{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:57:19Z","timestamp":1773482239379,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Data Sci Anal"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s41060-025-00922-9","type":"journal-article","created":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T07:52:32Z","timestamp":1764575552000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing network intrusion detection using graph convolutional networks fused with traditional systems"],"prefix":"10.1007","volume":"21","author":[{"given":"Patrick","family":"Ansah","sequence":"first","affiliation":[]},{"given":"Caroline","family":"John","sequence":"additional","affiliation":[]},{"given":"Sumit Kumar","family":"Tetarave","sequence":"additional","affiliation":[]},{"given":"Ezhil","family":"Kalaimannan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,1]]},"reference":[{"issue":"1","key":"922_CR1","first-page":"1","volume":"4","author":"S Anwar","year":"2021","unstructured":"Anwar, S., Mohay, G., Woodward, A., Bitrus, M.C.: Protecting cybersecurity systems using machine learning. Cybersecurity 4(1), 1\u201317 (2021)","journal-title":"Cybersecurity"},{"key":"922_CR2","volume":"105","author":"L Buczek","year":"2021","unstructured":"Buczek, L., Jelen, P., Flizikowski, J., Ho\u0142ubowicz, W., Krawczyk, N., Palka, D., Gewali, L.: Anomaly detection models for network security in 5G systems. Comput. Secur. 105, 102283 (2021)","journal-title":"Comput. Secur."},{"key":"922_CR3","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1186\/s42400-024-00296-8","volume":"8","author":"Y Wang","year":"2025","unstructured":"Wang, Y., Han, Z., Du, Y., Li, J., He, X.: BS-GAT: a network intrusion detection system based on graph neural network for edge computing. Cybersecurity 8, 27 (2025). https:\/\/doi.org\/10.1186\/s42400-024-00296-8","journal-title":"Cybersecurity"},{"key":"922_CR4","unstructured":"Zhang, M., Chen, Y.: Link prediction based on graph neural networks. In Advances in Neural Information Processing Systems (NeurIPS) (pp. 5165-5175) (2018)"},{"key":"922_CR5","unstructured":"Zhou, Z., Li, Z., Chen, J., Zuo, W.: Towards more accurate anomaly detection with graph neural networks. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI) (2020)"},{"key":"922_CR6","first-page":"60268","volume":"9","author":"Z Sun","year":"2021","unstructured":"Sun, Z., Cheng, Z., Chen, L., Chen, L., Ding, W.: Learning to detect network intrusion using graph convolutional networks. IEEE Access 9, 60268\u201360277 (2021)","journal-title":"IEEE Access"},{"issue":"6","key":"922_CR7","doi-asserted-by":"publisher","first-page":"499","DOI":"10.3390\/info16060499","volume":"16","author":"T Ngo","year":"2025","unstructured":"Ngo, T., Yin, J., Ge, Y.-F., Wang, H.: Optimizing IoT intrusion detection-A graph neural network approach with attribute-based graph construction. Information 16(6), 499 (2025). https:\/\/doi.org\/10.3390\/info16060499","journal-title":"Information"},{"key":"922_CR8","doi-asserted-by":"publisher","first-page":"20511","DOI":"10.1038\/s41598-025-07956-w","volume":"15","author":"V Govindarajan","year":"2025","unstructured":"Govindarajan, V., Muzamal, J.H.: Advanced cloud intrusion detection framework using graph-based features, transformers and contrastive learning. Sci. Rep. 15, 20511 (2025). https:\/\/doi.org\/10.1038\/s41598-025-07956-w","journal-title":"Sci. Rep."},{"key":"922_CR9","unstructured":"Velickovic, P., Cucurull, G., Casanova, A., Romero, A., Li\u00f3, P., Bengio, Y.: Graph attention networks. In International Conference on Learning Representations (ICLR) (2018)"},{"key":"922_CR10","unstructured":"Wang, D., Cui, P., Zhu, W., Yang, X.: Deep graph convolutional autoencoder for network anomaly detection. IEEE Transactions on Network Science and Engineering (2022)"},{"key":"922_CR11","doi-asserted-by":"crossref","unstructured":"Sarhan, Mohanad, Siamak Layeghy, Nour Moustafa, and Marius Portmann. NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systems. In Big Data Technologies and Applications: 10th EAI International Conference, BDTA 2020, and 13th EAI International Conference on Wireless Internet, WiCON 2020, Virtual Event, December 11, 2020, Proceedings (p. 117). Springer Nature","DOI":"10.1007\/978-3-030-72802-1_9"},{"key":"922_CR12","doi-asserted-by":"publisher","unstructured":"Ansah, P., Tetarave, S.K., Kalaimannan, E., Dash, B.B., John, C.: \u201cEnhancing Network Security Through Proactive Anomaly