{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T21:21:39Z","timestamp":1774041699520,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T00:00:00Z","timestamp":1737676800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T00:00:00Z","timestamp":1737676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s13042-025-02544-w","type":"journal-article","created":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T00:33:16Z","timestamp":1737678796000},"page":"4797-4815","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Enhancing network security in industrial IoT environments: a DeepCLG hybrid learning model for cyberattack detection"],"prefix":"10.1007","volume":"16","author":[{"given":"Qawsar","family":"Gulzar","sequence":"first","affiliation":[]},{"given":"Khuram","family":"Mustafa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,24]]},"reference":[{"issue":"6","key":"2544_CR1","doi-asserted-by":"publisher","first-page":"4418","DOI":"10.1109\/JIOT.2018.2814063","volume":"5","author":"S Jeong","year":"2018","unstructured":"Jeong S, Na W, Kim J, Cho S (2018) Internet of things for smart manufacturing system: Trust issues in resource allocation. IEEE Internet Things J 5(6):4418\u20134427","journal-title":"IEEE Internet Things J"},{"key":"2544_CR2","unstructured":"Newman P (2020) The internet of things 2020: Here\u00e2\u2019s what over 400 iot decision-makers say about the future of enterprise connectivity and how iot companies can use it to grow revenue. Business Insider, pp.\u00a01\u20136"},{"key":"2544_CR3","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.jocs.2018.09.008","volume":"29","author":"F Anwaar","year":"2018","unstructured":"Anwaar F, Iltaf N, Afzal H, Nawaz R (2018) Hrs-ce: A hybrid framework to integrate content embeddings in recommender systems for cold start items. J Comput Sci 29:9\u201318","journal-title":"J Comput Sci"},{"key":"2544_CR4","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.mfglet.2014.12.001","volume":"3","author":"J Lee","year":"2015","unstructured":"Lee J, Bagheri B, Kao H-A (2015) A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manuf Lett 3:18\u201323","journal-title":"Manuf Lett"},{"key":"2544_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102481","volume":"149","author":"J Sengupta","year":"2020","unstructured":"Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for iot and iiot. J Netw Comput Appl 149:102481","journal-title":"J Netw Comput Appl"},{"issue":"5","key":"2544_CR6","doi-asserted-by":"publisher","first-page":"1973","DOI":"10.1007\/s00170-022-10329-6","volume":"123","author":"M Shahin","year":"2022","unstructured":"Shahin M, Chen FF, Hosseinzadeh A, Bouzary H, Rashidifar R (2022) A deep hybrid learning model for detection of cyber attacks in industrial iot devices. Int J Adv Manuf Technol 123(5):1973\u20131983","journal-title":"Int J Adv Manuf Technol"},{"issue":"11","key":"2544_CR7","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.3390\/electronics10111257","volume":"10","author":"MA Ferrag","year":"2021","unstructured":"Ferrag MA, Shu L, Djallel H, Choo K-KR (2021) Deep learning-based intrusion detection for distributed denial of service attack in agriculture 4.0. Electronics 10(11):1257","journal-title":"Electronics"},{"issue":"7","key":"2544_CR8","doi-asserted-by":"publisher","first-page":"3197","DOI":"10.1109\/TII.2018.2791423","volume":"14","author":"Q Zhang","year":"2018","unstructured":"Zhang Q, Yang LT, Chen Z, Li P (2018) A tensor-train deep computation model for industry informatics big data feature learning. IEEE Trans Indust Inf 14(7):3197\u20133204","journal-title":"IEEE Trans Indust Inf"},{"key":"2544_CR9","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for internet of things. Future Generat Comput Syst 82:761\u2013768","journal-title":"Future Generat Comput Syst"},{"key":"2544_CR10","first-page":"1","volume":"41","author":"A-H Muna","year":"2018","unstructured":"Muna A-H, Moustafa N, Sitnikova E (2018) Identification of malicious activities in industrial internet of things based on deep learning models. J Inf Security Appl 41:1\u201311","journal-title":"J Inf Security Appl"},{"issue":"4","key":"2544_CR11","doi-asserted-by":"publisher","first-page":"4436","DOI":"10.1109\/TIA.2020.2971952","volume":"56","author":"R Vinayakumar","year":"2020","unstructured":"Vinayakumar R, Alazab M, Srinivasan S, Pham Q-V, Padannayil SK, Simran K (2020) A visualized botnet detection system based deep learning for the internet of things networks of smart cities. IEEE Trans Indust Appl 56(4):4436\u20134456","journal-title":"IEEE Trans Indust Appl"},{"key":"2544_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102662","volume":"163","author":"GDLT Parra","year":"2020","unstructured":"Parra GDLT, Rad P, Choo K-KR, Beebe N (2020) Detecting internet of things attacks using distributed deep learning. J Netw Comput Appl 163:102662","journal-title":"J Netw Comput