{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T16:46:41Z","timestamp":1776358001358,"version":"3.51.2"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T00:00:00Z","timestamp":1753660800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T00:00:00Z","timestamp":1753660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00184-8","type":"journal-article","created":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T11:20:16Z","timestamp":1753701616000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Explainable AI for zero-day attack detection in IoT networks using attention fusion model"],"prefix":"10.1007","volume":"5","author":[{"given":"Deepa","family":"Krishnan","sequence":"first","affiliation":[]},{"given":"Swapnil","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Vijayan","family":"Sugumaran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,28]]},"reference":[{"issue":"4","key":"184_CR1","doi-asserted-by":"publisher","first-page":"4899","DOI":"10.1002\/ett.4899","volume":"35","author":"T Vaiyapuri","year":"2024","unstructured":"Vaiyapuri T, Shankar K, Rajendran S, Kumar S, Gaur V, Gupta D, Alharbi M. Automated cyberattack detection using optimal ensemble deep learning model. Trans Emerg Telecommun Technol. 2024;35(4):4899.","journal-title":"Trans Emerg Telecommun Technol"},{"key":"184_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2024.100539","volume":"27","author":"S Singh","year":"2024","unstructured":"Singh S, Krishnan D, Vazirani V, Ravi V, Alsuhibany SA. Deep hybrid approach with sequential feature extraction and classification for robust malware detection. Egypt Inform J. 2024;27: 100539.","journal-title":"Egypt Inform J"},{"key":"184_CR3","doi-asserted-by":"crossref","unstructured":"Nkongolo M, Tokmak M. Zero-day threats detection for critical infrastructures. In: Annual Conference of South African Institute of Computer Scientists and Information Technologists, 2023;32\u201347. Springer","DOI":"10.1007\/978-3-031-39652-6_3"},{"issue":"3","key":"184_CR4","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","volume":"22","author":"MA Al-Garadi","year":"2020","unstructured":"Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M. A survey of machine and deep learning methods for internet of things (iot) security. IEEE Commun Surveys Tutor. 2020;22(3):1646\u201385.","journal-title":"IEEE Commun Surveys Tutor"},{"key":"184_CR5","doi-asserted-by":"publisher","first-page":"119118","DOI":"10.1109\/ACCESS.2021.3106873","volume":"9","author":"A Sahu","year":"2021","unstructured":"Sahu A, Mao Z, Wlazlo P, Huang H, Davis K, Goulart A, Zonouz S. Multi-source multi-domain data fusion for cyberattack detection in power systems. IEEE Access. 2021;9:119118\u201338.","journal-title":"IEEE Access"},{"key":"184_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103760","volume":"220","author":"H Kheddar","year":"2023","unstructured":"Kheddar H, Himeur Y, Awad AI. Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review. J Netw Comput Appl. 2023;220: 103760.","journal-title":"J Netw Comput Appl"},{"key":"184_CR7","doi-asserted-by":"publisher","first-page":"93104","DOI":"10.1109\/ACCESS.2022.3204051","volume":"10","author":"Z Zhang","year":"2022","unstructured":"Zhang Z, Al Hamadi H, Damiani E, Yeun CY, Taher F. Explainable artificial intelligence applications in cyber security: State-of-the-art in research. IEEE Access. 2022;10:93104\u201339.","journal-title":"IEEE Access"},{"issue":"10","key":"184_CR8","doi-asserted-by":"publisher","first-page":"1684","DOI":"10.3390\/electronics9101684","volume":"9","author":"H Hindy","year":"2020","unstructured":"Hindy H, Atkinson R, Tachtatzis C, Colin J-N, Bayne E, Bellekens X. Utilising deep learning techniques for effective zero-day attack detection. Electronics. 