{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T11:38:33Z","timestamp":1764070713984,"version":"3.45.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-04513-0","type":"journal-article","created":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T11:34:58Z","timestamp":1764070498000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Kervolutional Neural Network with Feature Fusion for Detecting IoT Security Threats"],"prefix":"10.1007","volume":"6","author":[{"given":"D. R.","family":"Janardhana","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"K.","family":"Shivanna","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohamed","family":"Ghouse Shukur","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"C. P.","family":"Vijay","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"H. R.","family":"Mahalingegowda","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"H. V.","family":"Nithin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,11,25]]},"reference":[{"issue":"13","key":"4513_CR1","doi-asserted-by":"publisher","first-page":"11093","DOI":"10.1109\/JIOT.2023.3239944","volume":"10","author":"S Lu","year":"2023","unstructured":"Lu S, Lu J, An K, Wang X, He Q. Edge computing on IoT for machine signal processing and fault diagnosis: A review. IEEE Internet Things J. 2023;10(13):11093\u2013116. https:\/\/doi.org\/10.1109\/JIOT.2023.3239944.","journal-title":"IEEE Internet Things J"},{"key":"4513_CR2","doi-asserted-by":"publisher","unstructured":"Venkatasubramanian M, Lashkari AH, Hakak S. IoT Malware Analysis Using Federated Learning: A Comprehensive Survey, in IEEE Access, vol. 11, pp. 5004\u20135018, 2023, https:\/\/doi.org\/10.1109\/ACCESS.2023.3235389","DOI":"10.1109\/ACCESS.2023.3235389"},{"issue":"2","key":"4513_CR3","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1504\/IJCAT.2021.114988","volume":"65","author":"SS Alshamrani","year":"2021","unstructured":"Alshamrani SS, Basha AF. IoT data security with DNA-Genetic algorithm using blockchain technology. Int J Comput Appl Technol. 2021;65(2):150\u20139.","journal-title":"Int J Comput Appl Technol"},{"issue":"4","key":"4513_CR4","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1016\/j.jnca.2011.01.002","volume":"34","author":"F Amiri","year":"2011","unstructured":"Amiri F, Yousefi MR, Lucas C, Shakery A, Yazdani N. Mutual Information-Based feature selection for intrusion detection systems. J Netw Comput Appl. 2011;34(4):1184\u201399.","journal-title":"J Netw Comput Appl"},{"issue":"6","key":"4513_CR5","doi-asserted-by":"publisher","first-page":"e91","DOI":"10.1002\/spy2.91","volume":"2","author":"S Bagui","year":"2019","unstructured":"Bagui S, Kalaimannan E, Bagui S, Nandi D, Pinto A. Using machine learning techniques to identify rare Cyber-attacks on the UNSW-NB15 dataset. Secur Priv. 2019;2(6):e91.","journal-title":"Secur Priv"},{"key":"4513_CR6","doi-asserted-by":"crossref","unstructured":"Hegde MN, Kanchan J, Shetty AB, Janardhana D, Ganaraj K. Security Issues and Challenges in the Internet of Things (IoT), Advances in Applications of Computational Intelligence and the Internet of Things, pp. 77\u201390, 2022.","DOI":"10.1201\/9781003127482-6"},{"issue":"9","key":"4513_CR7","doi-asserted-by":"publisher","first-page":"3014","DOI":"10.1016\/j.asoc.2012.04.020","volume":"12","author":"YY Chung","year":"2012","unstructured":"Chung YY, Wahid N. A hybrid network intrusion detection system using simplified swarm optimization (SSO). Appl Soft Comput. 2012;12(9):3014\u201322.","journal-title":"Appl Soft Comput"},{"key":"4513_CR8","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.neucom.2014.09.083","volume":"164","author":"E De la Hoz","year":"2015","unstructured":"De la Hoz E, De La Hoz E, Ortiz A, Ortega J, Prieto B. PCA filtering and probabilistic SOM for network intrusion detection. Neurocomputing. 2015;164:71\u201381.","journal-title":"Neurocomputing"},{"issue":"4","key":"4513_CR9","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.eswa.2005.05.002","volume":"29","author":"O Depren","year":"2005","unstructured":"Depren O, Topallar M, Anarim E, Ciliz MK. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Syst Appl. 2005;29(4):713\u201322.","journal-title":"Expert Syst Appl"},{"key":"4513_CR10","first-page":"1","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa N, Slay J. The evaluation of network anomaly detection systems: statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Inform Secur Journal: Global Perspective. 2016;25:1\u20133.","journal-title":"Inform Secur Journal: Global Perspective"},{"issue":"6","key":"4513_CR11","first-page":"446","volume":"4","author":"L Dhanabal","year":"2015","unstructured":"Dhanabal L, Shantharajah S. A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int J Adv Res Comput Communication Eng. 2015;4(6):446\u201352.","journal-title":"Int J Adv Res Comput Communication Eng"},{"issue":"2","key":"4513_CR12","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/846183.846199","volume":"1","author":"C Elkan","year":"2000","unstructured":"Elkan C. Results of the KDD\u201999 classifier learning. ACM SIGKDD Explorations Newsl. 2000;1(2):63\u20134.","journal-title":"ACM SIGKDD Explorations Newsl"},{"key":"4513_CR13","doi-asserted-by":"crossref","unstructured":"Gharaee H, Hosseinvand H. A New Feature Selection IDS Based on Genetic Algorithm and SVM, in 2016 8th International Symposium on Telecommunications (IST). IEEE, 2016, pp. 139\u2013144.","DOI":"10.1109\/ISTEL.2016.7881798"},{"key":"4513_CR14","unstructured":"Guyon I, Gunn S, Nikravesh M, Zadeh LA. Feature extraction: foundations and applications. Springer; 2008. p. 207."