{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T17:53:47Z","timestamp":1771264427888,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T00:00:00Z","timestamp":1732838400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T00:00:00Z","timestamp":1732838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s13042-024-02460-5","type":"journal-article","created":{"date-parts":[[2024,11,29]],"date-time":"2024-11-29T15:59:23Z","timestamp":1732895963000},"page":"3429-3447","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Enhancing early attack detection: novel hybrid density-based isolation forest for improved anomaly detection"],"prefix":"10.1007","volume":"16","author":[{"given":"M.","family":"Nalini","sequence":"first","affiliation":[]},{"given":"B.","family":"Yamini","sequence":"additional","affiliation":[]},{"given":"C.","family":"Ambhika","sequence":"additional","affiliation":[]},{"given":"R.","family":"Siva Subramanian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,29]]},"reference":[{"issue":"12","key":"2460_CR1","doi-asserted-by":"publisher","first-page":"5320","DOI":"10.3390\/app11125320","volume":"11","author":"R Al-amri","year":"2021","unstructured":"Al-amri R, Murugesan RK, Man M, Abdulateef AF, Al-Sharafi MA, Alkahtani AA (2021) A review of machine learning and deep learning techniques for anomaly detection in IoT data. Appl Sci 11(12):5320","journal-title":"Appl Sci"},{"key":"2460_CR2","doi-asserted-by":"publisher","first-page":"4548","DOI":"10.1109\/TCE.2023.3326384","volume":"70","author":"G Almahadin","year":"2023","unstructured":"Almahadin G, Aoudni Y, Shabaz M, Agrawal AV, Yasmin G, Alomari ES, Al-Khafaji HMR, Dansana D, Maaliw RR (2023) VANET network traffic anomaly detection using GRU-based deep learning model. IEEE Trans Consum Electron 70:4548\u20134555","journal-title":"IEEE Trans Consum Electron"},{"key":"2460_CR3","doi-asserted-by":"publisher","first-page":"34820","DOI":"10.1109\/ACCESS.2024.3373694","volume":"12","author":"T Al-Shehari","year":"2024","unstructured":"Al-Shehari T, Rosaci D, Al-Razgan M, Alfakih T, Kadrie M, Afzal H, Nawaz R (2024) Enhancing insider threat detection in imbalanced cybersecurity settings using the density-based local outlier factor algorithm. IEEE Access 12:34820\u201334834","journal-title":"IEEE Access"},{"key":"2460_CR4","doi-asserted-by":"publisher","first-page":"6491","DOI":"10.1007\/s10586-024-04303-y","volume":"27","author":"N Chander","year":"2024","unstructured":"Chander N, Upendra Kumar M (2024) Enhanced pelican optimization algorithm with ensemble-based anomaly detection in industrial internet of things environment. Cluster Comput 27:6491\u20136509","journal-title":"Cluster Comput"},{"key":"2460_CR5","doi-asserted-by":"publisher","first-page":"102600","DOI":"10.1016\/j.cose.2021.102600","volume":"114","author":"A Chen","year":"2022","unstructured":"Chen A, Fu Y, Zheng X, Lu G (2022) An efficient network behavior anomaly detection using a hybrid DBN-LSTM network. Comput Secur 114:102600","journal-title":"Comput Secur"},{"key":"2460_CR6","doi-asserted-by":"publisher","first-page":"110011","DOI":"10.1016\/j.knosys.2022.110011","volume":"259","author":"M Dehghani","year":"2023","unstructured":"Dehghani M, Montazeri Z, Trojovsk\u00e1 E, Trojovsk\u00fd P (2023) Coati Optimization Algorithm: a new bio-inspired metaheuristic algorithm for solving optimization problems. Knowl-Based Syst 259:110011","journal-title":"Knowl-Based Syst"},{"key":"2460_CR7","doi-asserted-by":"publisher","first-page":"123027","DOI":"10.1016\/j.eswa.2023.123027","volume":"245","author":"R Devendiran","year":"2024","unstructured":"Devendiran R, Turukmane AV (2024) Dugat-LSTM: Deep learning based network intrusion detection system using chaotic optimization