{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:48:25Z","timestamp":1776106105346,"version":"3.50.1"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:00:00Z","timestamp":1742947200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:00:00Z","timestamp":1742947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01944-7","type":"journal-article","created":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T17:02:22Z","timestamp":1743267742000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Network security based combined CNN-RNN models for IoT intrusion detection system"],"prefix":"10.1007","volume":"18","author":[{"given":"Rahma","family":"Jablaoui","sequence":"first","affiliation":[]},{"given":"Noureddine","family":"Liouane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,26]]},"reference":[{"key":"1944_CR1","doi-asserted-by":"crossref","first-page":"108040","DOI":"10.1016\/j.comnet.2021.108040","volume":"192","author":"L Babun","year":"2021","unstructured":"Babun L, Denney K, Celik ZB, McDaniel P, Uluagac AS (2021) A survey on iot platforms: communication, security, and privacy perspectives. Comput Netw 192:108040","journal-title":"Comput Netw"},{"issue":"2","key":"1944_CR2","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1109\/TMC.2023.3241206","volume":"23","author":"F Wu","year":"2023","unstructured":"Wu F, Lyu F, Ren J, Yang P, Qian K, Gao S, Zhang Y (2023) Characterizing internet card user portraits for efficient churn prediction model design. IEEE Trans Mob Comput 23(2):1735\u20131752","journal-title":"IEEE Trans Mob Comput"},{"issue":"3","key":"1944_CR3","doi-asserted-by":"crossref","first-page":"1383","DOI":"10.1007\/s11277-020-07108-5","volume":"112","author":"C Sobin","year":"2020","unstructured":"Sobin C (2020) A survey on architecture, protocols and challenges in iot. Wirel Pers Commun 112(3):1383\u20131429","journal-title":"Wirel Pers Commun"},{"issue":"13","key":"1944_CR4","doi-asserted-by":"crossref","first-page":"10474","DOI":"10.1109\/JIOT.2021.3062630","volume":"8","author":"MN Bhuiyan","year":"2021","unstructured":"Bhuiyan MN, Rahman MM, Billah MM, Saha D (2021) Internet of things (iot): A review of its enabling technologies in healthcare applications, standards protocols, security, and market opportunities. IEEE Internet Things J 8(13):10474\u201310498","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"1944_CR5","doi-asserted-by":"crossref","first-page":"155","DOI":"10.26599\/BDMA.2020.9020029","volume":"4","author":"Z Tong","year":"2021","unstructured":"Tong Z, Ye F, Yan M, Liu H, Basodi S (2021) A survey on algorithms for intelligent computing and smart city applications. Big Data Min Anal 4(3):155\u2013172","journal-title":"Big Data Min Anal"},{"key":"1944_CR6","doi-asserted-by":"crossref","first-page":"2440","DOI":"10.1016\/j.egyr.2023.01.085","volume":"9","author":"MO Qays","year":"2023","unstructured":"Qays MO, Ahmad I, Abu-Siada A, Hossain ML, Yasmin F (2023) Key communication technologies, applications, protocols and future guides for iot-assisted smart grid systems: a review. Energy Rep 9:2440\u20132452","journal-title":"Energy Rep"},{"issue":"9","key":"1944_CR7","doi-asserted-by":"crossref","first-page":"8327","DOI":"10.1109\/JSEN.2022.3161797","volume":"22","author":"L Babangida","year":"2022","unstructured":"Babangida L, Perumal T, Mustapha N, Yaakob R (2022) Internet of things (iot) based activity recognition strategies in smart homes: a review. IEEE Sens J 22(9):8327\u20138336","journal-title":"IEEE Sens J"},{"issue":"3","key":"1944_CR8","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/s13198-021-01089-9","volume":"12","author":"M Madhiarasan","year":"2021","unstructured":"Madhiarasan M (2021) Design and development of iot based solar powered versatile moving robot for military application. Int J Syst Assur Eng Manag 12(3):437\u2013450","journal-title":"Int J Syst Assur Eng Manag"},{"issue":"3","key":"1944_CR9","doi-asserted-by":"crossref","first-page":"273","DOI":"10.26599\/BDMA.2022.9020032","volume":"6","author":"M Mohy-Eddine","year":"2023","unstructured":"Mohy-Eddine M, Guezzaz A, Benkirane S, Azrour M, Farhaoui Y (2023) An