{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T18:10:34Z","timestamp":1768500634421,"version":"3.49.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"11-12","license":[{"start":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:00:00Z","timestamp":1760140800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:00:00Z","timestamp":1760140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s12243-025-01119-8","type":"journal-article","created":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:59:22Z","timestamp":1760162362000},"page":"1143-1158","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bridging digital and physical realms: cross-evaluating intrusion detection models in cyber-physical systems"],"prefix":"10.1007","volume":"80","author":[{"given":"Henry Chima","family":"Ukwuoma","sequence":"first","affiliation":[]},{"given":"Gilles","family":"Dusserre","sequence":"additional","affiliation":[]},{"given":"Gouenou","family":"Coatrieux","sequence":"additional","affiliation":[]},{"given":"Johanne","family":"Vincent","sequence":"additional","affiliation":[]},{"given":"Nasir","family":"Baba-Ahmed","sequence":"additional","affiliation":[]},{"given":"St\u00e9phane","family":"Lecoeuche","sequence":"additional","affiliation":[]},{"given":"Emmanuel Song","family":"Shombot","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,11]]},"reference":[{"key":"1119_CR1","doi-asserted-by":"crossref","unstructured":"Cheng AM (2014) An undergraduate cyber-physical systems course. In Proceedings of the 4th ACM SIGBED. International Workshop on Design, Modeling, and Evaluation of Cyber-Physical Systems pp 31\u201334","DOI":"10.1145\/2593458.2593464"},{"key":"1119_CR2","doi-asserted-by":"crossref","unstructured":"Prakash SJ, Devi D, Muthukumaran N, Romila R (2025) Cyber-physical systems and IoT intrusion detection: a hybrid deep learning perspective. In 2025 International conference on electronics and renewable systems (ICEARS) pp 960\u2013965. IEEE","DOI":"10.1109\/ICEARS64219.2025.10940238"},{"key":"1119_CR3","volume-title":"Internet of Digital Twin: framework","author":"R Liu","year":"2025","unstructured":"Liu R, Luan TH, Qu Y, Xiang Y, Gao L, Zhao D (2025) Internet of Digital Twin: framework. IEEE Communications Surveys & Tutorials, Applications and Enabling Technologies"},{"key":"1119_CR4","doi-asserted-by":"crossref","unstructured":"Dillard JP (2020) Currents in the study of persuasion. In Oliver MB, Raney AA, Bryant J (eds) Media effects: Advances in theory and research, 4th ed., pp 115\u2013129. Routledge","DOI":"10.4324\/9780429491146-8"},{"key":"1119_CR5","unstructured":"Fagan J (2019) Nursing clinical brain. OER Commons. Retrieved January 7, 2020, from https:\/\/www.oercommons.org\/authoring\/53029-nursing-clinical-brain\/view"},{"key":"1119_CR6","doi-asserted-by":"publisher","unstructured":"Khan MAR et al (2022) Optimizing hybrid metaheuristic algorithm with cluster head to improve performance metrics on the IoT. Theor Comput Sci 927:87\u201397. https:\/\/doi.org\/10.1016\/j.tcs.2022.05.031","DOI":"10.1016\/j.tcs.2022.05.031"},{"key":"1119_CR7","doi-asserted-by":"publisher","unstructured":"Lesch V, Z\u00fcfle M, Bauer A, Iffl\u00e4nder L, Krupitzer C, Kounev S (2023) A literature review of IoT and CPS\u2014what they are, and what they are not. J Syst Softw 200:111631. https:\/\/doi.org\/10.1016\/j.jss.2023.111631","DOI":"10.1016\/j.jss.2023.111631"},{"key":"1119_CR8","doi-asserted-by":"publisher","unstructured":"Garc\u00eda-Valls M, Dubey A, Botti V (2018) Introducing the new paradigm of social dispersed computing: applications, technologies and challenges. J Syst Archit 91:83\u2013102. https:\/\/doi.org\/10.1016\/j.sysarc.2018.05.007","DOI":"10.1016\/j.sysarc.2018.05.007"},{"key":"1119_CR9","doi-asserted-by":"publisher","unstructured":"Awotunde JB et al (2023) Cyber-physical systems security: analysis, opportunities, challenges, and future prospects. In Maleh Y, Alazab M, Romdhani I (eds) Blockchain for Cybersecurity in Cyber-Physical Systems, pp 21\u201346. Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-031-25506-9_2","DOI":"10.1007\/978-3-031-25506-9_2"},{"key":"1119_CR10","doi-asserted-by":"publisher","unstructured":"Parhizkari S (2024) Anomaly detection in intrusion detection systems. In Artificial Intelligence, vol 24, Krishna Parimala V (ed) IntechOpen. https:\/\/doi.org\/10.5772\/intechopen.112733","DOI":"10.5772\/intechopen.112733"},{"key":"1119_CR11","doi-asserted-by":"publisher","unstructured":"Abubakar A, Garko AB (2022) A predictive model for network intrusion detection system using deep neural network. Dutse J Pure Appl Sci 7(3a):113\u2013128. https:\/\/doi.org\/10.4314\/dujopas.v7i3a.12","DOI":"10.4314\/dujopas.v7i3a.12"},{"key":"1119_CR12","doi-asserted-by":"publisher","unstructured":"Jamshidi MB, Lotfi S, Siahkamari H, Blecha T, Talla J, Peroutka Z (2024) An intelligent digital twinning approach for complex circuits. Appl Soft Comput 154:111327. https:\/\/doi.org\/10.1016\/j.asoc.2024.111327","DOI":"10.1016\/j.asoc.2024.111327"},{"key":"1119_CR13","doi-asserted-by":"publisher","unstructured":"Riaz K, McAfee M, Gharbia SS (2023) Management of climate resilience: exploring the potential of digital twin technology, 3D city modelling, and early warning systems. Sensors 23(5):2659. https:\/\/doi.org\/10.3390\/s23052659","DOI":"10.3390\/s23052659"},{"key":"1119_CR14","doi-asserted-by":"publisher","unstructured":"Villa V, Chiaia B (2021) Digital twin for smart school buildings: state of the art, challenges, and opportunities. In Del Giudice M, Osello A (eds) Advances in Civil and Industrial Engineering, pp 320\u2013340. IGI Global. https:\/\/doi.org\/10.4018\/978-1-7998-7091-3.ch015","DOI":"10.4018\/978-1-7998-7091-3.ch015"},{"key":"1119_CR15","doi-asserted-by":"publisher","unstructured":"Krishnaveni S, Chen TM, Sathiyanarayanan M, Amutha B (2024) CyberDefender: an integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems. Clust Comput. https:\/\/doi.org\/10.1007\/s10586-024-04320-x","DOI":"10.1007\/s10586-024-04320-x"},{"key":"1119_CR16","doi-asserted-by":"publisher","unstructured":"Murillo A, Taormina R, Tippenhauer N, Galelli S (2021) Co-simulating physical processes and network data for high-fidelity cyber-security experiments. In *Sixth annual industrial control system security (ICSS) Workshop*, New York, NY, USA: association for computing machinery, pp 13\u201320. https:\/\/doi.org\/10.1145\/3442144.3442147","DOI":"10.1145\/3442144.3442147"},{"key":"1119_CR17","doi-asserted-by":"publisher","unstructured":"Varghese SA, Ghadim AD, Balador A, Alimadadi Z, Papadimitratos P (2022) Digital twin-based intrusion detection for industrial control systems. In *2022 IEEE International conference on pervasive computing and communications workshops*, pp 611\u2013617. https:\/\/doi.org\/10.1109\/PerComWorkshops53856.2022.9767492","DOI":"10.1109\/PerComWorkshops53856.2022.9767492"},{"key":"1119_CR18","doi-asserted-by":"publisher","unstructured":"Xu Q, Ali S, Yue T (2021) Digital twin-based anomaly detection in cyber-physical systems. In *2021 14th IEEE Conference on software testing, verification & validation (ICST)*, pp 205\u2013216. https:\/\/doi.org\/10.1109\/ICST49551.2021.00031","DOI":"10.1109\/ICST49551.2021.00031"},{"key":"1119_CR19","doi-asserted-by":"publisher","unstructured":"Dhingra B, Jain V, Sharma DK, Gupta KD, Kukreja D (2024) RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment. Int J Inf Secur 23(1):315\u2013330. https:\/\/doi.org\/10.1007\/s10207-023-00739-2","DOI":"10.1007\/s10207-023-00739-2"},{"key":"1119_CR20","doi-asserted-by":"publisher","unstructured":"Jeffrey N, Tan Q, Villar JR (2024) A hybrid methodology for anomaly detection in cyber\u2013physical systems. Neurocomputing 568:127068. https:\/\/doi.org\/10.1016\/j.neucom.2023.127068","DOI":"10.1016\/j.neucom.2023.127068"},{"key":"1119_CR21","doi-asserted-by":"publisher","unstructured":"Bakhsh SA, Khan MA, Ahmed F, Alshehri MS, Ali H, Ahmad J (2023) Enhancing IoT network security through deep learning-powered intrusion detection system. Internet of Things 24:100936. https:\/\/doi.org\/10.1016\/j.iot.2023.100936","DOI":"10.1016\/j.iot.2023.100936"},{"key":"1119_CR22","unstructured":"Alanezi K, Mishra S (2023) An IoT architecture leveraging digital twins: compromised node detection scenario. arXiv preprint arXiv:2308.10180. Retrieved from http:\/\/arxiv.org\/abs\/2308.10180"},{"key":"1119_CR23","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.procs.2020.01.079","volume":"165","author":"S