{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T12:03:26Z","timestamp":1773662606095,"version":"3.50.1"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T00:00:00Z","timestamp":1769644800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T00:00:00Z","timestamp":1769644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s13042-025-02896-3","type":"journal-article","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T14:45:10Z","timestamp":1769697910000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LI-HML detector: a unified framework for network traffic attack classification"],"prefix":"10.1007","volume":"17","author":[{"given":"Hajar","family":"Kamel","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hasna","family":"Chamlal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tayeb","family":"Ouaderhman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2026,1,29]]},"reference":[{"issue":"1","key":"2896_CR1","first-page":"58","volume":"5","author":"ZP Agusta","year":"2019","unstructured":"Agusta ZP et al (2019) Modified balanced random forest for improving imbalanced data prediction. Int J Adv Intell Inform 5(1):58\u201365","journal-title":"Int J Adv Intell Inform"},{"issue":"2","key":"2896_CR2","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/MCOM.2018.1700332","volume":"56","author":"A Abeshu","year":"2018","unstructured":"Abeshu A, Chilamkurti N (2018) Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun Mag 56(2):169\u2013175","journal-title":"IEEE Commun Mag"},{"key":"2896_CR3","doi-asserted-by":"crossref","unstructured":"Aaboub F, Chamlal H, Ouaderhman T (2023) Statistical analysis of various splitting criteria for decision trees. J Algorithm Comput Technol 17:17483026231198181","DOI":"10.1177\/17483026231198181"},{"issue":"1","key":"2896_CR4","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1186\/s40537-021-00419-9","volume":"8","author":"A Adadi","year":"2021","unstructured":"Adadi A (2021) A survey on data-efficient algorithms in big data era. J Big Data 8(1):24","journal-title":"J Big Data"},{"issue":"1","key":"2896_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LSENS.2018.2879990","volume":"3","author":"R Abdulhammed","year":"2018","unstructured":"Abdulhammed R, Faezipour M, Abuzneid A, AbuMallouh A (2018) Deep and machine learning approaches for anomaly-based intrusion detection of imbalanced network traffic. IEEE Sens Lett 3(1):1\u20134","journal-title":"IEEE Sens Lett"},{"issue":"4","key":"2896_CR6","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/s10462-023-10652-8","volume":"57","author":"I Araf","year":"2024","unstructured":"Araf I, Idri A, Chairi I (2024) Cost-sensitive learning for imbalanced medical data: a review. Artif Intell Rev 57(4):80","journal-title":"Artif Intell Rev"},{"key":"2896_CR7","doi-asserted-by":"crossref","unstructured":"Antunes M, Oliveira L, Seguro A, Ver\u00edssimo J, Salgado R, Murteira T (2022) Benchmarking deep learning methods for behaviour-based network intrusion detection. Informatics, vol 9, p 29, MDPI","DOI":"10.3390\/informatics9010029"},{"key":"2896_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102754","volume":"119","author":"S AlDaajeh","year":"2022","unstructured":"AlDaajeh S, Saleous H, Alrabaee S, Barka E, Breitinger F, Choo K-KR (2022) The role of national cybersecurity strategies on the improvement of cybersecurity education. Comput Secur 119:102754","journal-title":"Comput Secur"},{"issue":"1","key":"2896_CR9","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/BF01581266","volume":"58","author":"L Breiman","year":"1993","unstructured":"Breiman L, Cutler A (1993) A deterministic algorithm for global optimization. Math Program 58(1):179\u2013199","journal-title":"Math Program"},{"key":"2896_CR10","doi-asserted-by":"publisher","first-page":"176540","DOI":"10.1109\/ACCESS.2020.3026337","volume":"8","author":"A Bayati","year":"2020","unstructured":"Bayati A, Nguyen K-K, Cheriet M (2020) Gaussian process regression ensemble model