{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:58:01Z","timestamp":1762869481402,"version":"3.32.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T00:00:00Z","timestamp":1736208000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T00:00:00Z","timestamp":1736208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03597-4","type":"journal-article","created":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T13:55:45Z","timestamp":1736258145000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Real-Time Intrusion Detection in IIoT Stream Data Using Window-Based Weighted Ensemble Techniques"],"prefix":"10.1007","volume":"6","author":[{"given":"N.","family":"Malathy","sequence":"first","affiliation":[]},{"given":"A. Thana","family":"Swvtha","sequence":"additional","affiliation":[]},{"given":"T. Bharathi","family":"Leela","sequence":"additional","affiliation":[]},{"given":"Apoorva","family":"Raaman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,7]]},"reference":[{"issue":"100257","key":"3597_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jii.2021.100257","volume":"26","author":"PKR Maddikunta","year":"2022","unstructured":"Maddikunta PKR, et al. Industry 5.0: a survey on enabling technologies and potential applications. J Ind Inf Integr. 2022;26(100257):1\u201319. https:\/\/doi.org\/10.1016\/j.jii.2021.100257.","journal-title":"J Ind Inf Integr"},{"key":"3597_CR2","doi-asserted-by":"publisher","unstructured":"Sari A, Lekidis A and Butun I. Industrial Networks and IIoT: now and future trends. In: Industrial IoT: Challenges, Design Principles, Applications, and Security, Springer International Publishing, 2020; pp. 3\u201355. https:\/\/doi.org\/10.1007\/978-981-16-8059-5_11.","DOI":"10.1007\/978-981-16-8059-5_11"},{"issue":"10","key":"3597_CR3","doi-asserted-by":"publisher","first-page":"D126","DOI":"10.1364\/JOCN.10.00D126","volume":"10","author":"D Rafique","year":"2018","unstructured":"Rafique D, Velasco L. Machine learning for network automation: overview, architecture, and applications. J Opt Commun Netw. 2018;10(10):D126\u201343. https:\/\/doi.org\/10.1364\/JOCN.10.00D126.","journal-title":"J Opt Commun Netw"},{"issue":"1","key":"3597_CR4","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1186\/s13677-018-0123-6","volume":"7","author":"MF Elrawy","year":"2018","unstructured":"Elrawy MF, Awad AI, Hamed HFA. Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comput. 2018;7(1):21. https:\/\/doi.org\/10.1186\/s13677-018-0123-6.","journal-title":"J Cloud Comput"},{"key":"3597_CR5","doi-asserted-by":"publisher","unstructured":"Yu T and Wang X. Real-time data analytics in the internet of things systems. In: Handbook of real-time computing. Springer Singapore, 2020; pp. 1\u201328. https:\/\/doi.org\/10.1007\/978-981-4585-87-3_38-1.","DOI":"10.1007\/978-981-4585-87-3_38-1"},{"issue":"12","key":"3597_CR6","doi-asserted-by":"publisher","first-page":"2346","DOI":"10.1109\/TKDE.2018.2876857","volume":"31","author":"J Lu","year":"2019","unstructured":"Lu J, Liu A, Dong F, Gu F, Gama J, Zhang G. Learning under network drift: a review. IEEE Trans Knowl Data Eng. 2019;31(12):2346\u201363. https:\/\/doi.org\/10.1109\/TKDE.2018.2876857.","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1\/2","key":"3597_CR7","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1093\/biomet\/41.1-2.100","volume":"41","author":"ES Pagse","year":"1954","unstructured":"Pagse ES. Continuous inspection schemes. Biometrika. 1954;41(1\/2):100\u201315. https:\/\/doi.org\/10.1093\/biomet\/41.1-2.100.","journal-title":"Biometrika"},{"issue":"3","key":"3597_CR8","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1109\/TKDE.2014.2345382","volume":"27","author":"I Fr\u00edas-Blanco","year":"2014","unstructured":"Fr\u00edas-Blanco I, del Campo-\u00c1vila J, Ramos-Jimenez G, et al. Online and non-parametric drift detection methods based on Hoeffding\u2019s bounds. IEEE Trans Knowl Data Eng. 2014;27(3):810\u201323. https:\/\/doi.org\/10.1109\/TKDE.2014.2345382.