{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:48:47Z","timestamp":1776077327519,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T00:00:00Z","timestamp":1743638400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T00:00:00Z","timestamp":1743638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-03875-9","type":"journal-article","created":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T04:39:40Z","timestamp":1743827980000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A New Model to Evaluate Signature and Anomaly Based Intrusion Detection in Medical IoT System Using Ensemble Approach"],"prefix":"10.1007","volume":"6","author":[{"given":"A. Sheik","family":"Abdullah","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hridhik John","family":"Sunil","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohamed Saleem Haja","family":"Nazmudeen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,4,3]]},"reference":[{"key":"3875_CR1","doi-asserted-by":"publisher","first-page":"2479","DOI":"10.3390\/app13042479","volume":"13","author":"JB Awotunde","year":"2023","unstructured":"Awotunde JB, Folorunso SO, Imoize AL, Odunuga JO, Lee C-C, Li C-T, Do D-T. An ensemble Tree-Based model for intrusion detection in industrial internet of things networks. Appl Sci. 2023;13:2479. https:\/\/doi.org\/10.3390\/app13042479.","journal-title":"Appl Sci"},{"key":"3875_CR2","doi-asserted-by":"publisher","unstructured":"Wazid M, Singh J, Das AK, Rodrigues JJPC. An Ensemble- based machine Learning-Envisioned intrusion detection in industry 5.0- driven healthcare applications. IEEE Trans Consum Electron. https:\/\/doi.org\/10.1109\/TCE.2023.3318850.","DOI":"10.1109\/TCE.2023.3318850"},{"key":"3875_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s11416-022-00456-9","volume":"19","author":"M Mohy-eddine","year":"2023","unstructured":"Mohy-eddine M, Guezzaz A, Benkirane S, et al. An effective intrusion detection approach based on ensemble learning for IIoT edge computing. J Comput Virol Hack Tech. 2023;19:469\u201381. https:\/\/doi.org\/10.1007\/s11416-022-00456-9.","journal-title":"J Comput Virol Hack Tech"},{"key":"3875_CR4","unstructured":"Kongsorot Y, Musikawan P, Aimtongkham P, You I. A. Benslimane and."},{"issue":"4","key":"3875_CR5","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1109\/TSUSC.2023.3303422","volume":"8","author":"C So-In","year":"2023","unstructured":"So-In C. An intrusion detection and identification system for internet of things networks using a hybrid ensemble deep learning framework. IEEE Trans Sustainable Comput. 2023;8(4):596\u2013613. https:\/\/doi.org\/10.1109\/TSUSC.2023.3303422.","journal-title":"IEEE Trans Sustainable Comput"},{"key":"3875_CR6","doi-asserted-by":"publisher","first-page":"102","DOI":"10.3390\/fi14040102","volume":"14","author":"V Tomer","year":"2022","unstructured":"Tomer V, Sharma S. Detecting IoT attacks using an ensemble machine learning model. Future Internet. 