strategy. Expert Syst Appl 245:123027","journal-title":"Expert Syst Appl"},{"issue":"24","key":"2460_CR8","doi-asserted-by":"publisher","first-page":"8320","DOI":"10.3390\/s21248320","volume":"21","author":"A Diro","year":"2021","unstructured":"Diro A, Chilamkurti N, Nguyen VD, Heyne W (2021) A comprehensive study of anomaly detection schemes in IoT networks using machine learning algorithms. Sensors 21(24):8320","journal-title":"Sensors"},{"issue":"1","key":"2460_CR9","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1109\/TNSM.2020.3048131","volume":"18","author":"A Dridi","year":"2020","unstructured":"Dridi A, Boucetta C, Hammami SE, Afifi H, Moungla H (2020) STAD: Spatio-temporal anomaly detection mechanism for mobile network management. IEEE Trans Netw Serv Manage 18(1):894\u2013906","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"2460_CR10","doi-asserted-by":"publisher","first-page":"4801","DOI":"10.1007\/s13042-024-02193-5","volume":"15","author":"H El-Ghaish","year":"2024","unstructured":"El-Ghaish H, Miqrish H, Elmogy A, Elawady W (2024) An adaptive nonlinear whale optimization multi-layer perceptron cyber intrusion detection framework. Int J Mach Learn Cybern 15:4801\u20134814","journal-title":"Int J Mach Learn Cybern"},{"issue":"14","key":"2460_CR11","doi-asserted-by":"publisher","first-page":"2158","DOI":"10.3390\/electronics11142158","volume":"11","author":"S Gadal","year":"2022","unstructured":"Gadal S, Mokhtar R, Abdelhaq M, Alsaqour R, Ali ES, Saeed R (2022) Machine learning-based anomaly detection using k-mean array and sequential minimal optimization. Electronics 11(14):2158","journal-title":"Electronics"},{"issue":"18","key":"2460_CR12","doi-asserted-by":"publisher","first-page":"10057","DOI":"10.3390\/su131810057","volume":"13","author":"F Imran Jamil","year":"2021","unstructured":"Imran Jamil F, Kim D (2021) An ensemble of prediction and learning mechanism for improving accuracy of anomaly detection in network intrusion environments. Sustainability 13(18):10057","journal-title":"Sustainability"},{"issue":"17","key":"2460_CR13","doi-asserted-by":"publisher","first-page":"7987","DOI":"10.3390\/app11177987","volume":"11","author":"A Kami\u0161ali\u0107","year":"2021","unstructured":"Kami\u0161ali\u0107 A, Kramberger R, Fister I Jr (2021) Synergy of blockchain technology and data mining techniques for anomaly detection. Appl Sci 11(17):7987","journal-title":"Appl Sci"},{"issue":"3","key":"2460_CR14","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.1109\/TSG.2020.3046602","volume":"12","author":"E Khaledian","year":"2020","unstructured":"Khaledian E, Pandey S, Kundu P, Srivastava AK (2020) Real-time synchrophasor data anomaly detection and classification using isolation forest, kmeans, and loop. IEEE Trans Smart Grid 12(3):2378\u20132388","journal-title":"IEEE Trans Smart Grid"},{"issue":"4","key":"2460_CR15","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1504\/IJAHUC.2023.132998","volume":"43","author":"A Kharwar","year":"2023","unstructured":"Kharwar A, Thakor D (2023) A hybrid approach for feature selection using SFFS and SBFS with extra-tree and classification using XGBoost. Int J Ad Hoc Ubiquitous Comput 43(4):191\u2013205","journal-title":"Int J Ad Hoc Ubiquitous Comput"},{"issue":"1","key":"2460_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJISP.2022010113","volume":"16","author":"AR Kharwar","year":"2022","unstructured":"Kharwar AR, Thakor DV (2022) An ensemble approach for feature selection and classification in intrusion detection using extra-tree algorithm. Int J Inf Secur Priv 16(1):1\u201321","journal-title":"Int J Inf Secur Priv"},{"key":"2460_CR17","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1016\/j.aej.2023.05.082","volume":"75","author":"MM