{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T19:34:03Z","timestamp":1772739243407,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T00:00:00Z","timestamp":1764633600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"vor","delay-in-days":35,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00266-7","type":"journal-article","created":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T22:06:25Z","timestamp":1764713185000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["IoTLSDT hybrid method for anomaly detection in internet of things environments"],"prefix":"10.1007","volume":"6","author":[{"given":"Dan","family":"Ali","sequence":"first","affiliation":[]},{"given":"Dagogo","family":"Orifama","sequence":"additional","affiliation":[]},{"given":"Olatunde","family":"Olaleye","sequence":"additional","affiliation":[]},{"given":"Benedict Onochie","family":"Ibe","sequence":"additional","affiliation":[]},{"given":"Ayodeji Akeem","family":"Ajani","sequence":"additional","affiliation":[]},{"given":"Oluseun Damilola","family":"Oyeleke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,2]]},"reference":[{"key":"266_CR1","doi-asserted-by":"publisher","unstructured":"Thakur RK, Tiwari RK. SECURITY ON IOT: A REVIEW, International Journal of Electronics Engineering and Applications, vol. VIII, no. II, p. 40, Dec. 2020, https:\/\/doi.org\/10.30696\/ijeea.viii.ii.2020.40-48","DOI":"10.30696\/ijeea.viii.ii.2020.40-48"},{"key":"266_CR2","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.5730386","author":"A Cazanas-Gordon","year":"2020","unstructured":"Cazanas-Gordon A, Parra-Mora E. The internet of things in Healthcare. An overview. Jul. 2020. https:\/\/doi.org\/10.5281\/zenodo.5730386.","journal-title":"Jul"},{"key":"266_CR3","doi-asserted-by":"publisher","first-page":"1236","DOI":"10.1093\/bib\/bbx044","volume":"19","author":"R Miotto","year":"2018","unstructured":"Miotto R, Wang F, Wang S, Jiang X, Dudley JT. Deep learning for healthcare: review, opportunities and challenges. Brief Bioinform. 2018;19:1236\u201346. https:\/\/doi.org\/10.1093\/bib\/bbx044.","journal-title":"Brief Bioinform"},{"key":"266_CR4","doi-asserted-by":"publisher","unstructured":"Ong ZZ et al. May., Diagnostic performance of deep learning in infectious keratitis: a systematic review and meta-analysis protocol, BMJ Open, vol. 13, no. 5, p. e065537, 2023, https:\/\/doi.org\/10.1136\/bmjopen-2022-065537","DOI":"10.1136\/bmjopen-2022-065537"},{"key":"266_CR5","doi-asserted-by":"publisher","unstructured":"Mazlan AU et al. A review on recent progress in machine learning and deep learning methods for cancer classification on gene expression data, Processes, vol. 9, no. 8, p. undefined\u2013undefined, 2021, https:\/\/doi.org\/10.3390\/pr9081466","DOI":"10.3390\/pr9081466"},{"key":"266_CR6","doi-asserted-by":"publisher","unstructured":"Nisar D-E-M, Amin R, Shah N-U-H, Ghamdi MAA, Almotiri SH, Alruily M. Healthcare techniques through deep learning: Issues, challenges and opportunities. IEEE Access. 2021;1\u20131. https:\/\/doi.org\/10.1109\/access.2021.3095312.","DOI":"10.1109\/access.2021.3095312"},{"key":"266_CR7","doi-asserted-by":"publisher","unstructured":"Conti M, Dehghantanha A, Franke K, Watson S. Internet of things security and forensics: challenges and opportunities. Future Generation Comput Syst. Jan. 2018;78:544\u20136. https:\/\/doi.org\/10.1016\/j.future.2017.07.060.","DOI":"10.1016\/j.future.2017.07.060"},{"key":"266_CR8","doi-asserted-by":"publisher","unstructured":"Cauteruccio F, et al. Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance. Inform Fusion. Dec. 2019;52:13\u201330. https:\/\/doi.org\/10.1016\/j.inffus.2018.11.010.","DOI":"10.1016\/j.inffus.2018.11.010"},{"key":"266_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2930627","author":"Y Peng","year":"2019","unstructured":"Peng Y, Tan A, Wu J, Bi Y. Industrial Internet of Things. IEEE Access. 2019;7:111257\u201370. https:\/\/doi.org\/10.1109\/access.2019.2930627. Hierarchical Edge Computing: A Novel Multi-Source Multi-Dimensional Data Anomaly Detection Scheme for."},{"key":"266_CR10","doi-asserted-by":"publisher","unstructured":"Qiu J, Du Q, Qian C. KPI-TSAD: A Time-Series anomaly detector for KPI monitoring in cloud applications. Symmetry. Nov. 2019;11(11):1350. https:\/\/doi.org\/10.3390\/sym11111350.","DOI":"10.3390\/sym11111350"},{"key":"266_CR11","doi-asserted-by":"publisher","unstructured":"Wambura S, Huang J, Li H. Long-range forecasting in feature-evolving data streams. Knowl Based Syst. Oct. 2020;206:106405. https:\/\/doi.org\/10.1016\/j.knosys.2020.106405.","DOI":"10.1016\/j.knosys.2020.106405"},{"key":"266_CR12","doi-asserted-by":"publisher","unstructured":"Nawaratne R, Alahakoon D, De Silva D, Yu X. Spatiotemporal anomaly detection using deep learning for Real-time video surveillance. IEEE Trans Industr Inf. 2019;1\u20131. https:\/\/doi.org\/10.1109\/tii.2019.2938527.","DOI":"10.1109\/tii.2019.2938527"},{"key":"266_CR13","unstructured":"Stoian