for network traffic prediction. IEEE Access 8:176540\u2013176554","journal-title":"IEEE Access"},{"key":"2896_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.112261","volume":"167","author":"H Chamlal","year":"2024","unstructured":"Chamlal H, Aaboub F, Ouaderhman T (2024) A preordonance-based decision tree method and its parallel implementation in the framework of map-reduce. Appl Soft Comput 167:112261","journal-title":"Appl Soft Comput"},{"issue":"1","key":"2896_CR12","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ejor.2023.06.036","volume":"312","author":"Y Chen","year":"2024","unstructured":"Chen Y, Calabrese R, Martin-Barragan B (2024) Interpretable machine learning for imbalanced credit scoring datasets. Eur J Oper Res 312(1):357\u2013372","journal-title":"Eur J Oper Res"},{"key":"2896_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111367","volume":"285","author":"H Chamlal","year":"2024","unstructured":"Chamlal H, Kamel H, Ouaderhman T (2024) A hybrid multi-criteria meta-learner based classifier for imbalanced data. Knowl-Based Syst 285:111367","journal-title":"Knowl-Based Syst"},{"key":"2896_CR14","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1016\/j.procs.2024.11.138","volume":"251","author":"H Chamlal","year":"2024","unstructured":"Chamlal H, Kamel H, Ouaderhman T (2024) A stacking ensemble classifier with gan-sfla for improved diagnosis in imbalanced healthcare data. Procedia Comput Sci 251:494\u2013501","journal-title":"Procedia Comput Sci"},{"key":"2896_CR15","doi-asserted-by":"crossref","unstructured":"Chawla NV, Lazarevic A, Hall LO, Bowyer KW (2003) Smoteboost: improving prediction of the minority class in boosting. In: Knowledge Discovery in Databases: PKDD 2003: 7th European conference on principles and practice of knowledge discovery in databases, cavtat-dubrovnik, Croatia, September 22-26, 2003. Proceedings 7, Springer, Berlin, pp 107\u2013119","DOI":"10.1007\/978-3-540-39804-2_12"},{"issue":"1","key":"2896_CR16","first-page":"1","volume":"12","author":"M \u00c7elebi","year":"2023","unstructured":"\u00c7elebi M, \u00d6zbilen A, Yavano\u011flu U (2023) A comprehensive survey on deep packet inspection for advanced network traffic analysis: issues and challenges. Ni\u011fde \u00d6mer Halisdemir \u00dcniversitesi M\u00fchendislik Bilimleri Dergisi 12(1):1\u201329","journal-title":"Ni\u011fde \u00d6mer Halisdemir \u00dcniversitesi M\u00fchendislik Bilimleri Dergisi"},{"key":"2896_CR17","doi-asserted-by":"crossref","unstructured":"Catillo M, Rak M, Villano U (2020) 2l-zed-ids: a two-level anomaly detector for multiple attack classes. In: Web, artificial intelligence and network applications: proceedings of the workshops of the 34th international conference on advanced information networking and applications (WAINA-2020), Springer, Berlin, pp 687\u2013696","DOI":"10.1007\/978-3-030-44038-1_63"},{"key":"2896_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103368","volume":"202","author":"R Chapaneri","year":"2022","unstructured":"Chapaneri R, Shah S (2022) Enhanced detection of imbalanced malicious network traffic with regularized generative adversarial networks. J Netw Comput Appl 202:103368","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"2896_CR19","doi-asserted-by":"crossref","first-page":"1506","DOI":"10.1109\/TNSM.2021.3139019","volume":"19","author":"M Chen","year":"2022","unstructured":"Chen M, Zhang L, Yu F, Liu B (2022) Interpretable network traffic classification using attention-based deep learning. IEEE Trans Netw Serv Manage 19(2):1506\u20131519","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"2896_CR20","doi-asserted-by":"crossref","unstructured":"Cao P, Zhao D, Zaiane O (2013) An optimized cost-sensitive svm for imbalanced data learning. In: Pacific-asia conference on knowledge discovery and data mining, Springer, Berlin, pp 280\u2013292","DOI":"10.1007\/978-3-642-37456-2_24"},{"key":"2896_CR21","unstructured":"El-Henawy I, El-Amir S, Smarandache MMF (2024) Modeling