{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:58:52Z","timestamp":1775282332932,"version":"3.50.1"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T00:00:00Z","timestamp":1746230400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T00:00:00Z","timestamp":1746230400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s13042-025-02628-7","type":"journal-article","created":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T03:40:09Z","timestamp":1746243609000},"page":"6399-6446","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Multi-layered security architecture for IoMT systems: integrating dynamic key management, decentralized storage, and dependable intrusion detection framework"],"prefix":"10.1007","volume":"16","author":[{"given":"Nikhil","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Prashant Giridhar","family":"Shambharkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,3]]},"reference":[{"key":"2628_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104622","author":"S Saif","year":"2022","unstructured":"Saif S, Das P, Biswas S, Khari M, Shanmuganathan V (2022) HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IOT based healthcare. Microprocess Microsyst. https:\/\/doi.org\/10.1016\/j.micpro.2022.104622","journal-title":"Microprocess Microsyst"},{"issue":"1","key":"2628_CR2","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1109\/jiot.2018.2854714","volume":"6","author":"H Tao","year":"2019","unstructured":"Tao H, Bhuiyan MZ, Abdalla AN, Hassan MM, Zain JM, Hayajneh T (2019) Secured data collection with hardware-based ciphers for IOT-based healthcare. IEEE Internet Things J 6(1):410\u2013420. https:\/\/doi.org\/10.1109\/jiot.2018.2854714","journal-title":"IEEE Internet Things J"},{"issue":"15","key":"2628_CR3","doi-asserted-by":"publisher","first-page":"17403","DOI":"10.1007\/s11227-022-04568-3","volume":"78","author":"A Binbusayyis","year":"2022","unstructured":"Binbusayyis A, Alaskar H, Vaiyapuri T, Dinesh M (2022) An investigation and comparison of machine learning approaches for intrusion detection in IOMT Network. J Supercomput 78(15):17403\u201317422. https:\/\/doi.org\/10.1007\/s11227-022-04568-3","journal-title":"J Supercomput"},{"key":"2628_CR4","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/j.future.2019.12.028","volume":"105","author":"J-PA Yaacoub","year":"2020","unstructured":"Yaacoub J-PA, Noura M, Noura HN, Salman O, Yaacoub E, Couturier R, Chehab A (2020) Securing internet of medical things systems: Limitations, issues and recommendations. Futur Gener Comput Syst 105:581\u2013606. https:\/\/doi.org\/10.1016\/j.future.2019.12.028","journal-title":"Futur Gener Comput Syst"},{"issue":"4","key":"2628_CR5","doi-asserted-by":"publisher","first-page":"1835","DOI":"10.1109\/tetc.2019.2936881","volume":"9","author":"M Kassab","year":"2021","unstructured":"Kassab M, DeFranco J, Malas T, Laplante P, Destefanis G, Neto VV (2021) Exploring research in blockchain for healthcare and a roadmap for the future. IEEE Trans Emerg Top Comput 9(4):1835\u20131852. https:\/\/doi.org\/10.1109\/tetc.2019.2936881","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"2628_CR6","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1016\/j.future.2019.05.059","volume":"100","author":"N Islam","year":"2019","unstructured":"Islam N, Faheem Y, Din IU, Talha M, Guizani M, Khalil M (2019) A blockchain-based fog computing framework for activity recognition as an application to e-healthcare services. Futur Gener Comput Syst 100:569\u2013578. https:\/\/doi.org\/10.1016\/j.future.2019.05.059","journal-title":"Futur Gener Comput Syst"},{"issue":"2","key":"2628_CR7","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1007\/s10207-023-00787-8","volume":"23","author":"H Nandanwar","year":"2023","unstructured":"Nandanwar H, Katarya R (2023) TL-BILSTM IOT: Transfer Learning Model for prediction of Intrusion Detection System in IOT environment. Int J Inf Secur 23(2):1251\u20131277. https:\/\/doi.org\/10.1007\/s10207-023-00787-8","journal-title":"Int