{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T09:10:33Z","timestamp":1773220233511,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T00:00:00Z","timestamp":1773100800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T00:00:00Z","timestamp":1773100800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-026-04805-z","type":"journal-article","created":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T11:23:28Z","timestamp":1773141808000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Enhanced Approach for Edge-Based Intrusion Detection Based on a Hybrid Deep Learning Model CNN-DNN"],"prefix":"10.1007","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3048-1920","authenticated-orcid":false,"given":"Ahmed M.","family":"Elshewey","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,10]]},"reference":[{"key":"4805_CR1","doi-asserted-by":"publisher","unstructured":"Zhang Y, Muniyandi RC, Qamar F. A Review of Deep Learning Applications in Intrusion Detection Systems: Overcoming Challenges in Spatiotemporal Feature Extraction and Data Imbalance. Applied Sciences 2025, Vol. 15, Page 1552. 15, 1552 (2025). https:\/\/doi.org\/10.3390\/APP15031552","DOI":"10.3390\/APP15031552"},{"key":"4805_CR2","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/S10462-025-11346-Z","volume":"58","author":"ECP Neto","year":"2025","unstructured":"Neto ECP, Iqbal S, Buffett S, Sultana M, Taylor A. Deep learning for intrusion detection in emerging technologies: a comprehensive survey and new perspectives. Artif Intell Rev 2025. 2025;58:11. https:\/\/doi.org\/10.1007\/S10462-025-11346-Z.","journal-title":"Artif Intell Rev 2025"},{"key":"4805_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/S13677-025-00762-9","volume":"14","author":"HGA Umar","year":"2025","unstructured":"Umar HGA, Yasmeen I, Aoun M, Mazhar T, Khan MA, Jaghdam IH, Hamam H. Energy-efficient deep learning-based intrusion detection system for edge computing: a novel DNN-KDQ model. J Cloud Comput. 2025;14:1\u201327. https:\/\/doi.org\/10.1186\/S13677-025-00762-9.","journal-title":"J Cloud Comput"},{"key":"4805_CR4","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"HJ Liao","year":"2013","unstructured":"Liao HJ, Lin CHR, Lin YC, Tung KY. Intrusion detection system: A comprehensive review. J Netw Comput Appl. 2013;36:16\u201324. https:\/\/doi.org\/10.1016\/j.jnca.2012.09.004.","journal-title":"J Netw Comput Appl"},{"key":"4805_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/S40537-024-00943-4","volume":"11","author":"M Mujahid","year":"2024","unstructured":"Mujahid M, K\u0131na EROL, Rustam F, Villar MG, Alvarado ES, De La Torre Diez I, Ashraf I. Data oversampling and imbalanced datasets: an investigation of performance for machine learning and feature engineering. J Big Data. 2024;11:1\u201332. https:\/\/doi.org\/10.1186\/S40537-024-00943-4.","journal-title":"J Big Data"},{"key":"4805_CR6","doi-asserted-by":"publisher","unstructured":"Demircio\u011flu A. Applying oversampling before cross-validation will lead to high bias in radiomics. Scientific Reports 2024 14:1. 14, 1\u201311 (2024). https:\/\/doi.org\/10.1038\/s41598-024-62585-z","DOI":"10.1038\/s41598-024-62585-z"},{"key":"4805_CR7","doi-asserted-by":"publisher","unstructured":"Shanmugam V, Razavi-Far R, Hallaji E. Addressing Class Imbalance in Intrusion Detection: A Comprehensive Evaluation of Machine Learning Approaches. Electronics 2025, Vol. 14, Page 69. 