{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:57:22Z","timestamp":1773482242247,"version":"3.50.1"},"reference-count":104,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T00:00:00Z","timestamp":1766016000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T00:00:00Z","timestamp":1766016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Data Sci Anal"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s41060-025-00980-z","type":"journal-article","created":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:36:47Z","timestamp":1766068607000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Scalable and generalizable AI-based intrusion detection in AIoT: a review and lightweight ensemble solution"],"prefix":"10.1007","volume":"21","author":[{"given":"Shayma Wail","family":"Nourildean","sequence":"first","affiliation":[]},{"given":"Wafa","family":"Mefteh","sequence":"additional","affiliation":[]},{"given":"Ali Mohsen","family":"Frihida","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,18]]},"reference":[{"key":"980_CR1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9781271","author":"TW Sung","year":"2021","unstructured":"Sung, T.W., Tsai, P.W., Gaber, T., Lee, C.Y.: Artificial intelligence of things (AIoT) technologies and applications. Wirel. Commun. Mob. Comput. (2021). https:\/\/doi.org\/10.1155\/2021\/9781271","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"980_CR2","doi-asserted-by":"publisher","unstructured":"Kataria, A., Rani, S., Kautish, S.: Artificial Intelligence of Things for sustainable development of smart city infrastructures. (2024). https:\/\/doi.org\/10.1007\/978-3-031-68427-2_10","DOI":"10.1007\/978-3-031-68427-2_10"},{"key":"980_CR3","doi-asserted-by":"publisher","unstructured":"Nazir, A. et al.: Advancing IoT security: a systematic review of machine learning approaches for the detection of IoT botnets. J. King Saud Univ. Comput. Inf. Sci., 35(10), 1\u201332, 2023, https:\/\/doi.org\/10.1016\/j.jksuci.2023.101820.","DOI":"10.1016\/j.jksuci.2023.101820"},{"issue":"4","key":"980_CR4","first-page":"122","volume":"8","author":"MZG Resul Da\u00b8s","year":"2021","unstructured":"Resul Da\u00b8s, M.Z.G.: Analysis of cyber-attacks in IoT-based critical infrastructures. Int. J. Inf. Secur. Sci. 8(4), 122\u2013133 (2021)","journal-title":"Int. J. Inf. Secur. Sci."},{"issue":"7","key":"980_CR5","first-page":"1","volume":"1","author":"M Kuzlu","year":"2021","unstructured":"Kuzlu, M., Fair, C., Guler, O.: Role of artificial intelligence in the Internet of Things (IoT) cybersecurity. Discov. Internet Things 1(7), 1\u201314 (2021)","journal-title":"Discov. Internet Things"},{"issue":"1","key":"980_CR6","doi-asserted-by":"publisher","first-page":"19610","DOI":"10.48084\/etasr.9464","volume":"15","author":"SW Nourildean","year":"2025","unstructured":"Nourildean, S.W., Mefteh, W., Frihida, A.M.: DTXG-RF-based intrusion detection system for artificial IoT cyber attacks. Eng. Technol. Appl. Sci. Res. 15(1), 19610\u201319614 (2025). https:\/\/doi.org\/10.48084\/etasr.9464","journal-title":"Eng. Technol. Appl. Sci. Res."},{"issue":"1","key":"980_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-018-0123-6","volume":"7","author":"MF Elrawy","year":"2018","unstructured":"Elrawy, M.F., Awad, A.I., Hamed, H.F.A.: Intrusion detection systems for IoT-based smart environments: a survey. J. Cloud Comput. 7(1), 1\u201320 (2018). https:\/\/doi.org\/10.1186\/s13677-018-0123-6","journal-title":"J. Cloud Comput."},{"key":"980_CR8","doi-asserted-by":"publisher","DOI":"10.3390\/app13095427","author":"S Alosaimi","year":"2023","unstructured":"Alosaimi, S., Almutairi, S.M.: An intrusion detection system using BoT-IoT. Appl. Sci. (2023). https:\/\/doi.org\/10.3390\/app13095427","journal-title":"Appl. Sci."},{"issue":"5","key":"980_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/978-1-6684-8098-4.ch022","volume":"6","author":"MNO Sadiku","year":"2020","unstructured":"Sadiku, M.N.O., Fagbohungbe, O.I., Musa, S.M.: Artificial intelligence in cyber security. Int. J. Eng. Res. Adv. Technol. 6(5), 1\u20137 (2020). https:\/\/doi.org\/10.4018\/978-1-6684-8098-4.ch022","journal-title":"Int. J. Eng. Res. Adv. Technol."},{"key":"980_CR10","doi-asserted-by":"publisher","DOI":"10.3390\/app122211752","author":"P Vanin","year":"2022","unstructured":"Vanin, P., et al.: A study of network intrusion detection systems using artificial intelligence\/machine learning. Appl. Sci. (2022). https:\/\/doi.org\/10.3390\/app122211752","journal-title":"Appl. Sci."},{"issue":"2","key":"980_CR11","first-page":"510","volume":"6","author":"MF Naaz","year":"2021","unstructured":"Naaz, M.F., G, P.K., Lakshmi, P.P.: Application of artificial intelligence on internet of things (IOT). J. Emerg. Technol. Innov. Res. 6(2), 510\u2013514 (2021)","journal-title":"J. Emerg. Technol. Innov. Res."},{"key":"980_CR12","doi-asserted-by":"publisher","unstructured":"B. Chander, S. Pal, D. De, and R. Buyya, Artificial Intelligence-based Internet of Things for Industry 5.0, no. January. 