Detection: A Comparative Study of Auto-Encoder Models and K-Nearest Neighbours Algorithm\u201d: 3rd Intelligent Cybersecurity Conference (ICSC). San Antonio, TX, USA 2023, 119\u2013126 (2023). https:\/\/doi.org\/10.1109\/ICSC60084.2023.10349990","DOI":"10.1109\/ICSC60084.2023.10349990"},{"key":"922_CR13","doi-asserted-by":"publisher","unstructured":"Shen, Z., Guo, X., Feng, B., Cheng, H., Ni, S., Dong, H., Adversarial learning based residual variational graph normalized autoencoder for network representation, Information Sciences, Volume 640,: 119055. ISSN 0020\u20130255,(2023). https:\/\/doi.org\/10.1016\/j.ins.2023.119055","DOI":"10.1016\/j.ins.2023.119055"},{"key":"922_CR14","doi-asserted-by":"crossref","unstructured":"Yuening Li, Xiao Huang, Jundong Li, Mengnan Du, and Na Zou. 2019. SpecAE: Spectral AutoEncoder for Anomaly Detection in Attributed Networks. In Proceedings of the 28th ACM International Conference on Information and Knowledge Management (CIKM \u201919). ACM, New York, NY, USA, 2233\u20132236. https:\/\/doi.org\/10.1145\/3357384.3358074","DOI":"10.1145\/3357384.3358074"},{"key":"922_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, K., Lu, G., Li, Y., Xu, C.: A Graph Autoencoder-based Anomaly Detection Method for Attributed Networks. In 2023 5th International Conference on Natural Language Processing (ICNLP) (pp. 330-337). IEEE (2023)","DOI":"10.1109\/ICNLP58431.2023.00067"},{"key":"922_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106717","volume":"126","author":"P Zhang","year":"2023","unstructured":"Zhang, P., Zhang, Y., Wang, J., Yin, B.: MVMA-GCN: multi-view multi-layer attention graph convolutional networks. Eng. Appl. Artif. Intell. 126, 106717 (2023)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"922_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110725","volume":"275","author":"Y Shi","year":"2023","unstructured":"Shi, Y., Wang, B., Yu, Y., Tang, X., Huang, C., Dong, J.: Robust anomaly detection for multivariate time series through temporal GCNs and attention-based VAE. Knowl. Based Syst. 275, 110725 (2023)","journal-title":"Knowl. Based Syst."},{"key":"922_CR18","doi-asserted-by":"crossref","unstructured":"Idrissi, M. J., Alami, H., El Mahdaouy, A., El Mekki, A., Oualil, S., Yartaoui, Z., Berrada, I.: FedANIDS: Federated learning for anomaly-based network intrusion detection systems. Expert Systems with Applications, 11 (2023)","DOI":"10.1016\/j.eswa.2023.121000"},{"issue":"24","key":"922_CR19","first-page":"7924","volume":"24","author":"G Volpe","year":"2024","unstructured":"Volpe, G., et al.: A petri net and LSTM hybrid approach for intrusion detection. Sens. Explicitly Removes Highly Correlated Features During Preproces. 24(24), 7924 (2024)","journal-title":"Sens. Explicitly Removes Highly Correlated Features During Preproces."},{"key":"922_CR20","unstructured":"scikit-learn Preprocessing (StandardScaler \/ OneHotEncoder): \u201c7.3. Preprocessing data,\u201d scikit-learn 1.7 (stable docs)"},{"key":"922_CR21","unstructured":"Hanberry, B. B.: A practical guide for retaining correlated variables. Ecological Informatics. (endorses $$r $$ 0.8 thresholds pragmatically) (2024)"},{"issue":"16","key":"922_CR22","doi-asserted-by":"publisher","first-page":"2553","DOI":"10.3390\/math12162553","volume":"12","author":"F Bolikulov","year":"2024","unstructured":"Bolikulov, F., et al.: Effective methods of categorical data encoding for ML. Mathematics 12(16), 2553 (2024)","journal-title":"Mathematics"},{"key":"922_CR23","doi-asserted-by":"crossref","unstructured":"Chen, W., et al. A survey on imbalanced learning: latest research. Artificial Intelligence Review (2024)","DOI":"10.1007\/s10462-024-10759-6"},{"key":"922_CR24","unstructured":"Jin, D., et al. Anomaly Detection in Dynamic Graphs: A Comprehensive Survey. ACM Computing Surveys (2024)"},{"key":"922_CR25","unstructured":"Jin, M., et al. (2023). A Survey on Graph Neural Networks for Time Series (incl. anomaly detection). arXiv:2307.03759"},{"key":"922_CR26","doi-asserted-by":"crossref","unstructured":"Filipov, V. A., Archambault, D., Hurter, C., Telea, A.: Are We There Yet? A Roadmap of Network Visualization from Surveys to Task Taxonomies. Computer Graphics Forum. (State-of-the-art survey on network visualization and its analytical value.) (2023)","DOI":"10.1111\/cgf.14794"},{"key":"922_CR27","unstructured":"NetworkX 3.5 documentation - Centrality (closeness, betweenness, degree, eigenvector, current-flow\/information). (Authoritative, up-to-date API definitions aligned with your implementation.)"