J Inf Secur"},{"key":"2628_CR8","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.comcom.2020.12.003","volume":"166","author":"P Kumar","year":"2021","unstructured":"Kumar P, Gupta GP, Tripathi R (2021) An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IOMT networks. Comput Commun 166:110\u2013124. https:\/\/doi.org\/10.1016\/j.comcom.2020.12.003","journal-title":"Comput Commun"},{"key":"2628_CR9","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-56364-z","author":"S Inam","year":"2024","unstructured":"Inam S, Kanwal S, Firdous R, Hajjej F (2024) Blockchain based medical image encryption using Arnold\u2019s cat map in a cloud environment. Sci Rep. https:\/\/doi.org\/10.1038\/s41598-024-56364-z","journal-title":"Sci Rep"},{"issue":"11","key":"2628_CR10","doi-asserted-by":"publisher","first-page":"19838","DOI":"10.1109\/jiot.2024.3370708","volume":"11","author":"C Li","year":"2024","unstructured":"Li C, Jiang B, Dong M, Chen Y, Zhang Z, Xin X, Ota K (2024) Efficient designated verifier signature for secure Cross-Chain Health Data Sharing in BIoMT. IEEE Internet Things J 11(11):19838\u201319851. https:\/\/doi.org\/10.1109\/jiot.2024.3370708","journal-title":"IEEE Internet Things J"},{"issue":"14","key":"2628_CR11","doi-asserted-by":"publisher","first-page":"11717","DOI":"10.1109\/jiot.2021.3058946","volume":"8","author":"BS Egala","year":"2021","unstructured":"Egala BS, Pradhan AK, Badarla V, Mohanty SP (2021) Fortified-chain: A blockchain-based framework for security and privacy-assured internet of medical things with effective access control. IEEE Internet Things J 8(14):11717\u201311731. https:\/\/doi.org\/10.1109\/jiot.2021.3058946","journal-title":"IEEE Internet Things J"},{"key":"2628_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100422","author":"S Shukla","year":"2021","unstructured":"Shukla S, Thakur S, Hussain S, Breslin JG, Jameel SM (2021) Identification and authentication in Healthcare internet-of-things using integrated fog computing based Blockchain Model. Internet of Things. https:\/\/doi.org\/10.1016\/j.iot.2021.100422","journal-title":"Internet of Things"},{"key":"2628_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101256","author":"NF Mohd Shari","year":"2024","unstructured":"Mohd Shari NF, Malip A (2024) Enhancing privacy and security in smart healthcare: A blockchain-powered decentralized data dissemination scheme. Internet of Things. https:\/\/doi.org\/10.1016\/j.iot.2024.101256","journal-title":"Internet of Things"},{"key":"2628_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2023.107630","author":"W Moulahi","year":"2023","unstructured":"Moulahi W, Jdey I, Moulahi T, Alawida M, Alabdulatif A (2023) A blockchain-based federated learning mechanism for privacy preservation of healthcare IOT Data. Comput Biol Med. https:\/\/doi.org\/10.1016\/j.compbiomed.2023.107630","journal-title":"Comput Biol Med"},{"issue":"4","key":"2628_CR15","doi-asserted-by":"publisher","first-page":"3512","DOI":"10.1109\/tnse.2024.3376069","volume":"11","author":"AU Rehman","year":"2024","unstructured":"Rehman AU, Tariq N, Jan MA, Khan F, Song H, Ibrahim M (2024) A blockchain-based hybrid model for IOMT-enabled Intelligent Healthcare System. IEEE Transact Network Sci Eng 11(4):3512\u20133521. https:\/\/doi.org\/10.1109\/tnse.2024.3376069","journal-title":"IEEE Transact Network Sci Eng"},{"key":"2628_CR16","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.future.2023.11.032","volume":"153","author":"T Wang","year":"2024","unstructured":"Wang T, Wu Q, Chen J, Chen F, Xie D, Shen H (2024) Health data security sharing method based on hybrid blockchain. Futur Gener Comput Syst 153:251\u2013261. https:\/\/doi.org\/10.1016\/j.future.2023.11.032","journal-title":"Futur Gener Comput Syst"},{"key":"2628_CR17","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.comcom.2021.08.011","volume":"180","author":"K Mohammad Hossein","year":"2021","unstructured":"Mohammad Hossein K, Esmaeili ME, Dargahi T, Khonsari A, Conti M (2021) BCHealth: A novel blockchain-based privacy-preserving architecture for IOT healthcare applications. Comput Commun 180:31\u201347. https:\/\/doi.org\/10.1016\/j.comcom.2021.08.011","journal-title":"Comput Commun"},{"key":"2628_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107529","author":"P Sharma","year":"2021","unstructured":"Sharma P, Borah MD, Namasudra S (2021) Improving security of medical big data by using blockchain technology. Comput Electr Eng. https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107529","journal-title":"Comput Electr Eng"},{"key":"2628_CR19","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.comcom.2020.02.058","volume":"154","author":"A Farouk","year":"2020","unstructured":"Farouk A, Alahmadi A, Ghose S, Mashatan A (2020) Blockchain platform for industrial healthcare: vision and future opportunities. Comput Commun 154:223\u2013235. https:\/\/doi.org\/10.1016\/j.comcom.2020.02.058","journal-title":"Comput Commun"},{"key":"2628_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102590","author":"S Shamshad","year":"2020","unstructured":"Shamshad S, Minahil M, K., Kumari, S., & Chen, C.-M. (2020) A secure blockchain-based e-health records storage and sharing scheme. J Inform Secur Applicat. https:\/\/doi.org\/10.1016\/j.jisa.2020.102590","journal-title":"J Inform Secur Applicat"},{"key":"2628_CR21","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1016\/j.ins.2023.01.148","volume":"629","author":"P Sharma","year":"2023","unstructured":"Sharma P, Namasudra S, Gonzalez Crespo R, Parra-Fuente J, Chandra Trivedi M (2023) EHDHE: Enhancing security of healthcare documents in IOT-enabled digital healthcare ecosystems using blockchain. Inf Sci 629:703\u2013718. https:\/\/doi.org\/10.1016\/j.ins.2023.01.148","journal-title":"Inf Sci"},{"key":"2628_CR22","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.comcom.2024.07.007","volume":"225","author":"L Chen","year":"2024","unstructured":"Chen L, Feng T, Ma R, Shi J (2024) BTMDS: blockchain trusted medical data sharing scheme with privacy protection and access control. Comput Commun 225:279\u2013288. https:\/\/doi.org\/10.1016\/j.comcom.2024.07.007","journal-title":"Comput Commun"},{"key":"2628_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2022.106019","author":"A Rehman","year":"2022","unstructured":"Rehman A, Abbas S, Khan MA, Ghazal TM, Adnan KM, Mosavi A (2022) A secure healthcare 50 system based on blockchain technology entangled with federated learning technique. Comp Biol Med. https:\/\/doi.org\/10.1016\/j.compbiomed.2022.106019","journal-title":"Comp Biol Med"},{"key":"2628_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jpdc.2020.03.004","volume":"142","author":"Z Wang","year":"2020","unstructured":"Wang Z, Luo N, Zhou P (2020) GuardHealth: Blockchain empowered secure data management and graph convolutional network enabled anomaly detection in smart healthcare. J Parallel Distrib Comput 142:1\u201312. https:\/\/doi.org\/10.1016\/j.jpdc.2020.03.004","journal-title":"J Parallel Distrib Comput"},{"key":"2628_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103304","author":"EL Azzaoui","year":"2022","unstructured":"Azzaoui EL, A., Sharma, P. K., & Park, J. H. (2022) Blockchain-based delegated quantum cloud architecture for medical big data security. J Netw Comput Appl. https:\/\/doi.org\/10.1016\/j.jnca.2021.103304","journal-title":"J Netw Comput Appl"},{"key":"2628_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100849","author":"A Tomar","year":"2023","unstructured":"Tomar A, Gupta N, Rani D, Tripathi S (2023) Blockchain-assisted authenticated key agreement scheme for iot-based healthcare system. Intern Thing. https:\/\/doi.org\/10.1016\/j.iot.2023.100849","journal-title":"Intern Thing"},{"key":"2628_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.07.039","author":"A Rizzardi","year":"2024","unstructured":"Rizzardi A, Sicari S, Cevallos MJF, Coen-Porisini A (2024) IOT-driven blockchain to manage the healthcare supply chain and protect medical records. Futur