2022. https:\/\/doi.org\/10.1007\/978-3-030-87059-1_1.","DOI":"10.1007\/978-3-030-87059-1_1"},{"key":"980_CR13","doi-asserted-by":"publisher","unstructured":"Atlam, H.F., Walters, R.J., Wills, G.B.: Intelligence of things: Opportunities challenges. In: 3rd Cloudification of the Internet of Things Conference, CIoT 2018, IEEE. pp. 1\u20136. (2019). https:\/\/doi.org\/10.1109\/CIOT.2018.8627114","DOI":"10.1109\/CIOT.2018.8627114"},{"key":"980_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s22082931","volume":"22","author":"H Nozari","year":"2022","unstructured":"Nozari, H., Szmelter-jarosz, A., Ghahremani-nahr, J.: Analysis of the challenges of artificial intelligence of things (AIoT) for the smart supply chain (case study: FMCG industries). Sensors 22, 1\u201318 (2022)","journal-title":"Sensors"},{"issue":"3","key":"980_CR15","first-page":"94","volume":"6","author":"PRRKD Venkatesh Naganathan","year":"2018","unstructured":"Venkatesh Naganathan, P.R.R.K.D.: The evolution of internet of things: bringing the power of artificial intelligence to IoT, its opportunities and challenges. Int. J. Comput. Sci. Trends Technol. 6(3), 94\u2013108 (2018)","journal-title":"Int. J. Comput. Sci. Trends Technol."},{"key":"980_CR16","doi-asserted-by":"publisher","unstructured":"El-Gendy, S.: IoT based AI and its implementations in industries. In: Proceedings of ICCES 2020\u20132020 15th International Conference on Computer Engineering and Systems, pp. 1\u20136. (2020). https:\/\/doi.org\/10.1109\/ICCES51560.2020.9334627.","DOI":"10.1109\/ICCES51560.2020.9334627"},{"issue":"5","key":"980_CR17","doi-asserted-by":"publisher","first-page":"101532","DOI":"10.1016\/j.jksuci.2023.03.010","volume":"35","author":"Y Kayode Saheed","year":"2023","unstructured":"Kayode Saheed, Y., Harazeem Abdulganiyu, O., Ait Tchakoucht, T.: A novel hybrid ensemble learning for anomaly detection in industrial sensor networks and SCADA systems for smart city infrastructures. J. King Saud Univ. - Comput. Inf. Sci. 35(5), 101532 (2023). https:\/\/doi.org\/10.1016\/j.jksuci.2023.03.010","journal-title":"J. King Saud Univ. - Comput. Inf. Sci."},{"key":"980_CR18","doi-asserted-by":"publisher","first-page":"38859","DOI":"10.1109\/ACCESS.2021.3059858","volume":"9","author":"HK Bharadwaj","year":"2021","unstructured":"Bharadwaj, H.K., et al.: A review on the role of machine learning in enabling IoT based healthcare applications. IEEE Access 9, 38859\u201338890 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3059858","journal-title":"IEEE Access"},{"issue":"10","key":"980_CR19","doi-asserted-by":"publisher","first-page":"984","DOI":"10.3844\/jcssp.2021.984.999","volume":"17","author":"S Katiyar","year":"2021","unstructured":"Katiyar, S., Farhana, A.: Smart agriculture: the future of agriculture using AI and IoT. J. Comput. Sci. 17(10), 984\u2013999 (2021). https:\/\/doi.org\/10.3844\/jcssp.2021.984.999","journal-title":"J. Comput. Sci."},{"issue":"07","key":"980_CR20","doi-asserted-by":"publisher","first-page":"110","DOI":"10.17577\/ijertv9is070080","volume":"9","author":"Aman Kumar Dewangan","year":"2020","unstructured":"Aman Kumar Dewangan: Application of IoT and machine learning in agriculture. Int. J. Eng. Res. Technol. 9(07), 110\u2013114 (2020). https:\/\/doi.org\/10.17577\/ijertv9is070080","journal-title":"Int. J. Eng. Res. Technol."},{"key":"980_CR21","doi-asserted-by":"publisher","unstructured":"Anand Sharma, S.B., Jangir, S.K., Kumar, M., Choubey, D.K., Shrivastava, T.: Industrial Internet of Things Technologies and Research Directions. (2022). https:\/\/doi.org\/10.1201\/9781003145004-1","DOI":"10.1201\/9781003145004-1"},{"key":"980_CR22","doi-asserted-by":"publisher","unstructured":"Khayyam, H., Javadi, B., Jalili, M., Jazar, R.N.: Artificial intelligence and internet of things for autonomous vehicles. In: Nonlinear Approaches in Engineering Applications, pp. 1\u201331 (2020). https:\/\/doi.org\/10.1007\/978-3-030-18963-1","DOI":"10.1007\/978-3-030-18963-1"},{"issue":"4","key":"980_CR23","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1049\/trit.2018.1008","volume":"3","author":"A Ghosh","year":"2018","unstructured":"Ghosh, A., Chakraborty, D., Law, A.: Artificial intelligence in Internet of things. CAAI Trans. Intell. Technol. 3(4), 208\u2013218 (2018). https:\/\/doi.org\/10.1049\/trit.2018.1008","journal-title":"CAAI Trans. Intell. Technol."},{"issue":"4","key":"980_CR24","doi-asserted-by":"publisher","first-page":"253","DOI":"10.48009\/4_iis_2020_253-263","volume":"21","author":"T Zewdie","year":"2020","unstructured":"Zewdie, T., Girma, A.: Iot security and the role of AI\/Ml to combat emerging cyber threats in cloud computing environment. Issues Inf. Syst. 21(4), 253\u2013263 (2020). https:\/\/doi.org\/10.48009\/4_iis_2020_253-263","journal-title":"Issues Inf. Syst."},{"key":"980_CR25","doi-asserted-by":"publisher","unstructured":"Nourildean, S.W., Mefteh, W., Frihida, A.A.M.: Intrusion detection system based artificial intelligence to improve cyber security of IoT network. In: Lecture notes in networks and systems, pp. 602\u2013611. (2026). https:\/\/doi.org\/10.1007\/978-3-032-03769-5_45.","DOI":"10.1007\/978-3-032-03769-5_45"},{"issue":"3","key":"980_CR26","first-page":"2297","volume":"7","author":"A Karn","year":"2021","unstructured":"Karn, A.: Applications of artificial intelligence in IoT and sensor networks: a survey. Int. J. Adv. Res. Ideas Innov. Technol. 