2020;9(10):1684.","journal-title":"Electronics"},{"key":"184_CR9","doi-asserted-by":"publisher","first-page":"2106","DOI":"10.1109\/OJCOMS.2022.3215676","volume":"3","author":"SK Jagatheesaperumal","year":"2022","unstructured":"Jagatheesaperumal SK, Pham Q-V, Ruby R, Yang Z, Xu C, Zhang Z. Explainable ai over the internet of things (iot): Overview, state-of-the-art and future directions. IEEE Open J Commun Soc. 2022;3:2106\u201336.","journal-title":"IEEE Open J Commun Soc"},{"issue":"5","key":"184_CR10","doi-asserted-by":"publisher","first-page":"2211","DOI":"10.1007\/s40747-021-00396-9","volume":"7","author":"V Kumar","year":"2021","unstructured":"Kumar V, Sinha D. A robust intelligent zero-day cyber-attack detection technique. Complex Intell Syst. 2021;7(5):2211\u201334.","journal-title":"Complex Intell Syst"},{"issue":"17","key":"184_CR11","doi-asserted-by":"publisher","first-page":"7470","DOI":"10.3390\/s23177470","volume":"23","author":"B Alotaibi","year":"2023","unstructured":"Alotaibi B. A survey on industrial internet of things security: requirements, attacks, ai-based solutions, and edge computing opportunities. Sensors. 2023;23(17):7470.","journal-title":"Sensors"},{"issue":"19","key":"184_CR12","doi-asserted-by":"publisher","first-page":"9572","DOI":"10.3390\/app12199572","volume":"12","author":"I Tareq","year":"2022","unstructured":"Tareq I, Elbagoury BM, El-Regaily S, El-Horbaty E-SM. Analysis of ton-iot, unw-nb15, and edge-iiot datasets using dl in cybersecurity for iot. Appl Sci. 2022;12(19):9572.","journal-title":"Appl Sci"},{"key":"184_CR13","doi-asserted-by":"crossref","unstructured":"Singh M, Chauhan N. Convolutional neural network based iot intrusion detection system using edge-iiotset. In 2024 International Conference on Integrated Circuits Communication and Computing Systems (ICIC3S). 2024;1:1\u20134 (IEEE).","DOI":"10.1109\/ICIC3S61846.2024.10603309"},{"key":"184_CR14","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H. Edge-iiotset: a new comprehensive realistic cyber security dataset of iot and iiot applications for centralized and federated learning. IEEE Access. 2022;10:40281\u2013306.","journal-title":"IEEE Access"},{"key":"184_CR15","doi-asserted-by":"crossref","unstructured":"Khacha A, Saadouni R, Harbi Y, Aliouat Z. Hybrid deep learning-based intrusion detection system for industrial internet of things. In: 2022 5th International Symposium on Informatics and Its Applications (ISIA), IEEE; 2022. pp. 1\u20136.","DOI":"10.1109\/ISIA55826.2022.9993487"},{"key":"184_CR16","doi-asserted-by":"crossref","unstructured":"Saadouni R, Khacha A, Harbi Y, Gherbi C, Harous S, Aliouat Z. Secure iiot networks with hybrid cnn-gru model using edge-iiotset. In: 2023 15th International Conference on Innovations in Information Technology (IIT), IEEE;2023. pp. 150\u2013155.","DOI":"10.1109\/IIT59782.2023.10366486"},{"issue":"1","key":"184_CR17","first-page":"13","volume":"16","author":"A Rajak","year":"2024","unstructured":"Rajak A, Tripathi R. Dl-sklstm approach for cyber security threats detection in 5g enabled iiot. Int J Inf Technol. 2024;16(1):13\u201320.","journal-title":"Int J Inf Technol"},{"key":"184_CR18","doi-asserted-by":"publisher","first-page":"45762","DOI":"10.1109\/ACCESS.2024.3380816","volume":"12","author":"MS Alshehri","year":"2024","unstructured":"Alshehri MS, Saidani O, Alrayes FS, Abbasi SF, Ahmad J. A self-attention-based deep convolutional neural networks for iiot networks intrusion detection. IEEE Access. 