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"3597_CR9","doi-asserted-by":"publisher","unstructured":"Manapragada C, Webb GI and Salehi M. Extremely fast decision tree. In: Proceeding ACM SIGKDD Int. Conf. Knowl. Discov. Data Min. 2018; pp. 1953\u20131962. https:\/\/doi.org\/10.1145\/3219819.322000.","DOI":"10.1145\/3219819.322000"},{"key":"3597_CR10","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/s11227-023-05729-8","volume":"7","author":"K Crammer","year":"2006","unstructured":"Crammer K, Dekel O, Keshet J, Shalev-Shwartz S, Singer Y. Online passive-aggressive algorithms. J Mach Learn Res. 2006;7:551\u201385. https:\/\/doi.org\/10.1007\/s11227-023-05729-8.","journal-title":"J Mach Learn Res"},{"key":"3597_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00034","author":"HM Gomes","year":"2019","unstructured":"Gomes HM, Read J, Bifet A. Streaming random patches for evolving data stream classification. IEEE Int Conf Data Min (ICDM). 2019. https:\/\/doi.org\/10.1109\/ICDM.2019.00034.","journal-title":"IEEE Int Conf Data Min (ICDM)"},{"key":"3597_CR12","doi-asserted-by":"publisher","unstructured":"Bifet A, Holmes G, Pfahringer B. Leveraging bagging for evolving data streams. In: Balc\u00e1zar JL, Bonchi F, Gionis A, Sebag M (eds) Machine learning and knowledge discovery in databases. Lecture Notes in Computer Science, vol. 6321. Springer, 2021. https:\/\/doi.org\/10.1007\/978-3-642-15880-3_15.","DOI":"10.1007\/978-3-642-15880-3_15"},{"key":"3597_CR13","doi-asserted-by":"publisher","unstructured":"Losing V, Hammer B and Wersing H. KNN classifier with self adjusting memory for heterogeneous concept drift. In: 2016 IEEE 16th International Conference on Data Mining (ICDM), Barcelona, Spain, 2016; pp. 291\u2013300. https:\/\/doi.org\/10.1109\/ICDM.2016.0040.","DOI":"10.1109\/ICDM.2016.0040"},{"issue":"11","key":"3597_CR14","doi-asserted-by":"publisher","first-page":"36","DOI":"10.5815\/ijcnis.2017.11.04","volume":"9","author":"A Pandey","year":"2017","unstructured":"Pandey A, Jain A. Comparative analysis of KNN algorithm using various normalization techniques. Int J Comput Netw Inf Secur. 2017;9(11):36\u201342. https:\/\/doi.org\/10.5815\/ijcnis.2017.11.04.","journal-title":"Int J Comput Netw Inf Secur"},{"key":"3597_CR15","doi-asserted-by":"publisher","first-page":"1977","DOI":"10.1007\/s12652-021-03411-6","volume":"14","author":"S Pande","year":"2023","unstructured":"Pande S, Khamparia A, Gupta D. Feature selection and comparison of classification algorithms for wireless sensor networks. J Ambient Intell Human Comput. 2023;14:1977\u201389. https:\/\/doi.org\/10.1007\/s12652-021-03411-6.","journal-title":"J Ambient Intell Human Comput"},{"key":"3597_CR16","doi-asserted-by":"publisher","unstructured":"Ullah I, Mahmoud QH. A scheme for generating a dataset for anomalous activity detection in IoT networks. In: Goutte C, Zhu X (eds) Advances in artificial intelligence. Canadian AI, vol 12109. Springer, 2021. https:\/\/doi.org\/10.1007\/978-3-030-47358-7_52.","DOI":"10.1007\/978-3-030-47358-7_52"},{"key":"3597_CR17","doi-asserted-by":"publisher","unstructured":"Sharafaldin I, Lashkari AH and Ghorbani AA. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: Proceeding of International Conference of Information System Secure. Privacy, 2018, pp. 108\u201316. https:\/\/doi.org\/10.5220\/0006639801080116.","DOI":"10.5220\/0006639801080116"},{"key":"3597_CR18","doi-asserted-by":"publisher","unstructured":"Nishihara R et al. Real-time machine learning: the missing pieces. In: Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017; pp. 106\u201310. https:\/\/doi.org\/10.1145\/3102980.3102998.","DOI":"10.1145\/3102980.3102998"},{"key":"3597_CR19","doi-asserted-by":"publisher","DOI":"10.3390\/app12042053","author":"Z Fatima","year":"2022","unstructured":"Fatima Z, Tanveer MH, Waseemullah, Zardari S, Naz LF, Khadim H, Ahmed N, Tahir M. Production plant and warehouse automation with IoT and industry 5.0. Appl Sci. 2022. https:\/\/doi.org\/10.3390\/app12042053.","journal-title":"Appl Sci"},{"key":"3597_CR20","doi-asserted-by":"publisher","unstructured":"Yang L, Manias DM and Shami A. PWPAE: an ensemble framework for concept drift adaptation in IoT data streams. In: IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, 2021; pp. 01\u201306.https:\/\/doi.org\/10.1109\/GLOBECOM46510.2021.9685338.","DOI":"10.1109\/GLOBECOM46510.2021.9685338"},{"key":"3597_CR21","doi-asserted-by":"publisher","unstructured":"Bifet A and Gavalda R. Learning from time-changing data with adaptive windowing. In: Proceeding of 7th SIAM International Conference of Data Mining. 2007;pp. 443\u20138. https:\/\/doi.org\/10.1137\/1.9781611972771.42.","DOI":"10.1137\/1.9781611972771.42"},{"issue":"10","key":"3597_CR22","doi-asserted-by":"publisher","first-page":"6581","DOI":"10.1109\/TII.2021.3129825","volume":"18","author":"E Uchiteleva","year":"2022","unstructured":"Uchiteleva E, Primak SL, Luccini M, Hussein AR, Shami A. The TriLS approach for drift-aware time-series prediction in iiot environment. IEEE Trans Industr Inf. 2022;18(10):6581\u201391. https:\/\/doi.org\/10.1109\/TII.2021.3129825.","journal-title":"IEEE Trans Industr Inf"},{"key":"3597_CR23","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1007\/s10994-017-5642-8","volume":"106","author":"HM Gomes","year":"2017","unstructured":"Gomes HM, Bifet A, Read J, et al. Adaptive random forests for evolving data stream classification. Mach Learn. 2017;106:1469\u201395. https:\/\/doi.org\/10.1007\/s10994-017-5642-8.","journal-title":"Mach Learn"},{"key":"3597_CR24","doi-asserted-by":"publisher","unstructured":"Gomes HM, Read J and Bifet A. Streaming random patches for evolving data stream classification. In: IEEE International Conference on Data Mining (ICDM), Beijing, China, 2019; pp. 240\u20139. https:\/\/doi.org\/10.1109\/ICDM.2019.00034.","DOI":"10.1109\/ICDM.2019.00034"},{"key":"3597_CR25","doi-asserted-by":"publisher","unstructured":"Kaur P, Gosain A. Comparing the behavior of oversampling and undersampling approach of class imbalance learning by combining class imbalance problem with noise. In: Saini A, Nayak A, Vyas R. (eds) ICT Based Innovations. Advances in Intelligent Systems and Computing, vol. 653, Springer, 2022. https:\/\/doi.org\/10.1007\/978-981-10-6602-3_3.","DOI":"10.1007\/978-981-10-6602-3_3"},{"key":"3597_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.48550\/arXiv.2012.04740","volume":"22","author":"J Montiel","year":"2023","unstructured":"Montiel J, et al. River: machine learning for streaming data in python. J Mach Learn Res. 2023;22:1\u20138. https:\/\/doi.org\/10.48550\/arXiv.2012.04740.","journal-title":"J Mach Learn Res"},{"key":"3597_CR27","doi-asserted-by":"publisher","first-page":"4621","DOI":"10.1109\/ACCESS.2017.2682640","volume":"5","author":"SK Sharma","year":"2024","unstructured":"Sharma SK, Wang X. Live data analytics with collaborative edge and cloud processing in wireless IoT networks. IEEE Access. 2024;5:4621\u201335. https:\/\/doi.org\/10.1109\/ACCESS.2017.2682640.","journal-title":"IEEE Access"},{"key":"3597_CR28","doi-asserted-by":"publisher","first-page":"48","DOI":"10.3390\/telecom1010005","volume":"1","author":"E O\u2019Connell","year":"2024","unstructured":"O\u2019Connell E, Moore D, Newe T. Challenges associated with implementing 5G in manufacturing. Telecom. 