{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T05:24:31Z","timestamp":1761110671877,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T00:00:00Z","timestamp":1672185600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T00:00:00Z","timestamp":1672185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-022-01566-3","type":"journal-article","created":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T15:05:24Z","timestamp":1672239924000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Toward an Improved Security Performance of Industrial Internet of Things Systems"],"prefix":"10.1007","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1710-9286","authenticated-orcid":false,"given":"Salma","family":"Elhag","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Amal Mahmoud","family":"Alghamdi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Norah Ahmad","family":"Al-Shomrani","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,12,28]]},"reference":[{"issue":"2","key":"1566_CR1","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1049\/ise2.12020","volume":"15","author":"M Hammad","year":"2021","unstructured":"Hammad M, Hewahi N, Elmedany W. T-SNERF: a novel high accuracy machine learning approach for intrusion detection systems. IET Inf Secur. 2021;15(2):178\u201390.","journal-title":"IET Inf Secur"},{"key":"1566_CR2","doi-asserted-by":"publisher","first-page":"75729","DOI":"10.1109\/ACCESS.2021.3082147","volume":"9","author":"C Liu","year":"2021","unstructured":"Liu C, Gu Z, Wang J. A hybrid intrusion detection system based on scalable K-means + random forest and deep learning. IEEE Access. 2021;9:75729\u201340.","journal-title":"IEEE Access"},{"key":"1566_CR3","doi-asserted-by":"publisher","first-page":"76614","DOI":"10.1109\/ACCESS.2021.3082160","volume":"9","author":"D Park","year":"2021","unstructured":"Park D, Kim S, Kwon H, Shin D, Shin D. Host-based intrusion detection model using Siamese network. IEEE Access. 2021;9:76614\u201323.","journal-title":"IEEE Access"},{"key":"1566_CR4","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4667","author":"S Manimurugan","year":"2020","unstructured":"Manimurugan S, Manimegalai P, Valsalan P, Krishnadas J, Narmatha C. Intrusion detection in cloud environment using hybrid genetic algorithm and back propagation neural network. Int J Commun Syst. 2020. https:\/\/doi.org\/10.1002\/dac.4667.","journal-title":"Int J Commun Syst"},{"key":"1566_CR5","doi-asserted-by":"crossref","unstructured":"Dantas DT, Li H, Charton T, Chen L, Zhang R.Machine learning based anomaly-based intrusion detection system in a full digital substation (2020).","DOI":"10.1049\/cp.2020.0049"},{"issue":"6","key":"1566_CR6","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1049\/iet-net.2018.5080","volume":"7","author":"M Latah","year":"2018","unstructured":"Latah M, Toker L. Towards an efficient anomaly-based intrusion detection for software-defined networks. IET Netw. 2018;7(6):453\u20139.","journal-title":"IET Netw"},{"key":"1566_CR7","unstructured":"Ejimofor I, Ajibola A, Igboeli U, Yakubu A. Intrusion detection system using comparative machine learning algorithms (2020)."},{"key":"1566_CR8","doi-asserted-by":"crossref","unstructured":"Zhang H, Lin KY, Chen W, Genyuan L. Using machine learning techniques to improve intrusion detection accuracy. In: 2019 IEEE 2nd international conference on knowledge innovation and invention (ICKII), pp. 308\u2013310. IEEE (2019).","DOI":"10.1109\/ICKII46306.2019.9042621"},{"key":"1566_CR9","doi-asserted-by":"crossref","unstructured":"Singh P, Venkatesan M. Hybrid approach for intrusion detection system. In: 2018 International conference on current trends towards converging technologies (ICCTCT), pp. 1\u20135. IEEE (2018)","DOI":"10.1109\/ICCTCT.2018.8551181"},{"key":"1566_CR10","doi-asserted-by":"crossref","unstructured":"Hammad M, El-medany W, Ismail Y. Intrusion detection system using feature selection with clustering and classification machine learning algorithms on the unsw-nb15 dataset. In: 2020 International conference on innovation and intelligence for informatics, computing, and technologies (3ICT), pp. 1\u20136. IEEE (2020).","DOI":"10.1109\/3ICT51146.2020.9312002"},{"key":"1566_CR11","doi-asserted-by":"crossref","unstructured":"Halimaa A, Sundarakantham K. Machine learning based intrusion detection system. In: 2019 3rd International conference on trends in electronics and informatics (ICOEI), pp 916\u2013920. IEEE (2019)","DOI":"10.1109\/ICOEI.2019.8862784"},{"issue":"7","key":"1566_CR12","doi-asserted-by":"publisher","first-page":"751","DOI":"10.3390\/math9070751","volume":"9","author":"R Panigrahi","year":"2021","unstructured":"Panigrahi R, Borah S, Bhoi AK, Ijaz MF, Pramanik M, Kumar Y, Jhaveri RH. A consolidated decision tree-based intrusion detection system for binary and multiclass imbalanced datasets. Mathematics. 2021;9(7):751.","journal-title":"Mathematics"},{"key":"1566_CR13","doi-asserted-by":"crossref","unstructured":"Aung YY, Min MM. Hybrid intrusion detection system using K-means and K-nearest neighbors algorithms. In: 2018 IEEE\/ACIS 17th international conference on computer and information science (ICIS), pp. 34\u201338. IEEE (2018)","DOI":"10.1109\/ICIS.2018.8466537"},{"key":"1566_CR14","doi-asserted-by":"crossref","unstructured":"Abrar I, Ayub Z, Masoodi F, Bamhdi AM. A machine learning approach for intrusion detection system on NSL-KDD dataset. In: 2020 International conference on smart electronics and communication (ICOSEC), pp. 919924. IEEE (2020)","DOI":"10.1109\/ICOSEC49089.2020.9215232"},{"issue":"5","key":"1566_CR15","doi-asserted-by":"publisher","first-page":"754","DOI":"10.3390\/sym12050754","volume":"12","author":"IH Sarker","year":"2020","unstructured":"Sarker IH, Abushark YB, Alsolami F, Khan AI. Intrudtree: a machine learning-based cyber security intrusion detection model. Symmetry. 2020;12(5):754.","journal-title":"Symmetry"},{"key":"1566_CR16","doi-asserted-by":"crossref","unstructured":"Amanoul SV, Abdulazeez AM, Zeebare DQ, Ahmed FY. Intrusion detection systems based on machine learning algorithms. In: 2021 IEEE international conference on automatic control & intelligent systems (I2CACIS), pp. 282287. IEEE (2021)","DOI":"10.1109\/I2CACIS52118.2021.9495897"},{"key":"1566_CR17","first-page":"1","volume":"41","author":"A Muna","year":"2018","unstructured":"Muna A, Moustafa N, Sitnikova E. Identification of malicious activities in industrial internet of things based on deep learning models. J Inf Secur Appl. 2018;41:1\u201311.","journal-title":"J. Inf. Secur. Appl."},{"key":"1566_CR18","doi-asserted-by":"publisher","first-page":"114066","DOI":"10.1109\/ACCESS.2020.2996214","volume":"8","author":"M Bagaa","year":"2020","unstructured":"Bagaa M, Taleb T, Bernabe JB, Skarmeta A. A machine learning security framework for IoT systems. IEEE Access. 2020;8:114066\u201377.","journal-title":"IEEE Access"},{"key":"1566_CR19","doi-asserted-by":"publisher","first-page":"113199","DOI":"10.1109\/ACCESS.2021.3104113","volume":"9","author":"SM Kasongo","year":"2021","unstructured":"Kasongo SM. An advanced intrusion detection system for IIoT based on GA and tree based algorithms. IEEE Access. 2021;9:113199\u2013212.","journal-title":"IEEE Access"},{"key":"1566_CR20","doi-asserted-by":"publisher","first-page":"61024","DOI":"10.1109\/ACCESS.2021.3074664","volume":"9","author":"RV Mendon\u00e7a","year":"2021","unstructured":"Mendon\u00e7a RV, Teodoro A, Rosa R, Saadi M, Melgarejo D, et al. Intrusion detection system based on fast hierarchical deep convolutional neural network. IEEE Access. 