2024;12:45762\u201372.","journal-title":"IEEE Access"},{"key":"184_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103898","volume":"142","author":"A Rizzardi","year":"2024","unstructured":"Rizzardi A, Sicari S, Porisini AC, et al. Nero: neural algorithmic reasoning for zero-day attack detection in the iot: a hybrid approach. Computers & Security. 2024;142: 103898.","journal-title":"Comput Secur"},{"issue":"1","key":"184_CR20","doi-asserted-by":"publisher","first-page":"19339","DOI":"10.1038\/s41598-024-70094-2","volume":"14","author":"K Yang","year":"2024","unstructured":"Yang K, Wang J, Li M. An improved intrusion detection method for iiot using attention mechanisms, bigru, and inception-cnn. Sci Rep. 2024;14(1):19339.","journal-title":"Sci Rep"},{"issue":"6","key":"184_CR21","doi-asserted-by":"publisher","first-page":"1398","DOI":"10.1049\/cit2.12352","volume":"9","author":"MA Qathrady","year":"2024","unstructured":"Qathrady MA, Ullah S, Alshehri MS, Ahmad J, Almakdi S, Alqhtani SM, Khan MA, Ghaleb B. Sacnn-ids: a self-attention convolutional neural network for intrusion detection in industrial internet of things. CAAI Trans Intell Technol. 2024;9(6):1398\u2013411.","journal-title":"CAAI Trans Intell Technol"},{"issue":"11","key":"184_CR22","doi-asserted-by":"publisher","first-page":"114590","DOI":"10.1109\/ACCESS.2023.3324657","volume":"16","author":"S Ullah","year":"2023","unstructured":"Ullah S, Boulila W, Koubaa A, Ahmad J. Magru-ids: a multi-head attention-based gated recurrent unit for intrusion detection in iiot networks. IEEE Access. 2023;16(11):114590\u2013601.","journal-title":"IEEE Access"},{"issue":"3","key":"184_CR23","doi-asserted-by":"publisher","first-page":"478","DOI":"10.3390\/iot5030022","volume":"5","author":"R Alqura\u2019n","year":"2024","unstructured":"Alqura\u2019n R, AlJamal M, Al-Aiash I, Alsarhan A, Khassawneh B, Aljaidi M, Alanazi R. Advancing xss detection in iot over 5g: a cutting-edge artificial neural network approach. IoT. 2024;5(3):478\u2013508.","journal-title":"IoT"},{"key":"184_CR24","doi-asserted-by":"crossref","unstructured":"Cui H, Xue T, Liu Y, Liu B. Transferable intrusion detection model for industrial internet based on deep learning: Iids model combining hybrid deep learning model and transfer learning. In: Proceedings of the 2024 3rd International Conference on Cryptography, Network Security and Communication Technology, 2024;107\u2013113.","DOI":"10.1145\/3673277.3673296"},{"issue":"16","key":"184_CR25","doi-asserted-by":"publisher","first-page":"26866","DOI":"10.1109\/JIOT.2023.3288544","volume":"11","author":"D Javeed","year":"2023","unstructured":"Javeed D, Gao T, Saeed MS, Kumar P. An intrusion detection system for edge-envisioned smart agriculture in extreme environment. IEEE Internet Things J. 2023;11(16):26866\u201376.","journal-title":"IEEE Internet Things J"},{"key":"184_CR26","doi-asserted-by":"crossref","unstructured":"Hoang TM, Nguyen TT, Pham TA, Nguyen VN. An ids-based dnn model deployed on the edge network to detect industrial iot attacks. In: International Conference on Intelligence of Things. Springer;2023. pp. 307\u2013319.","DOI":"10.1007\/978-3-031-46749-3_29"},{"key":"184_CR27","doi-asserted-by":"crossref","unstructured":"Shen T, Ding L, Sun J, Jing C, Guo F, Wu C. Edge computing for iot security: integrating machine learning with key agreement. In: 2023 3rd International Conference on Consumer Electronics and Computer Engineering (ICCECE), IEEE;2023. pp. 474\u2013483.","DOI":"10.1109\/ICCECE58074.2023.10135211"},{"key":"184_CR28","doi-asserted-by":"crossref","unstructured":"Elias EM, Carriel VS, De\u00a0Oliveira GW, Dos Santos AL, Nogueira M, Junior RH, Batista DM. A hybrid cnn-lstm model for iiot edge privacy-aware intrusion detection. In: 2022 IEEE Latin-American Conference on Communications (LATINCOM). IEEE; 2022. pp. 1\u20136.","DOI":"10.1109\/LATINCOM56090.2022.10000468"},{"issue":"1","key":"184_CR29","doi-asserted-by":"publisher","first-page":"1610","DOI":"10.1109\/TCE.2023.3347170","volume":"70","author":"SI Popoola","year":"2023","unstructured":"Popoola SI, Imoize AL, Hammoudeh M, Adebisi B, Jogunola O, Aibinu AM. Federated deep learning for intrusion detection in consumer-centric internet of things. IEEE Trans Consum Electron. 