ensemble learning based intrusion detection model for industrial iot security. Big Data Min Anal 6(3):273\u2013287","journal-title":"Big Data Min Anal"},{"key":"1944_CR10","doi-asserted-by":"crossref","unstructured":"Smmarwar SK, Gupta GP, Kumar S (2024) Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: a comprehensive review. Telemat Inform Rep 100130","DOI":"10.1016\/j.teler.2024.100130"},{"key":"1944_CR11","doi-asserted-by":"crossref","first-page":"108410","DOI":"10.1016\/j.compeleceng.2022.108410","volume":"104","author":"SK Smmarwar","year":"2022","unstructured":"Smmarwar SK, Gupta GP, Kumar S (2022) Deep malware detection framework for iot-based smart agriculture. Comput Electr Eng 104:108410","journal-title":"Comput Electr Eng"},{"key":"1944_CR12","unstructured":"Anderson JP (1980) Computer security threat monitoring and surveillance. James P. Anderson Company, Technical Report"},{"issue":"1","key":"1944_CR13","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1007\/s10462-021-10037-9","volume":"55","author":"A Thakkar","year":"2022","unstructured":"Thakkar A, Lohiya R (2022) A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions. Artif Intell Rev 55(1):453\u2013563","journal-title":"Artif Intell Rev"},{"issue":"3","key":"1944_CR14","doi-asserted-by":"crossref","first-page":"292","DOI":"10.3390\/electronics8030292","volume":"8","author":"MZ Alom","year":"2019","unstructured":"Alom MZ, Taha TM, Yakopcic C, Westberg S, Sidike P, Nasrin MS, Hasan M, Van Essen BC, Awwal AA, Asari VK (2019) A state-of-the-art survey on deep learning theory and architectures. Electronics 8(3):292","journal-title":"Electronics"},{"key":"1944_CR15","doi-asserted-by":"crossref","first-page":"104109","DOI":"10.1016\/j.cose.2024.104109","volume":"148","author":"P Kumar","year":"2025","unstructured":"Kumar P, Jolfaei A, Islam AN (2025) An enhanced deep-learning empowered threat-hunting framework for software-defined internet of things. Comput Secur 148:104109","journal-title":"Comput Secur"},{"issue":"3","key":"1944_CR16","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","volume":"22","author":"MA Al-Garadi","year":"2020","unstructured":"Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for internet of things (iot) security. IEEE Commun Surv Tutor 22(3):1646\u20131685","journal-title":"IEEE Commun Surv Tutor"},{"key":"1944_CR17","doi-asserted-by":"crossref","first-page":"36429","DOI":"10.1109\/ACCESS.2022.3151903","volume":"10","author":"NQ Do","year":"2022","unstructured":"Do NQ, Selamat A, Krejcar O, Herrera-Viedma E, Fujita H (2022) Deep learning for phishing detection: Taxonomy, current challenges and future directions. IEEE Access 10:36429\u201336463","journal-title":"IEEE Access"},{"key":"1944_CR18","doi-asserted-by":"crossref","unstructured":"Jablaoui R, Liouane N (2024) Efficient rnn models for iot intrusion detection system. In: 2024 International conference on control, automation and diagnosis (ICCAD). IEEE, pp 1\u20136","DOI":"10.1109\/ICCAD60883.2024.10553939"},{"key":"1944_CR19","doi-asserted-by":"crossref","first-page":"102675","DOI":"10.1016\/j.cose.2022.102675","volume":"116","author":"Z Yang","year":"2022","unstructured":"Yang Z, Liu X, Li T, Wu D, Wang J, Zhao Y, Han H (2022) A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput Secur 116:102675","journal-title":"Comput Secur"},{"issue":"2","key":"1944_CR20","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/JSYST.2020.2992966","volume":"15","author":"D G\u00fcm\u00fc\u015fba\u015f","year":"2020","unstructured":"G\u00fcm\u00fc\u015fba\u015f D, Y\u0131ld\u0131r\u0131m T, Genovese A, Scotti F (2020) A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems. IEEE Syst J 15(2):1717\u20131731","journal-title":"IEEE Syst J"},{"key":"1944_CR21","doi-asserted-by":"crossref","unstructured":"Jablaoui R, Liouane N (2024) An effective deep cnn-lstm based intrusion detection system for network security. In: 2024 International conference on control, automation and diagnosis (ICCAD). IEEE, pp 1\u20136","DOI":"10.1109\/ICCAD60883.2024.10553826"},{"issue":"3","key":"1944_CR22","doi-asserted-by":"crossref","first-page":"181","DOI":"10.26599\/BDMA.2020.9020003","volume":"3","author":"W