{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T07:57:43Z","timestamp":1774079863203,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T00:00:00Z","timestamp":1774051200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T00:00:00Z","timestamp":1774051200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Researchers Supporting Project","award":["RSP2024R309"],"award-info":[{"award-number":["RSP2024R309"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1007\/s13042-026-03055-y","type":"journal-article","created":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T06:11:57Z","timestamp":1774073517000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A hybrid CNN-transformer with explainable AI for robust IoT and IIoT intrusion detection"],"prefix":"10.1007","volume":"17","author":[{"given":"Radhwan A. A.","family":"Saleh","sequence":"first","affiliation":[]},{"given":"Ayed","family":"Alwadain","sequence":"additional","affiliation":[]},{"given":"Mashaal A. M.","family":"Saif","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,21]]},"reference":[{"key":"3055_CR1","unstructured":"Mahdi MF (2024) Revolutionizing the future investigating the role of smart devices in iot. Int J Comput Electron Asp Eng (IJCEAE) 5"},{"key":"3055_CR2","doi-asserted-by":"publisher","first-page":"317","DOI":"10.12928\/telkomnika.v18i1.12434","volume":"18","author":"A Muneer","year":"2020","unstructured":"Muneer A, Fati SM, Fuddah S (2020) Smart health monitoring system using iot based smart fitness mirror. TELKOMNIKA (Telecommun Comput Electron Control) 18:317\u2013331","journal-title":"TELKOMNIKA (Telecommun Comput Electron Control)"},{"key":"3055_CR3","doi-asserted-by":"publisher","first-page":"4249","DOI":"10.1109\/TCE.2024.3370193","volume":"70","author":"R Rajesh","year":"2024","unstructured":"Rajesh R, Hemalatha S, Nagarajan SM, Devarajan GG, Omar M, Bashir AK (2024) Threat detection and mitigation for tactile internet driven consumer iot-healthcare system. IEEE Trans Consum Electron 70:4249\u20134257","journal-title":"IEEE Trans Consum Electron"},{"key":"3055_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123808","volume":"249","author":"H Nandanwar","year":"2024","unstructured":"Nandanwar H, Katarya R (2024) Deep learning enabled intrusion detection system for industrial iot environment. Expert Syst Appl 249:123808","journal-title":"Expert Syst Appl"},{"key":"3055_CR5","doi-asserted-by":"publisher","first-page":"63584","DOI":"10.1109\/ACCESS.2024.3396461","volume":"12","author":"S Racherla","year":"2024","unstructured":"Racherla S, Sripathi P, Faruqui N, Kabir MA, Whaiduzzaman M, Shah SA (2024) Deep-ids: a real-time intrusion detector for iot nodes using deep learning. IEEE Access 12:63584\u201363597","journal-title":"IEEE Access"},{"key":"3055_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103404","volume":"156","author":"A Singh","year":"2024","unstructured":"Singh A, Chouhan PK, Aujla GS (2024) Secureflow: Knowledge and data-driven ensemble for intrusion detection and dynamic rule configuration in software-defined iot environment. Ad Hoc Netw 156:103404","journal-title":"Ad Hoc Netw"},{"key":"3055_CR7","doi-asserted-by":"publisher","DOI":"10.1201\/9781003383253","volume-title":"Cybersecurity of industrial internet of things (IIoT)","author":"A Buja","year":"2025","unstructured":"Buja A (2025) Cybersecurity of industrial internet of things (IIoT). CRC Press, Boca Raton"},{"key":"3055_CR8","doi-asserted-by":"crossref","unstructured":"Alashhab A, Zahid MS, Muneer A, Abdullahi M (2022) Low-rate ddos attack detection using deep learning for sdn-enabled iot networks, Authorea Preprints","DOI":"10.14569\/IJACSA.2022.0131141"},{"key":"3055_CR9","doi-asserted-by":"publisher","first-page":"9261","DOI":"10.1007\/s10586-024-04379-6","volume":"27","author":"A Aldaej","year":"2024","unstructured":"Aldaej