{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T06:50:16Z","timestamp":1769323816879,"version":"3.49.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"9-10","license":[{"start":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T00:00:00Z","timestamp":1682294400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T00:00:00Z","timestamp":1682294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s12243-023-00959-6","type":"journal-article","created":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T16:05:58Z","timestamp":1682352358000},"page":"585-597","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Social network malicious insider detection using time-based trust evaluation"],"prefix":"10.1007","volume":"78","author":[{"given":"T.","family":"Nathezhtha","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9226-4668","authenticated-orcid":false,"given":"D.","family":"Sangeetha","sequence":"additional","affiliation":[]},{"given":"V.","family":"Vaidehi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,24]]},"reference":[{"key":"959_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-021-00874-8","author":"T Wakui","year":"2021","unstructured":"Wakui T, Kondo T, Teraoka F (2021) GAMPAL: an anomaly detection mechanism for internet backbone traffic by flow size prediction with LSTM-RNN. Ann Telecommun. https:\/\/doi.org\/10.1007\/s12243-021-00874-8","journal-title":"Ann Telecommun"},{"key":"959_CR2","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s12243-013-0412-5","volume":"69","author":"R Filasiak","year":"2014","unstructured":"Filasiak R, Grzenda M, Luckner M et al (2014) On the testing of network cyber threat detection methods on spam example. Ann Telecommun 69:363\u2013377. https:\/\/doi.org\/10.1007\/s12243-013-0412-5","journal-title":"Ann Telecommun"},{"key":"959_CR3","doi-asserted-by":"publisher","first-page":"7550","DOI":"10.1109\/ACCESS.2020.3048198","volume":"9","author":"L Liu","year":"2021","unstructured":"Liu L, Wang P, Lin J, Liu L (2021) Intrusion detection of imbalanced network traffic based on machine learning and deep learning. IEEE Access 9:7550\u20137563. https:\/\/doi.org\/10.1109\/ACCESS.2020.3048198","journal-title":"IEEE Access"},{"issue":"8","key":"959_CR4","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1109\/TIFS.2019.2894358","volume":"14","author":"J Camacho","year":"2019","unstructured":"Camacho J, Maci\u00e1-Fern\u00e1ndez G, Fuentes-Garc\u00eda NM, Saccenti E (2019) Semi-supervised multivariate statistical network monitoring for learning security threats. IEEE Trans Inf Forensics Secur 14(8):2179\u20132189. https:\/\/doi.org\/10.1109\/TIFS.2019.2894358","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"959_CR5","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2010","unstructured":"Pan SJ, Yang Q (2010) A survey on transfer learning. IEEE Trans Knowl Data Eng 22(10):1345\u20131359. https:\/\/doi.org\/10.1109\/TKDE.2009.191","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"2","key":"959_CR6","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1109\/TNSE.2020.3004312","volume":"8","author":"X Ma","year":"2021","unstructured":"Ma X, Shi W (2021) AESMOTE: adversarial reinforcement learning with SMOTE for anomaly detection. IEEE Trans Netw Sci Eng 8(2):943\u2013956. https:\/\/doi.org\/10.1109\/TNSE.2020.3004312","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"4","key":"959_CR7","doi-asserted-by":"publisher","first-page":"2480","DOI":"10.1109\/TNSM.2020.3024225","volume":"17","author":"MD Mauro","year":"2020","unstructured":"Mauro MD, Galatro G, Liotta A (2020) Experimental review of neural-based approaches for network intrusion management. IEEE Trans Netw Serv Manage 