2022;14:102. https:\/\/doi.org\/10.3390\/fi14040102.","journal-title":"Future Internet"},{"key":"3875_CR7","doi-asserted-by":"publisher","unstructured":"Norouzi M, G\u00fcrkas\u00b8-Ayd\u0131n Z, Turna \u00d6C, Yag\u02d8ci MY, Aydin MA, Souri AA. Hybrid genetic Algorithm-Based random forest model for intrusion detection approach in internet of medical things. Appl Sci. 2023;1311145. https:\/\/doi.org\/10.3390\/app132011145.","DOI":"10.3390\/app132011145"},{"key":"3875_CR8","doi-asserted-by":"publisher","unstructured":"Tama BA, Comuzzi M, Rhee K-H. TSE-IDS: A Two- Stage Classifier Ensemble for Intelligent Anomaly-Based Intrusion Detection System, in IEEE Access, vol. 7, pp. 94497\u201394507, 2019, https:\/\/doi.org\/10.1109\/ACCESS.2019.2928048.","DOI":"10.1109\/ACCESS.2019.2928048"},{"key":"3875_CR9","doi-asserted-by":"publisher","unstructured":"Fouda M, Ksantini R, Elmedany W. A novel intrusion detection system for internet of healthcare things based on deep subclasses dispersion information. IEEE Internet Things J. 2023,10(10):8395\u2013407. https:\/\/doi.org\/10.1109\/JIOT.2022.3230694.","DOI":"10.1109\/JIOT.2022.3230694"},{"key":"3875_CR10","doi-asserted-by":"publisher","unstructured":"Hady AA, Ghubaish A, Salman T, Unal D, Jain R. Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study, in IEEE Access, vol. 8, pp. 106576\u2013106584, 2020. https:\/\/doi.org\/10.1109\/ACCESS.2020.3000421.","DOI":"10.1109\/ACCESS.2020.3000421"},{"key":"3875_CR11","doi-asserted-by":"publisher","unstructured":"A.Ghourabi, A security model based on LightGBM and transformer to protect healthcare systems from cyberattacks. in IEEE Access, 10, pp. 48890\u2013903, 2022. https:\/\/doi.org\/10.1109\/ACCESS.2022.3172432.","DOI":"10.1109\/ACCESS.2022.3172432"},{"key":"3875_CR12","doi-asserted-by":"publisher","unstructured":"Ekolle ZE, Ochiai H, Kohno R. Collabo: A collaborative machine learning model and its application to the security of heterogeneous medical data in an IoT network, in IEEE access, 11, pp. 142663\u201375, 2023. https:\/\/doi.org\/10.1109\/ACCESS.2023.3341837.","DOI":"10.1109\/ACCESS.2023.3341837"},{"key":"3875_CR13","doi-asserted-by":"publisher","first-page":"181560","DOI":"10.1109\/ACCESS.2020.3026260","volume":"8","author":"G Thamilarasu","year":"2020","unstructured":"Thamilarasu G, Odesile A, Hoang A. An intrusion detection system for internet of medical things. IEEE Access. 2020;8:181560\u201376. https:\/\/doi.org\/10.1109\/ACCESS.2020.3026260.","journal-title":"IEEE Access"},{"key":"3875_CR14","doi-asserted-by":"publisher","first-page":"1375","DOI":"10.3390\/electronics10121375","volume":"10","author":"C Iwendi","year":"2021","unstructured":"Iwendi C, Anajemba JH, Biamba C, Ngabo D. Security of thing intrusion detection system for smart healthcare. Electronics. 2021;10:1375. https:\/\/doi.org\/10.3390\/electronics10121375.","journal-title":"Electronics"},{"key":"3875_CR15","doi-asserted-by":"publisher","unstructured":"Ferrag MA, Friha O, Maglaras L, Janicke H, Shu L. Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis, in IEEE Access, vol. 9, pp. 138509\u2013138542, 2021. https:\/\/doi.org\/10.1109\/ACCESS.2021.3118642.","DOI":"10.1109\/ACCESS.2021.3118642"},{"issue":"11","key":"3875_CR16","doi-asserted-by":"publisher","first-page":"8707","DOI":"10.1109\/JIOT.2020.3045653","volume":"8","author":"A Ghubaish","year":"2021","unstructured":"Ghubaish A, Salman T, Zolanvari M, Unal D, Al-Ali A. Jain recent advances in the Internet-of-Medical-Things (IoMT) systems security. IEEE Internet Things J. 2021;8(11):8707\u201318. https:\/\/doi.org\/10.1109\/JIOT.2020.3045653.","journal-title":"IEEE Internet Things J"},{"key":"3875_CR17","doi-asserted-by":"publisher","first-page":"2562","DOI":"10.3390\/electronics10212562","volume":"10","author":"G Zachos","year":"2021","unstructured":"Zachos G, Essop I, Mantas G, Porfyrakis K, Ribeiro JC. Ro- Driguez, J. An Anomaly-Based intrusion detection system for In- Ternet of medical things networks. Electronics. 