2024;1:48\u201367. https:\/\/doi.org\/10.3390\/telecom1010005.","journal-title":"Telecom"},{"key":"3597_CR29","doi-asserted-by":"publisher","first-page":"57913","DOI":"10.1007\/s11042-024-18379-6","volume":"83","author":"N Malathy","year":"2024","unstructured":"Malathy N, Shree Harish Kumar G, Sriram R, et al. Federated transfer learning for intrusion detection system in industrial iot 40. Multimed Tools Appl. 2024;83:57913\u201341. https:\/\/doi.org\/10.1007\/s11042-024-18379-6.","journal-title":"Multimed Tools Appl"},{"key":"3597_CR30","doi-asserted-by":"publisher","unstructured":"Kiran A, Prakash SW, Kumar BA, Likhitha, Sameeratmaja T and Charan USSR. Intrusion detection system using machine learning. In: 2023 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 2023; pp. 1\u20134. https:\/\/doi.org\/10.1109\/ICCCI56745.2023.10128363.","DOI":"10.1109\/ICCCI56745.2023.10128363"},{"issue":"1","key":"3597_CR31","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.dcan.2022.09.021","volume":"9","author":"H Lin","year":"2023","unstructured":"Lin H, Xue Q, Feng J, Bai Di. Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine. Digit Commun Netw. 2023;9(1):111\u201324. https:\/\/doi.org\/10.1016\/j.dcan.2022.09.021.","journal-title":"Digit Commun Netw"},{"issue":"2","key":"3597_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/ett.4690","volume":"34","author":"MN Krishnan","year":"2023","unstructured":"Krishnan MN, Thiyagarajan R. Entropy-based complex proportional assessment for efficient task scheduling in fog computing. Trans Emerg Telecommun Technol. 2023;34(2):1\u201328. https:\/\/doi.org\/10.1002\/ett.4690.","journal-title":"Trans Emerg Telecommun Technol"},{"key":"3597_CR33","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4941","author":"N Malathy","year":"2024","unstructured":"Malathy N, Revathi T. Opposition-based improved memetic algorithm for placement of concurrent Internet of Things applications in fog computing. Trans Emerg Telecommun Technol. 2024. https:\/\/doi.org\/10.1002\/ett.4941.","journal-title":"Trans Emerg Telecommun Technol"},{"key":"3597_CR34","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1002\/cpe.7227","volume":"34","author":"MN Krishnan","year":"2022","unstructured":"Krishnan MN, Thiyagarajan R. Multi-objective task scheduling in fog computing using improved gaining sharing knowledge-based algorithm. Concurr Comput: Pract Exper. 2022;34:24. https:\/\/doi.org\/10.1002\/cpe.7227.","journal-title":"Concurr Comput: Pract Exper"},{"issue":"1","key":"3597_CR35","doi-asserted-by":"publisher","first-page":"157","DOI":"10.47857\/irjms.2024.v05i01.0182","volume":"5","author":"N Malathy","year":"2024","unstructured":"Malathy N, Grace Sophia J, Swathi S, Vijaya-Subasri K. Privacy-preserving medical diagnosis system using harris hawk optimization in edge computing. Int Res J Multidisciplin Scope. 2024;5(1):157\u201370.","journal-title":"Int Res J Multidisciplin Scope"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03597-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03597-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03597-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T14:03:55Z","timestamp":1736258635000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03597-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,7]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,1]]}},"alternative-id":["3597"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03597-4","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,7]]},"assertion":[{"value":"7 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"66"}}