14, 69 (2024). https:\/\/doi.org\/10.3390\/ELECTRONICS14010069","DOI":"10.3390\/ELECTRONICS14010069"},{"key":"4805_CR8","doi-asserted-by":"publisher","first-page":"200298","DOI":"10.1016\/J.ISWA.2023.200298","volume":"20","author":"T Al Nuaimi","year":"2023","unstructured":"Al Nuaimi T, Zaabi A, Alyilieli S, AlMaskari M, Alblooshi M, Alhabsi S, Yusof F, Bin MF, Al Badawi A. A comparative evaluation of intrusion detection systems on the edge-IIoT-2022 dataset. Intell Syst Appl. 2023;20:200298. https:\/\/doi.org\/10.1016\/J.ISWA.2023.200298.","journal-title":"Intell Syst Appl"},{"key":"4805_CR9","doi-asserted-by":"publisher","first-page":"2249","DOI":"10.1002\/spe.3338","volume":"54","author":"M Sahi","year":"2024","unstructured":"Sahi M, Auluck N, Azim A, Maruf MA. Dynamic hierarchical intrusion detection task offloading in IoT edge networks. Software: Pract Experience. 2024;54:2249\u201371. https:\/\/doi.org\/10.1002\/spe.3338.","journal-title":"Software: Pract Experience"},{"key":"4805_CR10","doi-asserted-by":"publisher","first-page":"111080","DOI":"10.1016\/J.ASOC.2023.111080","volume":"150","author":"S Shen","year":"2024","unstructured":"Shen S, Cai C, Li Z, Shen Y, Wu G, Yu S. Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks. Appl Soft Comput. 2024;150:111080. https:\/\/doi.org\/10.1016\/J.ASOC.2023.111080.","journal-title":"Appl Soft Comput"},{"key":"4805_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/S13677-024-00609-9","volume":"13","author":"N Tariq","year":"2024","unstructured":"Tariq N, Alsirhani A, Humayun M, Alserhani F, Shaheen M. A fog-edge-enabled intrusion detection system for smart grids. J Cloud Comput. 2024;13:1\u201334. https:\/\/doi.org\/10.1186\/S13677-024-00609-9.","journal-title":"J Cloud Comput"},{"issue":"1","key":"4805_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-025-11738-9","volume":"15","author":"AA Laghari","year":"2025","unstructured":"Laghari AA, Khan AA, Ksibi A, Hajjej F, Kryvinska N, Almadhor A, Mohamed MA, Alsubai S. A novel and secure artificial intelligence enabled zero trust intrusion detection in industrial internet of things architecture. Sci Rep 2025. 2025;15(1):15, 1\u201315. https:\/\/doi.org\/10.1038\/s41598-025-11738-9.","journal-title":"Sci Rep 2025"},{"key":"4805_CR13","doi-asserted-by":"publisher","first-page":"2926","DOI":"10.1109\/OJCOMS.2024.3421647","volume":"6","author":"M Mohammad Shtayat","year":"2025","unstructured":"Mohammad Shtayat M, Kamrul Hasan M, Kumar Budhati A, Solaiman R, Islam S, Pandey B, Abbas S, Saeed H. An improved binary spider Wasp optimization algorithm for intrusion detection for industrial internet of things. IEEE Open J Commun Soc. 2025;6:2926\u201344. https:\/\/doi.org\/10.1109\/OJCOMS.2024.3421647.","journal-title":"IEEE Open J Commun Soc"},{"key":"4805_CR14","doi-asserted-by":"publisher","first-page":"126886","DOI":"10.1016\/J.NEUCOM.2023.126886","volume":"564","author":"Y Lu","year":"2024","unstructured":"Lu Y, Chai S, Suo Y, Yao F, Zhang C. Intrusion detection for industrial internet of things based on deep learning. Neurocomputing. 2024;564:126886. https:\/\/doi.org\/10.1016\/J.NEUCOM.2023.126886.","journal-title":"Neurocomputing"},{"key":"4805_CR15","doi-asserted-by":"publisher","first-page":"1398","DOI":"10.1049\/CIT2.12352","volume":"9","author":"M Qathrady","year":"2024","unstructured":"Qathrady M, Al, Ullah S, Alshehri MS, Ahmad J, Almakdi S, Alqhtani SM, Khan MA, Ghaleb B. SACNN-IDS: A self-attention convolutional neural network for intrusion detection in industrial internet of things. CAAI Trans Intell Technol. 