influenced criteria in classifiers\u2019 imbalanced challenges based on trss bolstered by the vague nature of neutrosophic theory. Neutrosophic Sets Syst, 183"},{"key":"2896_CR22","unstructured":"Elbers J (2020) Holistic science for living well"},{"issue":"15","key":"2896_CR23","doi-asserted-by":"publisher","first-page":"2733","DOI":"10.3390\/math10152733","volume":"10","author":"A Figueira","year":"2022","unstructured":"Figueira A, Vaz B (2022) Survey on synthetic data generation, evaluation methods and gans. Mathematics 10(15):2733","journal-title":"Mathematics"},{"key":"2896_CR24","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.comcom.2022.11.001","volume":"198","author":"Y Guo","year":"2023","unstructured":"Guo Y (2023) A review of machine learning-based zero-day attack detection: challenges and future directions. Comput Commun 198:175\u2013185","journal-title":"Comput Commun"},{"key":"2896_CR25","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/j.comcom.2023.10.018","volume":"212","author":"Y Gu","year":"2023","unstructured":"Gu Y, Yang Y, Yan Y, Shen F, Gao M (2023) Learning-based intrusion detection for high-dimensional imbalanced traffic. Comput Commun 212:366\u2013376","journal-title":"Comput Commun"},{"key":"2896_CR26","unstructured":"G\u2018uzorovich EA (2024) The evolution of cybersecurity: safeguarding the digital era. Synergy: Cross-Disciplinary J Digit Investigation (2995-4827) 2(4):111\u2013117"},{"key":"2896_CR27","unstructured":"Hancock\u00a0III JT (2024) Fraud detection in highly imbalanced big data with novel and efficient data reduction techniques. PhD thesis, Florida Atlantic University"},{"key":"2896_CR28","doi-asserted-by":"crossref","unstructured":"Hasanin T, Khoshgoftaar TM, Leevy J, Seliya N (2019) Investigating random undersampling and feature selection on bioinformatics big data. In: 2019 IEEE fifth international conference on big data computing service and applications (BigDataService). IEEE, pp 346\u2013356","DOI":"10.1109\/BigDataService.2019.00063"},{"issue":"2","key":"2896_CR29","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TSUSC.2018.2793284","volume":"5","author":"F Jiang","year":"2018","unstructured":"Jiang F, Fu Y, Gupta BB, Liang Y, Rho S, Lou F, Meng F, Tian Z (2018) Deep learning based multi-channel intelligent attack detection for data security. IEEE Trans Sustain Comput 5(2):204\u2013212","journal-title":"IEEE Trans Sustain Comput"},{"key":"2896_CR30","doi-asserted-by":"crossref","unstructured":"Kumarakulasinghe NB, Blomberg T, Liu J, Leao AS, Papapetrou P (2020) Evaluating local interpretable model-agnostic explanations on clinical machine learning classification models. In: 2020 IEEE 33rd international symposium on computer-based medical systems (CBMS), IEEE, pp 7\u201312","DOI":"10.1109\/CBMS49503.2020.00009"},{"key":"2896_CR31","doi-asserted-by":"crossref","unstructured":"Kamel H, Chamlal H, Ouaderhman T (2024) Dynamic boundary-aware incremental ensemble learner for imbalanced data classification. In: 2024 Sixth international conference on intelligent computing in data sciences (ICDS), IEEE, pp 1\u20136","DOI":"10.1109\/ICDS62089.2024.10756399"},{"key":"2896_CR32","doi-asserted-by":"publisher","first-page":"32150","DOI":"10.1109\/ACCESS.2020.2973219","volume":"8","author":"G Karatas","year":"2020","unstructured":"Karatas G, Demir O, Sahingoz OK (2020) Increasing the performance of machine learning-based idss on an imbalanced and up-to-date dataset. IEEE Access 8:32150\u201332162","journal-title":"IEEE Access"},{"key":"2896_CR33","doi-asserted-by":"crossref","unstructured":"Kim J, Jeong K, Choi H, Seo K (2020) Gan-based anomaly detection in imbalance problems. In: Computer vision\u2013ECCV 2020 workshops: Glasgow, UK, August 23\u201328, 2020, Proceedings, Part VI 16, Springer, Berlin, pp 128\u2013145","DOI":"10.1007\/978-3-030-65414-6_11"},{"key":"2896_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.109694","volume":"130","author":"A Knapi\u0144ska","year":"2022","unstructured":"Knapi\u0144ska