Zhong","year":"2020","unstructured":"Zhong W, Yu N, Ai C (2020) Applying big data based deep learning system to intrusion detection. Big Data Min Anal 3(3):181\u2013195","journal-title":"Big Data Min Anal"},{"key":"1944_CR23","doi-asserted-by":"crossref","unstructured":"Sarhan M, Layeghy S, Moustafa N, Portmann M (2021) Netflow datasets for machine learning-based network intrusion detection systems. In: Big data technologies and applications: 10th EAI International Conference, BDTA 2020, and 13th EAI International Conference on Wireless Internet, WiCON 2020, Virtual Event, December 11, 2020, Proceedings 10. Springer, pp 117\u2013135","DOI":"10.1007\/978-3-030-72802-1_9"},{"key":"1944_CR24","doi-asserted-by":"crossref","unstructured":"Sarhan M, Layeghy S, Portmann M (2022) Towards a standard feature set for network intrusion detection system datasets. Mobile networks and applications, 1\u201314","DOI":"10.1007\/s11036-021-01843-0"},{"key":"1944_CR25","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.100818","volume":"22","author":"T Altaf","year":"2023","unstructured":"Altaf T, Wang X, Ni W, Yu G, Liu RP, Braun R (2023) A new concatenated multigraph neural network for iot intrusion detection. Internet of Things. 22:100818","journal-title":"Internet of Things."},{"key":"1944_CR26","doi-asserted-by":"crossref","unstructured":"Vishwakarma M, Kesswani N (2023) A transfer learning based intrusion detection system for internet of things","DOI":"10.21203\/rs.3.rs-2930837\/v1"},{"issue":"1","key":"1944_CR27","first-page":"1351","volume":"74","author":"N Sayed","year":"2022","unstructured":"Sayed N, Shoaib M, Ahmed W, Qasem S, Albarrak A, Saeed F (2022) Augmenting iot intrusion detection system performance using deep neural network. Comput Mater Contin 74(1):1351\u20131374","journal-title":"Comput Mater Contin"},{"key":"1944_CR28","doi-asserted-by":"crossref","unstructured":"Smmarwar SK, Gupta GP, Kumar S (2023) Xai-amd-dl: An explainable ai approach for android malware detection system using deep learning. In: 2023 IEEE World conference on applied intelligence and computing (AIC). IEEE, pp 423\u2013428","DOI":"10.1109\/AIC57670.2023.10263974"},{"key":"1944_CR29","doi-asserted-by":"crossref","unstructured":"Cao B, Li C, Song Y, Fan X et al (2022) Network intrusion detection technology based on convolutional neural network and bigru. Comput Intell Neurosci 2022","DOI":"10.1155\/2022\/1942847"},{"key":"1944_CR30","doi-asserted-by":"crossref","first-page":"100053","DOI":"10.1016\/j.teler.2023.100053","volume":"10","author":"V Hnamte","year":"2023","unstructured":"Hnamte V, Hussain J (2023) Dcnnbilstm: An efficient hybrid deep learning-based intrusion detection system. Telemat Inform Rep 10:100053","journal-title":"Telemat Inform Rep"},{"key":"1944_CR31","first-page":"102852","volume":"54","author":"SK Smmarwar","year":"2022","unstructured":"Smmarwar SK, Gupta GP, Kumar S, Kumar P (2022) An optimized and efficient android malware detection framework for future sustainable computing. Sustain Energy Technol Assess 54:102852","journal-title":"Sustain Energy Technol Assess"},{"issue":"9","key":"1944_CR32","doi-asserted-by":"crossref","first-page":"1104","DOI":"10.3390\/electronics10091104","volume":"10","author":"SI Popoola","year":"2021","unstructured":"Popoola SI, Adebisi B, Ande R, Hammoudeh M, Atayero AA (2021) Memory-efficient deep learning for botnet attack detection in iot networks. Electronics 10(9):1104","journal-title":"Electronics"},{"issue":"4","key":"1944_CR33","doi-asserted-by":"crossref","first-page":"2171","DOI":"10.3390\/s23042171","volume":"23","author":"Y-C Wang","year":"2023","unstructured":"Wang Y-C, Houng Y-C, Chen H-X, Tseng S-M (2023) Network anomaly intrusion detection based on deep learning approach. Sensors 23(4):2171","journal-title":"Sensors"},{"issue":"1","key":"1944_CR34","doi-asserted-by":"crossref","first-page":"58","DOI":"10.23919\/cje.2022.00.173","volume":"33","author":"Z Li","year":"2024","unstructured":"Li Z, Wang P, Wang Z (2024) Flowgananomaly: Flow-based anomaly network intrusion detection with adversarial learning. Chin J Electron 