Khayyat","year":"2023","unstructured":"Khayyat MM (2023) Improved bacterial foraging optimization with deep learning based anomaly detection in smart cities. Alex Eng J 75:407\u2013417","journal-title":"Alex Eng J"},{"issue":"2","key":"2460_CR18","doi-asserted-by":"publisher","first-page":"36","DOI":"10.3390\/jimaging4020036","volume":"4","author":"BR Kiran","year":"2018","unstructured":"Kiran BR, Thomas DM, Parakkal R (2018) An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos. J Imaging 4(2):36","journal-title":"J Imaging"},{"issue":"10","key":"2460_CR19","doi-asserted-by":"publisher","first-page":"3430","DOI":"10.3390\/app10103430","volume":"10","author":"X Larriva-Novo","year":"2020","unstructured":"Larriva-Novo X, Vega-Barbas M, Villagra VA, Rivera D, Alvarez-Campana M, Berrocal J (2020) Efficient distributed preprocessing model for machine learning-based anomaly detection over large-scale cybersecurity datasets. Appl Sci 10(10):3430","journal-title":"Appl Sci"},{"issue":"4","key":"2460_CR20","doi-asserted-by":"publisher","first-page":"407","DOI":"10.3390\/electronics10040407","volume":"10","author":"S Mokhtari","year":"2021","unstructured":"Mokhtari S, Abbaspour A, Yen KK, Sargolzaei A (2021) A machine learning approach for anomaly detection in industrial control systems based on measurement data. Electronics 10(4):407","journal-title":"Electronics"},{"key":"2460_CR21","doi-asserted-by":"publisher","first-page":"7137","DOI":"10.1080\/03772063.2024.2350932","volume":"70","author":"M Nalini","year":"2024","unstructured":"Nalini M, Yamini B, Sinthia P (2024) DeepRoughNetID: a robust framework for network anomaly intrusion detection with high detection rates. IETE J Res 70:7137\u20137148","journal-title":"IETE J Res"},{"issue":"13","key":"2460_CR22","doi-asserted-by":"publisher","first-page":"3738","DOI":"10.3390\/s20133738","volume":"20","author":"Z Niu","year":"2020","unstructured":"Niu Z, Yu K, Wu X (2020) LSTM-based VAE-GAN for time-series anomaly detection. Sensors 20(13):3738","journal-title":"Sensors"},{"key":"2460_CR23","doi-asserted-by":"publisher","first-page":"109536","DOI":"10.1016\/j.compeleceng.2024.109536","volume":"119","author":"RR Nv","year":"2024","unstructured":"Nv RR, SreeDivya N, Jagadesh BN, Gandikota R, Lella KK, Pydala B, Vatambeti R (2024) Enhancing anomaly detection: a comprehensive approach with MTBO feature selection and TVETBOOptimized Quad-LSTM classification. Comput Electr Eng 119:109536","journal-title":"Comput Electr Eng"},{"key":"2460_CR24","doi-asserted-by":"publisher","first-page":"91006","DOI":"10.1109\/ACCESS.2022.3201869","volume":"10","author":"HW Oleiwi","year":"2022","unstructured":"Oleiwi HW, Mhawi DN, Al-Raweshidy H (2022) MLTs-ADCNs: Machine learning techniques for anomaly detection in communication networks. IEEE Access 10:91006\u201391017","journal-title":"IEEE Access"},{"key":"2460_CR25","doi-asserted-by":"publisher","first-page":"98685","DOI":"10.1109\/ACCESS.2023.3313596","volume":"11","author":"A Raza","year":"2023","unstructured":"Raza A, Munir K, Almutairi MS, Sehar R (2023) Novel class probability features for optimizing network attack detection with machine learning. IEEE Access 11:98685\u201398694","journal-title":"IEEE Access"},{"issue":"15","key":"2460_CR26","doi-asserted-by":"publisher","first-page":"3300","DOI":"10.3390\/electronics12153300","volume":"12","author":"MM Saeed","year":"2023","unstructured":"Saeed MM, Saeed RA, Abdelhaq M, Alsaqour R, Hasan MK, Mokhtar RA (2023) Anomaly detection in 6G networks using machine learning methods. Electronics 12(15):3300","journal-title":"Electronics"},{"issue":"7","key":"2460_CR27","doi-asserted-by":"publisher","first-page":"2573","DOI":"10.1007\/s13042-023-02049-4","volume":"15","author":"I