Gener Comput Syst. https:\/\/doi.org\/10.1016\/j.future.2024.07.039","journal-title":"Futur Gener Comput Syst"},{"issue":"5","key":"2628_CR28","doi-asserted-by":"publisher","first-page":"2402","DOI":"10.1109\/tnse.2023.3285070","volume":"10","author":"A Ali","year":"2023","unstructured":"Ali A, Pasha MF, Guerrieri A, Guzzo A, Sun X, Saeed A, Hussain A, Fortino G (2023) A novel homomorphic encryption and consortium blockchain-based hybrid deep learning model for Industrial Internet of Medical Things. IEEE Transact Network Sci Eng 10(5):2402\u20132418. https:\/\/doi.org\/10.1109\/tnse.2023.3285070","journal-title":"IEEE Transact Network Sci Eng"},{"key":"2628_CR29","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.aej.2022.09.031","volume":"65","author":"AI Taloba","year":"2023","unstructured":"Taloba AI, Elhadad A, Rayan A, Abd El-Aziz RM, Salem M, Alzahrani AA, Alharithi FS, Park C (2023) A blockchain-based hybrid platform for multimedia data processing in IOT-Healthcare. Alex Eng J 65:263\u2013274. https:\/\/doi.org\/10.1016\/j.aej.2022.09.031","journal-title":"Alex Eng J"},{"key":"2628_CR30","doi-asserted-by":"publisher","unstructured":"Tanwar, S., Parekh, K., & Evans, R. (2020). Blockchain-based Electronic Healthcare Record System for healthcare 4.0 applications. Journal of Information Security and Applications. https:\/\/doi.org\/10.1016\/j.jisa.2019.102407","DOI":"10.1016\/j.jisa.2019.102407"},{"key":"2628_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108586","volume":"203","author":"G Zhang","year":"2022","unstructured":"Zhang G, Yang Z, Liu W (2022) Blockchain-based privacy preserving e-health system for healthcare data in cloud. Comput Netw 203:108586. https:\/\/doi.org\/10.1016\/j.comnet.2021.108586","journal-title":"Comput Netw"},{"key":"2628_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108500","author":"B Zaabar","year":"2021","unstructured":"Zaabar B, Cheikhrouhou O, Jamil F, Ammi M, Abid M (2021) HealthBlock: A secure blockchain-based healthcare data management system. Comput Netw. https:\/\/doi.org\/10.1016\/j.comnet.2021.108500","journal-title":"Comput Netw"},{"key":"2628_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102714","author":"D Chhikara","year":"2022","unstructured":"Chhikara D, Rana S, Mishra A, Mishra D (2022) Blockchain-driven authorized data access mechanism for digital healthcare. J Syst Architect. https:\/\/doi.org\/10.1016\/j.sysarc.2022.102714","journal-title":"J Syst Architect"},{"key":"2628_CR34","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.future.2021.11.028","volume":"129","author":"S Singh","year":"2022","unstructured":"Singh S, Rathore S, Alfarraj O, Tolba A, Yoon B (2022) A framework for privacy-preservation of IOT healthcare data using Federated Learning and Blockchain Technology. Futur Gener Comput Syst 129:380\u2013388. https:\/\/doi.org\/10.1016\/j.future.2021.11.028","journal-title":"Futur Gener Comput Syst"},{"key":"2628_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107112","author":"AR Mishra","year":"2023","unstructured":"Mishra AR, Rani P, Alrasheedi AF, Dwivedi R (2023) Evaluating the blockchain-based healthcare supply chain using interval-valued pythagorean fuzzy entropy-based decision support system. Eng Appl Artif Intell. https:\/\/doi.org\/10.1016\/j.engappai.2023.107112","journal-title":"Eng Appl Artif Intell"},{"key":"2628_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121912","author":"SC Kumar","year":"2024","unstructured":"Kumar SC, G., Kiran Kumar, R., Parish Venkata Kumar, K., Raghavendra Sai, N., & Brahmaiah, M. (2024) Deep residual convolutional neural network: An efficient technique for intrusion detection system. Expert Syst Appl. https:\/\/doi.org\/10.1016\/j.eswa.2023.121912","journal-title":"Expert Syst Appl"},{"key":"2628_CR37","doi-asserted-by":"publisher","first-page":"1596","DOI":"10.1016\/j.matpr.2022.09.410","volume":"72","author":"TY Deo","year":"2023","unstructured":"Deo TY, Sanju A (2023) Data imputation and comparison of custom ensemble