2021;10:2562. https:\/\/doi.org\/10.3390\/electronics10212562.","journal-title":"Electronics"},{"key":"3875_CR18","doi-asserted-by":"publisher","first-page":"5503","DOI":"10.1007\/s11276-020-02340-0","volume":"27","author":"R Somasundaram","year":"2021","unstructured":"Somasundaram R, Thirugnanam M. Review of security challenges in healthcare internet of things. Wirel Netw. 2021;27:5503\u20139. https:\/\/doi.org\/10.1007\/s11276-020-02340-0.","journal-title":"Wirel Netw"},{"key":"3875_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-022-02042-1","author":"S Ksibi","year":"2023","unstructured":"Ksibi S, Jaidi F, Bouhoula A. Mob Netw Appl. 2023;28:107\u201327. https:\/\/doi.org\/10.1007\/s11036-022-02042-1. A Comprehensive Study of Security and Cyber-Security Risk Management within e-Health Systems: Synthe- sis, Analysis and a Novel Quantified Approach."},{"key":"3875_CR20","doi-asserted-by":"publisher","unstructured":"Mishra N, Pandya S. Internet of Things Applications, Secu- rity Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review, in IEEE Access, vol. 9, pp. 59353\u201359377, 2021. https:\/\/doi.org\/10.1109\/ACCESS.2021.3073408.","DOI":"10.1109\/ACCESS.2021.3073408"},{"key":"3875_CR21","doi-asserted-by":"publisher","DOI":"10.3390\/app132111985","author":"A Odeh","year":"2023","unstructured":"Odeh A, Anas Abu Taleb. Detect Appl Sci. 2023;13:21: 11985. https:\/\/doi.org\/10.3390\/app132111985. Ensemble-Based Deep Learn- ing Models for Enhancing IoT Intrusion."},{"key":"3875_CR22","doi-asserted-by":"publisher","unstructured":"Li J, Cai. Jinjin and Khan, Fazlullah and Rehman, Ateeq Ur and Balasubramaniam, Venki and Sun, Jiangfeng and Venu, P. A Secured Framework for SDN-Based Edge Computing in IoT-Enabled Healthcare System, in IEEE Access, vol. 8, pp. 135479\u2013135490, 2020. https:\/\/doi.org\/10.1109\/ACCESS.2020.3011503.","DOI":"10.1109\/ACCESS.2020.3011503"},{"key":"3875_CR23","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s10916-019-1489-9","volume":"44","author":"SC Sethuraman","year":"2020","unstructured":"Sethuraman SC, Vijayakumar V, Walczak S. Cyber attacks on healthcare devices using unmanned aerial vehicles. J Med Syst. 2020;44:29. https:\/\/doi.org\/10.1007\/s10916-019-1489-9.","journal-title":"J Med Syst"},{"key":"3875_CR24","doi-asserted-by":"publisher","first-page":"3025","DOI":"10.3390\/s21093025","volume":"21","author":"F Hussain","year":"2021","unstructured":"Hussain F, Abbas SG, Shah GA, Pires IM, Fayyaz UU, Shahzad F, Garcia NM, Zdravevski E. A framework for malicious Traf- Fic detection in IoT healthcare environment. Sensors. 2021;21:3025. https:\/\/doi.org\/10.3390\/s21093025.","journal-title":"Sensors"},{"key":"3875_CR25","doi-asserted-by":"publisher","unstructured":"Bhutia NT, Verma H, Chauhan N, Awasthi LK. DDoS At- tacks Detection in \u2018Internet of Medical Things\u2019 Using Machine Learning Techniques, 2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI), Gwalior, India, 2022, pp. 1\u20136. https:\/\/doi.org\/10.1109\/IATMSI56455.2022.10119428.","DOI":"10.1109\/IATMSI56455.2022.10119428"},{"key":"3875_CR26","doi-asserted-by":"publisher","unstructured":"Sharma A, Babbar H, Vats AK. Detection of attacks in smart healthcare deploying machine learning algorithms. Belgaum India. 