{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T01:25:30Z","timestamp":1776389130443,"version":"3.51.2"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:00:00Z","timestamp":1755734400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:00:00Z","timestamp":1755734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s40747-025-02001-9","type":"journal-article","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T07:24:12Z","timestamp":1755761052000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A novel federated learning approach for IoT botnet intrusion detection using SHAP-based knowledge distillation"],"prefix":"10.1007","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5120-2911","authenticated-orcid":false,"given":"Md. Alamgir","family":"Hossain","sequence":"first","affiliation":[]},{"given":"Sadman","family":"Saif","sequence":"additional","affiliation":[]},{"given":"Md. Saiful","family":"Islam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,21]]},"reference":[{"key":"2001_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109984","volume":"122","author":"A Kalidindi","year":"2025","unstructured":"Kalidindi A, Arrama MB (2025) Feature selection and hybrid CNNF deep stacked autoencoder for botnet attack detection in IoT. Comput Electr Eng 122:109984. https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109984","journal-title":"Comput Electr Eng"},{"key":"2001_CR2","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.aej.2025.01.042","volume":"118","author":"MdA Hossain","year":"2025","unstructured":"Hossain MdA, Islam MdS (2025) A novel feature selection-driven ensemble learning approach for accurate botnet attack detection. Alex Eng J 118:261\u2013277. https:\/\/doi.org\/10.1016\/j.aej.2025.01.042","journal-title":"Alex Eng J"},{"key":"2001_CR3","doi-asserted-by":"publisher","unstructured":"Putra MAR (2022) NCC-2 dataset: simultaneous botnet dataset. Mendeley, Sep. 08, 2022. https:\/\/doi.org\/10.17632\/8DPT85JRHP.2","DOI":"10.17632\/8DPT85JRHP.2"},{"key":"2001_CR4","doi-asserted-by":"publisher","unstructured":"McNulty L, Vassilakis VG (2022) IoT botnets: characteristics, exploits, attack capabilities, and targets. In: 2022 13th International symposium on communication systems, networks and digital signal processing (CSNDSP), Porto, Portugal. IEEE. pp. 350\u2013355. https:\/\/doi.org\/10.1109\/CSNDSP54353.2022.9908039","DOI":"10.1109\/CSNDSP54353.2022.9908039"},{"key":"2001_CR5","doi-asserted-by":"publisher","unstructured":"Kelly C, Pitropakis N, McKeown S, Lambrinoudakis C (2020) Testing and hardening IoT devices against the Mirai botnet. In: 2020 International conference on cyber security and protection of digital services (cyber security), Dublin, Ireland. IEEE. pp 1\u20138. https:\/\/doi.org\/10.1109\/CyberSecurity49315.2020.9138887","DOI":"10.1109\/CyberSecurity49315.2020.9138887"},{"key":"2001_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2024.101037","volume":"32","author":"MdA Hossain","year":"2024","unstructured":"Hossain MdA, Islam MdS (2024) Enhancing DDoS attack detection with hybrid feature selection and ensemble-based classifier: a promising solution for robust cybersecurity. Meas Sens 32:101037. https:\/\/doi.org\/10.1016\/j.measen.2024.101037","journal-title":"Meas Sens"},{"key":"2001_CR7","doi-asserted-by":"publisher","unstructured":"Bithi Ms, Hossain MdA, Ahmed MdK, Sultana R, Ahammad I, Islam MS (2024) Enhanced DDoS detection in software defined networking using ensemble-based machine learning. In: 2024 6th International conference on electrical engineering and information & communication technology (ICEEICT), Dhaka, Bangladesh. IEEE. pp 