models with existing libraries like XGBoost, CATBoost, AdaBoost and Scikit learn for predictive equipment failure. Materials Today: Proceedings 72:1596\u20131604. https:\/\/doi.org\/10.1016\/j.matpr.2022.09.410","journal-title":"Materials Today: Proceedings"},{"key":"2628_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101351","author":"S Dadkhah","year":"2024","unstructured":"Dadkhah S, Neto EC, Ferreira R, Molokwu RC, Sadeghi S, Ghorbani AA (2024) CICIOMT2024: A benchmark dataset for multi-protocol security assessment in IOMT. Internet of Things. https:\/\/doi.org\/10.1016\/j.iot.2024.101351","journal-title":"Internet of Things"},{"issue":"4","key":"2628_CR39","doi-asserted-by":"publisher","first-page":"3094","DOI":"10.1109\/jiot.2021.3112159","volume":"10","author":"Y Wu","year":"2023","unstructured":"Wu Y, Nie L, Wang S, Ning Z, Li S (2023) Intelligent intrusion detection for internet of things security: A deep convolutional generative adversarial network-enabled approach. IEEE Internet Things J 10(4):3094\u20133106. https:\/\/doi.org\/10.1109\/jiot.2021.3112159","journal-title":"IEEE Internet Things J"},{"key":"2628_CR40","doi-asserted-by":"publisher","first-page":"119357","DOI":"10.1109\/access.2022.3221400","volume":"10","author":"T Kim","year":"2022","unstructured":"Kim T, Pak W (2022) Early detection of network intrusions using a gan-based one-class classifier. IEEE Access 10:119357\u2013119367. https:\/\/doi.org\/10.1109\/access.2022.3221400","journal-title":"IEEE Access"},{"issue":"3","key":"2628_CR41","doi-asserted-by":"publisher","first-page":"2330","DOI":"10.1109\/jiot.2022.3211346","volume":"10","author":"C Park","year":"2023","unstructured":"Park C, Lee J, Kim Y, Park J-G, Kim H, Hong D (2023) An enhanced AI-based network intrusion detection system using generative adversarial networks. IEEE Internet Things J 10(3):2330\u20132345. https:\/\/doi.org\/10.1109\/jiot.2022.3211346","journal-title":"IEEE Internet Things J"},{"key":"2628_CR42","doi-asserted-by":"publisher","first-page":"77396","DOI":"10.1109\/access.2020.2986013","volume":"8","author":"S Manimurugan","year":"2020","unstructured":"Manimurugan S, Al-Mutairi S, Aborokbah MM, Chilamkurti N, Ganesan S, Patan R (2020) Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access 8:77396\u201377404. https:\/\/doi.org\/10.1109\/access.2020.2986013","journal-title":"IEEE Access"},{"key":"2628_CR43","doi-asserted-by":"publisher","first-page":"64375","DOI":"10.1109\/access.2022.3182333","volume":"10","author":"Z Wu","year":"2022","unstructured":"Wu Z, Zhang H, Wang P, Sun Z (2022) RTIDS: a robust transformer-based approach for intrusion detection system. IEEE Access 10:64375\u201364387. https:\/\/doi.org\/10.1109\/access.2022.3182333","journal-title":"IEEE Access"},{"key":"2628_CR44","doi-asserted-by":"publisher","first-page":"5895","DOI":"10.1109\/tifs.2024.3402439","volume":"19","author":"Y Zhong","year":"2024","unstructured":"Zhong Y, Wang Z, Shi X, Yang J, Li K (2024) RFG-HELAD: A robust fine-grained network traffic anomaly detection model based on heterogeneous ensemble learning. IEEE Trans Inf Forensics Secur 19:5895\u20135910. https:\/\/doi.org\/10.1109\/tifs.2024.3402439","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"2628_CR45","doi-asserted-by":"publisher","first-page":"13340","DOI":"10.1109\/jiot.2023.3337755","volume":"11","author":"W Han","year":"2024","unstructured":"Han W, Peng J, Yu J, Kang J, Lu J, Niyato D (2024) Heterogeneous data-aware federated learning for intrusion detection systems via meta-sampling in artificial intelligence of things. IEEE Internet Things J 11(8):13340\u201313354. https:\/\/doi.org\/10.1109\/jiot.2023.3337755","journal-title":"IEEE Internet Things J"},{"key":"2628_CR46","doi-asserted-by":"publisher","first-page":"46386","DOI":"10.1109\/access.2021.3066620","volume":"9","author":"W Seo","year":"2021","unstructured":"Seo W, Pak W (2021) Real-time network intrusion prevention system based on hybrid machine learning. IEEE Access 