2023;1\u20136. https:\/\/doi.org\/10.1109\/INCET57972.2023.10170367.","DOI":"10.1109\/INCET57972.2023.10170367"},{"key":"3875_CR27","doi-asserted-by":"publisher","unstructured":"Abdulwahid AA. Detection of Middlebox-Based Attacks in Healthcare Internet of Things Using Multiple Machine Learning Mod- els, Computational Intelligence and Neuroscience, vol. 2022, Article ID 2037954, 15 pages, 2022. https:\/\/doi.org\/10.1155\/2022\/2037954.","DOI":"10.1155\/2022\/2037954"},{"key":"3875_CR28","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1038\/s41598-024-51154-z","volume":"14","author":"OBJ Rabie","year":"2024","unstructured":"Rabie OBJ, Selvarajan S, Hasanin T, et al. A novel IoT intrusion detection framework using decisive red Fox optimization and descriptive back propagated radial basis function models. Sci Rep. 2024;14:386. https:\/\/doi.org\/10.1038\/s41598-024-51154-z.","journal-title":"Sci Rep"},{"key":"3875_CR29","doi-asserted-by":"publisher","first-page":"11058","DOI":"10.1038\/s41598-023-38203-9","volume":"13","author":"M Hosseinzadeh","year":"2023","unstructured":"Hosseinzadeh M, Yoo J, Ali S, et al. A fuzzy logic-based secure hierarchical routing scheme using firefly algorithm in internet of things for healthcare. Sci Rep. 2023;13:11058. https:\/\/doi.org\/10.1038\/s41598-023-38203-9.","journal-title":"Sci Rep"},{"key":"3875_CR30","doi-asserted-by":"publisher","first-page":"1072","DOI":"10.3390\/pr11041072","volume":"11","author":"KP Vijayakumar","year":"2023","unstructured":"Vijayakumar KP, Pradeep K, Balasundaram A, Prusty MR. En- Hanced cyber attack detection process for internet of health things (IoHT) devices using deep neural network. Processes. 2023;11:1072. https:\/\/doi.org\/10.3390\/pr11041072.","journal-title":"Processes"},{"key":"3875_CR31","doi-asserted-by":"publisher","unstructured":"Alanya-Beltran J, Padilla-Caballero J, Pant R, Jagadish S, Ibrahim RK, Alazzam MB. Identification of Cyber-Attacks in IoT-based Health- care, 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Greater Noida, India, 2023, pp. 2692\u20132696. https:\/\/doi.org\/10.1109\/ICACITE57410.2023.10183349.","DOI":"10.1109\/ICACITE57410.2023.10183349"},{"key":"3875_CR32","doi-asserted-by":"publisher","first-page":"9247","DOI":"10.3390\/s23229247","volume":"23","author":"M Alalhareth","year":"2023","unstructured":"Alalhareth M, Hong S-C. An adaptive intrusion detection system in the internet of medical things using Fuzzy-Based learning. Sensors. 2023;23:9247. https:\/\/doi.org\/10.3390\/s23229247.","journal-title":"Sensors"},{"key":"3875_CR33","doi-asserted-by":"publisher","unstructured":"Rihan SDA, Anbar M, Alabsi BA. Approach for Detecting Attacks on IoT Networks Based on Ensemble Feature Selection and Deep Learning Mod- els. Sensors (Basel). 2023 Aug 23;23(17):7342. https:\/\/doi.org\/10.3390\/s23177342.","DOI":"10.3390\/s23177342"},{"key":"3875_CR34","doi-asserted-by":"publisher","unstructured":"Kilincer IF, Ertam F, Sengur A, Tan R-S, Rajendra U, Acharya. Automated detection of cybersecurity attacks in healthcare systems with recursive feature elimination and multi- layer perceptron optimization biocybernetics and biomedical Engi- Neering, 43, issue 1, 2023, Pages 30\u201341, ISSN 0208\u20135216, https:\/\/doi.org\/10.1016\/j.bbe.2022.11.005.","DOI":"10.1016\/j.bbe.2022.11.005"},{"key":"3875_CR35","doi-asserted-by":"publisher","unstructured":"Saheed YK, Arowolo MO. Efficient cyber attack detection on the internet of medical Things-Smart environment based on deep recurrent neural network and machine learning algorithms, in IEEE access, 9, pp. 161546\u201354, 2021. https:\/\/doi.org\/10.1109\/ACCESS.2021.3128837.","DOI":"10.1109\/ACCESS.2021.3128837"},{"key":"3875_CR36","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10922-023-09722-7","volume":"31","author":"O Jullian","year":"2023","unstructured":"Jullian O, Otero B, Rodriguez E, et al. Deep-Learning based detection for Cyber-Attacks in IoT networks: A distributed At- tack detection framework. J Netw Syst Manage. 