{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T19:25:48Z","timestamp":1770837948188,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T00:00:00Z","timestamp":1768608000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T00:00:00Z","timestamp":1770768000000},"content-version":"vor","delay-in-days":25,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00277-4","type":"journal-article","created":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T09:34:20Z","timestamp":1768642460000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Network topology security analysis and attack detection based on graph neural networks"],"prefix":"10.1007","volume":"6","author":[{"given":"Zhenhua","family":"Yang","sequence":"first","affiliation":[]},{"given":"Minghong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Qiwen","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,17]]},"reference":[{"issue":"2","key":"277_CR1","first-page":"1","volume":"3","author":"Y Zhang","year":"2024","unstructured":"Zhang Y, Wang X, Liu J. Graph neural network based intrusion detection system. ACM Trans Cybersecur. 2024;3(2):1\u201320.","journal-title":"ACM Trans Cybersecur"},{"key":"277_CR2","doi-asserted-by":"publisher","unstructured":"Abbas G. A sequential pattern mining method for the individualized detection of online banking fraudulent transactions. patternIQ mining. 2024;1(1):34\u201344. https:\/\/doi.org\/10.70023\/piqm244.","DOI":"10.70023\/piqm244"},{"issue":"1","key":"277_CR3","first-page":"1","volume":"15","author":"S Kumar","year":"2025","unstructured":"Kumar S, Gupta R, Singh V, Sharma P. Advanced intrusion detection in internet of things using graph neural networks. Sci Rep. 2025;15(1):1\u201312.","journal-title":"Sci Rep"},{"issue":"16","key":"277_CR4","doi-asserted-by":"publisher","first-page":"6932","DOI":"10.3390\/app14166932","volume":"14","author":"D Tran","year":"2024","unstructured":"Tran D, Park M. A novel graph embedding approach for enhancing graph neural networks in network intrusion detection systems. Appl Sci. 2024;14(16):6932.","journal-title":"Appl Sci"},{"key":"277_CR5","doi-asserted-by":"crossref","unstructured":"Yu H, Liu Z, Wang L, Song Y. DShield: defending against backdoor attacks on graph neural networks via discrepancy learning. In Proc. Netw. Distrib. Syst. Secur. Symp. (NDSS), 2025.","DOI":"10.14722\/ndss.2025.240798"},{"issue":"3","key":"277_CR6","first-page":"1","volume":"28","author":"C Ma","year":"2025","unstructured":"Ma C, Xiang T. Achieving personalized Privacy-Preserving graph neural network learning. ACM Trans Priv Secur. 2025;28(3):1\u201325.","journal-title":"ACM Trans Priv Secur"},{"key":"277_CR7","first-page":"1","volume":"69","author":"J Smith","year":"2021","unstructured":"Smith J, Lee A. Graph neural networks: A review of methods and applications. J Artif Intell Res. 2021;69:1\u201335.","journal-title":"J Artif Intell Res"},{"key":"277_CR8","first-page":"102","volume":"117","author":"K Liu","year":"2024","unstructured":"Liu K, Wang P. A survey on graph neural networks for intrusion detection systems. Computers Secur. 2024;117:102\u201318.","journal-title":"Computers Secur"},{"key":"277_CR9","doi-asserted-by":"crossref","unstructured":"Caville E, Lo WW, Layeghy S, Portmann M. Anomal-E: a self-supervised network intrusion detection system based on graph neural networks. ArXiv Preprint arXiv:2207.06819, 2022.","DOI":"10.1016\/j.knosys.2022.110030"},{"key":"277_CR10","doi-asserted-by":"crossref","unstructured":"Lo WW, Layeghy S, Sarhan M, Gallagher M, Portmann M. E-GraphSAGE: a graph neural network based intrusion detection system for IoT. ArXiv Preprint arXiv:2103.16329, 2021.","DOI":"10.1109\/NOMS54207.2022.9789878"},{"key":"277_CR11","unstructured":"Zhou J, Xu Z, Rush AM, Yu M. Automating botnet detection with graph neural networks. ArXiv Preprint arXiv:2003.06344, 2020."