A, Lechowicz P, W\u0119gier W, Walkowiak K (2022) Long-term prediction of multiple types of time-varying network traffic using chunk-based ensemble learning. Appl Soft Comput 130:109694","journal-title":"Appl Soft Comput"},{"key":"2896_CR35","unstructured":"Liu J, Fan W (2023) A machine learning-based intrusion detection approach for intelligent connected vehicles. In: 2023 24st asia-pacific network operations and management symposium (APNOMS), IEEE, pp 231\u2013234"},{"key":"2896_CR36","doi-asserted-by":"crossref","unstructured":"Liu J, Fan W, Dai Y, Lim EG, Lisitsa A (2024) A lightweight and responsive on-line ids towards intelligent connected vehicles system. In: International conference on computer safety, reliability, and security, Springer, Berlin, pp 184\u2013199","DOI":"10.1007\/978-3-031-68606-1_12"},{"key":"2896_CR37","doi-asserted-by":"crossref","unstructured":"Liu J, Fan W, Dai Y, Lim E, Pan Z, Lisitsa A (2024) Leveraging semi-supervised learning for enhancing anomaly-based ids in automotive ethernet. In: 2024 IEEE 23rd international conference on trust, security and privacy in computing and communications (TrustCom), IEEE, pp 1563\u20131571","DOI":"10.1109\/TrustCom63139.2024.00216"},{"key":"2896_CR38","unstructured":"Lipson H (2002) Tracking and tracing cyber-attacks: technical challenges and global policy issues"},{"key":"2896_CR39","unstructured":"Lundberg S (2017) A unified approach to interpreting model predictions. arXiv preprint arXiv:1705.07874"},{"key":"2896_CR40","doi-asserted-by":"publisher","first-page":"7550","DOI":"10.1109\/ACCESS.2020.3048198","volume":"9","author":"L Liu","year":"2020","unstructured":"Liu L, Wang P, Lin J, Liu L (2020) Intrusion detection of imbalanced network traffic based on machine learning and deep learning. IEEE Access 9:7550\u20137563","journal-title":"IEEE Access"},{"key":"2896_CR41","doi-asserted-by":"crossref","unstructured":"Lin P, Ye K, Xu C-Z(2019) Dynamic network anomaly detection system by using deep learning techniques. In: Cloud computing\u2013CLOUD 2019: 12th international conference, held as part of the services conference federation, SCF 2019, San Diego, CA, USA, June 25\u201330, 2019, Proceedings 12, Springer, Berlin, pp 161\u2013176","DOI":"10.1007\/978-3-030-23502-4_12"},{"issue":"2","key":"2896_CR42","doi-asserted-by":"publisher","first-page":"1636","DOI":"10.1109\/COMST.2018.2874978","volume":"21","author":"I Makhdoom","year":"2018","unstructured":"Makhdoom I, Abolhasan M, Lipman J, Liu RP, Ni W (2018) Anatomy of threats to the internet of things. IEEE Commun Surv Tutor 21(2):1636\u20131675","journal-title":"IEEE Commun Surv Tutor"},{"key":"2896_CR43","unstructured":"Marques HMP (2024) Imbalanced learning: a comparative study of oversampling and undersampling techniques. Master\u2019s thesis, Universidade NOVA de Lisboa (Portugal)"},{"issue":"2009","key":"2896_CR44","first-page":"1322","volume":"10","author":"GH Nguyen","year":"2009","unstructured":"Nguyen GH, Bouzerdoum A, Phung SL (2009) Learning pattern classification tasks with imbalanced data sets. Pattern Recogn 10(2009):1322\u20131328","journal-title":"Pattern Recogn"},{"key":"2896_CR45","doi-asserted-by":"publisher","first-page":"21","DOI":"10.3389\/fnbot.2013.00021","volume":"7","author":"A Natekin","year":"2013","unstructured":"Natekin A, Knoll A (2013) Gradient boosting machines, a tutorial. Front Neurorobot 7:21","journal-title":"Front Neurorobot"},{"key":"2896_CR46","unstructured":"Nguyen TD, Rieger P, De\u00a0Viti R, Chen H, Brandenburg BB, Yalame H, M\u00f6llering H, Fereidooni H, Marchal S, Miettinen M, et al (2022) $$\\{$$FLAME$$\\}$$: Taming backdoors in federated learning. In: 31st USENIX security symposium (USENIX Security 22), pp 1415\u20131432"},{"key":"2896_CR47","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/s10844-015-0368-1","volume":"46","author":"K Napierala","year":"2016","unstructured":"Napierala K, Stefanowski J (2016) Types of minority class examples and their