{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:46:23Z","timestamp":1773931583097,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:00:00Z","timestamp":1725840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:00:00Z","timestamp":1725840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s40747-024-01577-y","type":"journal-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:02:11Z","timestamp":1725865331000},"page":"8467-8479","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["SAGB: self-attention with gate and BiGRU network for intrusion detection"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1606-3511","authenticated-orcid":false,"given":"Zhanhui","family":"Hu","sequence":"first","affiliation":[]},{"given":"Guangzhong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yanping","family":"Li","sequence":"additional","affiliation":[]},{"given":"Siqing","family":"Zhuang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,9]]},"reference":[{"key":"1577_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.02.028","author":"V Hajisalem","year":"2018","unstructured":"Hajisalem V, Babaie S (2018) A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput Netw. https:\/\/doi.org\/10.1016\/j.comnet.2018.02.028","journal-title":"Comput Netw"},{"key":"1577_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003","author":"P Garc\u00eda-Teodoro","year":"2019","unstructured":"Garc\u00eda-Teodoro P, D\u00edaz-Verdejo J et al (2019) Anomalybased network intrusion detection: techniques, systems and challenges. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2008.08.003","journal-title":"Comput Secur"},{"key":"1577_CR3","doi-asserted-by":"publisher","DOI":"10.1145\/1741906.1741914","author":"S Chakrabarti","year":"2010","unstructured":"Chakrabarti S, Chakraborty M, Mukhopadhyay I (2010) Study of snort-based IDS. Conf Proc. https:\/\/doi.org\/10.1145\/1741906.1741914","journal-title":"Conf Proc"},{"key":"1577_CR4","volume-title":"Deep learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow I, Bengio Y, Courville A (2016) Deep learning. MIT Press"},{"key":"1577_CR5","unstructured":"Bourdev L, Fergus R, et al (2015) Learning spatiotemporal features with 3D convolutional networks. In: Proceedings of the 2015 IEEE international conference on computer vision (ICCV)"},{"key":"1577_CR6","doi-asserted-by":"crossref","unstructured":"Eigen D, Fergus R (2015) Predicting depth, surface normals and semantic labels with a common multi-scale convolutional architecture. In: Proceedings of the 2015 IEEE international conference on computer vision (ICCV), pp 2650\u20132658","DOI":"10.1109\/ICCV.2015.304"},{"key":"1577_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107183","author":"C Khammassi","year":"2020","unstructured":"Khammassi C, Krichen S, NSGA2-LR A (2020) Wrapper approach for feature selection in network intrusion detection. Comput Netw. https:\/\/doi.org\/10.1016\/j.comnet.2020.107183","journal-title":"Comput Netw"},{"key":"1577_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.016","author":"R Patil","year":"2019","unstructured":"Patil R, Dudeja H, Modi C (2019) Designing an efficient security framework for detecting intrusions in virtual network of cloud computing. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2019.05.016","journal-title":"Comput Secur"},{"key":"1577_CR9","doi-asserted-by":"publisher","DOI":"10.33851\/jmis.2019.6.4.165","author":"J Kim","year":"2019","unstructured":"Kim J, Shin Y, Choi E (2019) An intrusion detection model based on a convolutional neural network. J Multimed Inf Syst. https:\/\/doi.org\/10.33851\/jmis.2019.6.4.165","journal-title":"J Multimed Inf Syst"},{"key":"1577_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-023-11189-1","author":"XN Song","year":"2023","unstructured":"Song XN, Wu NN, Song S, Stojanovic V (2023) Switching-like event-triggered state estimation for reaction-diffusion neural networks against DoS attacks. Neural Process Lett. https:\/\/doi.org\/10.1007\/s11063-023-11189-1","journal-title":"Neural Process Lett"},{"key":"1577_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2024.107945","author":"XN Song","year":"2024","unstructured":"Song XN, Peng ZL, Song S, Stojanovic V (2024) Anti-disturbance state estimation for PDT-switched RDNNs utilizing time-sampling and space-splitting measurements. Commun Nonlinear Sci Numer Simul. https:\/\/doi.org\/10.1016\/j.cnsns.2024.107945","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"1577_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101681","author":"J Zhang","year":"2020","unstructured":"Zhang J, Ling Y, Fu X, Yang X, Xiong G, Zhang R (2020) Model of the intrusion detection system based on the integration of spatial-temporal features. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2019.101681","journal-title":"Comput Secur"},{"key":"1577_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.008","author":"F Gottwalt","year":"2019","unstructured":"Gottwalt F, Chang E, Dillon T (2019) CorrCorr: a feature selection method for multivariate correlation network anomaly detection techniques. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2019.02.008","journal-title":"Comput Secur"},{"key":"1577_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.005","author":"C Khammassi","year":"2017","unstructured":"Khammassi C, Krichen S (2017) GA-LR wrapper approach for feature selection in network intrusion detection. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2017.06.005","journal-title":"Comput Secur"},{"key":"1577_CR15","doi-asserted-by":"crossref","unstructured":"Rashid A, Siddique MJ, Ahmed SM (2020) Machine and deep learning based comparative analysis using hybrid approaches for intrusion detection system","DOI":"10.1109\/ICACS47775.2020.9055946"},{"key":"1577_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.01.002","author":"J David","year":"2019","unstructured":"David J, Thomas C (2019) Efficient DDoS flood attack detection using dynamicbthresholding on flow-based network traffic. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2019.01.002","journal-title":"Comput Secur"},{"key":"1577_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3380816","author":"MS Alshehri","year":"2024","unstructured":"Alshehri MS, Saidani O, Alrayes FS, Abbasi SF, Ahmad J (2024) A self-attention-based deep convolutional neural networks for IIoT networks intrusion detection. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2024.3380816","journal-title":"IEEE Access"},{"key":"1577_CR18","doi-asserted-by":"crossref","unstructured":"Wankhede S, Kshirsagar D (2018) DoS attack detection using machine learning and neural network. In: Computing communication control and automation (ICCUBEA), 2018 fourth international conference on. IEEE, pp\u00a01\u20135","DOI":"10.1109\/ICCUBEA.2018.8697702"},{"key":"1577_CR19","doi-asserted-by":"crossref","unstructured":"Tang TA, Mhamdi L, Mclernon D et al (2016) Deep learning approach for network intrusion detection in software defined networking. In: Wireless networks and mobile communications (WINCOM), 2016 international conference on. IEEE, pp 258\u2013263","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"1577_CR20","doi-asserted-by":"crossref","unstructured":"Tang TA, Zaidi S, Mclernon D et al (2018) Deep recurrent neural network for intrusion detection in SDN-based networks. In: Network softwarization and workshops (NetSoft), 2018 4th IEEE conference on. IEEE, pp 202\u2013206","DOI":"10.1109\/NETSOFT.2018.8460090"},{"key":"1577_CR21","unstructured":"Jihyun K, Jaehyun K, Thu H et al (2016) Long short term memory recurrent neural network classifier for intrusion detection. In: Platform technology and service (PlatCon), 2016 international conference on. IEEE, pp\u00a01\u20135"},{"key":"1577_CR22","doi-asserted-by":"crossref","unstructured":"Hu W, Gao J, Wang Y, Wu O, Maybank S (2013) Online adaboost based parameterized methods for dynamic distributed network intrusion detection. IEEE Trans Cybern 66\u201382","DOI":"10.1109\/TCYB.2013.2247592"},{"key":"1577_CR23","doi-asserted-by":"crossref","unstructured":"Zhang J, Zulkernine M, Haque A (2008) Random-forests-based network intrusion detection systems.In: IEEE transactions on systems, man, and cybernetics, part C (applications and reviews), pp 649\u2013659","DOI":"10.1109\/TSMCC.2008.923876"},{"key":"1577_CR24","unstructured":"Bengio Y, Delalleau O, Roux NL (2006) The curse of highly variable functions for local kernel machines. In: Advances in neural information processing systems, pp 107\u2013114"},{"key":"1577_CR25","doi-asserted-by":"crossref","unstructured":"Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D et al (2015) Going deeper with convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1\u20139","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"1577_CR26","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"1577_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2020.3047335","author":"KR Fernando","year":"2021","unstructured":"Fernando KR, Tsokos CP (2021) Dynamically weighted balanced loss: class imbalanced learning and confidence calibration of deep neural networks. IEEE Trans Neural Netw Learn Syst. https:\/\/doi.org\/10.1109\/tnnls.2020.3047335","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"1577_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105845","author":"XW Liang","year":"2020","unstructured":"Liang XW, Jiang AP, Li T et al (2020) LR-Smote\u2014an improved unbalanced data set oversampling based on K-means and SVM. Knowl-Based Syst. https:\/\/doi.org\/10.1016\/j.knosys.2020.105845","journal-title":"Knowl-Based Syst"},{"key":"1577_CR29","doi-asserted-by":"crossref","unstructured":"Lin C H, Yumer E, Wang