},{"key":"277_CR12","doi-asserted-by":"crossref","unstructured":"Haghshenas SH, Hasnat MA, Naeini M. A temporal graph neural network for cyber attack detection and localization in smart grids. ArXiv Preprint arXiv:2212.03390, 2022.","DOI":"10.1109\/ISGT51731.2023.10066446"},{"issue":"12","key":"277_CR13","doi-asserted-by":"publisher","first-page":"2274","DOI":"10.3390\/electronics13122274","volume":"13","author":"T Altaf","year":"2024","unstructured":"Altaf T, Wang X, Ni W, Yu G, Liu RP, Braun R. GNN-Based network traffic analysis for the detection of sequential attacks in IoT. Electronics. 2024;13(12):2274.","journal-title":"Electronics"},{"issue":"14","key":"277_CR14","doi-asserted-by":"publisher","first-page":"3611","DOI":"10.3390\/rs15143611","volume":"15","author":"Q Cheng","year":"2023","unstructured":"Cheng Q, Liu H, Zhang T. Spatio-Temporal graph neural network based network intrusion detection for Near-Earth remote sensing. Remote Sens. 2023;15(14):3611.","journal-title":"Remote Sens"},{"key":"277_CR15","doi-asserted-by":"publisher","first-page":"110508","DOI":"10.1016\/j.comnet.2024.110508","volume":"250","author":"RA Bakar","year":"2024","unstructured":"Bakar RA, De Marinis L, Cugini F, Paolucci F. FTG-Net-E: A hierarchical ensemble graph neural network for DDoS attack detection. Comput Netw. 2024;250:110508.","journal-title":"Comput Netw"},{"key":"277_CR16","doi-asserted-by":"publisher","first-page":"112603","DOI":"10.1016\/j.asoc.2024.112603","volume":"169","author":"S Ghosh","year":"2025","unstructured":"Ghosh S. Network traffic analysis based on cybersecurity intrusion detection through an effective automated separate guided attention federated graph neural network. Appl Soft Comput. 2025;169:112603.","journal-title":"Appl Soft Comput"},{"issue":"14","key":"277_CR17","doi-asserted-by":"crossref","first-page":"142601","DOI":"10.1063\/5.0102092","volume":"121","author":"Y Ma","year":"2022","unstructured":"Ma Y, Chen X, Li J. Monitoring weak DC and AC electric fields inside atomic vapor cells using laser spectroscopy and silicon-ring electrodes. Appl Phys Lett. 2022;121(14):142601.","journal-title":"Appl Phys Lett"},{"key":"277_CR18","first-page":"103497","volume":"215","author":"R Khan","year":"2024","unstructured":"Khan R, Ali S, Ahmad I. Fed-Inforce-Fusion: Privacy-preserving federated learning with reinforcement-based integration for IoMT intrusion detection. J Netw Comput Appl. 2024;215:103497.","journal-title":"J Netw Comput Appl"},{"key":"277_CR19","doi-asserted-by":"crossref","first-page":"110508","DOI":"10.1016\/j.future.2025.107707","volume":"166","author":"S Ruiz-Villafranca","year":"2025","unstructured":"Ruiz-Villafranca S. WFE-Tab: overcoming limitations of TabPFN in IIoT-MEC scenarios for intrusion detection systems. Future Generation Comput Syst. 2025;166:110508.","journal-title":"Future Generation Comput Syst"},{"key":"277_CR20","unstructured":"https:\/\/www.kaggle.com\/code\/khairulislam\/unsw-nb15-anomaly-detection."},{"key":"277_CR21","unstructured":"https:\/\/www.kaggle.com\/code\/eneskosar19\/intrusion-detection-system-nsl-kdd."}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00277-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00277-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00277-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T18:47:58Z","timestamp":1770835678000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00277-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,17]]},"references-count":21,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["277"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00277-4","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,17]]},"assertion":[{"value":"3 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"16"}}