Velliangiri","year":"2019","unstructured":"Velliangiri S, Alagumuthukrishnan S (2019) A review of dimensionality reduction techniques for efficient computation. Procedia Comput Sci 165:104\u2013111","journal-title":"Procedia Comput Sci"},{"key":"1119_CR24","doi-asserted-by":"publisher","unstructured":"Turukmane AV, Devendiran R (2024) M-MultiSVM: an efficient feature selection assisted network intrusion detection system using machine learning. Comput Secur 137:103587. https:\/\/doi.org\/10.1016\/j.cose.2023.103587","DOI":"10.1016\/j.cose.2023.103587"},{"key":"1119_CR25","doi-asserted-by":"publisher","unstructured":"Theng D, Bhoyar KK (2024) Feature selection techniques for machine learning: a survey of more than two decades of research. Knowl Inf Syst 66(3):1575\u20131637. https:\/\/doi.org\/10.1007\/s10115-023-02010-5","DOI":"10.1007\/s10115-023-02010-5"},{"key":"1119_CR26","doi-asserted-by":"publisher","unstructured":"Thakkar A, Lohiya R (2023) Fusion of statistical importance for feature selection in deep neural network-based intrusion detection system. Inf Fusion 90:353\u2013363. https:\/\/doi.org\/10.1016\/j.inffus.2022.09.026","DOI":"10.1016\/j.inffus.2022.09.026"},{"key":"1119_CR27","doi-asserted-by":"publisher","unstructured":"Venkatesh B, Anuradha J (2019) A review of feature selection and its methods. Cybernetics Inf Technol 19(1):3\u201326. https:\/\/doi.org\/10.2478\/cait-2019-0001","DOI":"10.2478\/cait-2019-0001"},{"key":"1119_CR28","doi-asserted-by":"publisher","unstructured":"Li J, Othman MS, Chen H, Yusuf LM (2024) Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning. J Big Data 11(1):36. https:\/\/doi.org\/10.1186\/s40537-024-00892-y","DOI":"10.1186\/s40537-024-00892-y"},{"key":"1119_CR29","doi-asserted-by":"crossref","unstructured":"Andrade C (2021) Z scores, standard scores, and composite test scores explained. Indian J Psychol Med 43(6):555\u2013557. https:\/\/doi.org\/10.1177\/02537176211046525","DOI":"10.1177\/02537176211046525"},{"key":"1119_CR30","doi-asserted-by":"publisher","unstructured":"Iranzad R, Liu X (2024) A review of random forest-based feature selection methods for data science education and applications. International Journal of Data Science and Analysis. https:\/\/doi.org\/10.1007\/s41060-024-00509-w","DOI":"10.1007\/s41060-024-00509-w"},{"key":"1119_CR31","doi-asserted-by":"crossref","unstructured":"Xu Q, Ali S, Yue T (2023) Digital twin-based anomaly detection with curriculum learning in cyber-physical systems. ACM Transactions on Software Engineering and Methodology","DOI":"10.1145\/3582571"},{"key":"1119_CR32","doi-asserted-by":"publisher","unstructured":"Wang Z (2024) Cyber digital twin with deep learning model for enterprise products management. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-024-11146-8","DOI":"10.1007\/s11277-024-11146-8"},{"key":"1119_CR33","doi-asserted-by":"publisher","unstructured":"Rajab ME, Yang L, Shami A (2024) Enhancing network intrusion detection: an AutoML pipeline with efficient digital twin synchronization. Retrieved from https:\/\/doi.org\/10.36227\/techrxiv.170475326.65758197\/v1","DOI":"10.36227\/techrxiv.170475326.65758197\/v1"},{"key":"1119_CR34","doi-asserted-by":"publisher","DOI":"10.3389\/fpls.2021.699589","volume":"12","author":"CC Westhues","year":"2021","unstructured":"Westhues CC, Mahone GS, da Silva S, Thorwarth P, Schmidt M, Richter JC, Beissinger TM (2021) Prediction of maize phenotypic traits with genomic and environmental predictors using gradient boosting frameworks. Front Plant Sci 12:699589","journal-title":"Front Plant Sci"},{"key":"1119_CR35","doi-asserted-by":"publisher","unstructured":"Anusha G, Baigmohammad G, Mageswari U (2024) Detection of cyber attacks on IoT based cyber physical systems. MATEC Web of Conferences 392:01166. https:\/\/doi.org\/10.1051\/matecconf\/202439201166","DOI":"10.1051\/matecconf\/202439201166"},{"key":"1119_CR36","doi-asserted-by":"publisher","unstructured":"Almuqren L, Maashi MS, Alamgeer M, Mohsen H, Hamza MA, Abdelmageed AA (2023) Explainable artificial intelligence enabled intrusion detection technique for secure cyber-physical systems. Appl Sci 13(5):5. https:\/\/doi.org\/10.3390\/app13053081","DOI":"10.3390\/app13053081"},{"key":"1119_CR37","doi-asserted-by":"publisher","unstructured":"Nour