A, Ahanger TA, Atiquzzaman M, Ullah I (2024) A comprehensive node-based botnet detection framework for iot network. Clust Comput 27:9261\u20139281","journal-title":"Clust Comput"},{"key":"3055_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.future.2023.10.011","volume":"152","author":"PMS S\u00e1nchez","year":"2024","unstructured":"S\u00e1nchez PMS, Celdr\u00e1n AH, Bovet G, P\u00e9rez GM (2024) Adversarial attacks and defenses on ml-and hardware-based iot device fingerprinting and identification. Futur Gener Comput Syst 152:30\u201342","journal-title":"Futur Gener Comput Syst"},{"key":"3055_CR11","doi-asserted-by":"crossref","unstructured":"Ali RF, Muneer A, Dominic P, Taib SM, Ghaleb EA (2021) Internet of things (iot) security challenges and solutions: a systematic literature review. In: International conference on advances in cyber security. Springer, pp 128\u2013154","DOI":"10.1007\/978-981-16-8059-5_9"},{"key":"3055_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42044-025-00246-8","volume":"8","author":"N Kalpani","year":"2025","unstructured":"Kalpani N, Rodrigo N, Seneviratne D, Ariyadasa S, Senanayake J (2025) Cutting-edge approaches in intrusion detection systems: a systematic review of deep learning, reinforcement learning, and ensemble techniques. Iran J Comput Sci 8:1\u201331","journal-title":"Iran J Comput Sci"},{"key":"3055_CR13","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150","volume":"32","author":"Z Ahmad","year":"2021","unstructured":"Ahmad Z, Khan AS, Shiang CW, Abdullah J, Ahmad F (2021) Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans Emerg Telecommun Technol 32:e4150","journal-title":"Trans Emerg Telecommun Technol"},{"key":"3055_CR14","doi-asserted-by":"publisher","first-page":"10","DOI":"10.22214\/ijraset.2024.58946","volume":"12","author":"T Arjunan","year":"2024","unstructured":"Arjunan T (2024) Real-time detection of network traffic anomalies in big data environments using deep learning models. Int J Res Appl Sci Eng Technol 12:10\u201322214","journal-title":"Int J Res Appl Sci Eng Technol"},{"key":"3055_CR15","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/s10462-024-11044-2","volume":"58","author":"L Su","year":"2025","unstructured":"Su L, Zuo X, Li R, Wang X, Zhao H, Huang B (2025) A systematic review for transformer-based long-term series forecasting. Artif Intell Rev 58:80","journal-title":"Artif Intell Rev"},{"key":"3055_CR16","unstructured":"Wang Y, Wu H, Dong J, Liu Y, Long M, Wang J (2024) Deep time series models: a comprehensive survey and benchmark. arXiv preprint arXiv:2407.13278IF: NA NA NA"},{"key":"3055_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.126473","volume":"269","author":"RA Saleh","year":"2025","unstructured":"Saleh RA, Ertun\u00e7 HM (2025) Attention-based deep learning for tire defect detection: fusing local and global features in an industrial case study. Expert Syst Appl 269:126473","journal-title":"Expert Syst Appl"},{"key":"3055_CR18","doi-asserted-by":"crossref","unstructured":"Kheddar H (2024) Transformers and large language models for efficient intrusion detection systems: a comprehensive survey. arXiv preprint arXiv:2408.07583IF: NA NA NA","DOI":"10.1016\/j.inffus.2025.103347"},{"key":"3055_CR19","doi-asserted-by":"publisher","first-page":"4677","DOI":"10.3390\/electronics13234677","volume":"13","author":"M Alshomrani","year":"2024","unstructured":"Alshomrani M, Albeshri A, Alturki B, Alallah FS, Alsulami AA (2024) Survey of transformer-based malicious software detection systems. Electronics 13:4677","journal-title":"Electronics"},{"key":"3055_CR20","doi-asserted-by":"publisher","first-page":"3909173","DOI":"10.1155\/2024\/3909173","volume":"2024","author":"S Muneer","year":"2024","unstructured":"Muneer S, Farooq U, Athar A, Raza MA, Ghazal TM, Sakib S (2024) A critical review of artificial