9:46386\u201346397. https:\/\/doi.org\/10.1109\/access.2021.3066620","journal-title":"IEEE Access"},{"issue":"3","key":"2628_CR47","doi-asserted-by":"publisher","first-page":"1634","DOI":"10.1109\/tcc.2020.3001017","volume":"10","author":"W Wang","year":"2022","unstructured":"Wang W, Du X, Shan D, Qin R, Wang N (2022) Cloud intrusion detection method based on stacked contractive auto-encoder and support vector machine. IEEE Transact Cloud Comput 10(3):1634\u20131646. https:\/\/doi.org\/10.1109\/tcc.2020.3001017","journal-title":"IEEE Transact Cloud Comput"},{"issue":"3","key":"2628_CR48","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/tnet.2021.3137084","volume":"30","author":"C Zhang","year":"2022","unstructured":"Zhang C, Costa-Perez X, Patras P (2022) Adversarial attacks against Deep Learning-based network intrusion detection systems and Defense Mechanisms. IEEE\/ACM Trans Networking 30(3):1294\u20131311. https:\/\/doi.org\/10.1109\/tnet.2021.3137084","journal-title":"IEEE\/ACM Trans Networking"},{"key":"2628_CR49","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/access.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi A, Moustafa N, Tari Z, Mahmood A, Anwar A (2020) TON_IoT Telemetry Dataset: A new generation dataset of IOT and IIoT for data-driven intrusion detection systems. IEEE Access 8:165130\u2013165150. https:\/\/doi.org\/10.1109\/access.2020.3022862","journal-title":"IEEE Access"},{"key":"2628_CR50","doi-asserted-by":"publisher","first-page":"1908","DOI":"10.1109\/lsp.2022.3203296","volume":"29","author":"H Kye","year":"2022","unstructured":"Kye H, Kim M, Kwon M (2022) Hierarchical detection of network anomalies: A self-supervised learning approach. IEEE Signal Process Lett 29:1908\u20131912. https:\/\/doi.org\/10.1109\/lsp.2022.3203296","journal-title":"IEEE Signal Process Lett"},{"key":"2628_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/tim.2024.3420375","volume":"73","author":"JS Raja","year":"2024","unstructured":"Raja JS, D., Sriranjani, R., Arulmozhi, P., & Hemavathi, N. (2024) Unified Random Forest and hybrid bat optimization based man-in-the-middle attack detection in advanced metering infrastructure. IEEE Trans Instrum Meas 73:1\u201312. https:\/\/doi.org\/10.1109\/tim.2024.3420375","journal-title":"IEEE Trans Instrum Meas"},{"key":"2628_CR52","doi-asserted-by":"publisher","first-page":"38254","DOI":"10.1109\/access.2021.3063671","volume":"9","author":"J Liu","year":"2021","unstructured":"Liu J, Yang D, Lian M, Li M (2021) Research on intrusion detection based on particle swarm optimization in IOT. IEEE Access 9:38254\u201338268. https:\/\/doi.org\/10.1109\/access.2021.3063671","journal-title":"IEEE Access"},{"key":"2628_CR53","doi-asserted-by":"publisher","first-page":"170128","DOI":"10.1109\/access.2020.3019973","volume":"8","author":"L Yang","year":"2020","unstructured":"Yang L, Li J, Yin L, Sun Z, Zhao Y, Li Z (2020) Real-time intrusion detection in wireless network: a deep learning-based intelligent mechanism. IEEE Access 8:170128\u2013170139. https:\/\/doi.org\/10.1109\/access.2020.3019973","journal-title":"IEEE Access"},{"key":"2628_CR54","doi-asserted-by":"publisher","first-page":"138732","DOI":"10.1109\/access.2023.3340142","volume":"11","author":"R Ben Said","year":"2023","unstructured":"Ben Said R, Sabir Z, Askerzade I (2023) CNN-BiLSTM: A hybrid deep learning approach for network intrusion detection system in software-defined networking with hybrid feature selection. IEEE Access 11:138732\u2013138747. https:\/\/doi.org\/10.1109\/access.2023.3340142","journal-title":"IEEE Access"},{"key":"2628_CR55","doi-asserted-by":"publisher","first-page":"71414","DOI":"10.1109\/access.2022.3186975","volume":"10","author":"R Zhao","year":"2022","unstructured":"Zhao R, Mu Y, Zou L, Wen X (2022) A hybrid intrusion detection system based on feature selection and weighted stacking classifier. IEEE Access 10:71414\u201371426. https:\/\/doi.org\/10.1109\/access.2022.3186975","journal-title":"IEEE