7(3), 2297\u20132300 (2021)","journal-title":"Int. J. Adv. Res. Ideas Innov. Technol."},{"issue":"3","key":"980_CR27","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1007\/s43538-024-00372-0","volume":"91","author":"R Ji","year":"2025","unstructured":"Ji, R., Kumar, N., Padha, D.: CNN-GWO-voting & hybrid: ensemble learning inspired intrusion detection approaches for cyber-physical systems. Proc. Indian Natl. Sci. Acad. 91(3), 848\u2013862 (2025). https:\/\/doi.org\/10.1007\/s43538-024-00372-0","journal-title":"Proc. Indian Natl. Sci. Acad."},{"issue":"4","key":"980_CR28","doi-asserted-by":"publisher","first-page":"975","DOI":"10.3745\/JIPS.03.0144","volume":"16","author":"JCS Sicato","year":"2020","unstructured":"Sicato, J.C.S., Singh, S.K., Rathore, S., Park, J.H.: A comprehensive analyses of intrusion detection system for IoT environment. J. Inf. Process. Syst. 16(4), 975\u2013990 (2020). https:\/\/doi.org\/10.3745\/JIPS.03.0144","journal-title":"J. Inf. Process. Syst."},{"issue":"8","key":"980_CR29","doi-asserted-by":"publisher","first-page":"13491","DOI":"10.3934\/mbe.2023602","volume":"20","author":"NW Khan","year":"2023","unstructured":"Khan, N.W., et al.: A hybrid deep learning-based intrusion detection system for IoT networks. Math. Biosci. Eng. 20(8), 13491\u201313520 (2023). https:\/\/doi.org\/10.3934\/mbe.2023602","journal-title":"Math. Biosci. Eng."},{"key":"980_CR30","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00077-7","author":"A Khraisat","year":"2021","unstructured":"Khraisat, A., Alazab, A.: A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity (2021). https:\/\/doi.org\/10.1186\/s42400-021-00077-7","journal-title":"Cybersecurity"},{"issue":"1","key":"980_CR31","first-page":"297","volume":"101","author":"R Hdidou","year":"2024","unstructured":"Hdidou, R., El Alami, M.: Intrusion detection systems in internet of things: a recent state of the art. J. Theor. Appl. Inf. Technol. 101(1), 297\u2013317 (2024)","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"980_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/s43926-023-00034-5","author":"M Bhavsar","year":"2023","unstructured":"Bhavsar, M., Roy, K., Kelly, J., Olusola, O.: Anomaly-based intrusion detection system for IoT application. Discover Internet Things (2023). https:\/\/doi.org\/10.1007\/s43926-023-00034-5","journal-title":"Discover Internet Things"},{"key":"980_CR33","doi-asserted-by":"publisher","unstructured":"Nourildean, S.W.: Artificial Internet of Things (AIoT): a review. In: International Conference on Electrical Computer and Energy Technologies Icecet 2024, 2024. https:\/\/doi.org\/10.1109\/ICECET61485.2024.10698612","DOI":"10.1109\/ICECET61485.2024.10698612"},{"issue":"7","key":"980_CR34","doi-asserted-by":"publisher","first-page":"43","DOI":"10.36713\/epra2013","volume":"8","author":"A J","year":"2022","unstructured":"J, A., A, A.H.: Investigation on intrusion detection systems in IoT 1Mrs. EPRA Int. J. Multidiscip. Res. (IJMR)-Peer Rev. J. 8(7), 43\u201351 (2022). https:\/\/doi.org\/10.36713\/epra2013","journal-title":"EPRA Int. J. Multidiscip. Res. (IJMR)-Peer Rev. J."},{"issue":"30","key":"980_CR35","doi-asserted-by":"publisher","first-page":"3069","DOI":"10.17485\/ijst\/v17i30.1794","volume":"17","author":"R Ji","year":"2024","unstructured":"Ji, R., Kumar, N., Padha, D.: Hybrid enhanced intrusion detection frameworks for cyber-physical systems via optimal features selection. Indian J. Sci. Technol. 17(30), 3069\u20133079 (2024). https:\/\/doi.org\/10.17485\/ijst\/v17i30.1794","journal-title":"Indian J. Sci. Technol."},{"key":"980_CR36","doi-asserted-by":"crossref","unstructured":"Ji, R., Selwal, A., Kumar, N., Padha, D.: Cascading bagging and boosting ensemble methods for intrusion detection in cyber-physical systems. Secur. Priv. 8(1) (2024)","DOI":"10.1002\/spy2.497"},{"issue":"1","key":"980_CR37","doi-asserted-by":"publisher","first-page":"53","DOI":"10.21928\/uhdjst.v7n1y2023.pp53-65","volume":"7","author":"AR Abdulla","year":"2023","unstructured":"Abdulla, A.R., Jameel, N.G.M.: A review on IoT intrusion detection systems using supervised machine learning: techniques, datasets, and algorithms. UHD J. Sci. Technol. 7(1), 53\u201365 (2023). https:\/\/doi.org\/10.21928\/uhdjst.v7n1y2023.pp53-65","journal-title":"UHD J. Sci. Technol."},{"issue":"2","key":"980_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-022-01043-x","volume":"3","author":"IH Sarker","year":"2022","unstructured":"Sarker, I.H.: AI-based modeling: techniques, applications and research issues towards automation, intelligent and smart systems. SN Comput. Sci. 3(2), 1\u201320 (2022). https:\/\/doi.org\/10.1007\/s42979-022-01043-x","journal-title":"SN Comput. Sci."},{"issue":"2","key":"980_CR39","first-page":"602","volume":"102","author":"R Hdidou","year":"2024","unstructured":"Hdidou, R., El Alami, M.: Advancements in intrusion detection systems for internet of things: a state-of-the-art and comprehensive analysis of machine learning algorithms. J. Theor. Appl. Inf. Technol. 102(2), 602\u2013618 (2024)","journal-title":"J. Theor. Appl. Inf. Technol."