33(1):58\u201371","journal-title":"Chin J Electron"},{"key":"1944_CR35","doi-asserted-by":"crossref","first-page":"114351","DOI":"10.1016\/j.dss.2024.114351","volume":"188","author":"P Kumar","year":"2025","unstructured":"Kumar P, Javeed D, Islam AN, Luo XR (2025) Deepsecure: A computational design science approach for interpretable threat hunting in cybersecurity decision making. Decis Support Syst 188:114351","journal-title":"Decis Support Syst"},{"issue":"12","key":"1944_CR36","doi-asserted-by":"crossref","first-page":"6999","DOI":"10.1109\/TNNLS.2021.3084827","volume":"33","author":"Z Li","year":"2021","unstructured":"Li Z, Liu F, Yang W, Peng S, Zhou J (2021) A survey of convolutional neural networks: analysis, applications, and prospects. IEEE Trans Neural Netw Learn Syst 33(12):6999\u20137019","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"1","key":"1944_CR37","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s10772-021-09843-x","volume":"26","author":"SR Reddy","year":"2023","unstructured":"Reddy SR, Varma GS, Davuluri RL (2023) Optimized convolutional neural network model for plant species identification from leaf images using computer vision. Int J Speech Technol 26(1):23\u201350","journal-title":"Int J Speech Technol"},{"key":"1944_CR38","doi-asserted-by":"crossref","first-page":"100140","DOI":"10.1016\/j.health.2023.100140","volume":"3","author":"R Thanki","year":"2023","unstructured":"Thanki R (2023) A deep neural network and machine learning approach for retinal fundus image classification. Healthc Anal 3:100140","journal-title":"Healthc Anal"},{"key":"1944_CR39","doi-asserted-by":"crossref","unstructured":"Amjoud AB, Amrouch M (2023) Object detection using deep learning, cnns and vision transformers: a review. IEEE Access","DOI":"10.1109\/ACCESS.2023.3266093"},{"issue":"3","key":"1944_CR40","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1089\/big.2020.0263","volume":"9","author":"I Al-Turaiki","year":"2021","unstructured":"Al-Turaiki I, Altwaijry N (2021) A convolutional neural network for improved anomaly-based network intrusion detection. Big Data 9(3):233\u2013252","journal-title":"Big Data"},{"key":"1944_CR41","doi-asserted-by":"crossref","first-page":"5455","DOI":"10.1007\/s10462-020-09825-6","volume":"53","author":"A Khan","year":"2020","unstructured":"Khan A, Sohail A, Zahoora U, Qureshi AS (2020) A survey of the recent architectures of deep convolutional neural networks. Artif Intell Rev 53:5455\u20135516","journal-title":"Artif Intell Rev"},{"key":"1944_CR42","doi-asserted-by":"crossref","first-page":"9827","DOI":"10.1007\/s00521-019-04557-3","volume":"32","author":"A Aleesa","year":"2020","unstructured":"Aleesa A, Zaidan B, Zaidan A, Sahar NM (2020) Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions. Neural Comput Appl 32:9827\u20139858","journal-title":"Neural Comput Appl"},{"issue":"10","key":"1944_CR43","doi-asserted-by":"crossref","first-page":"10246","DOI":"10.1016\/j.jksuci.2022.10.019","volume":"34","author":"PB Udas","year":"2022","unstructured":"Udas PB, Karim ME, Roy KS (2022) Spider: A shallow pca based network intrusion detection system with enhanced recurrent neural networks. J King Saud Univ - Comput Inf Sci 34(10):10246\u201310272","journal-title":"J King Saud Univ - Comput Inf Sci"},{"issue":"8","key":"1944_CR44","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"issue":"10","key":"1944_CR45","doi-asserted-by":"crossref","first-page":"2313","DOI":"10.1140\/epjst\/e2019-900046-x","volume":"228","author":"K Smagulova","year":"2019","unstructured":"Smagulova K, James AP (2019) A survey on lstm memristive neural network architectures and applications. Eur Phys J Spec Top 228(10):2313\u20132324","journal-title":"Eur Phys J Spec Top"},{"key":"1944_CR46","doi-asserted-by":"crossref","unstructured":"Ma Z, Li J, Song Y, Wu X, Chen C et al (2022) Network intrusion detection method based on fcwgan and bilstm. Comput Intell Neurosci 2022","DOI":"10.1155\/2022\/6591140"},{"issue":"2","key":"1944_CR47","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1016\/j.gltp.2021.08.017","volume":"2","author":"T Pooja","year":"2021","unstructured":"Pooja T, Shrinivasacharya