1032\u20131037. https:\/\/doi.org\/10.1109\/ICEEICT62016.2024.10534483","DOI":"10.1109\/ICEEICT62016.2024.10534483"},{"key":"2001_CR8","doi-asserted-by":"publisher","unstructured":"Hossain MdA (2025) Deep learning-based intrusion detection for IoT networks: a scalable and efficient approach. https:\/\/doi.org\/10.21203\/rs.3.rs-6042512\/v1 (in review)","DOI":"10.21203\/rs.3.rs-6042512\/v1"},{"key":"2001_CR9","doi-asserted-by":"publisher","unstructured":"Saif S, Hossain MdA, Islam MdS (2024) IoT security fortification: enhancing cyber threat detection through feature selection and advanced machine learning. In: 2024 1st International conference on innovative engineering sciences and technological research (ICIESTR), Muscat, Oman. IEEE. pp 1\u20136. https:\/\/doi.org\/10.1109\/ICIESTR60916.2024.10798181","DOI":"10.1109\/ICIESTR60916.2024.10798181"},{"key":"2001_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2024.102685","volume":"62","author":"M Shahin","year":"2024","unstructured":"Shahin M, Maghanaki M, Hosseinzadeh A, Chen FF (2024) Advancing network security in industrial IoT: a deep dive into AI-enabled intrusion detection systems. Adv Eng Inform 62:102685. https:\/\/doi.org\/10.1016\/j.aei.2024.102685","journal-title":"Adv Eng Inform"},{"key":"2001_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2023.100306","author":"MA Hossain","year":"2023","unstructured":"Hossain MA, Islam MS (2023) Ensuring network security with a robust intrusion detection system using ensemble-based machine learning. Array. https:\/\/doi.org\/10.1016\/j.array.2023.100306","journal-title":"Array"},{"key":"2001_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100710","volume":"22","author":"E Fazel","year":"2023","unstructured":"Fazel E, Najafabadi HE, Rezaei M, Leung H (2023) Unlocking the power of mist computing through clustering techniques in IoT networks. Internet Things 22:100710. https:\/\/doi.org\/10.1016\/j.iot.2023.100710","journal-title":"Internet Things"},{"key":"2001_CR13","doi-asserted-by":"publisher","first-page":"40682","DOI":"10.1109\/ACCESS.2024.3376400","volume":"12","author":"M Ali","year":"2024","unstructured":"Ali M, Shahroz M, Mushtaq MF, Alfarhood S, Safran M, Ashraf I (2024) Hybrid machine learning model for efficient botnet attack detection in IoT environment. IEEE Access 12:40682\u201340699. https:\/\/doi.org\/10.1109\/ACCESS.2024.3376400","journal-title":"IEEE Access"},{"issue":"2","key":"2001_CR14","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/s10207-025-01008-0","volume":"24","author":"MdA Hossain","year":"2025","unstructured":"Hossain MdA, Hossain MD, Choupani R, Do\u01e7du E (2025) MRS-PFIDS: federated learning driven detection of network intrusions in maritime radar systems. Int J Inf Secur 24(2):92. https:\/\/doi.org\/10.1007\/s10207-025-01008-0","journal-title":"Int J Inf Secur"},{"issue":"4","key":"2001_CR15","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.5267\/j.ijdns.2023.7.021","volume":"7","author":"M AL-Akhras","year":"2023","unstructured":"AL-Akhras M, Alshunaybir A, Omar H, Alhazmi S (2023) Botnet attacks detection in IoT environment using machine learning techniques. Int J Data Netw Sci 7(4):1683\u20131706. https:\/\/doi.org\/10.5267\/j.ijdns.2023.7.021","journal-title":"Int J Data Netw Sci"},{"key":"2001_CR16","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1016\/j.procs.2024.08.058","volume":"241","author":"T Zhukabayeva","year":"2024","unstructured":"Zhukabayeva T, Zholshiyeva L, Ven-Tsen K, Adamova A, Mardenov Y, Karabayev N (2024) Enhancing IoT security: effective botnet attack detection through machine learning. Procedia Comput Sci 