Access"},{"issue":"4","key":"2628_CR56","doi-asserted-by":"publisher","first-page":"4821","DOI":"10.1109\/tnsm.2021.3138457","volume":"19","author":"S Das","year":"2022","unstructured":"Das S, Saha S, Priyoti AT, Roy EK, Sheldon FT, Haque A, Shiva S (2022) Network intrusion detection and comparative analysis using ensemble machine learning and feature selection. IEEE Trans Netw Serv Manage 19(4):4821\u20134833. https:\/\/doi.org\/10.1109\/tnsm.2021.3138457","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"2628_CR57","doi-asserted-by":"publisher","unstructured":"Ghubaish, A., Yang, Z., & Jain, R. (2024). HDRL-ids: A hybrid deep reinforcement learning intrusion detection system for enhancing the security of medical applications in 5G networks. 2024 International Conference on Smart Applications, Communications and Networking (SmartNets). https:\/\/doi.org\/10.1109\/smartnets61466.2024.10577692","DOI":"10.1109\/smartnets61466.2024.10577692"},{"key":"2628_CR58","doi-asserted-by":"publisher","first-page":"66212","DOI":"10.1109\/access.2023.3290613","volume":"11","author":"H Xu","year":"2023","unstructured":"Xu H, Sun L, Fan G, Li W, Kuang G (2023) A hierarchical intrusion detection model combining multiple deep learning models with attention mechanism. IEEE Access 11:66212\u201366226. https:\/\/doi.org\/10.1109\/access.2023.3290613","journal-title":"IEEE Access"},{"key":"2628_CR59","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04928-z","author":"AM Tawfik","year":"2025","unstructured":"Tawfik AM, Al-Ahwal A, Eldien AS, Zayed HH (2025) Pricollabanalysis: Privacy-preserving healthcare collaborative analysis on blockchain using homomorphic encryption and secure multiparty computation. Clust Comput. https:\/\/doi.org\/10.1007\/s10586-024-04928-z","journal-title":"Clust Comput"},{"key":"2628_CR60","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-024-06873-5","author":"R Jiang","year":"2025","unstructured":"Jiang R, Zhang H, Song Z, Tian S, Lou W (2025) T-BFL model based on two-dimensional trust and blockchain-federated learning for medical data sharing. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-024-06873-5","journal-title":"J Supercomput"},{"key":"2628_CR61","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-05054-6","author":"A Khan","year":"2025","unstructured":"Khan A, Litchfield A, Alabdulatif A, Khan F (2025) Blockpres ipfs: Performance evaluation of blockchain based secure patients prescription record storage using ipfs for smart prescription management system. Clust Comput. https:\/\/doi.org\/10.1007\/s10586-024-05054-6","journal-title":"Clust Comput"},{"key":"2628_CR62","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04896-4","author":"A Mazid","year":"2025","unstructured":"Mazid A, Kirmani S, Abid M, Pawar V (2025) A secure and efficient framework for internet of medical things through blockchain driven customized federated learning. Clust Comput. https:\/\/doi.org\/10.1007\/s10586-024-04896-4","journal-title":"Clust Comput"},{"key":"2628_CR63","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-024-06884-2","author":"B Wang","year":"2025","unstructured":"Wang B, Jiang R, Pu X, Zhang H (2025) An on-chain and off-chain collaborative data sharing and access control model for electronic medical records. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-024-06884-2","journal-title":"J Supercomput"},{"key":"2628_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108862","author":"J Liang","year":"2024","unstructured":"Liang J, Sadiq M, Yang G, Jiang K, Cai T, Ma M (2024) Enhanced collaborative intrusion detection for industrial cyber-physical systems using permissioned blockchain and decentralized Federated Learning Networks. Eng Appl Artif Intell. https:\/\/doi.org\/10.1016\/j.engappai.2024.108862","journal-title":"Eng Appl Artif Intell"},{"key":"2628_CR65","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122564","author":"LD Manocchio","year":"2024","unstructured":"Manocchio LD, Layeghy S, Lo WW, Kulatilleke GK, Sarhan M, Portmann M (2024) Flowtransformer: a transformer framework