influence on learning classifiers from imbalanced data. J Intell Inf Syst 46:563\u2013597","journal-title":"J Intell Inf Syst"},{"key":"2896_CR48","unstructured":"Nzuva SM (2019) The superiority of the ensemble classification methods: a comprehensive review. J Inf Eng Appl"},{"issue":"6","key":"2896_CR49","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s40747-022-00739-0","volume":"8","author":"C Pimsarn","year":"2022","unstructured":"Pimsarn C, Boongoen T, Iam-On N, Naik N, Yang L (2022) Strengthening intrusion detection system for adversarial attacks: improved handling of imbalance classification problem. Complex Intell Syst 8(6):4863\u20134880","journal-title":"Complex Intell Syst"},{"key":"2896_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.algal.2020.102006","volume":"50","author":"A Pathy","year":"2020","unstructured":"Pathy A, Meher S, Balasubramanian P (2020) Predicting algal biochar yield using extreme gradient boosting (xgb) algorithm of machine learning methods. Algal Res 50:102006","journal-title":"Algal Res"},{"key":"2896_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1214\/21-SS133","volume":"16","author":"C Rudin","year":"2022","unstructured":"Rudin C, Chen C, Chen Z, Huang H, Semenova L, Zhong C (2022) Interpretable machine learning: fundamental principles and 10 grand challenges. Stat Surv 16:1\u201385","journal-title":"Stat Surv"},{"key":"2896_CR52","doi-asserted-by":"crossref","unstructured":"Ribeiro MT, Singh S, Guestrin C (2016) \u201c why should i trust you?\u201d explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp 1135\u20131144","DOI":"10.1145\/2939672.2939778"},{"key":"2896_CR53","doi-asserted-by":"crossref","unstructured":"Ribeiro MT, Singh S, Guestrin C (2018) Anchors: high-precision model-agnostic explanations. In: Proceedings of the AAAI conference on artificial intelligence, vol 32","DOI":"10.1609\/aaai.v32i1.11491"},{"key":"2896_CR54","unstructured":"Shrikumar A, Greenside P, Kundaje A (2017) Learning important features through propagating activation differences. In: International conference on machine learning, PMlR, pp 3145\u20133153"},{"issue":"57","key":"2896_CR55","first-page":"98","volume":"29","author":"D Singh","year":"2024","unstructured":"Singh D (2024) Foreign direct investment and local interpretable model-agnostic explanations: a rational framework for fdi decision making. J Econ Financ Adm Sci 29(57):98\u2013120","journal-title":"J Econ Financ Adm Sci"},{"issue":"6","key":"2896_CR56","first-page":"1319","volume":"41","author":"A Singh","year":"2020","unstructured":"Singh A, Jain A (2020) Cost-sensitive metaheuristic technique for credit card fraud detection. J Inf Optim Sci 41(6):1319\u20131331","journal-title":"J Inf Optim Sci"},{"issue":"4","key":"2896_CR57","first-page":"12298","volume":"3","author":"S Susan","year":"2021","unstructured":"Susan S, Kumar A (2021) The balancing trick: optimized sampling of imbalanced datasets-a brief survey of the recent state of the art. Eng Rep 3(4):12298","journal-title":"Eng Rep"},{"key":"2896_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124902","volume":"256","author":"W Shan","year":"2024","unstructured":"Shan W, Li D, Liu S, Song M, Xiao S, Zhang H (2024) A random feature mapping method based on the adaboost algorithm and results fusion for enhancing classification performance. Expert Syst Appl 256:124902","journal-title":"Expert Syst Appl"},{"issue":"3","key":"2896_CR59","doi-asserted-by":"publisher","first-page":"47","DOI":"10.3390\/jcp5030047","volume":"5","author":"S Tang","year":"2025","unstructured":"Tang S, Du F, Diao Z, Fan W (2025) A multi-feature semantic fusion machine learning architecture for detecting encrypted malicious traffic. J Cybersecur Priv 5(3):47","journal-title":"J Cybersecur Priv"},{"key":"2896_CR60","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.ins.2019.11.004","volume":"513","author":"F Thabtah","year":"2020","unstructured":"Thabtah F, Hammoud S, Kamalov F, Gonsalves A (2020) Data