},{"issue":"20","key":"980_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics12204289","volume":"12","author":"B Xu","year":"2023","unstructured":"Xu, B., Sun, L., Mao, X., Ding, R., Liu, C.: IoT intrusion detection system based on machine learning. Electron. 12(20), 1\u201321 (2023). https:\/\/doi.org\/10.3390\/electronics12204289","journal-title":"Electron."},{"key":"980_CR41","doi-asserted-by":"publisher","first-page":"105248","DOI":"10.1016\/j.cageo.2022.105248","volume":"170","author":"G Sarailidis","year":"2023","unstructured":"Sarailidis, G., Wagener, T., Pianosi, F.: Integrating scientific knowledge into machine learning using interactive decision trees. Comput. Geosci. 170, 105248 (2023). https:\/\/doi.org\/10.1016\/j.cageo.2022.105248","journal-title":"Comput. Geosci."},{"key":"980_CR42","doi-asserted-by":"crossref","unstructured":"Saheed, O., Ait, H.A., Ait, T., chakouchtAhmed El Hilali, El Hilali, A., Kayode, A.: Attention-driven multi-model architecture for unbalanced network traffic intrusion detection via extreme gradient boosting. Intell. Syst. with Appl. 26(5) (2025)","DOI":"10.1016\/j.iswa.2025.200519"},{"issue":"1","key":"980_CR43","doi-asserted-by":"publisher","first-page":"12","DOI":"10.11613\/BM.2014.003","volume":"24","author":"S Sperandei","year":"2014","unstructured":"Sperandei, S.: Understanding logistic regression analysis. Biochem. Medica 24(1), 12\u201318 (2014). https:\/\/doi.org\/10.11613\/BM.2014.003","journal-title":"Biochem. Medica"},{"issue":"1","key":"980_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18063\/ieac.v1i1.770","volume":"1","author":"J Sun","year":"2018","unstructured":"Sun, J., Du, W., Shi, N.: A survey of kNN algorithm. Inf. Eng. Appl. Comput. 1(1), 1\u201310 (2018). https:\/\/doi.org\/10.18063\/ieac.v1i1.770","journal-title":"Inf. Eng. Appl. Comput."},{"issue":"3","key":"980_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-981-15-0978-0","volume":"16","author":"MDM Manessa","year":"2020","unstructured":"Manessa, M.D.M., Setiawan, K.T., Haidar, M., Supriatna, S., Pataropura, A., Supardjo, A.H.: Optimization of the random forest algorithm for multispectral derived bathymetry. Int. J. Geoinf. 16(3), 1\u20136 (2020). https:\/\/doi.org\/10.1007\/978-981-15-0978-0","journal-title":"Int. J. Geoinf."},{"issue":"3","key":"980_CR46","doi-asserted-by":"publisher","first-page":"2277","DOI":"10.1007\/s00500-020-05297-6","volume":"25","author":"I Wickramasinghe","year":"2021","unstructured":"Wickramasinghe, I., Kalutarage, H.: Naive bayes: applications, variations and vulnerabilities: a review of literature with code snippets for implementation. Soft. Comput. 25(3), 2277\u20132293 (2021). https:\/\/doi.org\/10.1007\/s00500-020-05297-6","journal-title":"Soft. Comput."},{"key":"980_CR47","unstructured":"Prokhorenkova, L., Gusev, G., Vorobev, A., Dorogush, A.V., Gulin, A.: Catboost: Unbiased boosting with categorical features. Adv. Neural Inf. Process. Syst. 2018-Decem, no. Section 4, pp. 6638\u20136648, (2018)"},{"key":"980_CR48","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4748528","author":"X Yang","year":"2022","unstructured":"Yang, X., Peng, G., Zhang, D., Lv, Y.: An enhanced intrusion detection system for IoT networks based on deep learning and knowledge graph. Secur. Commun. Networks (2022). https:\/\/doi.org\/10.1155\/2022\/4748528","journal-title":"Secur. Commun. Networks"},{"key":"980_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s43926-020-00001-4","volume":"1","author":"M Kuzlu","year":"2021","unstructured":"Kuzlu, M., Fair, C., Guler, O.: Role of artificial intelligence in the internet of things (IoT) cybersecurity. Discov. Internet Things 1, 1\u201315 (2021). https:\/\/doi.org\/10.1007\/s43926-020-00001-4","journal-title":"Discov. Internet Things"},{"key":"980_CR50","doi-asserted-by":"publisher","unstructured":"Alzubaidi, L. et al.: Review of deep learning: concepts, CNN architectures, challenges, applications, future directions, vol. 8, no. 1. Springer International Publishing, 2021. https:\/\/doi.org\/10.1186\/s40537-021-00444-8","DOI":"10.1186\/s40537-021-00444-8"},{"issue":"6","key":"980_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-021-00815-1","volume":"2","author":"IH Sarker","year":"2021","unstructured":"Sarker, I.H.: Deep learning: a comprehensive overview on techniques, taxonomy, applications and research directions. SN Comput. Sci. 2(6), 1\u201320 (2021). https:\/\/doi.org\/10.1007\/s42979-021-00815-1","journal-title":"SN Comput. Sci."},{"key":"980_CR52","doi-asserted-by":"publisher","unstructured":"Hao, Z.: Deep learning review and discussion of its future development. In: MATEC Web of Conferences, p. 02035 (2019). https:\/\/doi.org\/10.1051\/matecconf\/201927702035.","DOI":"10.1051\/matecconf\/201927702035"},{"issue":"9","key":"980_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.53555\/m.v9i9.5842","volume":"9","author":"E Jawad","year":"2023","unstructured":"Jawad, E.: The deep neural network-a review. Ijrdo J. Math. 9(9), 1\u20135 (2023). https:\/\/doi.org\/10.53555\/m.v9i9.5842","journal-title":"Ijrdo J. Math."