2021;9:61024\u201334.","journal-title":"IEEE Access"},{"key":"1566_CR21","doi-asserted-by":"crossref","unstructured":"Ludwig SA. Intrusion detection of multiple attack classes using a deep neural net ensemble. In:2017 IEEE symposium series on computational intelligence (SSCI), Hawaii, USA, pp. 1\u20137 (2017).","DOI":"10.1109\/SSCI.2017.8280825"},{"key":"1566_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/7154587","volume":"2021","author":"J Awotunde","year":"2021","unstructured":"Awotunde J, Bamidele J, Chakraborty C, Adeniyi A. Intrusion detection in industrial internet of things network-based on deep learning model with rule-based feature selection. Wirel Commun Mob Comput. 2021;2021:1\u201317.","journal-title":"Wirel Commun Mob Comput"},{"key":"1566_CR23","doi-asserted-by":"publisher","first-page":"103906103926","DOI":"10.1109\/ACCESS.2021.3094024","volume":"9","author":"I Ullah","year":"2021","unstructured":"Ullah I, Mahmoud Q. Design and development of a deep learning-based model for anomaly detection in IoT networks. IEEE Access. 2021;9:103906103926.","journal-title":"IEEE Access"},{"key":"1566_CR24","doi-asserted-by":"publisher","first-page":"142206","DOI":"10.1109\/ACCESS.2021.3120626","volume":"9","author":"A Gad","year":"2021","unstructured":"Gad A, Nashat A, Barkat T. Intrusion detection system using machine learning for vehicular ad hoc networks based on ton-IoT dataset. IEEE Access. 2021;9:142206\u201317.","journal-title":"IEEE Access"},{"key":"1566_CR25","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.proenv.2011.12.040","volume":"11","author":"W Li","year":"2011","unstructured":"Li W, Liu Z. A method of SVM with normalization in intrusion detection. Procedia Environ Sci. 2011;11:256\u201362.","journal-title":"Procedia Environ Sci"},{"issue":"6","key":"1566_CR26","doi-asserted-by":"publisher","first-page":"4280","DOI":"10.1109\/JIOT.2021.3103829","volume":"9","author":"G Abdelmoumin","year":"2022","unstructured":"Abdelmoumin G, Rawat DB, Rahman A. On the performance of machine learning models for anomaly-based intelligent intrusion detection systems for the internet of things. IEEE Internet Things J. 2022;9(6):4280\u201390. https:\/\/doi.org\/10.1109\/JIOT.2021.3103829.","journal-title":"IEEE Internet Things J"},{"issue":"14","key":"1566_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/su14148707","volume":"14","author":"TTH Le","year":"2022","unstructured":"Le TTH, Oktian YE, Kim H. XGBoost for imbalanced multiclass classification-based industrial internet of things intrusion detection systems. Sustainability (Switzerland). 2022;14(14):1\u201321. https:\/\/doi.org\/10.3390\/su14148707.","journal-title":"Sustainability (Switzerland)"},{"key":"1566_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.09.008","author":"A Yazdinejad","year":"2022","unstructured":"Yazdinejad A, et al. An ensemble deep learning model for cyber threat hunting in industrial internet of things. Digit Commun Netw. 2022. https:\/\/doi.org\/10.1016\/j.dcan.2022.09.008.","journal-title":"Digit Commun Netw"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01566-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-022-01566-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01566-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T15:07:22Z","timestamp":1672240042000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-022-01566-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,28]]},"references-count":28,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,3]]}},"alternative-id":["1566"],"URL":"https:\/\/doi.org\/10.1007\/s42979-022-01566-3","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2022,12,28]]},"assertion":[{"value":"21 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"131"}}