241:421\u2013426. https:\/\/doi.org\/10.1016\/j.procs.2024.08.058","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"2001_CR17","doi-asserted-by":"publisher","first-page":"21207","DOI":"10.1038\/s41598-023-48230-1","volume":"13","author":"MdA Hossain","year":"2023","unstructured":"Hossain MdA, Islam MdS (2023) A novel hybrid feature selection and ensemble-based machine learning approach for botnet detection. Sci Rep 13(1):21207. https:\/\/doi.org\/10.1038\/s41598-023-48230-1","journal-title":"Sci Rep"},{"key":"2001_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/3806459","volume":"2021","author":"H Alkahtani","year":"2021","unstructured":"Alkahtani H, Aldhyani THH (2021) Botnet attack detection by using CNN-LSTM model for internet of things applications. Secur Commun Netw 2021:1\u201323. https:\/\/doi.org\/10.1155\/2021\/3806459","journal-title":"Secur Commun Netw"},{"key":"2001_CR19","doi-asserted-by":"publisher","unstructured":"Hossain MdA, Saiful Islam Md (2023) An ensemble-based machine learning approach for botnet-based DDoS attack detection. In: 2023 IEEE international conference on telecommunications and photonics (ICTP), Dhaka, Bangladesh. IEEE. pp 1\u20135. https:\/\/doi.org\/10.1109\/ICTP60248.2023.10490528","DOI":"10.1109\/ICTP60248.2023.10490528"},{"key":"2001_CR20","doi-asserted-by":"publisher","unstructured":"Dharaneish VC, Rajakrishnan S, Sudhay S, Senthil Kumar T, Siddhesh TS, Vajipayajula S (2024) Enhanced botnet attack detection using machine learning and neural networks. In: 2024 International conference on inventive computation technologies (ICICT), Lalitpur, Nepal. IEEE. pp 814\u2013821. https:\/\/doi.org\/10.1109\/ICICT60155.2024.10544628","DOI":"10.1109\/ICICT60155.2024.10544628"},{"issue":"1","key":"2001_CR21","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1186\/s13677-024-00699-5","volume":"13","author":"MdS Hossain","year":"2024","unstructured":"Hossain MdS, Hossain MdA, Islam MdS (2024) I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach. J Cloud Comput 13(1):151. https:\/\/doi.org\/10.1186\/s13677-024-00699-5","journal-title":"J Cloud Comput"},{"key":"2001_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.107533","volume":"163","author":"MA Kouda","year":"2025","unstructured":"Kouda MA, Djamaa B, Yachir A (2025) An efficient federated learning solution for the artificial intelligence of things. Future Gener Comput Syst 163:107533. https:\/\/doi.org\/10.1016\/j.future.2024.107533","journal-title":"Future Gener Comput Syst"},{"key":"2001_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2022.100263","volume":"8","author":"C Regan","year":"2022","unstructured":"Regan C, Nasajpour M, Parizi RM, Pouriyeh S, Dehghantanha A, Choo K-KR (2022) Federated IoT attack detection using decentralized edge data. Mach Learn Appl 8:100263. https:\/\/doi.org\/10.1016\/j.mlwa.2022.100263","journal-title":"Mach Learn Appl"},{"key":"2001_CR24","doi-asserted-by":"publisher","unstructured":"Chatterjee S, Hanawal MK (2021) Federated learning for intrusion detection in IoT security: a hybrid ensemble approach. arXiv. https:\/\/doi.org\/10.48550\/ARXIV.2106.15349","DOI":"10.48550\/ARXIV.2106.15349"},{"key":"2001_CR25","doi-asserted-by":"publisher","unstructured":"Popoola S, Ande R, Atayero A, Hammoudeh M, Gui G, Adebisi B (2023) Optimized lightweight federated learning for botnet detection in smart critical infrastructure. preprint. https:\/\/doi.org\/10.36227\/techrxiv.23620674.v1","DOI":"10.36227\/techrxiv.23620674.v1"},{"key":"2001_CR26","doi-asserted-by":"publisher","unstructured":"Zhang J, Liang S, Ye F, Hu RQ, Qian Y (2023) Towards detection of zero-day botnet attack in IoT