},{"issue":"07","key":"980_CR54","doi-asserted-by":"publisher","first-page":"41","DOI":"10.4236\/jcc.2018.67005","volume":"06","author":"J Di","year":"2018","unstructured":"Di, J., Wang, L.: Application of improved deep auto-encoder network in rolling bearing fault diagnosis. J. Comput. Commun. 06(07), 41\u201353 (2018). https:\/\/doi.org\/10.4236\/jcc.2018.67005","journal-title":"J. Comput. Commun."},{"issue":"4","key":"980_CR55","doi-asserted-by":"publisher","first-page":"929","DOI":"10.26599\/TST.2023.9010033","volume":"29","author":"C Hazman","year":"2024","unstructured":"Hazman, C., Guezzaz, A., Benkirane, S., Azrour, M.: Enhanced IDS with deep learning for IoT-based smart cities security. Tsinghua Sci. Technol. 29(4), 929\u2013947 (2024). https:\/\/doi.org\/10.26599\/TST.2023.9010033","journal-title":"Tsinghua Sci. Technol."},{"issue":"4","key":"980_CR56","first-page":"75","volume":"XXVI","author":"S Bayraci","year":"2019","unstructured":"Bayraci, S., Susuz, O.: A deep neural network (DNN) based classification model in application to loan default prediction. Theor. Appl. Econ. XXVI(4), 75\u201384 (2019)","journal-title":"Theor. Appl. Econ."},{"key":"980_CR57","doi-asserted-by":"publisher","DOI":"10.1002\/ett.5029","author":"R Ji","year":"2024","unstructured":"Ji, R., Padha, D., Singh, Y., Sharma, S.: Review of intrusion detection system in cyber-physical system based networks: characteristics, industrial protocols, attacks, data sets and challenges. Trans. Emerg. Telecommun. Technol. (2024). https:\/\/doi.org\/10.1002\/ett.5029","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"980_CR58","doi-asserted-by":"publisher","unstructured":"Nourildean, S.W., Mefteh, W., Frihida, A.M.: Hybrid deep learning model-based intrusion detection system to improve artificial Internet of Things against cyber attacks, 252. (2025). https:\/\/doi.org\/10.1007\/978-3-031-87784-1_25","DOI":"10.1007\/978-3-031-87784-1_25"},{"key":"980_CR59","doi-asserted-by":"publisher","first-page":"81118","DOI":"10.1109\/ACCESS.2025.3566980","volume":"13","author":"Y Kayode Saheed","year":"2025","unstructured":"Kayode Saheed, Y., Chukwuere, J.E.: CPS-IIoT-P2Attention: explainable privacy-preserving with scaled dot-product attention in cyber-physical system-industrial IoT network. IEEE Access 13, 81118\u201381142 (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3566980","journal-title":"IEEE Access"},{"issue":"7","key":"980_CR60","doi-asserted-by":"publisher","first-page":"9917","DOI":"10.1007\/s10586-024-04458-8","volume":"27","author":"EI Elsedimy","year":"2024","unstructured":"Elsedimy, E.I., Elhadidy, H., Abohashish, S.M.M.: A novel intrusion detection system based on a hybrid quantum support vector machine and improved Grey Wolf optimizer. Cluster Comput. 27(7), 9917\u20139935 (2024). https:\/\/doi.org\/10.1007\/s10586-024-04458-8","journal-title":"Cluster Comput."},{"key":"980_CR61","doi-asserted-by":"publisher","first-page":"99837","DOI":"10.1109\/ACCESS.2022.3206425","volume":"10","author":"A Halbouni","year":"2022","unstructured":"Halbouni, A., Gunawan, T.S., Habaebi, M.H., Halbouni, M., Kartiwi, M., Ahmad, R.: CNN-LSTM: hybrid deep neural network for network intrusion detection system. IEEE Access 10, 99837\u201399849 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3206425","journal-title":"IEEE Access"},{"key":"980_CR62","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"980_CR63","doi-asserted-by":"publisher","DOI":"10.3390\/s25092725","author":"C Zhang","year":"2025","unstructured":"Zhang, C., Li, J., Wang, N., Zhang, D.: Research on intrusion detection method based on transformer and CNN-BiLSTM in internet of things. Sensors (2025). https:\/\/doi.org\/10.3390\/s25092725","journal-title":"Sensors"},{"key":"980_CR64","unstructured":"Lieqing Lin, L.C., Zhong, Q., Qiu, J., Liang, Z., Yang, Y: Intrusion detection using a hybrid approach based on CatBoost and an enhanced inception V1. Int. J. Mach. Learn. Cybern. (2025)"},{"issue":"3","key":"980_CR65","doi-asserted-by":"publisher","first-page":"4149","DOI":"10.32604\/cmc.2024.058052","volume":"81","author":"A Odeh","year":"2024","unstructured":"Odeh, A., Abu Taleb, A.: Robust network security: a deep learning approach to intrusion detection in IoT. Comput. Mater. Contin. 81(3), 4149\u20134169 (2024). https:\/\/doi.org\/10.32604\/cmc.2024.058052","journal-title":"Comput. Mater. Contin."},{"issue":"1","key":"980_CR66","doi-asserted-by":"publisher","first-page":"67","DOI":"10.18280\/ijsse.150107","volume":"15","author":"AA Abd Al-Ameer","year":"2025","unstructured":"Abd Al-Ameer, A.A., Huby, A.A.: Hybrid BiLSTM-SVM intrusion detection with decision-based flow ranking. Int. J. Saf. Secur. Eng. 15(1), 67\u201372 (2025). https:\/\/doi.org\/10.18280\/ijsse.150107","journal-title":"Int. J. Saf. Secur. Eng."