AA, Mehbodniya A, Webber JL, Bostani A, Shah B, Ergashevich BZ, K S (2023) Optimizing intrusion detection in industrial cyber-physical systems through transfer learning approaches. Comput Electrical Eng 111:108929. https:\/\/doi.org\/10.1016\/j.compeleceng.2023.108929","DOI":"10.1016\/j.compeleceng.2023.108929"},{"key":"1119_CR38","doi-asserted-by":"publisher","unstructured":"Mboweni IV, Ramotsoela DT, Abu-Mahfouz AM (2023) Hydraulic data preprocessing for machine learning-based intrusion detection in cyber-physical systems. Mathematics 11(8):8. https:\/\/doi.org\/10.3390\/math11081846","DOI":"10.3390\/math11081846"},{"key":"1119_CR39","doi-asserted-by":"publisher","unstructured":"Noor Z, Hina S, Hayat F, Shah GA (2023) An intelligent context-aware threat detection and response model for smart cyber-physical systems. Internet of Things 23:100843. https:\/\/doi.org\/10.1016\/j.iot.2023.100843","DOI":"10.1016\/j.iot.2023.100843"},{"key":"1119_CR40","doi-asserted-by":"publisher","unstructured":"Theng D, Bhoyar KK (2024) Feature selection techniques for machine learning: A survey of more than two decades of research. Knowl Inf Syst 66(3):1575\u20131637. https:\/\/doi.org\/10.1007\/s10115-023-02010-5","DOI":"10.1007\/s10115-023-02010-5"},{"key":"1119_CR41","unstructured":"Zewdie TG, Girma A, Cotae P (2022) Malware detection framework in cyber-physical systems using artificial intelligence-machine learning. Issues Inf Syst *23*(1)"},{"key":"1119_CR42","doi-asserted-by":"publisher","unstructured":"Parashar A, Parashar A, Ding W, Shabaz M, Rida I (2023) Data preprocessing and feature selection techniques in gait recognition: A comparative study of machine learning and deep learning approaches. Pattern Recognit Lett 172:65\u201373. https:\/\/doi.org\/10.1016\/j.patrec.2023.05.021","DOI":"10.1016\/j.patrec.2023.05.021"},{"key":"1119_CR43","doi-asserted-by":"publisher","unstructured":"Rahmat F, Zulkafli Z, Ishak AJ, Abdul Rahman RZ, Stercke SD, Buytaert W, Tahir W, Ab Rahman J, Ibrahim S, Ismail M (2024) Supervised feature selection using principal component analysis. Knowl Inf Syst 66(3):1955\u20131995. https:\/\/doi.org\/10.1007\/s10115-023-01993-5","DOI":"10.1007\/s10115-023-01993-5"},{"key":"1119_CR44","doi-asserted-by":"publisher","unstructured":"Hayati R, Munawar AA, Lukitaningsih E, Earlia N, Karma T, Idroes R (2024) Combination of PCA with LDA and SVM classifiers: A model for determining the geographical origin of coconut in the coastal plantation, Aceh Province, Indonesia. Case Studies Chem Environ Eng 9:100552. https:\/\/doi.org\/10.1016\/j.cscee.2023.100552","DOI":"10.1016\/j.cscee.2023.100552"},{"key":"1119_CR45","doi-asserted-by":"crossref","unstructured":"Ali A, Jayaraman R, Azar E, Maalouf M (2024) A comparative analysis of machine learning and statistical methods for evaluating building performance: A systematic review and future benchmarking framework. Building and Environment 111268","DOI":"10.1016\/j.buildenv.2024.111268"},{"key":"1119_CR46","unstructured":"iTrust (2018) iTrust Labs_WADI. Singapore University of Technology and Design. Retrieved from https:\/\/itrust.sutd.edu.sg\/itrust-labs-home\/itrust-labs_wadi\/"},{"key":"1119_CR47","doi-asserted-by":"crossref","unstructured":"Ukwuoma HC, Dusserre G, Coatrieux G, Vincent J, Ahmed NB (2024) Optimising Intrusion Detection in Cyber-Physical Systems. In 2024 8th Cyber security in networking conference (CSNet), pp 7\u201314. IEEE","DOI":"10.1109\/CSNet64211.2024.10851766"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-025-01119-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-025-01119-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-025-01119-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T02:43:35Z","timestamp":1768445015000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-025-01119-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,11]]},"references-count":47,"journal-issue":{"issue":"11-12","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["1119"],"URL":"https:\/\/doi.org\/10.1007\/s12243-025-01119-8","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,11]]},"assertion":[{"value":"17 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}