O et al (2018) ST-GAN: spatial transformer generative adversarial networks for image compositing. In: IEEE\/CVF conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2018.00985"},{"key":"1577_CR30","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-19266-y","author":"IV Tetko","year":"2020","unstructured":"Tetko IV, Karpov P, Van Deursen R, Godin G (2020) State-of-the-art augmented NLP transformer models for direct and single-step retrosynthesis. Nat Commun. https:\/\/doi.org\/10.1038\/s41467-020-19266-y","journal-title":"Nat Commun"},{"key":"1577_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/asru46091.2019.9003750","author":"S Karita","year":"2019","unstructured":"Karita S, Wang X, Watanabe S et al (2019) A comparative study on transformer vs RNN in speech applications. IEEE Autom Speech Recogn Underst Workshop (ASRU). https:\/\/doi.org\/10.1109\/asru46091.2019.9003750","journal-title":"IEEE Autom Speech Recogn Underst Workshop (ASRU)"},{"key":"1577_CR32","doi-asserted-by":"crossref","unstructured":"Jeon J J, Kim E (2021) Multitask learning and joint optimization for transformer-RNN-transducer speech recognition. In: IEEE international conference on acoustics, speech and signal processing (ICASSP)","DOI":"10.1109\/ICASSP39728.2021.9414911"},{"key":"1577_CR33","doi-asserted-by":"crossref","unstructured":"Athiwaratkun B, Stokes JW (2017) Malware classification with LSTM and GRU language models and a character-level CNN. In: 2017 IEEE international conference on acoustics, speech and signal processing (ICASSP)","DOI":"10.1109\/ICASSP.2017.7952603"},{"key":"1577_CR34","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2762418","author":"C Yin","year":"2017","unstructured":"Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access. https:\/\/doi.org\/10.1109\/access.2017.2762418","journal-title":"IEEE Access"},{"key":"1577_CR35","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2836950","author":"Y Xin","year":"2018","unstructured":"Xin Y, Kong L, Liu Z, Chen Y, Li Y, Zhu H, Gao M, Hou H, Wang C (2018) Machine learning and deep learning methods for cybersecurity. IEEE Access. https:\/\/doi.org\/10.1109\/access.2018.2836950","journal-title":"IEEE Access"},{"key":"1577_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2023.07.063","author":"R Harini","year":"2023","unstructured":"Harini R, Maheswari N, Ganapathy S, Sivagami M (2023) An effective technique for detecting minority attacks in NIDS using deep learning and sampling approach. Alex Eng J. https:\/\/doi.org\/10.1016\/j.aej.2023.07.063","journal-title":"Alex Eng J"},{"key":"1577_CR37","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In Proc. IEEE Symp. Comput. Intell. Secur. Defense Appl., pp 1\u20136","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"1577_CR38","unstructured":"The KDD CUP99 Dataset. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"1577_CR39","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2762418","author":"T Su","year":"2020","unstructured":"Su T, Sun H, Zhu J, Wang S, Li Y (2020) BAT: deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access. https:\/\/doi.org\/10.1109\/access.2017.2762418","journal-title":"IEEE Access"},{"key":"1577_CR40","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2854599","author":"Z Wang","year":"2018","unstructured":"Wang Z (2018) Deep learning based intrusion detection with adversaries. IEEE Access. https:\/\/doi.org\/10.1109\/access.2018.2854599","journal-title":"IEEE Access"},{"key":"1577_CR41","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0284795","author":"AA Awad","year":"2023","unstructured":"Awad AA, Ali AF, Gaber T (2023) An improved long short term memory network for intrusion detection. PLoS ONE. https:\/\/doi.org\/10.1371\/journal.pone.0284795","journal-title":"PLoS ONE"},{"key":"1577_CR42","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2847722","author":"P Mishra","year":"2018","unstructured":"Mishra P, Varadharajan V, Tupakula U, Pilli ES (2018) A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun Surv Tutor. https:\/\/doi.org\/10.1109\/comst.2018.2847722","journal-title":"IEEE Commun Surv Tutor"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01577-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01577-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01577-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T22:21:48Z","timestamp":1729117308000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01577-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,9]]},"references-count":42,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["1577"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01577-y","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,9]]},"assertion":[{"value":"12 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no Conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}