},{"key":"980_CR67","doi-asserted-by":"publisher","DOI":"10.3390\/s23239583","author":"S Chalichalamala","year":"2023","unstructured":"Chalichalamala, S., Govindan, N., Kasarapu, R.: Logistic regression ensemble classifier for intrusion detection system in internet of things. Sensors (2023). https:\/\/doi.org\/10.3390\/s23239583","journal-title":"Sensors"},{"issue":"9","key":"980_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/sym12091458","volume":"12","author":"C Tang","year":"2020","unstructured":"Tang, C., Luktarhan, N., Zhao, Y.: An efficient intrusion detection method based on LightGBM and autoencoder. Symmetry 12(9), 1\u201316 (2020). https:\/\/doi.org\/10.3390\/sym12091458","journal-title":"Symmetry"},{"issue":"3","key":"980_CR69","doi-asserted-by":"publisher","first-page":"451","DOI":"10.3390\/jcp3030023","volume":"3","author":"H Ghani","year":"2023","unstructured":"Ghani, H., Virdee, B., Salekzamankhani, S.: A deep learning approach for network intrusion detection using a small features vector. J. Cybersecur. Privacy 3(3), 451\u2013463 (2023). https:\/\/doi.org\/10.3390\/jcp3030023","journal-title":"J. Cybersecur. Privacy"},{"issue":"C","key":"980_CR70","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.comcom.2022.12.010","volume":"199","author":"SM Kasongo","year":"2023","unstructured":"Kasongo, S.M.: A deep learning technique for intrusion detection system using a recurrent neural networks based framework. Comput. Commun. 199(C), 113\u2013125 (2023)","journal-title":"Comput. Commun."},{"issue":"1","key":"980_CR71","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-024-00994-7","volume":"11","author":"AM Alsaffar","year":"2024","unstructured":"Alsaffar, A.M., Nouri-Baygi, M., Zolbanin, H.M.: Shielding networks: enhancing intrusion detection with hybrid feature selection and stack ensemble learning. J. Big Data 11(1), 1\u201332 (2024). https:\/\/doi.org\/10.1186\/s40537-024-00994-7","journal-title":"J. Big Data"},{"issue":"1","key":"980_CR72","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-024-00184-1","volume":"2024","author":"A Shebl","year":"2024","unstructured":"Shebl, A., Elsedimy, E.I., Ismail, A., Salama, A.A., Herajy, M.: DCNN: a novel binary and multi-class network intrusion detection model via deep convolutional neural network. Eurasip J. Inf. Secur. 2024(1), 1\u201323 (2024). https:\/\/doi.org\/10.1186\/s13635-024-00184-1","journal-title":"Eurasip J. Inf. Secur."},{"issue":"6","key":"980_CR73","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/fi17060230","volume":"17","author":"AA Seyedkolaei","year":"2025","unstructured":"Seyedkolaei, A.A., Mahmoudi, F., Garc\u00eda, J.: A deep learning approach for multiclass attack classification in IoT and IIoT networks using convolutional neural networks. Futur. Internet 17(6), 1\u201321 (2025). https:\/\/doi.org\/10.3390\/fi17060230","journal-title":"Futur. Internet"},{"key":"980_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics10111257","volume":"10","author":"MA Ferrag","year":"2021","unstructured":"Ferrag, M.A., Shu, L., Djallel, H.: Deep learning-based intrusion detection for distributed denial of service attack in Agriculture 4.0. Electronics 10, 1\u201326 (2021)","journal-title":"Electronics"},{"key":"980_CR75","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/7154587","author":"JB Awotunde","year":"2021","unstructured":"Awotunde, J.B., Chakraborty, C., Adeniyi, A.E.: Intrusion detection in industrial internet of things network-based on deep learning model with rule-based feature selection. Wirel. Commun. Mob. Comput. (2021). https:\/\/doi.org\/10.1155\/2021\/7154587","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"980_CR76","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5579851","author":"H Alkahtani","year":"2021","unstructured":"Alkahtani, H., Aldhyani, T.H.H.: Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complexity (2021). https:\/\/doi.org\/10.1155\/2021\/5579851","journal-title":"Complexity"},{"key":"980_CR77","doi-asserted-by":"crossref","unstructured":"Karamollao\u011flu, H., Y\u00fcceda\u011f, \u0130., Do\u011fru, \u0130.A.: A hybrid PCA-MAO based LSTM model for intrusion detection in IoT environments, pp. 0\u201324, 2022, [Online]. Available: https:\/\/www.researchsquare.com\/article\/rs-2357212\/latest.pdf","DOI":"10.21203\/rs.3.rs-2357212\/v1"},{"key":"980_CR78","doi-asserted-by":"publisher","DOI":"10.3390\/app12105015","author":"K Albulayhi","year":"2022","unstructured":"Albulayhi, K., Al-Haija, Q.A., Alsuhibany, S.A., Jillepalli, A.A., Ashrafuzzaman, M., Sheldon, F.T.: IoT intrusion detection using machine learning with a novel high performing feature selection method. Appl. Sci. (2022). https:\/\/doi.org\/10.3390\/app12105015","journal-title":"Appl. Sci."},{"key":"980_CR79","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-025-07255-1","author":"A Nazir","year":"2025","unstructured":"Nazir, A., et al.: Empirical evaluation of ensemble learning and hybrid CNN-LSTM for IoT threat detection on heterogeneous datasets. J. Supercomput. (2025). https:\/\/doi.org\/10.1007\/s11227-025-07255-1","journal-title":"J. Supercomput."},{"issue":"2","key":"980_CR80","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101939","volume":"36","author":"A Nazir","year":"2024","unstructured":"Nazir, A., et al.: Collaborative threat intelligence: enhancing IoT security through blockchain and machine learning integration. J. King Saud Univ. Comput. Inf. Sci. 36(2), 101939 (2024). https:\/\/doi.org\/10.1016\/j.jksuci.2024.101939","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"6","key":"980_CR81","doi-asserted-by":"publisher","first-page":"8367","DOI":"10.1007\/s10586-024-04436-0","volume":"27","author":"A Nazir","year":"2024","unstructured":"Nazir, A., He, J., Zhu, N., Anwar, M.S., Pathan, M.S.: Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain. Cluster Comput. 