NA. Machine Learning for anomaly detection in IoT networks: Malware analysis on the IoT-23 data set, essay.utwente.nl, Jul. 03, 2020. https:\/\/essay.utwente.nl\/81979\/"},{"key":"266_CR14","doi-asserted-by":"publisher","unstructured":"Cao Y, Cao J, Zhou Z, Liu Z. Aircraft track anomaly detection based on MOD-Bi-LSTM. Electronics. Apr. 2021;10(9):1007\u20131007. https:\/\/doi.org\/10.3390\/electronics10091007.","DOI":"10.3390\/electronics10091007"},{"key":"266_CR15","doi-asserted-by":"publisher","unstructured":"Ergen T, Kozat SS. Unsupervised anomaly detection with LSTM neural networks. IEEE Trans Neural Networks Learn Syst. 2019;1\u201315. https:\/\/doi.org\/10.1109\/tnnls.2019.2935975.","DOI":"10.1109\/tnnls.2019.2935975"},{"key":"266_CR16","doi-asserted-by":"publisher","unstructured":"Nguyen HD, Tran KP, Thomassey S, Hamad M. Forecasting and anomaly detection approaches using LSTM and LSTM autoencoder techniques with the applications in supply chain management. Int J Inf Manag. Apr. 2021;57:102282. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2020.102282.","DOI":"10.1016\/j.ijinfomgt.2020.102282"},{"key":"266_CR17","doi-asserted-by":"publisher","unstructured":"Park D, Hoshi Y, Kemp CC. A multimodal anomaly detector for Robot-Assisted feeding using an LSTM-Based variational autoencoder. IEEE Rob Autom Lett. Jul. 2018;3(3):1544\u201351. https:\/\/doi.org\/10.1109\/lra.2018.2801475.","DOI":"10.1109\/lra.2018.2801475"},{"key":"266_CR18","doi-asserted-by":"publisher","unstructured":"Wu D, Jiang Z, Xie X, Wei X, Yu W, Li R. LSTM learning with bayesian and Gaussian processing for anomaly detection in industrial IoT. IEEE Trans Industr Inf. Aug. 2020;16(8):5244\u201353. https:\/\/doi.org\/10.1109\/tii.2019.2952917.","DOI":"10.1109\/tii.2019.2952917"},{"key":"266_CR19","doi-asserted-by":"publisher","unstructured":"Shafiq M, Tian Z, Bashir AK, Du X, Guizani M. CorrAUC: a malicious Bot-IoT traffic detection method in IoT network using machine learning techniques. IEEE Internet Things J. 2020;1\u20131. https:\/\/doi.org\/10.1109\/jiot.2020.3002255.","DOI":"10.1109\/jiot.2020.3002255"},{"key":"266_CR20","doi-asserted-by":"publisher","unstructured":"Albulayhi K, Smadi AA, Sheldon FT, Abercrombie RK. IoT intrusion detection Taxonomy, reference Architecture, and analyses. Sensors. Sep. 2021;21:6432. https:\/\/doi.org\/10.3390\/s21196432.","DOI":"10.3390\/s21196432"},{"key":"266_CR21","doi-asserted-by":"publisher","unstructured":"Vigoya L, Pardal A, Fern\u00e1ndez DM\u00e9ndez, Carneiro V. Application of machine learning algorithms for the validation of a new CoAP-IoT anomaly detection dataset. Appl Sci. Apr. 2023;13:4482\u20134482. https:\/\/doi.org\/10.3390\/app13074482.","DOI":"10.3390\/app13074482"},{"key":"266_CR22","doi-asserted-by":"publisher","unstructured":"Vigoya L, Fernandez D, Carneiro V, N\u00f3voa FJ. Electronics. Nov. 2021;10:2857. https:\/\/doi.org\/10.3390\/electronics10222857. IoT Dataset Validation Using Machine Learning Techniques for Traffic Anomaly Detection.","DOI":"10.3390\/electronics10222857"},{"key":"266_CR23","unstructured":"yliang725. GitHub - yliang725\/Anomaly-Detection-IoT23: A research project of anomaly detection on dataset IoT-23, GitHub, 2021. https:\/\/github.com\/yliang725\/Anomaly-Detection-IoT23 (accessed Apr. 07, 2025)."},{"key":"266_CR24","doi-asserted-by":"publisher","unstructured":"Stacking enabled ensemble learning based intrusion detection scheme (SELIDS) for IoV. SN Comput Sci, 5:1000, 2024. https:\/\/doi.org\/10.1007\/s42979-024-03376-1","DOI":"10.1007\/s42979-024-03376-1"},{"key":"266_CR25","doi-asserted-by":"publisher","unstructured":"A Hybrid Meta-Heuristics Algorithm \u2013 XGBoost based approach for IDS in IoT. Springer Nat Comput Sci, 5:537, 2024. https:\/\/doi.org\/10.1007\/s42979-024-02913-2","DOI":"10.1007\/s42979-024-02913-2"},{"key":"266_CR26","doi-asserted-by":"publisher","unstructured":"Blockchain-enabled intrusion detection systems for Real-Time vehicle monitoring. Veh Commun, 55:100961, 2025. https:\/\/doi.org\/10.1016\/j.vehcom.2025.100961","DOI":"10.1016\/j.vehcom.2025.100961"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00266-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00266-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00266-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T14:14:38Z","timestamp":1767708878000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00266-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,2]]},"references-count":26,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["266"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00266-7","relation":{"references":[{"id-type":"doi","id":"10.1109\/access.2019.2930627","asserted-by":"subject"}]},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,2]]},"assertion":[{"value":"7 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"1"}}