17(4):2480\u20132495. https:\/\/doi.org\/10.1109\/TNSM.2020.3024225","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"959_CR8","doi-asserted-by":"publisher","first-page":"148363","DOI":"10.1109\/ACCESS.2019.2946708","volume":"7","author":"C Ma","year":"2019","unstructured":"Ma C, Du X, Cao L (2019) Analysis of multi-types of flow features based on hybrid neural network for improving network anomaly detection. IEEE Access 7:148363\u2013148380. https:\/\/doi.org\/10.1109\/ACCESS.2019.2946708","journal-title":"IEEE Access"},{"key":"959_CR9","doi-asserted-by":"publisher","first-page":"116216","DOI":"10.1109\/ACCESS.2020.3004699","volume":"8","author":"J Mao","year":"2020","unstructured":"Mao J, Hu Y, Jiang D, Wei T, Shen F (2020) CBFS: a clustering-based feature selection mechanism for network anomaly detection. IEEE Access 8:116216\u2013116225. https:\/\/doi.org\/10.1109\/ACCESS.2020.3004699","journal-title":"IEEE Access"},{"issue":"3","key":"959_CR10","doi-asserted-by":"publisher","first-page":"1222","DOI":"10.1109\/TNET.2018.2819507","volume":"26","author":"K Xie","year":"2018","unstructured":"Xie K et al (2018) On-line anomaly detection with high accuracy. IEEE\/ACM Trans Netw 26(3):1222\u20131235","journal-title":"IEEE\/ACM Trans Netw"},{"key":"959_CR11","doi-asserted-by":"publisher","first-page":"113081","DOI":"10.1109\/ACCESS.2019.2935154","volume":"7","author":"J Camacho","year":"2019","unstructured":"Camacho J, Ther\u00f3n R, Garc\u00eda-Gim\u00e9nez JM, Maci\u00e1-Fern\u00e1ndez G, Garc\u00eda-Teodoro P (2019) Group-wise principal component analysis for exploratory intrusion detection. IEEE Access 7:113081\u2013113093. https:\/\/doi.org\/10.1109\/ACCESS.2019.2935154","journal-title":"IEEE Access"},{"issue":"6","key":"959_CR12","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1109\/LCOMM.2009.090689","volume":"13","author":"P Velarde-Alvarado","year":"2009","unstructured":"Velarde-Alvarado P, Vargas-Rosales C, Torres-Roman D, Martinez-Herrera A (2009) Detecting anomalies in network traffic using the method of remaining elements. IEEE Commun Lett 13(6):462\u2013464. https:\/\/doi.org\/10.1109\/LCOMM.2009.090689","journal-title":"IEEE Commun Lett"},{"key":"959_CR13","doi-asserted-by":"publisher","first-page":"214781","DOI":"10.1109\/ACCESS.2020.3040510","volume":"8","author":"X Liu","year":"2020","unstructured":"Liu X et al (2020) NADS-RA: network anomaly detection scheme based on feature representation and data augmentation. IEEE Access 8:214781\u2013214800. https:\/\/doi.org\/10.1109\/ACCESS.2020.3040510","journal-title":"IEEE Access"},{"issue":"3","key":"959_CR14","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1109\/TNSM.2019.2933358","volume":"16","author":"A D\u2019Alconzo","year":"2019","unstructured":"D\u2019Alconzo A, Drago I, Morichetta A, Mellia M, Casas P (2019) A survey on big data for network traffic monitoring and analysis. IEEE Trans Netw Serv Manage 16(3):800\u2013813","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"959_CR15","doi-asserted-by":"publisher","first-page":"45184","DOI":"10.1109\/ACCESS.2020.2977325","volume":"8","author":"MA Elsayed","year":"2020","unstructured":"Elsayed MA, Zulkernine M (2020) PredictDeep: security analytics as a service for anomaly detection and prediction. IEEE Access 8:45184\u201345197. https:\/\/doi.org\/10.1109\/ACCESS.2020.2977325","journal-title":"IEEE Access"},{"key":"959_CR16","doi-asserted-by":"publisher","first-page":"77572","DOI":"10.1109\/ACCESS.2020.2989770","volume":"8","author":"S Kwon","year":"2020","unstructured":"Kwon S, Yoo H, Shon T (2020) IEEE 1815.1-based power system security with bidirectional RNN-based network anomalous attack detection for cyber-physical system. IEEE