networks using federated learning. In: ICC 2023\u2014IEEE international conference on communications, Rome, Italy. IEEE. pp 7\u201312. https:\/\/doi.org\/10.1109\/ICC45041.2023.10279423","DOI":"10.1109\/ICC45041.2023.10279423"},{"issue":"7","key":"2001_CR27","doi-asserted-by":"publisher","first-page":"8159","DOI":"10.1109\/TII.2022.3216575","volume":"19","author":"J Zhang","year":"2023","unstructured":"Zhang J, Luo C, Carpenter M, Min G (2023) Federated learning for distributed IIoT intrusion detection using transfer approaches. IEEE Trans Ind Inform 19(7):8159\u20138169. https:\/\/doi.org\/10.1109\/TII.2022.3216575","journal-title":"IEEE Trans Ind Inform"},{"issue":"1","key":"2001_CR28","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10922-022-09691-3","volume":"31","author":"M Sarhan","year":"2023","unstructured":"Sarhan M, Layeghy S, Moustafa N, Portmann M (2023) Cyber threat intelligence sharing scheme based on federated learning for network intrusion detection. J Netw Syst Manag 31(1):3. https:\/\/doi.org\/10.1007\/s10922-022-09691-3","journal-title":"J Netw Syst Manag"},{"issue":"3","key":"2001_CR29","doi-asserted-by":"publisher","first-page":"509","DOI":"10.3390\/ai4030028","volume":"4","author":"R Lazzarini","year":"2023","unstructured":"Lazzarini R, Tianfield H, Charissis V (2023) Federated learning for IoT intrusion detection. AI 4(3):509\u2013530. https:\/\/doi.org\/10.3390\/ai4030028","journal-title":"AI"},{"key":"2001_CR30","doi-asserted-by":"publisher","unstructured":"Wang H, Mu\u00f1oz-Gonz\u00e1lez L, Eklund D, Raza S (2021) Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection. In: Proceedings of the 14th ACM conference on security and privacy in wireless and mobile networks, Abu Dhabi United Arab Emirates. ACM. pp 153\u2013163. https:\/\/doi.org\/10.1145\/3448300.3467827","DOI":"10.1145\/3448300.3467827"},{"issue":"1","key":"2001_CR31","doi-asserted-by":"publisher","first-page":"3878","DOI":"10.1038\/s41598-024-54438-6","volume":"14","author":"AA Wardana","year":"2024","unstructured":"Wardana AA, Ko\u0142aczek G, Warzy\u0144ski A, Sukarno P (2024) Ensemble averaging deep neural network for botnet detection in heterogeneous Internet of Things devices. Sci Rep 14(1):3878. https:\/\/doi.org\/10.1038\/s41598-024-54438-6","journal-title":"Sci Rep"},{"key":"2001_CR32","doi-asserted-by":"publisher","unstructured":"Sumathi L, Valarmathi L (2024) Towards securing the edge devices using lightweight A3E\u202f: apposite adversarial autoencoder. https:\/\/doi.org\/10.21203\/rs.3.rs-3847338\/v1","DOI":"10.21203\/rs.3.rs-3847338\/v1"},{"key":"2001_CR33","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4378339","author":"J Azimjonov","year":"2023","unstructured":"Azimjonov J, Kim T (2023) Stochastic gradient descent classifier-based lightweight intrusion detection systems using the most efficient feature subsets of datasets. SSRN. https:\/\/doi.org\/10.2139\/ssrn.4378339. (preprint)","journal-title":"SSRN"},{"key":"2001_CR34","doi-asserted-by":"publisher","first-page":"49319","DOI":"10.1109\/ACCESS.2023.3253432","volume":"11","author":"F Taher","year":"2023","unstructured":"Taher F, Abdel-Salam M, Elhoseny M, El-Hasnony IM (2023) Reliable machine learning model for IIoT botnet detection. IEEE Access 11:49319\u201349336. https:\/\/doi.org\/10.1109\/ACCESS.2023.3253432","journal-title":"IEEE Access"},{"key":"2001_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-023-04666-x","author":"A Sarwar","year":"2023","unstructured":"Sarwar A et al (2023) IoT networks attacks detection using multi-novel features and extra tree random\u2014voting ensemble classifier (ER-VEC). J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-023-04666-x","journal-title":"J Ambient Intell Human Comput"},{"issue":"16","key":"2001_CR36","doi-asserted-by":"publisher","first-page":"7721","DOI":"10.1007\/s00500-022-06750-4","volume":"26","author":"MY Alzahrani","year":"2022","unstructured":"Alzahrani MY, Bamhdi AM (2022) Hybrid deep-learning model to detect botnet attacks over internet of things environments. Soft Comput 26(16):7721\u20137735. https:\/\/doi.org\/10.1007\/s00500-022-06750-4","journal-title":"Soft Comput"},{"key":"2001_CR37","doi-asserted-by":"publisher","unstructured":"Hossen MdS, Ahmad T (2023) Traffic classification for botnet detection using deep learning. In: 2023 3rd international conference on smart cities, automation & intelligent computing systems (ICON-SONICS), Bali, Indonesia. IEEE. pp 218\u2013223. https:\/\/doi.org\/10.1109\/ICON-SONICS59898.2023.10435270","DOI":"10.1109\/ICON-SONICS59898.2023.10435270"},{"key":"2001_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109365","volume":"217","author":"Y Masoudi-Sobhanzadeh","year":"2022","unstructured":"Masoudi-Sobhanzadeh Y, Emami-Moghaddam S (2022) A real-time IoT-based botnet detection method using a novel two-step feature selection technique and the support vector machine classifier. Comput Netw 217:109365. https:\/\/doi.org\/10.1016\/j.comnet.2022.109365","journal-title":"Comput Netw"},{"key":"2001_CR39","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/j.comcom.2022.06.016","volume":"192","author":"M Alazab","year":"2022","unstructured":"Alazab M (2022) A discrete time-varying greywolf IoT botnet detection system. Comput Commun 192:405\u2013416. https:\/\/doi.org\/10.1016\/j.comcom.2022.06.016","journal-title":"Comput Commun"},{"issue":"11","key":"2001_CR40","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.3390\/electronics10111341","volume":"10","author":"A Alharbi","year":"2021","unstructured":"Alharbi A, Alosaimi W, Alyami H, Rauf HT, Dama\u0161evi\u010dius R (2021) Botnet attack detection using local global best bat algorithm for industrial internet of things. Electronics 10(11):1341. https:\/\/doi.org\/10.3390\/electronics10111341","journal-title":"Electronics"},{"key":"2001_CR41","series-title":"Communications in computer and information science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-981-16-8059-5_19","volume-title":"Advances in cyber security","author":"AA Hezam","year":"2021","unstructured":"Hezam AA, Mostafa SA, Ramli AA, Mahdin H, Khalaf BA (2021) Deep learning approach for detecting botnet attacks in IoT environment of multiple and heterogeneous sensors. In: Abdullah N, Manickam S, Anbar M (eds) Advances in cyber security, vol 1487. Communications in computer and information science. Springer, Singapore, pp 317\u2013328. https:\/\/doi.org\/10.1007\/978-981-16-8059-5_19"},{"key":"2001_CR42","doi-asserted-by":"publisher","unstructured":"Gandhi R, Li Y (2021) Comparing machine learning and deep learning for IoT botnet detection. In: 2021 IEEE international conference on smart computing (SMARTCOMP), Irvine, CA, USA. IEEE. pp 234\u2013239. https:\/\/doi.org\/10.1109\/SMARTCOMP52413.2021.00053","DOI":"10.1109\/SMARTCOMP52413.2021.00053"},{"key":"2001_CR43","series-title":"Communications in computer and information science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-030-94900-6_11","volume-title":"Information systems security and privacy","author":"A Guerra-Manzanares","year":"2022","unstructured":"Guerra-Manzanares A, Medina-Galindo J, Bahsi H, N\u00f5mm S (2022) Using MedBIoT dataset to build effective machine learning-based IoT botnet detection systems. In: Furnell S, Mori P, Weippl E, Camp