},{"key":"922_CR28","doi-asserted-by":"crossref","unstructured":"Meshcheryakova, N., et al. A Comparative Analysis of Centrality Measures in Complex Networks. Automation and Remote Control. (Modern comparative\/axiomatic treatment.) (2024)","DOI":"10.1134\/S0005117924700127"},{"key":"922_CR29","unstructured":"Zhao, X., et al. Critical nodes identification in complex networks: a survey. Complex Engineering Systems. (Covers betweenness\/closeness\/eigenvector use for identifying key nodes.) (2025)"},{"key":"922_CR30","unstructured":"Xiong, L., et al. Temporal betweenness centrality on shortest-walks variants. Applied Network Science. (Up-to-date perspective on betweenness and algorithmics.) (2024)"},{"issue":"2","key":"922_CR31","first-page":"292","volume":"13","author":"A Stellato","year":"2024","unstructured":"Stellato, A., et al.: Effectiveness of centrality measures for competitive influence maximization. Math. Empir. Eff. Degree Close. Eigenvector 13(2), 292 (2024)","journal-title":"Math. Empir. Eff. Degree Close. Eigenvector"},{"key":"922_CR32","unstructured":"NetworkX 3.5 documentation - information_centrality (current-flow variant). (Practical definition + solver options; matches your use.)"},{"key":"922_CR33","doi-asserted-by":"crossref","unstructured":"Cheng, X., et al. Research on the Statistical Properties and Stability of Complex Network Centrality Measures. Complexity (Wiley\/Hindawi). (Modern discussion of robustness\/stability.) (2024)","DOI":"10.1155\/2024\/9220756"},{"key":"922_CR34","doi-asserted-by":"crossref","unstructured":"U\u01e7urlu, O., et al. Comparative analysis of centrality measures for identifying influential nodes. Journal of Computational Science. (Recent, well-cited comparative study.) (2022)","DOI":"10.1016\/j.jocs.2022.101738"},{"key":"922_CR35","doi-asserted-by":"publisher","first-page":"81118","DOI":"10.1109\/ACCESS.2025.3566980","volume":"13","author":"YK Saheed","year":"2025","unstructured":"Saheed, Y.K., Chukwuere, J.E.: CPS-IIoT-P2Attention: explainable privacy-preserving with scaled dot-product attention in cyber-physical system-industrial IoT network. IEEE Access 13, 81118\u201381129 (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3566980","journal-title":"IEEE Access"},{"key":"922_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115939","volume":"191","author":"YK Saheed","year":"2025","unstructured":"Saheed, Y.K., Misra, S.: CPS-IoT-PPDNN: A new explainable privacy preserving DNN for resilient anomaly detection in Cyber-Physical Systems-enabled IoT networks. Chaos, Solitons & Fractals 191, 115939 (2025). https:\/\/doi.org\/10.1016\/j.chaos.2024.115939","journal-title":"Chaos, Solitons & Fractals"},{"key":"922_CR37","doi-asserted-by":"publisher","unstructured":"Saheed, Y.K., Misra, S., Chockalingam, S.: Autoencoder via DCNN and LSTM models for intrusion detection in industrial control systems of critical infrastructures. IEEE\/ACM Encycris Workshop (2023). https:\/\/doi.org\/10.1109\/EnCyCriS59249.2023.00006","DOI":"10.1109\/EnCyCriS59249.2023.00006"},{"key":"922_CR38","doi-asserted-by":"publisher","first-page":"55","DOI":"10.3233\/JHS-200630","volume":"26","author":"KM Sudar","year":"2020","unstructured":"Sudar, K.M., Deepalakshmi, P.: A two level security mechanism to detect a DDoS flooding attack in software-defined networks using entropy-based and C4.5 technique. J. High Speed Netw 26, 55\u201376 (2020). https:\/\/doi.org\/10.3233\/JHS-200630","journal-title":"J. High Speed Netw"}],"container-title":["International Journal of Data Science and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-025-00922-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41060-025-00922-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-025-00922-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:36:57Z","timestamp":1773481017000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41060-025-00922-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,1]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["922"],"URL":"https:\/\/doi.org\/10.1007\/s41060-025-00922-9","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-5284823\/v1","asserted-by":"object"}]},"ISSN":["2364-415X","2364-4168"],"issn-type":[{"value":"2364-415X","type":"print"},{"value":"2364-4168","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,1]]},"assertion":[{"value":"17 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"31"}}