imbalance in classification: experimental evaluation. Inf Sci 513:429\u2013441","journal-title":"Inf Sci"},{"key":"2896_CR61","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525\u201341550","journal-title":"IEEE Access"},{"key":"2896_CR62","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103735","volume":"220","author":"HV Vo","year":"2023","unstructured":"Vo HV, Du HP, Nguyen HN (2023) Ai-powered intrusion detection in large-scale traffic networks based on flow sensing strategy and parallel deep analysis. J Netw Comput Appl 220:103735","journal-title":"J Netw Comput Appl"},{"key":"2896_CR63","doi-asserted-by":"crossref","unstructured":"Vandal T, Kodra E, Dy J, Ganguly S, Nemani R, Ganguly AR (2018) Quantifying uncertainty in discrete-continuous and skewed data with bayesian deep learning. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining, pp 2377\u20132386","DOI":"10.1145\/3219819.3219996"},{"key":"2896_CR64","doi-asserted-by":"crossref","unstructured":"Vo HV, Nguyen HN, Nguyen TN, Du HP (2022) Sdaid: towards a hybrid signature and deep analysis-based intrusion detection method. In: GLOBECOM 2022-2022 IEEE global communications conference, IEEE, pp 2615\u20132620","DOI":"10.1109\/GLOBECOM48099.2022.10001582"},{"issue":"2","key":"2896_CR65","first-page":"841","volume":"31","author":"S Wachter","year":"2017","unstructured":"Wachter S, Mittelstadt B, Russell C (2017) Counterfactual explanations without opening the black box: automated decisions and the gdpr. Harv J Law Technol 31(2):841\u2013887","journal-title":"Harv J Law Technol"},{"key":"2896_CR66","doi-asserted-by":"publisher","first-page":"140136","DOI":"10.1109\/ACCESS.2021.3116612","volume":"9","author":"W Xu","year":"2021","unstructured":"Xu W, Jang-Jaccard J, Singh A, Wei Y, Sabrina F (2021) Improving performance of autoencoder-based network anomaly detection on nsl-kdd dataset. IEEE Access 9:140136\u2013140146","journal-title":"IEEE Access"},{"key":"2896_CR67","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.future.2021.03.024","volume":"122","author":"H Zhang","year":"2021","unstructured":"Zhang H, Li J-L, Liu X-M, Dong C (2021) Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection. Futur Gener Comput Syst 122:130\u2013143","journal-title":"Futur Gener Comput Syst"},{"key":"2896_CR68","doi-asserted-by":"crossref","unstructured":"Zilli C, Sacco A, Monaco D, Okafor O, Esposito F, Marchetto G (2024) Inferring visibility of internet traffic matrices using explainable AI. In: NOMS 2024-2024 IEEE network operations and management symposium, IEEE, pp 1\u20136","DOI":"10.1109\/NOMS59830.2024.10575173"},{"key":"2896_CR69","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103266","volume":"198","author":"X Zhang","year":"2022","unstructured":"Zhang X, Yang F, Hu Y, Tian Z, Liu W, Li Y, She W (2022) Ranet: network intrusion detection with group-gating convolutional neural network. J Netw Comput Appl 198:103266","journal-title":"J Netw Comput Appl"},{"key":"2896_CR70","doi-asserted-by":"publisher","first-page":"17169","DOI":"10.1007\/s00521-020-04914-7","volume":"32","author":"F Zhao","year":"2020","unstructured":"Zhao F, Zhang H, Peng J, Zhuang X, Na S-G (2020) A semi-self-taught network intrusion detection system. Neural Comput Appl 32:17169\u201317179","journal-title":"Neural Comput Appl"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02896-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-025-02896-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-025-02896-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T11:06:46Z","timestamp":1773659206000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-025-02896-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,29]]},"references-count":70,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["2896"],"URL":"https:\/\/doi.org\/10.1007\/s13042-025-02896-3","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,29]]},"assertion":[{"value":"13 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"49"}}