{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T08:06:06Z","timestamp":1775289966528,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:00:00Z","timestamp":1775260800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:00:00Z","timestamp":1775260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-026-04860-6","type":"journal-article","created":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T07:26:40Z","timestamp":1775287600000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Intrusion Detection in Wireless Sensor Networks Using a Machine Learning-Driven Cyber Security Framework"],"prefix":"10.1007","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9346-6752","authenticated-orcid":false,"given":"M.","family":"Meenakshi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5107-8076","authenticated-orcid":false,"given":"M.","family":"Mageshwari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6175-4434","authenticated-orcid":false,"given":"S. P. M.","family":"Kannan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8253-8730","authenticated-orcid":false,"given":"P.","family":"Veeramanikandan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6080-7581","authenticated-orcid":false,"given":"K.","family":"Manivannan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2349-3701","authenticated-orcid":false,"given":"Elangovan","family":"Muniyandy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4914-2269","authenticated-orcid":false,"given":"R. Mohan","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,4]]},"reference":[{"key":"4860_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100462","volume":"16","author":"AS Dina","year":"2021","unstructured":"Dina AS, Manivannan D. Intrusion detection based on machine learning techniques in computer networks. Internet Things. 2021;16:100462. https:\/\/doi.org\/10.1016\/j.iot.2021.100462.","journal-title":"Internet Things"},{"key":"4860_CR2","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1016\/j.procs.2020.04.133","volume":"171","author":"T Saranya","year":"2020","unstructured":"Saranya T, Sridevi S, Deisy C, Chung TD, Khan MA. Performance analysis of machine learning algorithms in intrusion detection system: A review. Procedia Comput Sci. 2020;171:1251\u201360. https:\/\/doi.org\/10.1016\/j.procs.2020.04.133.","journal-title":"Procedia Comput Sci"},{"key":"4860_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01041-z","volume":"3","author":"M Ajij","year":"2022","unstructured":"Ajij M, Pratihar S, Roy DS, Hanne T. Robust detection of tables in documents using scores from table cell cores. SN Comput Sci. 2022;3:161. https:\/\/doi.org\/10.1007\/s42979-022-01041-z.","journal-title":"SN Comput Sci"},{"key":"4860_CR4","doi-asserted-by":"publisher","first-page":"9723","DOI":"10.1016\/j.jksuci.2021.12.008","volume":"34","author":"M Asif","year":"2022","unstructured":"Asif M, Abbas S, Khan MA, Fatima A, Khan MA, Lee SW. MapReduce based intelligent model for intrusion detection using machine learning technique. J King Saud Univ Comput Inf Sci. 2022;34:9723\u201331. https:\/\/doi.org\/10.1016\/j.jksuci.2021.12.008.","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"4860_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01031-1","volume":"3","author":"SP Thirimanne","year":"2022","unstructured":"Thirimanne SP, Jayawardana L, Yasakethu L, Liyanaarachchi P, Hewage C. Deep neural network based real-time intrusion detection system. SN Comput Sci. 2022;3:145. https:\/\/doi.org\/10.1007\/s42979-022-01031-1.","journal-title":"SN Comput Sci"},{"key":"4860_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-024-03369-0","volume":"5","author":"SA Ajagbe","year":"2024","unstructured":"Ajagbe SA, Awotunde JB, Florez H. Intrusion detection: A comparison study of machine learning models using unbalanced dataset. SN Comput Sci. 2024;5:1028. https:\/\/doi.org\/10.1007\/s42979-024-03369-0.","journal-title":"SN Comput Sci"},{"key":"4860_CR7","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/COMST.2018.2847722","volume":"21","author":"P Mishra","year":"2018","unstructured":"Mishra P, Varadharajan V, Tupakula U, Pilli ES. A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun Surv Tutor. 2018;21:686\u2013728. https:\/\/doi.org\/10.1109\/COMST.2018.2847722.","journal-title":"IEEE Commun Surv Tutor"},{"key":"4860_CR8","doi-asserted-by":"publisher","first-page":"1765","DOI":"10.1007\/s00500-023-09452-7","volume":"28","author":"M Al-Ambusaidi","year":"2024","unstructured":"Al-Ambusaidi M, Yinjun Z, Muhammad Y, Yahya A. ML-IDS: an efficient ML-enabled intrusion detection system for securing IoT networks and applications. Soft Comput. 