2023;31:33. https:\/\/doi.org\/10.1007\/s10922-023-09722-7.","journal-title":"J Netw Syst Manage"},{"key":"3875_CR37","doi-asserted-by":"publisher","unstructured":"Rathee G, Saini H, Kerrache CA, Herrera-Tapia J. 2022. A computational framework for cyber threats in medical IoT systems electronics 11, no. 11: 1705. https:\/\/doi.org\/10.3390\/electronics11111705","DOI":"10.3390\/electronics11111705"},{"key":"3875_CR38","doi-asserted-by":"publisher","unstructured":"Basharat A, Mohamad MMB, Khan A. Machine Learning Techniques for Intrusion Detection in Smart Healthcare Systems: A Com- parative Analysis, 2022 4th International Conference on Smart Sensors and Application (ICSSA), Kuala Lumpur, Malaysia, 2022, pp. 29\u201333. https:\/\/doi.org\/10.1109\/ICSSA54161.2022.9870973.","DOI":"10.1109\/ICSSA54161.2022.9870973"},{"key":"3875_CR39","doi-asserted-by":"publisher","first-page":"127","DOI":"10.3390\/s24010127","volume":"24","author":"AH Farooqi","year":"2024","unstructured":"Farooqi AH, Akhtar S, Rahman H, Sadiq T, Abbass W. Enhancing network intrusion detection using an ensemble voting classifier for internet of things. Sensors. 2024;24:127. https:\/\/doi.org\/10.3390\/s24010127.","journal-title":"Sensors"},{"key":"3875_CR40","doi-asserted-by":"publisher","unstructured":"Yao W, Zhang K, Yu C, Zhao H. Exploiting Ensemble Learning for Edge-assisted Anomaly Detection Scheme in e-healthcare System, 2021 IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, 2021, pp. 1\u20137, https:\/\/doi.org\/10.1109\/GLOBECOM46510.2021.9685745.","DOI":"10.1109\/GLOBECOM46510.2021.9685745"},{"key":"3875_CR41","doi-asserted-by":"publisher","unstructured":"Pakrooh R, Jabbari A, Fung C. Deep Learning-Assisted Security and Privacy Provisioning in the Internet of Medical Things Systems: A Survey on Recent Advances, in IEEE Access, vol. 12, pp. 40610\u201340621, 2024, https:\/\/doi.org\/10.1109\/ACCESS.2024.3377561.","DOI":"10.1109\/ACCESS.2024.3377561"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03875-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-03875-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03875-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T04:39:43Z","timestamp":1743827983000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-03875-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,3]]},"references-count":41,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["3875"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-03875-9","relation":{"references":[{"id-type":"doi","id":"10.1007\/s11036-022-02042-1","asserted-by":"subject"},{"id-type":"doi","id":"10.3390\/app132111985","asserted-by":"subject"}]},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,3]]},"assertion":[{"value":"21 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human and \/or Animals"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"The authors declares that they have No any conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"347"}}