P (2021) Evaluating neural networks using bi-directional lstm for network ids (intrusion detection systems) in cyber security. Glob Transit Proc 2(2):448\u2013454","journal-title":"Glob Transit Proc"},{"key":"1944_CR48","unstructured":"Chung J, Gulcehre C, Cho K, Bengio Y (2014) Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv:1412.3555"},{"key":"1944_CR49","first-page":"102899","volume":"61","author":"NB Singh","year":"2021","unstructured":"Singh NB, Singh MM, Sarkar A, Mandal JK (2021) A novel wide & deep transfer learning stacked gru framework for network intrusion detection. J Inf Secur Appl 61:102899","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"1944_CR50","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/s44212-022-00015-z","volume":"1","author":"S Wang","year":"2022","unstructured":"Wang S, Shao C, Zhang J, Zheng Y, Meng M (2022) Traffic flow prediction using bi-directional gated recurrent unit method. Urban Inform 1(1):16","journal-title":"Urban Inform"},{"key":"1944_CR51","doi-asserted-by":"crossref","unstructured":"Yu H, Kang C, Xiao Y, Ting Y (2023) Network intrusion detection method based on hybrid improved residual network blocks and bidirectional gated recurrent units. IEEE Access","DOI":"10.1109\/ACCESS.2023.3271866"},{"key":"1944_CR52","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.tifs.2021.04.042","volume":"113","author":"Y Liu","year":"2021","unstructured":"Liu Y, Pu H, Sun D-W (2021) Efficient extraction of deep image features using convolutional neural network (cnn) for applications in detecting and analysing complex food matrices. Trends Food Sci Technol 113:193\u2013204","journal-title":"Trends Food Sci Technol"},{"key":"1944_CR53","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.ins.2021.04.053","volume":"571","author":"Z Xiao","year":"2021","unstructured":"Xiao Z, Xu X, Xing H, Luo S, Dai P, Zhan D (2021) Rtfn: A robust temporal feature network for time series classification. Inf Sci 571:65\u201386","journal-title":"Inf Sci"},{"key":"1944_CR54","doi-asserted-by":"crossref","unstructured":"Sarhan M, Layeghy S, Portmann M (2022) Towards a standard feature set for network intrusion detection system datasets. Mob Netw Appl, 1\u201314","DOI":"10.1007\/s11036-021-01843-0"},{"issue":"2","key":"1944_CR55","first-page":"299","volume":"28","author":"V \u00c7etin","year":"2022","unstructured":"\u00c7etin V, Yildiz O (2022) A comprehensive review on data preprocessing techniques in data analysis. Pamukkale \u00dcniversitesi M\u00fchendislik Bilimleri Dergisi 28(2):299\u2013312","journal-title":"Pamukkale \u00dcniversitesi M\u00fchendislik Bilimleri Dergisi"},{"key":"1944_CR56","doi-asserted-by":"crossref","first-page":"652801","DOI":"10.3389\/fenrg.2021.652801","volume":"9","author":"C Fan","year":"2021","unstructured":"Fan C, Chen M, Wang X, Wang J, Huang B (2021) A review on data preprocessing techniques toward efficient and reliable knowledge discovery from building operational data. Front Energy Res 9:652801","journal-title":"Front Energy Res"},{"issue":"2","key":"1944_CR57","first-page":"1945","volume":"12","author":"S Hudnurkar","year":"2022","unstructured":"Hudnurkar S, Rayavarapu N (2022) Binary classification of rainfall time-series using machine learning algorithms. Int J Electr Comput Eng 12(2):1945\u20131954","journal-title":"Int J Electr Comput Eng"},{"key":"1944_CR58","doi-asserted-by":"crossref","first-page":"90847","DOI":"10.1109\/ACCESS.2020.2994222","volume":"8","author":"M Hasnain","year":"2020","unstructured":"Hasnain M, Pasha MF, Ghani I, Imran M, Alzahrani MY, Budiarto R (2020) Evaluating trust prediction and confusion matrix measures for web services ranking. IEEE Access 8:90847\u201390861","journal-title":"IEEE Access"},{"issue":"21","key":"1944_CR59","doi-asserted-by":"crossref","first-page":"14623","DOI":"10.1007\/s00521-021-06103-6","volume":"33","author":"G Canbek","year":"2021","unstructured":"Canbek G, Taskaya Temizel T, Sagiroglu S (2021) Benchmetrics: A systematic benchmarking method for binary classification performance metrics. Neural Comput & Applic 33(21):14623\u201314650","journal-title":"Neural Comput & Applic"},{"key":"1944_CR60","unstructured":"Devarakonda A, Naumov M, Garland M (2017) Adabatch: Adaptive batch sizes for training deep neural networks. arXiv:1712.02029"},{"key":"1944_CR61","unstructured":"Kingma DP, Ba J (2014) Adam: A method for stochastic optimization. arXiv:1412.6980"},{"issue":"12","key":"1944_CR62","doi-asserted-by":"crossref","first-page":"13250","DOI":"10.1109\/TCYB.2021.3107415","volume":"52","author":"H Iiduka","year":"2021","unstructured":"Iiduka H (2021) Appropriate learning rates of adaptive learning rate optimization algorithms for training deep neural networks. IEEE Trans Cybern 52(12):13250\u201313261","journal-title":"IEEE Trans Cybern"},{"key":"1944_CR63","doi-asserted-by":"crossref","unstructured":"Banerjee C, Mukherjee T, Pasiliao E Jr (2019) An empirical study on generalizations of the relu activation function. In: Proceedings of the 2019 ACM southeast conference, pp 164\u2013167","DOI":"10.1145\/3299815.3314450"},{"key":"1944_CR64","doi-asserted-by":"crossref","unstructured":"Wang M, Lu S, Zhu D, Lin J, Wang Z (2018) A high-speed and low-complexity architecture for softmax function in deep learning. In: 2018 IEEE Asia pacific conference on circuits and systems (APCCAS). IEEE, pp 223\u2013226","DOI":"10.1109\/APCCAS.2018.8605654"},{"issue":"5","key":"1944_CR65","doi-asserted-by":"crossref","first-page":"1394","DOI":"10.1093\/jrsssc\/qlad057","volume":"72","author":"K Riehl","year":"2023","unstructured":"Riehl K, Neunteufel M, Hemberg M (2023) Hierarchical confusion matrix for classification performance evaluation. J R Stat Soc Ser C Appl Stat 72(5):1394\u20131412","journal-title":"J R Stat Soc Ser C Appl Stat"},{"issue":"1","key":"1944_CR66","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1136\/jcp.2008.061010","volume":"62","author":"K S\u00f8reide","year":"2009","unstructured":"S\u00f8reide K (2009) Receiver-operating characteristic curve analysis in diagnostic, prognostic and predictive biomarker research. J Clin Pathol 62(1):1\u20135","journal-title":"J Clin Pathol"},{"key":"1944_CR67","doi-asserted-by":"crossref","unstructured":"Lo WW, Layeghy S, Sarhan M, Gallagher M, Portmann M (2022) E-graphsage: A graph neural network based intrusion detection system for iot. In: NOMS 2022-2022 IEEE\/IFIP Network operations and management symposium. IEEE, pp 1\u20139","DOI":"10.1109\/NOMS54207.2022.9789878"},{"key":"1944_CR68","doi-asserted-by":"crossref","unstructured":"Xu R, Wu G, Wang W, Gao X, He A, Zhang Z (2024) Applying self-supervised learning to network intrusion detection for network flows with graph neural network. arXiv:2403.01501","DOI":"10.1016\/j.comnet.2024.110495"},{"key":"1944_CR69","doi-asserted-by":"crossref","unstructured":"Krishnan D, Shrinath P (2024) Robust botnet detection approach for known and unknown attacks in iot networks using stacked multi-classifier and adaptive thresholding. Arab J Sci Eng, 1\u201317","DOI":"10.1007\/s13369-024-08742-y"},{"issue":"1","key":"1944_CR70","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1186\/s13677-023-00509-4","volume":"12","author":"SMT Nizamudeen","year":"2023","unstructured":"Nizamudeen SMT (2023) Intelligent intrusion detection framework for multi-clouds-iot environment using swarm-based deep learning classifier. J Cloud Comput 12(1):134","journal-title":"J Cloud Comput"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01944-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01944-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01944-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:31:14Z","timestamp":1746844274000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01944-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,26]]},"references-count":70,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1944"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01944-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,26]]},"assertion":[{"value":"6 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Funding"}},{"value":"The authors declare no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"The authors declare no competing interests.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"129"}}