},{"key":"4513_CR15","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.comnet.2018.02.028","volume":"136","author":"V Hajisalem","year":"2018","unstructured":"Hajisalem V, Babaie S. A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput Netw. 2018;136:37\u201350.","journal-title":"Comput Netw"},{"issue":"200","key":"4513_CR16","first-page":"190","volume":"5","author":"MH Kamarudin","year":"2017","unstructured":"Kamarudin MH, Maple C, Watson T, Safa NS. A Logitboost- based algorithm for detecting known and unknown web attacks. IEEE Access. 2017;5(200):190\u201326.","journal-title":"IEEE Access"},{"key":"4513_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00379-6","volume":"7","author":"SM Kasongo","year":"2020","unstructured":"Kasongo SM, Sun Y. Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J Big Data. 2020;7:1\u201320.","journal-title":"J Big Data"},{"key":"4513_CR18","doi-asserted-by":"crossref","unstructured":"Vinayakumar R, Soman K, Poornachandran P, Applying Convolutional Neural Network for Network Intrusion Detection, in. 2017 International Conference on Advances in Computing, Communications, and Informatics (ICACCI). IEEE, 2017, pp. 1222\u20131228.","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"4513_CR19","doi-asserted-by":"crossref","unstructured":"Janardhana D, Kumar VP, Lavanya S, Manu A. Detecting Security and Privacy Attacks in IoT Network using Deep Learning Algorithms, in 2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER). IEEE, 2021, pp. 35\u201340.","DOI":"10.1109\/DISCOVER52564.2021.9663586"},{"issue":"15","key":"4513_CR20","doi-asserted-by":"publisher","first-page":"5621","DOI":"10.3390\/s22155621","volume":"22","author":"E Rodr\u00b4\u0131guez","year":"2022","unstructured":"Rodr\u00b4\u0131guez E, Valls P, Otero B, Costa JJ, Verdu\u00b4 J, Pajuelo MA, Canal R. Transfer-Learning-Based intrusion detection framework in IoT networks. Sensors. 2022;22(15):5621.","journal-title":"Sensors"},{"issue":"17","key":"4513_CR21","doi-asserted-by":"publisher","first-page":"29102","DOI":"10.1109\/JIOT.2024.3406044","volume":"11","author":"K Zheng","year":"2024","unstructured":"Zheng K, Luo R, Liu X, Qiu J, Liu J. Distributed DDPG-Based resource allocation for age of information minimization in mobile Wireless-Powered internet of things. IEEE Internet Things J. 2024;11(17):29102\u201315. https:\/\/doi.org\/10.1109\/JIOT.2024.3406044.","journal-title":"IEEE Internet Things J"},{"key":"4513_CR22","doi-asserted-by":"crossref","unstructured":"Nandi R, Shekhar S, Mulimani M. Acoustic Scene Classification using Kervolution-Based Sub-Spectral Net, in 22nd Annual Conference of the International Speech Communication Association, INTERSPEECH 2021. International Speech Communication Association, 2021, pp 26\u201330.","DOI":"10.21437\/Interspeech.2021-656"},{"issue":"6","key":"4513_CR23","doi-asserted-by":"publisher","first-page":"9447","DOI":"10.1007\/s11042-022-13763-6","volume":"82","author":"M Mulimani","year":"2023","unstructured":"Mulimani M, Nandi R, Koolagudi SG. Acoustic scene classification using projection kervolutional neural network. Multimedia Tools Appl. 2023;82(6):9447\u201357.","journal-title":"Multimedia Tools Appl"},{"key":"4513_CR24","unstructured":"Perez N. Exploring Kervolutional Neural Networks, arXiv preprint arXiv:2201.07264, 2022."},{"key":"4513_CR25","doi-asserted-by":"crossref","unstructured":"Ammann O, Michau G, Fink O. Anomaly Detection and Classification in Time Series with Kervolutional Neural Networks, arXiv preprint arXiv:2005.07078, 2020.","DOI":"10.3850\/978-981-14-8593-0_5044-cd"},{"key":"4513_CR26","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J, UNSW-NB15. A Comprehensive Dataset for Network Intrusion Detection Systems (UNSW-NB15 Network Dataset), in, : 2015 military communications and information systems conference (MilCIS). IEEE, 2015, pp. 1\u20136.","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"3","key":"4513_CR27","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1504\/IJCAT.2021.116009","volume":"65","author":"S Mishra","year":"2021","unstructured":"Mishra S. Detection and mitigation of attacks in SDN-Based IoT network using SVM. Int J Comput Appl Technol. 2021;65(3):270\u201381.","journal-title":"Int J Comput Appl Technol"},{"key":"4513_CR28","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J. The Significant Features of the UNSW-NB15 and the KDD\u201999 Datasets for Network Intrusion Detection Systems, in 2015 4th international workshop on building analysis datasets and gathering experience returns for security (BADGERS). IEEE, 2015, pp. 25\u201331.","DOI":"10.1109\/BADGERS.2015.014"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04513-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-04513-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-04513-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T11:35:04Z","timestamp":1764070504000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-04513-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,25]]},"references-count":28,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["4513"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-04513-0","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,25]]},"assertion":[{"value":"8 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}},{"value":"This is an observational study. The Research Ethics Committee has confirmed that no ethical approval is required.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval and Consent to Participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human Ethics and Consent To Participate"}}],"article-number":"979"}}