27(6), 8367\u20138392 (2024). https:\/\/doi.org\/10.1007\/s10586-024-04436-0","journal-title":"Cluster Comput."},{"issue":"23","key":"980_CR82","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app122312336","volume":"12","author":"AA Alsulami","year":"2022","unstructured":"Alsulami, A.A., Abu Al-Haija, Q., Tayeb, A., Alqahtani, A.: An intrusion detection and classification system for IoT traffic with improved data engineering. Appl. Sci. 12(23), 1\u201319 (2022). https:\/\/doi.org\/10.3390\/app122312336","journal-title":"Appl. Sci."},{"issue":"11","key":"980_CR83","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s24113339","volume":"24","author":"TM Nguyen","year":"2024","unstructured":"Nguyen, T.M., Vo, H.H.P., Yoo, M.: Enhancing intrusion detection in wireless sensor networks using a GSWO-CatBoost approach. Sensors 24(11), 1\u201326 (2024). https:\/\/doi.org\/10.3390\/s24113339","journal-title":"Sensors"},{"key":"980_CR84","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-024-00685-x","author":"M Sajid","year":"2024","unstructured":"Sajid, M., et al.: Enhancing intrusion detection: a hybrid machine and deep learning approach. J. Cloud Comput. (2024). https:\/\/doi.org\/10.1186\/s13677-024-00685-x","journal-title":"J. Cloud Comput."},{"key":"980_CR85","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2023.100053","volume":"10","author":"V Hnamte","year":"2023","unstructured":"Hnamte, V., Hussain, J.: DCNNBiLSTM: an efficient hybrid deep learning-based intrusion detection system. Telemat. Inf. Rep. 10, 100053 (2023). https:\/\/doi.org\/10.1016\/j.teler.2023.100053","journal-title":"Telemat. Inf. Rep."},{"issue":"1","key":"980_CR86","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/computers14010004","volume":"14","author":"S Gul","year":"2025","unstructured":"Gul, S., Arshad, S., Saeed, S.M.U., Akram, A., Azam, M.A.: WGAN-DL-IDS: an efficient framework for intrusion detection system using WGAN, random forest, and deep learning approaches. Computers 14(1), 1\u201321 (2025). https:\/\/doi.org\/10.3390\/computers14010004","journal-title":"Computers"},{"key":"980_CR87","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/6967938","volume":"2022","author":"SPK Gudla","year":"2022","unstructured":"Gudla, S.P.K., Bhoi, S.K., Nayak, S.R., Singh, K.K., Verma, A., Izonin, I.: A deep intelligent attack detection framework for fog-based IoT systems. Comput. Intell. Neurosci. 2022, 1\u201325 (2022). https:\/\/doi.org\/10.1155\/2022\/6967938","journal-title":"Comput. Intell. Neurosci."},{"issue":"2","key":"980_CR88","doi-asserted-by":"publisher","first-page":"99","DOI":"10.25046\/aj060213","volume":"6","author":"Z Din","year":"2021","unstructured":"Din, Z., Jambari, D.I., Yusof, M.M., Yahaya, J.: Challenges in IoT technology adoption into information system security management of smart cities: a review. Adv. Sci. Technol. Eng. Syst. J. 6(2), 99\u2013112 (2021). https:\/\/doi.org\/10.25046\/aj060213","journal-title":"Adv. Sci. Technol. Eng. Syst. J."},{"issue":"4926","key":"980_CR89","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1109\/AISC56616.2023.10084980","volume":"22","author":"A Sarwar","year":"2022","unstructured":"Sarwar, A., Alnajim, A.M., Khan, S.N.M., Ahmed, S., Alyahya, S., Khan, W.U.: Enhanced anomaly detection system for IOT based on improved dynamic SBPSO. Sensors 22(4926), 544\u2013547 (2022). https:\/\/doi.org\/10.1109\/AISC56616.2023.10084980","journal-title":"Sensors"},{"key":"980_CR90","doi-asserted-by":"crossref","unstructured":"Maniriho, P., Niyigaba, E., Bizimana, Z., Twiringiyimana, V., Mahoro, L.J., Ahmad, T.: Anomaly-based intrusion detection approach for IoT networks using machine learning. In: International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM), (2020)","DOI":"10.1109\/CENIM51130.2020.9297958"},{"key":"980_CR91","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9173291","author":"N Dat-Thinh","year":"2022","unstructured":"Dat-Thinh, N., Xuan-Ninh, H., Kim-Hung, L.: MidSiot: a multistage intrusion detection system for internet of things. Wirel. Commun. Mob. Comput. (2022). https:\/\/doi.org\/10.1155\/2022\/9173291","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"10","key":"980_CR92","doi-asserted-by":"publisher","first-page":"917","DOI":"10.14569\/IJACSA.2022.01310108","volume":"13","author":"WA Alonazi","year":"2022","unstructured":"Alonazi, W.A., Hamdi, H., Azim, N.A., El-Aziz, A.A.A.: SDN architecture for smart homes security with machine learning and deep learning. Int. J. Adv. Comput. Sci. Appl. 13(10), 917\u2013927 (2022). https:\/\/doi.org\/10.14569\/IJACSA.2022.01310108","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"2","key":"980_CR93","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.32604\/cmc.2021.018466","volume":"69","author":"N Islam","year":"2021","unstructured":"Islam, N., et al.: Towards machine learning based intrusion detection in IoT networks. Comput. Mater. Continua 69(2), 1801\u20131821 (2021). https:\/\/doi.org\/10.32604\/cmc.2021.018466","journal-title":"Comput. Mater. Continua"},{"issue":"1","key":"980_CR94","doi-asserted-by":"publisher","first-page":"489","DOI":"10.32604\/cmc.2022.019636","volume":"71","author":"PL Indrasiri","year":"2022","unstructured":"Indrasiri, P.L., Lee, E., Rupapara, V., Rustam, F., Ashraf, I.: Malicious traffic detection in iot and local networks using stacked ensemble classifier. Comput. Mater. Contin. 