2024;9:1398\u2013411. https:\/\/doi.org\/10.1049\/CIT2.12352.","journal-title":"CAAI Trans Intell Technol"},{"key":"4805_CR16","doi-asserted-by":"publisher","first-page":"29132","DOI":"10.1109\/JIOT.2024.3406386","volume":"11","author":"S Yu","year":"2024","unstructured":"Yu S, Wang X, Shen Y, Wu G, Yu S, Shen S. Novel intrusion detection strategies with optimal hyper parameters for industrial internet of things based on stochastic games and double deep Q-Networks. IEEE Internet Things J. 2024;11:29132\u201345. https:\/\/doi.org\/10.1109\/JIOT.2024.3406386.","journal-title":"IEEE Internet Things J"},{"key":"4805_CR17","doi-asserted-by":"publisher","first-page":"3385","DOI":"10.1007\/S12083-024-01749-0","volume":"17","author":"Z Wang","year":"2024","unstructured":"Wang Z, Yang X, Zeng Z, He D, Chan S. A hierarchical hybrid intrusion detection model for industrial internet of things. Peer Peer Netw Appl. 2024;17:3385\u2013407. https:\/\/doi.org\/10.1007\/S12083-024-01749-0.","journal-title":"Peer Peer Netw Appl"},{"key":"4805_CR18","doi-asserted-by":"publisher","first-page":"20080","DOI":"10.1007\/S11227-024-06166-X","volume":"80","author":"S Ruiz-Villafranca","year":"2024","unstructured":"Ruiz-Villafranca S, Rold\u00e1n-G\u00f3mez J, G\u00f3mez JMC, Carrillo-Mond\u00e9jar J, Martinez JL. A TabPFN-based intrusion detection system for the industrial internet of things. J Supercomputing. 2024;80:20080\u2013117. https:\/\/doi.org\/10.1007\/S11227-024-06166-X.","journal-title":"J Supercomputing"},{"key":"4805_CR19","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/TAI.2024.3443787","volume":"6","author":"A Kaur","year":"2025","unstructured":"Kaur A. Intrusion detection approach for industrial internet of things traffic using deep recurrent reinforcement learning assisted federated learning. IEEE Trans Artif Intell. 2025;6:37\u201350. https:\/\/doi.org\/10.1109\/TAI.2024.3443787.","journal-title":"IEEE Trans Artif Intell"},{"key":"4805_CR20","doi-asserted-by":"publisher","unstructured":"Beauty Angelin JA, Priyadharsini C. Deep Learning based Network based Intrusion Detection System in Industrial Internet of Things. 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024. 426\u2013432 (2024). https:\/\/doi.org\/10.1109\/IDCIOT59759.2024.10467510","DOI":"10.1109\/IDCIOT59759.2024.10467510"},{"key":"4805_CR21","doi-asserted-by":"publisher","first-page":"10","DOI":"10.3390\/S25010010","volume":"25","author":"T Rehman","year":"2024","unstructured":"Rehman T, Tariq N, Khan FA, Rehman SU. FFL-IDS: A Fog-Enabled federated Learning-Based intrusion detection system to counter jamming and spoofing attacks for the industrial internet of things. Sens 2025. 2024;25:25, 10. https:\/\/doi.org\/10.3390\/S25010010. Page 10.","journal-title":"Sens 2025"},{"key":"4805_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S42452-024-06165-W","volume":"6","author":"SA Elsaid","year":"2024","unstructured":"Elsaid SA, Binbusayyis A. An optimized isolation forest based intrusion detection system for heterogeneous and streaming data in the industrial internet of things (IIoT) networks. Discover Appl Sci. 2024;6:1\u201329. https:\/\/doi.org\/10.1007\/S42452-024-06165-W.","journal-title":"Discover Appl Sci"},{"key":"4805_CR23","doi-asserted-by":"publisher","first-page":"123808","DOI":"10.1016\/J.ESWA.2024.123808","volume":"249","author":"H Nandanwar","year":"2024","unstructured":"Nandanwar H, Katarya R. Deep learning enabled intrusion detection system for industrial IOT environment. Expert