intelligence based approaches in intrusion detection: a comprehensive analysis. J Eng 2024:3909173","journal-title":"J Eng"},{"key":"3055_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121751","volume":"238","author":"B Sharma","year":"2024","unstructured":"Sharma B, Sharma L, Lal C, Roy S (2024) Explainable artificial intelligence for intrusion detection in iot networks: a deep learning based approach. Expert Syst Appl 238:121751","journal-title":"Expert Syst Appl"},{"key":"3055_CR22","doi-asserted-by":"publisher","first-page":"1526221","DOI":"10.3389\/frai.2025.1526221","volume":"8","author":"VZ Mohale","year":"2025","unstructured":"Mohale VZ, Obagbuwa IC (2025) A systematic review on the integration of explainable artificial intelligence in intrusion detection systems to enhancing transparency and interpretability in cybersecurity. Front Artif Intell 8:1526221","journal-title":"Front Artif Intell"},{"key":"3055_CR23","doi-asserted-by":"publisher","first-page":"4170","DOI":"10.3390\/app14104170","volume":"14","author":"O Arreche","year":"2024","unstructured":"Arreche O, Guntur T, Abdallah M (2024) Xai-ids: toward proposing an explainable artificial intelligence framework for enhancing network intrusion detection systems. Appl Sci 14:4170","journal-title":"Appl Sci"},{"key":"3055_CR24","doi-asserted-by":"publisher","first-page":"11792","DOI":"10.1109\/ACCESS.2025.3526711","volume":"13","author":"T Al-Shurbaji","year":"2025","unstructured":"Al-Shurbaji T, Anbar M, Manickam S, Hasbullah IH, Alfriehate N, Alabsi BA, ALzighaibi AR, Hashim H (2025) Deep learning-based intrusion detection system for detecting iot botnet attacks: a review. IEEE Access 13:11792\u201311822","journal-title":"IEEE Access"},{"key":"3055_CR25","doi-asserted-by":"publisher","first-page":"8417","DOI":"10.3390\/s22218417","volume":"22","author":"AM Banaamah","year":"2022","unstructured":"Banaamah AM, Ahmad I (2022) Intrusion detection in iot using deep learning. Sensors 22:8417","journal-title":"Sensors"},{"key":"3055_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100936","volume":"24","author":"SA Bakhsh","year":"2023","unstructured":"Bakhsh SA, Khan MA, Ahmed F, Alshehri MS, Ali H, Ahmad J (2023) Enhancing iot network security through deep learning-powered intrusion detection system. Internet Things 24:100936","journal-title":"Internet Things"},{"key":"3055_CR27","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s43926-023-00034-5","volume":"3","author":"M Bhavsar","year":"2023","unstructured":"Bhavsar M, Roy K, Kelly J, Olusola O (2023) Anomaly-based intrusion detection system for iot application. Discov Internet Things 3:5","journal-title":"Discov Internet Things"},{"key":"3055_CR28","doi-asserted-by":"publisher","first-page":"203","DOI":"10.3390\/technologies12100203","volume":"12","author":"A Deshmukh","year":"2024","unstructured":"Deshmukh A, Ravulakollu K (2024) An efficient cnn-based intrusion detection system for iot: use case towards cybersecurity. Technologies 12:203","journal-title":"Technologies"},{"key":"3055_CR29","doi-asserted-by":"publisher","first-page":"2100","DOI":"10.3390\/electronics12092100","volume":"12","author":"M Wang","year":"2023","unstructured":"Wang M, Yang N, Weng N (2023) Securing a smart home with a transformer-based iot intrusion detection system. Electronics 12:2100","journal-title":"Electronics"},{"key":"3055_CR30","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1186\/s13677-024-00685-x","volume":"13","author":"M Sajid","year":"2024","unstructured":"Sajid M, Malik KR, Almogren A, Malik TS, Khan AH, Tanveer J, Rehman AU (2024) Enhancing intrusion detection: a hybrid machine and deep learning approach. J Cloud Comput 13:123","journal-title":"J Cloud Comput"},{"key":"3055_CR31","doi-asserted-by":"publisher","first-page":"81118","DOI":"10.1109\/ACCESS.2025.3566980","volume":"13","author":"YK