71(1), 489\u2013515 (2022). https:\/\/doi.org\/10.32604\/cmc.2022.019636","journal-title":"Comput. Mater. Contin."},{"key":"980_CR95","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115939","volume":"191","author":"YK Saheed","year":"2025","unstructured":"Saheed, Y.K., Misra, S.: CPS-IoT-PPDNN: a new explainable privacy preserving DNN for resilient anomaly detection in cyber-physical systems-enabled IoT networks. Chaos Solitons Fractals 191, 115939 (2025). https:\/\/doi.org\/10.1016\/j.chaos.2024.115939","journal-title":"Chaos Solitons Fractals"},{"key":"980_CR96","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111434","volume":"155","author":"YK Saheed","year":"2024","unstructured":"Saheed, Y.K., Abdulganiyu, O.H., Tchakoucht, T.A.: Modified genetic algorithm and fine-tuned long short-term memory network for intrusion detection in the internet of things networks with edge capabilities. Appl. Soft Comput. 155, 111434 (2024). https:\/\/doi.org\/10.1016\/j.asoc.2024.111434","journal-title":"Appl. Soft Comput."},{"key":"980_CR97","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Futur. Gener. Comput. Syst. 100, 779\u2013796 (2019). https:\/\/doi.org\/10.1016\/j.future.2019.05.041","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"980_CR98","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/JIOT.2021.3085194","volume":"9","author":"TM Booij","year":"2022","unstructured":"Booij, T.M., Chiscop, I., Meeuwissen, E., Moustafa, N., Hartog, F.T.H.D.: ToN_IoT: the role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets. IEEE Internet Things J. 9(1), 485\u2013496 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3085194","journal-title":"IEEE Internet Things J."},{"key":"980_CR99","doi-asserted-by":"publisher","unstructured":"Sharafaldin, I., Habibi Lashkari, A., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceedings of the 4th International Conference on Information Systems Security and Privacy\u2014ICISSP, SciTePress, pp. 108\u2013116 (2018). https:\/\/doi.org\/10.5220\/0006639801080116.","DOI":"10.5220\/0006639801080116"},{"key":"980_CR100","doi-asserted-by":"publisher","DOI":"10.3390\/s23135941","author":"ECP Neto","year":"2023","unstructured":"Neto, E.C.P., Dadkhah, S., Ferreira, R., Zohourian, A., Lu, R., Ghorbani, A.A.: CICIoT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors (2023). https:\/\/doi.org\/10.3390\/s23135941","journal-title":"Sensors"},{"key":"980_CR101","doi-asserted-by":"publisher","unstructured":"Mirsky, Y., Tshman, T., Elovici, Y., Shabtai, A.: Kitsune: an ensemble of autoencoders for online network intrusion detection. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, pp 1\u201315 (2018). https:\/\/doi.org\/10.14722\/ndss.2018.23204","DOI":"10.14722\/ndss.2018.23204"},{"issue":"3","key":"980_CR102","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., et al.: N-BaIoT\u2014network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12\u201322 (2018). https:\/\/doi.org\/10.1109\/MPRV.2018.03367731","journal-title":"IEEE Pervasive Comput."},{"issue":"2","key":"980_CR103","first-page":"165","volume":"59","author":"R Tahri","year":"2024","unstructured":"Tahri, R., Lasbahani, A., Jarrar, A., Balouki, Y.: Intelligent intrusion detection using decision trees and the NSL-KDD DATASET: an all-inclusive method for cyber attack detection. J. Southwest Jiaotong Univ. 59(2), 165\u2013182 (2024)","journal-title":"J. Southwest Jiaotong Univ."},{"issue":"1","key":"980_CR104","doi-asserted-by":"publisher","first-page":"333","DOI":"10.30880\/jscdm.2025.06.01.022","volume":"6","author":"SW Nourildean","year":"2025","unstructured":"Nourildean, S.W., Mefteh, W., Frihida, A.M.: An artificial intelligence of things intrusion detection framework for mitigating cyber and ransomware threats in IoT networks. J. Soft Comput. Data Min. 6(1), 333\u2013346 (2025). https:\/\/doi.org\/10.30880\/jscdm.2025.06.01.022","journal-title":"J. Soft Comput. Data Min."}],"container-title":["International Journal of Data Science and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-025-00980-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41060-025-00980-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-025-00980-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:37:01Z","timestamp":1773481021000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41060-025-00980-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,18]]},"references-count":104,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["980"],"URL":"https:\/\/doi.org\/10.1007\/s41060-025-00980-z","relation":{},"ISSN":["2364-415X","2364-4168"],"issn-type":[{"value":"2364-415X","type":"print"},{"value":"2364-4168","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,18]]},"assertion":[{"value":"1 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"78"}}