2024;28:1765\u201384. https:\/\/doi.org\/10.1007\/s00500-023-09452-7.","journal-title":"Soft Comput"},{"key":"4860_CR9","first-page":"12211","volume":"25","author":"GS Sajja","year":"2021","unstructured":"Sajja GS, Mustafa M, Ponnusamy R, Abdufattokhov S. Machine learning algorithms in intrusion detection and classification. Ann Rom Soc Cell Biol. 2021;25:12211\u20139.","journal-title":"Ann Rom Soc Cell Biol"},{"key":"4860_CR10","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-981-15-6648-6_10","volume":"1","author":"H Alqahtani","year":"2020","unstructured":"Alqahtani H, Sarker IH, Kalim A, Minhaz Hossain SM, Ikhlaq S, Hossain S. Cyber intrusion detection using machine learning classification techniques. Comput Sci Commun Secur. 2020;1:121\u201331. https:\/\/doi.org\/10.1007\/978-981-15-6648-6_10.","journal-title":"Comput Sci Commun Secur"},{"key":"4860_CR11","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/TMLCN.2024.3402158","volume":"2","author":"D Sudyana","year":"2024","unstructured":"Sudyana D, Lin YD, Verkerken M, Hwang RH, Lai YC, D\u2019hooge L, et al. Improving generalization of ML-based IDS with lifecycle-based dataset, auto-learning features, and deep learning. IEEE Trans Mach Learn Commun Netw. 2024;2:645\u201362. https:\/\/doi.org\/10.1109\/TMLCN.2024.3402158.","journal-title":"IEEE Trans Mach Learn Commun Netw"},{"key":"4860_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-018-0145-4","volume":"5","author":"SM Othman","year":"2018","unstructured":"Othman SM, Ba-Alwi FM, Alsohybe NT, Al-Hashida AY. Intrusion detection model using machine learning algorithm on big data environment. J Big Data. 2018;5:1\u201312. https:\/\/doi.org\/10.1186\/s40537-018-0145-4.","journal-title":"J Big Data"},{"key":"4860_CR13","doi-asserted-by":"publisher","DOI":"10.3390\/sym12050754","volume":"12","author":"IH Sarker","year":"2020","unstructured":"Sarker IH, Abushark YB, Alsolami F, Khan AI. IntruDTree: a machine learning based cyber security intrusion detection model. Symmetry Basel. 2020;12:754. https:\/\/doi.org\/10.3390\/sym12050754.","journal-title":"Symmetry Basel"},{"key":"4860_CR14","doi-asserted-by":"publisher","first-page":"9395","DOI":"10.1016\/j.aej.2022.02.063","volume":"61","author":"YK Saheed","year":"2022","unstructured":"Saheed YK, Abiodun AI, Misra S, Holone MK, Colomo-Palacios R. A machine learning-based intrusion detection for detecting internet of things network attacks. Alex Eng J. 2022;61:9395\u2013409. https:\/\/doi.org\/10.1016\/j.aej.2022.02.063.","journal-title":"Alex Eng J"},{"key":"4860_CR15","doi-asserted-by":"publisher","first-page":"2287","DOI":"10.1007\/s11277-019-06986-8","volume":"111","author":"A Verma","year":"2020","unstructured":"Verma A, Ranga V. Machine learning based intrusion detection systems for IoT applications. Wirel Pers Commun. 2020;111:2287\u2013310. https:\/\/doi.org\/10.1007\/s11277-019-06986-8.","journal-title":"Wirel Pers Commun"},{"key":"4860_CR16","unstructured":"Kaggle Dataset: NSL-KDD. Available from: https:\/\/www.kaggle.com\/hassan06\/nslkdd."},{"key":"4860_CR17","doi-asserted-by":"publisher","unstructured":"Shaver A, Liu Z, Thapa N, Roy K, Gokaraju B, Yuan X. Anomaly based intrusion detection for IoT with machine learning. In: 2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR); 2020 Oct; 1\u20136. https:\/\/doi.org\/10.1109\/AIPR50011.2020.9425199","DOI":"10.1109\/AIPR50011.2020.9425199"},{"key":"4860_CR18","doi-asserted-by":"publisher","first-page":"1785","DOI":"10.32604\/cmc.2020.013910","volume":"66","author":"A Haider","year":"2021","unstructured":"Haider A, Adnan Khan M, Rehman A, Rahman M, Seok Kim H. A real-time sequential deep extreme learning machine cybersecurity intrusion detection system. Comput Mater Contin. 2021;66:1785\u201398. https:\/\/doi.org\/10.32604\/cmc.2020.013910.","journal-title":"Comput Mater Contin"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04860-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-026-04860-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04860-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T07:26:41Z","timestamp":1775287601000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-026-04860-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,4]]},"references-count":18,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["4860"],"URL":"https:\/\/doi.org\/10.1007\/s42979-026-04860-6","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,4]]},"assertion":[{"value":"25 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"332"}}