Saheed","year":"2025","unstructured":"Saheed YK, Chukwuere JE (2025) Cps-iiot-p2attention: explainable privacy-preserving with scaled dot-product attention in cyber physical system-industrial iot network. IEEE Access 13:81118\u201381142","journal-title":"IEEE Access"},{"key":"3055_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115939","volume":"191","author":"YK Saheed","year":"2025","unstructured":"Saheed YK, Misra S (2025) Cps-iot-ppdnn: a new explainable privacy preserving dnn for resilient anomaly detection in cyber-physical systems-enabled iot networks. Chaos, Solitons Fractals 191:115939","journal-title":"Chaos, Solitons Fractals"},{"key":"3055_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111434","volume":"155","author":"YK Saheed","year":"2024","unstructured":"Saheed YK, Abdulganiyu OH, Ait Tchakoucht T (2024) Modified genetic algorithm and fine-tuned long short-term memory network for intrusion detection in the internet of things networks with edge capabilities. Appl Soft Comput 155:111434","journal-title":"Appl Soft Comput"},{"key":"3055_CR34","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1007\/s10207-023-00787-8","volume":"23","author":"H Nandanwar","year":"2024","unstructured":"Nandanwar H, Katarya R (2024) Tl-bilstm iot: transfer learning model for prediction of intrusion detection system in iot environment. Int J Inf Secur 23:1251\u20131277","journal-title":"Int J Inf Secur"},{"key":"3055_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2025.110161","volume":"123","author":"H Nandanwar","year":"2025","unstructured":"Nandanwar H, Katarya R (2025) Securing industry 5.0: an explainable deep learning model for intrusion detection in cyber-physical systems. Comput Electr Eng 123:110161","journal-title":"Comput Electr Eng"},{"key":"3055_CR36","doi-asserted-by":"crossref","unstructured":"Kauhsik B, Nandanwar H, Katarya R (2023) Iot security: a deep learning-based approach for intrusion detection and prevention. In: 2023 international conference on evolutionary algorithms and soft computing techniques (EASCT). IEEE, pp 1\u20137","DOI":"10.1109\/EASCT59475.2023.10392490"},{"key":"3055_CR37","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H (2022) Edge-iiotset: a new comprehensive realistic cyber security dataset of iot and iiot applications for centralized and federated learning. IEEe Access 10:40281\u201340306","journal-title":"IEEe Access"},{"key":"3055_CR38","doi-asserted-by":"publisher","first-page":"350","DOI":"10.4218\/etrij.2023-0506","volume":"47","author":"M Eme\u00e7","year":"2025","unstructured":"Eme\u00e7 M (2025) Detection of ipv6 routing attacks using ann and a novel iot dataset. ETRI J 47:350\u2013361","journal-title":"ETRI J"},{"key":"3055_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.102068","volume":"36","author":"SM Al-Selwi","year":"2024","unstructured":"Al-Selwi SM, Hassan MF, Abdulkadir SJ, Muneer A, Sumiea EH, Alqushaibi A, Ragab MG (2024) Rnn-lstm: from applications to modeling techniques and beyond\u2014systematic review. J King Saud Univ Comput Inf Sci 36:102068","journal-title":"J King Saud Univ Comput Inf Sci"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-026-03055-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-026-03055-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-026-03055-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T06:11:59Z","timestamp":1774073519000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-026-03055-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,21]]},"references-count":39,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2026,5]]}},"alternative-id":["3055"],"URL":"https:\/\/doi.org\/10.1007\/s13042-026-03055-y","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,21]]},"assertion":[{"value":"21 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"220"}}