-page":"110681","DOI":"10.1109\/ACCESS.2023.3321408","volume":"11","author":"J Fan","year":"2023","unstructured":"Fan J, Liu J, Chen Q, Wang W, Wu Y (2023) Accurate ovarian cyst classification with a lightweight deep learning model for ultrasound images. IEEE Access 11:110681\u2013110691. https:\/\/doi.org\/10.1109\/ACCESS.2023.3321408","journal-title":"IEEE Access"},{"key":"1933_CR39","doi-asserted-by":"publisher","unstructured":"Ukwandu E, Ben-Farah M, Hindy H, Bures M, Atkinson R, Tachtatzis C, Andonovic I, Bellekens X (2022) Cyber-security challenges in aviation industry: A review of current and future trends. Information 13(146). https:\/\/doi.org\/10.3390\/info13030146","DOI":"10.3390\/info13030146"},{"key":"1933_CR40","doi-asserted-by":"publisher","unstructured":"Asmitha KA, Puthuvath V, Rafidha Rehiman KA, Ananth SL (2024) Deep learning vs. adversarial noise: a battle in malware image analysis. Cluster Comput TBD:1\u201330. https:\/\/doi.org\/10.1007\/s10586-024-04397-4","DOI":"10.1007\/s10586-024-04397-4"},{"issue":"6","key":"1933_CR41","doi-asserted-by":"publisher","first-page":"154","DOI":"10.3390\/computers13060154","volume":"13","author":"F Mercaldo","year":"2024","unstructured":"Mercaldo F, Martinelli F, Santone A (2024) Deep convolutional generative adversarial networks in image-based android malware detection. Computers 13(6):154. https:\/\/doi.org\/10.3390\/computers13060154","journal-title":"Computers"},{"key":"1933_CR42","doi-asserted-by":"publisher","first-page":"84843","DOI":"10.1109\/ACCESS.2024.3414998","volume":"12","author":"AV Nagarjun","year":"2024","unstructured":"Nagarjun AV, Rajkumar S (2024) Design of an anomaly detection framework for delay and privacy-aware blockchain-based cloud deployments. IEEE Access 12:84843\u201384862. https:\/\/doi.org\/10.1109\/ACCESS.2024.3414998","journal-title":"IEEE Access"},{"key":"1933_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00678-y","author":"YK Saheed","year":"2023","unstructured":"Saheed YK, Abdulganiyu OH, Tchakoucht TA (2023) Feature selection in intrusion detection systems: a new hybrid fusion of bat algorithm and residue number system. Int J Inf Sec. https:\/\/doi.org\/10.1007\/s10207-023-00678-y","journal-title":"Int J Inf Sec"},{"issue":"16","key":"1933_CR44","doi-asserted-by":"publisher","first-page":"2430007","DOI":"10.1142\/S0218126624300071","volume":"33","author":"AV Nagarjun","year":"2024","unstructured":"Nagarjun AV, Rajkumar S (2024) Exploring the potential of deep learning and blockchain for intrusion detection systems: A comprehensive review. J Circuits, Syst, Comput 33(16):2430007. https:\/\/doi.org\/10.1142\/S0218126624300071","journal-title":"J Circuits, Syst, Comput"},{"key":"1933_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101300","volume":"27","author":"M Ghahramani","year":"2024","unstructured":"Ghahramani M, Taheri R, Shojafar M, Javidan R, Wan S (2024) Deep image: A precious image-based deep learning method for online malware detection in iot environment. Int Things 27:101300. https:\/\/doi.org\/10.1016\/j.iot.2024.101300","journal-title":"Int Things"},{"key":"1933_CR46","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-024-06552-5","author":"OH Abdulganiyu","year":"2025","unstructured":"Abdulganiyu OH, Tchakoucht TA, Saheed YK, Ahmed HA (2025) Xidintfl-vae: Xgboost-based intrusion detection of imbalance network traffic via class-wise focal loss variational autoencoder. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-024-06552-5","journal-title":"J Supercomput"},{"key":"1933_CR47","doi-asserted-by":"publisher","unstructured":"Abdulganiyu OH, Tchakoucht TA, Saheed YK (2024) Towards an efficient model for network intrusion detection system (ids): systematic literature review. Wireless Netw. https:\/\/doi.org\/10.1007\/s11276-023-03495-2","DOI":"10.1007\/s11276-023-03495-2"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01933-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01933-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01933-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:31:40Z","timestamp":1746844300000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01933-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,10]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1933"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01933-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,10]]},"assertion":[{"value":"8 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"145"}}