2023;70(1):1610\u201322.","journal-title":"IEEE Trans Consum Electron"},{"issue":"1","key":"184_CR30","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s44244-023-00006-2","volume":"1","author":"F Li","year":"2023","unstructured":"Li F, Lin J, Han H. Fsl: federated sequential learning-based cyberattack detection for industrial internet of things. Ind Artif Intell. 2023;1(1):4.","journal-title":"Ind Artif Intell"},{"key":"184_CR31","doi-asserted-by":"crossref","unstructured":"Zainudin A, Akter R, Kim DS, Lee JM. Federated learning inspired low-complexity intrusion detection and classification technique for sdn-based industrial cps. IEEE Transactions on Network and Service Management, 2023.","DOI":"10.1109\/TNSM.2023.3299606"},{"issue":"17","key":"184_CR32","doi-asserted-by":"publisher","first-page":"28578","DOI":"10.1109\/JIOT.2024.3402250","volume":"11","author":"F Li","year":"2024","unstructured":"Li F, Lin J, Wang Y, Du Y, Han H. Distributed hierarchical temporal graph learning for communication-efficient high-dimensional industrial iot modeling. IEEE Internet Things J. 2024;11(17):28578\u201390.","journal-title":"IEEE Internet Things J"},{"key":"184_CR33","doi-asserted-by":"crossref","unstructured":"Issa MA, Ibnkahla M, Matrawy A, Eldosouky A. Temporal partitioned federated learning for iot intrusion detection systems. In: 2024 IEEE Wireless Communications and Networking Conference (WCNC), IEEE;2024. pp. 1\u20136.","DOI":"10.1109\/WCNC57260.2024.10570551"},{"key":"184_CR34","doi-asserted-by":"publisher","first-page":"23733","DOI":"10.1109\/ACCESS.2024.3363469","volume":"12","author":"MA Ferrag","year":"2024","unstructured":"Ferrag MA, Ndhlovu M, Tihanyi N, Cordeiro LC, Debbah M, Lestable T, Thandi NS. Revolutionizing cyber threat detection with large language models: A privacy-preserving bert-based lightweight model for iot\/iiot devices. IEEE Access. 2024;12:23733\u201350.","journal-title":"IEEE Access"},{"issue":"1","key":"184_CR35","doi-asserted-by":"publisher","first-page":"158","DOI":"10.3390\/network3010008","volume":"3","author":"MM Rashid","year":"2023","unstructured":"Rashid MM, Khan SU, Eusufzai F, Redwan MA, Sabuj SR, Elsharief M. A federated learning-based approach for improving intrusion detection in industrial internet of things networks. Network. 2023;3(1):158\u201379.","journal-title":"Network"},{"key":"184_CR36","volume":"20","author":"T Al Nuaimi","year":"2023","unstructured":"Al Nuaimi T, Al Zaabi S, Alyilieli M, AlMaskari M, Alblooshi S, Alhabsi F, Yusof MFB, Al Badawi A. A comparative evaluation of intrusion detection systems on the edge-iiot-2022 dataset. Intell Syst Appl. 2023;20: 200298.","journal-title":"Intell Syst Appl"},{"key":"184_CR37","doi-asserted-by":"crossref","unstructured":"Fikriansyah MI, Karimah SA, Setiadi F. Detection of ddos attacks in iiot case using machine learning algorithms. In: 2024 International conference on data science and its applications (ICoDSA), IEEE;2024. pp. 117\u2013121.","DOI":"10.1109\/ICoDSA62899.2024.10652225"},{"issue":"4","key":"184_CR38","first-page":"811","volume":"14","author":"OB Samin","year":"2023","unstructured":"Samin OB, Algeelani NAA, Bathich A, Adil GM, Qadus A, Amin A. Malicious agricultural iot traffic detection and classification: a comparative study of ml classifiers. J Adv Inf Technol. 