Singh","year":"2024","unstructured":"Singh I, Jindal R (2024) Outlier based intrusion detection in databases for user behaviour analysis using weighted sequential pattern mining. Int J Mach Learn Cybern 15(7):2573\u20132593","journal-title":"Int J Mach Learn Cybern"},{"issue":"4","key":"2460_CR28","doi-asserted-by":"publisher","first-page":"3514","DOI":"10.1109\/TSG.2021.3066316","volume":"12","author":"VK Singh","year":"2021","unstructured":"Singh VK, Govindarasu M (2021) Cyber-physical anomaly detection for wide-area protection using machine learning. IEEE Trans Smart Grid 12(4):3514\u20133526","journal-title":"IEEE Trans Smart Grid"},{"key":"2460_CR29","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.future.2020.10.015","volume":"116","author":"B Steenwinckel","year":"2021","unstructured":"Steenwinckel B, De Paepe D, Hautte SV, Heyvaert P, Bentefrit M, Moens P, Dimou A, Van Den Bossche B, De Turck F, Van Hoecke S, Ongenae F (2021) FLAGS: A methodology for adaptive anomaly detection and root cause analysis on sensor data streams by fusing expert knowledge with machine learning. Futur Gener Comput Syst 116:30\u201348","journal-title":"Futur Gener Comput Syst"},{"key":"2460_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2021.107752","volume":"137","author":"M Sun","year":"2022","unstructured":"Sun M, He L, Zhang J (2022) Deep learning-based probabilistic anomaly detection for solar forecasting under cyberattacks. Int J Electr Power Energy Syst 137:107752","journal-title":"Int J Electr Power Energy Syst"},{"issue":"1","key":"2460_CR31","first-page":"25","volume":"9","author":"P Thapa","year":"2024","unstructured":"Thapa P, Arjunan T (2024) AI-enhanced cybersecurity: machine learning for anomaly detection in cloud computing. Q J Emerg Technol Innov 9(1):25\u201337","journal-title":"Q J Emerg Technol Innov"},{"issue":"5","key":"2460_CR32","doi-asserted-by":"publisher","first-page":"973","DOI":"10.3390\/electronics13050973","volume":"13","author":"J Yi","year":"2024","unstructured":"Yi J, Tian Y (2024) Insider threat detection model enhancement using hybrid algorithms between unsupervised and supervised learning. Electronics 13(5):973","journal-title":"Electronics"},{"key":"2460_CR33","doi-asserted-by":"publisher","first-page":"29402","DOI":"10.1109\/JIOT.2024.3353337","volume":"11","author":"S Yin","year":"2024","unstructured":"Yin S, Li H, Laghari AA, Gadekallu TR, Sampedro GA, Almadhor A (2024) An anomaly detection model based on deep auto-encoder and capsule graph convolution via sparrow search algorithm in 6G internet-of-everything. IEEE Internet Things J 11:29402\u201329404","journal-title":"IEEE Internet Things J"},{"issue":"12","key":"2460_CR34","doi-asserted-by":"publisher","first-page":"12220","DOI":"10.1109\/TKDE.2021.3119326","volume":"35","author":"Y Zheng","year":"2021","unstructured":"Zheng Y, Jin M, Liu Y, Chi L, Phan KT, Chen YPP (2021) Generative and contrastive self-supervised learning for graph anomaly detection. IEEE Trans Knowl Data Eng 35(12):12220\u201312233","journal-title":"IEEE Trans Knowl Data Eng"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02460-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02460-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02460-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T04:30:59Z","timestamp":1749270659000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02460-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,29]]},"references-count":34,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["2460"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02460-5","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,29]]},"assertion":[{"value":"6 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}