Syst Appl. 2024;249:123808. https:\/\/doi.org\/10.1016\/J.ESWA.2024.123808.","journal-title":"Expert Syst Appl"},{"key":"4805_CR24","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/J.AEJ.2024.12.106","volume":"116","author":"MAO Ahmed","year":"2025","unstructured":"Ahmed MAO, AbdelSatar Y, Alotaibi R, Reyad O. Enhancing internet of things security using performance gradient boosting for network intrusion detection systems. Alexandria Eng J. 2025;116:472\u201382. https:\/\/doi.org\/10.1016\/J.AEJ.2024.12.106.","journal-title":"Alexandria Eng J"},{"key":"4805_CR25","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/S11276-023-03435-0","volume":"30","author":"A Kaushik","year":"2024","unstructured":"Kaushik A, Al-Raweshidy H. A novel intrusion detection system for internet of things devices and data. Wireless Netw. 2024;30:285\u201394. https:\/\/doi.org\/10.1007\/S11276-023-03435-0.","journal-title":"Wireless Netw"},{"key":"4805_CR26","doi-asserted-by":"publisher","first-page":"2559","DOI":"10.1007\/S10207-024-00855-7","volume":"23","author":"U Otokwala","year":"2024","unstructured":"Otokwala U, Petrovski A, Kalutarage H. Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in internet of things. Int J Inf Secur. 2024;23:2559\u201381. https:\/\/doi.org\/10.1007\/S10207-024-00855-7.","journal-title":"Int J Inf Secur"},{"key":"4805_CR27","doi-asserted-by":"publisher","unstructured":"Nadella, G. S., Addula, S. R., Yadulla, A. R., Sajja, G. S., Meesala, M., Maturi,M. H., \u2026 Gonaygunta, H.: Generative AI-Enhanced Cybersecurity Framework for Enterprise Data Privacy Management. Computers. 14, 55 (2025). https:\/\/doi.org\/10.3390\/computers14020055.","DOI":"10.3390\/computers14020055."},{"key":"4805_CR28","doi-asserted-by":"publisher","unstructured":"Huang J, Chen Z, Liu SZ, Zhang H, Long HX. Improved Intrusion Detection Based on Hybrid Deep Learning Models and Federated Learning. Sensors 2024, Vol. 24, Page 4002. 24, 4002 (2024). https:\/\/doi.org\/10.3390\/S24124002","DOI":"10.3390\/S24124002"},{"key":"4805_CR29","doi-asserted-by":"publisher","first-page":"101252","DOI":"10.1016\/j.iot.2024.101252","volume":"27","author":"SMS Bukhari","year":"2024","unstructured":"Bukhari SMS, Zafar MH, Abou Houran M, Qadir Z, Moosavi SKR, Sanfilippo F. Enhancing cybersecurity in edge IIoT networks: an asynchronous federated learning approach with a deep hybrid detection model. Internet Things. 2024;27:101252. https:\/\/doi.org\/10.1016\/j.iot.2024.101252.","journal-title":"Internet Things"},{"key":"4805_CR30","doi-asserted-by":"publisher","first-page":"26608","DOI":"10.1109\/ACCESS.2025.3538461","volume":"13","author":"M Srinivasan","year":"2025","unstructured":"Srinivasan M, Senthilkumar NC. Intrusion detection and prevention system (IDPS) model for IIoT environments using hybridized framework. IEEE Access. 2025;13:26608\u201321. https:\/\/doi.org\/10.1109\/ACCESS.2025.3538461.","journal-title":"IEEE Access"},{"key":"4805_CR31","doi-asserted-by":"publisher","first-page":"8491","DOI":"10.1109\/JIOT.2022.3196942","volume":"10","author":"A Zainudin","year":"2022","unstructured":"Zainudin A, Ahakonye LAC, Akter R, Kim DS, Lee JM. An efficient hybrid-dnn for Ddos detection and classification in software-defined Iiot networks. IEEE Internet Things J. 2022;10:8491\u2013504. https:\/\/doi.org\/10.1109\/JIOT.2022.3196942.","journal-title":"IEEE Internet Things J"},{"key":"4805_CR32","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H. Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access. 