O (eds) Information systems security and privacy, vol 1545. Communications in computer and information science. Springer International Publishing, Cham, pp 222\u2013243"},{"key":"2001_CR44","doi-asserted-by":"publisher","unstructured":"Guerra-Manzanares A, Medina-Galindo J, Bahsi H, N\u00f5mm S (2022) MedBIoT: generation of an IoT botnet dataset in a medium-sized IoT network. In: Proceedings of the 6th international conference on information systems security and privacy, Valletta, Malta. SCITEPRESS\u2014Science and Technology Publications. pp 207\u2013218. https:\/\/doi.org\/10.5220\/0009187802070218","DOI":"10.5220\/0009187802070218"},{"issue":"10","key":"2001_CR45","doi-asserted-by":"publisher","first-page":"3646","DOI":"10.3390\/s22103646","volume":"22","author":"K Malik","year":"2022","unstructured":"Malik K, Rehman F, Maqsood T, Mustafa S, Khalid O, Akhunzada A (2022) Lightweight internet of things botnet detection using one-class classification. Sensors 22(10):3646. https:\/\/doi.org\/10.3390\/s22103646","journal-title":"Sensors"},{"issue":"5","key":"2001_CR46","first-page":"1310","volume":"17","author":"D Stiawan","year":"2023","unstructured":"Stiawan D, Susanto, Bimantara A, Idris MY, Budiarto R (2023) IoT botnet attack detection using deep autoencoder and artificial neural networks. KSII Trans Internet Inf Syst 17(5):1310\u20131338","journal-title":"KSII Trans Internet Inf Syst"},{"key":"2001_CR47","doi-asserted-by":"publisher","first-page":"94518","DOI":"10.1109\/ACCESS.2022.3204001","volume":"10","author":"R Kalakoti","year":"2022","unstructured":"Kalakoti R, Nomm S, Bahsi H (2022) In-depth feature selection for the statistical machine learning-based botnet detection in IoT networks. IEEE Access 10:94518\u201394535. https:\/\/doi.org\/10.1109\/ACCESS.2022.3204001","journal-title":"IEEE Access"},{"key":"2001_CR48","doi-asserted-by":"publisher","first-page":"48753","DOI":"10.1109\/ACCESS.2021.3060778","volume":"9","author":"WNH Ibrahim","year":"2021","unstructured":"Ibrahim WNH et al (2021) Multilayer framework for botnet detection using machine learning algorithms. IEEE Access 9:48753\u201348768. https:\/\/doi.org\/10.1109\/ACCESS.2021.3060778","journal-title":"IEEE Access"},{"issue":"1","key":"2001_CR49","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1186\/s40537-024-00900-1","volume":"11","author":"MAR Putra","year":"2024","unstructured":"Putra MAR, Ahmad T, Hostiadi DP (2024) B-CAT: a model for detecting botnet attacks using deep attack behavior analysis on network traffic flows. J Big Data 11(1):49. https:\/\/doi.org\/10.1186\/s40537-024-00900-1","journal-title":"J Big Data"},{"issue":"3","key":"2001_CR50","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan Y et al (2018) N-BaIoT\u2014network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput 17(3):12\u201322. https:\/\/doi.org\/10.1109\/MPRV.2018.03367731","journal-title":"IEEE Pervasive Comput"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-02001-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-02001-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-02001-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T13:33:26Z","timestamp":1758807206000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-02001-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,21]]},"references-count":50,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2001"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-02001-9","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,21]]},"assertion":[{"value":"22 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflicts of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"422"}}