Access 8:77572\u201377586. https:\/\/doi.org\/10.1109\/ACCESS.2020.2989770","journal-title":"IEEE Access"},{"key":"959_CR17","doi-asserted-by":"publisher","first-page":"183207","DOI":"10.1109\/ACCESS.2019.2959131","volume":"7","author":"H He","year":"2019","unstructured":"He H, Sun X, He H, Zhao G, He L, Ren J (2019) A novel multimodal-sequential approach based on multi-view features for network intrusion detection. IEEE Access 7:183207\u2013183221. https:\/\/doi.org\/10.1109\/ACCESS.2019.2959131","journal-title":"IEEE Access"},{"issue":"5","key":"959_CR18","doi-asserted-by":"publisher","first-page":"3469","DOI":"10.1109\/TII.2020.3022432","volume":"17","author":"X Zhou","year":"2021","unstructured":"Zhou X, Hu Y, Liang W, Ma J, Jin Q (2021) Variational LSTM enhanced anomaly detection for industrial big data. IEEE Trans Industr Inf 17(5):3469\u20133477. https:\/\/doi.org\/10.1109\/TII.2020.3022432","journal-title":"IEEE Trans Industr Inf"},{"issue":"3","key":"959_CR19","doi-asserted-by":"publisher","first-page":"259","DOI":"10.26599\/TST.2019.9010033","volume":"26","author":"P Ma","year":"2021","unstructured":"Ma P, Jiang B, Lu Z, Li N, Jiang Z (2021) Cyber security named entity recognition using bidirectional long short-term memory with conditional random fields. Tsinghua Sci Technol 26(3):259\u2013265. https:\/\/doi.org\/10.26599\/TST.2019.9010033","journal-title":"Tsinghua Sci Technol"},{"issue":"2","key":"959_CR20","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1166\/jbic.2015.1117","volume":"4","author":"J Ma","year":"2015","unstructured":"Ma J, Zhang Y, Liu W (2015) User behavior trust evaluation model based on the AHP algorithm. J Bioinform Intell Control 4(2):106\u2013110","journal-title":"J Bioinform Intell Control"},{"issue":"4","key":"959_CR21","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/TCSS.2019.2917003","volume":"6","author":"C Wang","year":"2019","unstructured":"Wang C, Yang B, Cui J, Wang C (2019) Fusing behavioral projection models for identity theft detection in online social networks. IEEE Trans Comput Soc Syst 6(4):637\u2013648. https:\/\/doi.org\/10.1109\/TCSS.2019.2917003","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"959_CR22","doi-asserted-by":"publisher","first-page":"175499","DOI":"10.1109\/ACCESS.2019.2957779","volume":"7","author":"X Chen","year":"2019","unstructured":"Chen X, Yuan Y, Lu L, Yang J (2019) A multidimensional trust evaluation framework for online social networks based on machine learning. IEEE Access 7:175499\u2013175513. https:\/\/doi.org\/10.1109\/ACCESS.2019.2957779","journal-title":"IEEE Access"},{"issue":"6","key":"959_CR23","doi-asserted-by":"publisher","first-page":"1582","DOI":"10.1109\/TIFS.2018.2883000","volume":"14","author":"J Du","year":"2019","unstructured":"Du J, Gelenbe E, Jiang C, Zhang H, Ren Y, Poor HV (2019) Peer prediction-based trustworthiness evaluation and trustworthy service rating in social networks. IEEE Trans Inf Forensics Secur 14(6):1582\u20131594. https:\/\/doi.org\/10.1109\/TIFS.2018.2883000","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-023-00959-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-023-00959-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-023-00959-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T02:10:10Z","timestamp":1695348610000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-023-00959-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,24]]},"references-count":23,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["959"],"URL":"https:\/\/doi.org\/10.1007\/s12243-023-00959-6","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,24]]},"assertion":[{"value":"8 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}