for FLOW-based network intrusion detection systems. Expert Syst Appl. https:\/\/doi.org\/10.1016\/j.eswa.2023.122564","journal-title":"Expert Syst Appl"},{"issue":"1","key":"2628_CR66","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.dcan.2023.03.008","volume":"10","author":"F Ullah","year":"2024","unstructured":"Ullah F, Ullah S, Srivastava G, Lin JC-W (2024) IDs-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic. Dig Communicat Net 10(1):190\u2013204. https:\/\/doi.org\/10.1016\/j.dcan.2023.03.008","journal-title":"Dig Communicat Net"},{"key":"2628_CR67","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103910","author":"J-M Shao","year":"2024","unstructured":"Shao J-M, Zeng G-Q, Lu K-D, Geng G-G, Weng J (2024) Automated federated learning for intrusion detection of industrial control systems based on evolutionary neural architecture search. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2024.103910","journal-title":"Comput Secur"},{"key":"2628_CR68","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102807","volume":"117","author":"NH Quyen","year":"2025","unstructured":"Quyen NH, Duy PT, Nguyen NT, Khoa NH, Pham V-H (2025) FEDKD-ids: A robust intrusion detection system using knowledge distillation-based semi-supervised Federated Learning and anti-poisoning attack mechanism. Informat Fus 117:102807. https:\/\/doi.org\/10.1016\/j.inffus.2024.102807","journal-title":"Informat Fus"},{"key":"2628_CR69","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101397","author":"PT Duy","year":"2024","unstructured":"Duy PT, Hien DT, Luong TD, Quyen NH, Pham V-H (2024) Fed-Evolver: An automated evolving approach for federated intrusion detection system using adversarial autoencoder in SDN-enabled networks. Intern Thing. https:\/\/doi.org\/10.1016\/j.iot.2024.101397","journal-title":"Intern Thing"},{"key":"2628_CR70","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102621","author":"M Ahmed","year":"2021","unstructured":"Ahmed M, Byreddy S, Nutakki A, Sikos LF, Haskell-Dowland P (2021) ECU-ioht: A dataset for analyzing cyberattacks in internet of health things. Ad Hoc Netw. https:\/\/doi.org\/10.1016\/j.adhoc.2021.102621","journal-title":"Ad Hoc Netw"},{"key":"2628_CR71","doi-asserted-by":"publisher","first-page":"106576","DOI":"10.1109\/access.2020.3000421","volume":"8","author":"AA Hady","year":"2020","unstructured":"Hady AA, Ghubaish A, Salman T, Unal D, Jain R (2020) Intrusion detection system for healthcare systems using medical and network data: a comparison study. IEEE Access 8:106576\u2013106584. https:\/\/doi.org\/10.1109\/access.2020.3000421","journal-title":"IEEE Access"},{"key":"2628_CR72","first-page":"457","volume":"1","author":"MR Parsaei","year":"2016","unstructured":"Parsaei MR, Taheri R, Javidan R (2016) Perusing the effect of discretization of data on accuracy of predicting naive bayes algorithm. J Curr Res Sci 1:457","journal-title":"J Curr Res Sci"},{"key":"2628_CR73","unstructured":"Taheri, R., Ahmadzadeh, M., & Kharazmi, M. R. (2015). A new approach for feature selection in intrusion detection system.\u00a0Fen Bilimleri Dergisi (CFD),\u00a036(6)."}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02628-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-025-02628-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02628-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T11:01:17Z","timestamp":1757156477000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-025-02628-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,3]]},"references-count":73,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2628"],"URL":"https:\/\/doi.org\/10.1007\/s13042-025-02628-7","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,3]]},"assertion":[{"value":"3 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}},{"value":"This study uses publicly available data or data from published sources; therefore, no subject testing or data collection procedure was considered for this study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}