2022;10:40281\u2013306. https:\/\/doi.org\/10.1109\/ACCESS.2022.3165809.","journal-title":"IEEE Access"},{"key":"4805_CR33","doi-asserted-by":"publisher","unstructured":"Shah SSH, Jamil N, Khan A, ur R. Memory Visualization-Based Malware Detection Technique. Sensors 2022, Vol. 22, Page 7611. 22, 7611 (2022). https:\/\/doi.org\/10.3390\/S22197611","DOI":"10.3390\/S22197611"},{"key":"4805_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3764580","volume":"58","author":"Y Dehfouli","year":"2025","unstructured":"Dehfouli Y, Habibi Lashkari A. Memory analysis for malware detection: A comprehensive survey using the OSCAR methodology. ACM Comput Surv. 2025;58:1\u201358. https:\/\/doi.org\/10.1145\/3764580.","journal-title":"ACM Comput Surv"},{"key":"4805_CR35","doi-asserted-by":"publisher","first-page":"106614","DOI":"10.1016\/j.envsoft.2025.106614","volume":"193","author":"K Krasnod\u0119bska","year":"2025","unstructured":"Krasnod\u0119bska K, Goch W, Uhl JH, Verstegen JA, Pesaresi M. Advancing Precision, Recall, F-score, and Jaccard index: an approach for continuous, ratio-scale measurements. Environ Model Softw. 2025;193:106614. https:\/\/doi.org\/10.1016\/j.envsoft.2025.106614.","journal-title":"Environ Model Softw"},{"key":"4805_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-025-13457-7","volume":"15","author":"H Alamro","year":"2025","unstructured":"Alamro H, Albouq SS, Khan J, Alanazi MH, Aljehane NO, Alqurni JS, Alshahrani MM, Alasmari O. An intelligent deep representation learning with enhanced feature selection approach for cyberattack detection in internet of things enabled cloud environment. Sci Rep. 2025;15:1\u201320. https:\/\/doi.org\/10.1038\/s41598-025-13457-7.","journal-title":"Sci Rep"},{"key":"4805_CR37","doi-asserted-by":"publisher","first-page":"e0308639","DOI":"10.1371\/JOURNAL.PONE.0308639","volume":"19","author":"JM Wang","year":"2024","unstructured":"Wang JM, Yang K, Li MJ. NIDS-FGPA: A federated learning network intrusion detection algorithm based on secure aggregation of gradient similarity models. PLoS ONE. 2024;19:e0308639. https:\/\/doi.org\/10.1371\/JOURNAL.PONE.0308639.","journal-title":"PLoS ONE"},{"issue":"1","key":"4805_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-025-15146-x","volume":"15","author":"SA Alzakari","year":"2025","unstructured":"Alzakari SA, Aljebreen M, Ahmad N, Alahmari S, Alrusaini O, Alqazzaz A, Alkhiri H, Said Y. Explainable artificial intelligence-based cyber resilience in internet of things networks using hybrid deep learning with improved chimp optimization algorithm. Sci Rep 2025. 2025;15(1):15, 1\u201324. https:\/\/doi.org\/10.1038\/s41598-025-15146-x.","journal-title":"Sci Rep 2025"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04805-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-026-04805-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04805-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T11:23:28Z","timestamp":1773141808000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-026-04805-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,10]]},"references-count":38,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2026,3]]}},"alternative-id":["4805"],"URL":"https:\/\/doi.org\/10.1007\/s42979-026-04805-z","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,10]]},"assertion":[{"value":"1 November 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval and Consent to Participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"271"}}