Appl"},{"key":"2544_CR13","doi-asserted-by":"publisher","first-page":"77396","DOI":"10.1109\/ACCESS.2020.2986013","volume":"8","author":"S Manimurugan","year":"2020","unstructured":"Manimurugan S, Al-Mutairi S, Aborokbah MM, Chilamkurti N, Ganesan S, Patan R (2020) Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access 8:77396\u201377404","journal-title":"IEEE Access"},{"key":"2544_CR14","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.future.2020.03.042","volume":"110","author":"N Koroniotis","year":"2020","unstructured":"Koroniotis N, Moustafa N, Sitnikova E (2020) A new network forensic framework based on deep learning for internet of things networks: A particle deep framework. Future Generation Comput Syst 110:91\u2013106","journal-title":"Future Generation Comput Syst"},{"issue":"3","key":"2544_CR15","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3803","volume":"33","author":"Y Otoum","year":"2022","unstructured":"Otoum Y, Liu D, Nayak A (2022) Dl-ids: a deep learning-based intrusion detection framework for securing iot. Trans Emerging Telecommun Technol 33(3):e3803","journal-title":"Trans Emerging Telecommun Technol"},{"key":"2544_CR16","volume":"38","author":"HC Altunay","year":"2023","unstructured":"Altunay HC, Albayrak Z (2023) A hybrid cnn+ lstm-based intrusion detection system for industrial iot networks. Eng Sci Technol Int J 38:101322","journal-title":"Eng Sci Technol Int J"},{"key":"2544_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119330","volume":"215","author":"SA Khanday","year":"2023","unstructured":"Khanday SA, Fatima H, Rakesh N (2023) Implementation of intrusion detection model for ddos attacks in lightweight iot networks. Expert Syst Appl 215:119330","journal-title":"Expert Syst Appl"},{"issue":"10","key":"2544_CR18","doi-asserted-by":"publisher","first-page":"8467","DOI":"10.1109\/JIOT.2022.3200048","volume":"10","author":"IA Khan","year":"2022","unstructured":"Khan IA, Pi D, Abbas MZ, Zia U, Hussain Y, Soliman H (2022) Federated-srus: A federated-simple-recurrent-units-based ids for accurate detection of cyber attacks against iot-augmented industrial control systems. IEEE Internet Things J 10(10):8467\u20138476","journal-title":"IEEE Internet Things J"},{"key":"2544_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103540","volume":"162","author":"D Javeed","year":"2024","unstructured":"Javeed D, Saeed MS, Adil M, Kumar P, Jolfaei A (2024) A federated learning-based zero trust intrusion detection system for internet of things. Ad Hoc Networks 162:103540","journal-title":"Ad Hoc Networks"},{"key":"2544_CR20","unstructured":"Sabour S, Frosst N, Hinton GE (2017) \u201cDynamic routing between capsules. Adv Neural Inf Process Syst vol.\u00a030"},{"key":"2544_CR21","doi-asserted-by":"crossref","unstructured":"Chen W, Fang F, Wang P, Kan J, Li W, Wu W (2022) \u201cResearch on medical text classification based on biobert-gru-attention. In: 2022 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA), pp.\u00a0213\u2013219, IEEE","DOI":"10.1109\/AEECA55500.2022.9919061"},{"issue":"16","key":"2544_CR22","doi-asserted-by":"publisher","first-page":"10211","DOI":"10.1007\/s00521-021-05785-2","volume":"33","author":"R Alguliyev","year":"2021","unstructured":"Alguliyev R, Imamverdiyev Y, Sukhostat L (2021) Hybrid deepgcl model for cyber-attacks detection on cyber-physical systems. Neural Comput Appl 33(16):10211\u201310226","journal-title":"Neural Comput Appl"},{"issue":"5","key":"2544_CR23","doi-asserted-by":"publisher","first-page":"3469","DOI":"10.1109\/TII.2020.3022432","volume":"17","author":"X Zhou","year":"2020","unstructured":"Zhou X, Hu Y, Liang W, Ma J, Jin Q (2020) Variational lstm enhanced anomaly detection for industrial big data. IEEE Trans Indust Inf 17(5):3469\u20133477","journal-title":"IEEE Trans Indust Inf"},{"issue":"13","key":"2544_CR24","doi-asserted-by":"publisher","first-page":"5941","DOI":"10.3390\/s23135941","volume":"23","author":"ECP Neto","year":"2023","unstructured":"Neto ECP, Dadkhah S, Ferreira R, Zohourian A, Lu R, Ghorbani AA (2023) Ciciot 2023: A real-time dataset and benchmark for large-scale attacks in iot environment. Sensors 23(13):5941","journal-title":"Sensors"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02544-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-025-02544-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02544-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T04:29:35Z","timestamp":1757132975000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-025-02544-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,24]]},"references-count":24,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["2544"],"URL":"https:\/\/doi.org\/10.1007\/s13042-025-02544-w","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,24]]},"assertion":[{"value":"6 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No Conflict of interest exists as reported by the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}