2023;14(4):811\u201320.","journal-title":"J Adv Inf Technol"},{"key":"184_CR39","doi-asserted-by":"crossref","unstructured":"Ramaiah M, Rahamathulla MY. Securing the industrial iot: a novel network intrusion detection models. In: 2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT), IEEE;2024. pp. 1\u20136.","DOI":"10.1109\/AIIoT58432.2024.10574728"},{"key":"184_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.103980","volume":"230","author":"SA Abdulkareem","year":"2024","unstructured":"Abdulkareem SA, Foh CH, Carrez F, Moessner K. A lightweight sel for attack detection in iot\/iiot networks. J Netw Comput Appl. 2024;230: 103980.","journal-title":"J Netw Comput Appl"},{"key":"184_CR41","doi-asserted-by":"crossref","unstructured":"Zhou F, Yuan M, Liu Y, Zhang H, Gu M, Zhou T. Niect: A model for intrusion security detection applied to campus video surveillance edge networks. In: 2024 IEEE 11th International Conference on Cyber Security and Cloud Computing (CSCloud), IEEE;2024; pp. 24\u201329.","DOI":"10.1109\/CSCloud62866.2024.00012"},{"key":"184_CR42","doi-asserted-by":"crossref","unstructured":"Laiq F, Al-Obeidat F, Amin A, Moreira F. Ddos attack detection in edge-iiot using ensemble learning. In: 2023 7th Cyber Security in Networking Conference (CSNet), IEEE;2023. pp. 204\u2013207.","DOI":"10.1109\/CSNet59123.2023.10339784"},{"key":"184_CR43","doi-asserted-by":"crossref","unstructured":"Nwakanma CI, Ahakonye LA, Jun T, Lee JM, Kim DS. Explainable scada-edge network intrusion detection system: tree-lime approach. In: 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), IEEE;2023. pp. 1\u20137.","DOI":"10.1109\/SmartGridComm57358.2023.10333968"},{"key":"184_CR44","doi-asserted-by":"publisher","first-page":"67910","DOI":"10.1109\/ACCESS.2022.3186026","volume":"10","author":"P Dini","year":"2022","unstructured":"Dini P, Begni A, Ciavarella S, De Paoli E, Fiorelli G, Silvestro C, Saponara S. Design and testing novel one-class classifier based on polynomial interpolation with application to networking security. IEEE Access. 2022;10:67910\u201324.","journal-title":"IEEE Access"},{"issue":"5","key":"184_CR45","doi-asserted-by":"publisher","first-page":"7817","DOI":"10.1109\/JIOT.2023.3316669","volume":"11","author":"A Aljuhani","year":"2023","unstructured":"Aljuhani A, Kumar P, Alanazi R, Albalawi T, Taouali O, Islam AN, Kumar N, Alazab M. A deep learning integrated blockchain framework for securing industrial iot. IEEE Internet Things J. 2023;11(5):7817\u201327.","journal-title":"IEEE Internet Things J"},{"key":"184_CR46","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.future.2021.09.010","volume":"127","author":"IA Khan","year":"2022","unstructured":"Khan IA, Moustafa N, Razzak I, Tanveer M, Pi D, Pan Y, Ali BS. Xsru-iomt: Explainable simple recurrent units for threat detection in internet of medical things networks. Futur Gener Comput Syst. 2022;127:181\u201393.","journal-title":"Futur Gener Comput Syst"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00184-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00184-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00184-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T04:20:58Z","timestamp":1757305258000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00184-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,28]]},"references-count":46,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["184"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00184-8","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-5436116\/v1","asserted-by":"object"}]},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,28]]},"assertion":[{"value":"12 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"83"}}