{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T03:24:15Z","timestamp":1770175455616,"version":"3.49.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T00:00:00Z","timestamp":1770076800000},"content-version":"vor","delay-in-days":28,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00281-8","type":"journal-article","created":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T07:35:26Z","timestamp":1767684926000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Gamma-enhanced Na\u00efve Bayes model for robust intrusion detection in IoMT networks"],"prefix":"10.1007","volume":"6","author":[{"given":"Rayane","family":"ElRabaa","sequence":"first","affiliation":[]},{"given":"Soha","family":"Rawas","sequence":"additional","affiliation":[]},{"given":"Ali","family":"El-Zaart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,6]]},"reference":[{"issue":"21","key":"281_CR1","doi-asserted-by":"publisher","DOI":"10.3390\/s22218516","volume":"22","author":"U Tariq","year":"2022","unstructured":"Tariq U, Ullah I, Uddin MY, Kwon SJ. An effective self-configurable ransomware prevention technique for IoMT. Sensors. 2022;22(21):8516. https:\/\/doi.org\/10.3390\/s22218516.","journal-title":"Sensors"},{"issue":"3","key":"281_CR2","doi-asserted-by":"publisher","first-page":"640","DOI":"10.3390\/jcp2030033","volume":"2","author":"R Hireche","year":"2022","unstructured":"Hireche R, Mansouri H, Pathan ASK. Security and privacy management in internet of medical things (IoMT): a synthesis. J Cybersecur Privacy. 2022;2(3):640\u201361. https:\/\/doi.org\/10.3390\/jcp2030033.","journal-title":"J Cybersecur Privacy"},{"key":"281_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108498","volume":"200","author":"RK Batchu","year":"2021","unstructured":"Batchu RK, Seetha H. A generalized machine learning model for DDoS attacks detection using hybrid feature selection and hyperparameter tuning. Comput Netw. 2021;200:108498. https:\/\/doi.org\/10.1016\/j.comnet.2021.108498.","journal-title":"Comput Netw"},{"key":"281_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04461-z","author":"MA Siddiqui","year":"2024","unstructured":"Siddiqui MA, Krishna CR, Kalra M. Anomaly detection framework for IoT-enabled appliances using machine learning. Cluster Comput. 2024. https:\/\/doi.org\/10.1007\/s10586-024-04461-z.","journal-title":"Cluster Comput"},{"key":"281_CR5","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.414","volume":"7","author":"SS Hameed","year":"2021","unstructured":"Hameed SS, Hassan WH, Latiff LA, Ghabban F. A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches. PeerJ Comput Sci. 2021;7: e414. https:\/\/doi.org\/10.7717\/peerj-cs.414.","journal-title":"PeerJ Comput Sci"},{"key":"281_CR6","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.comnet.2019.04.027","volume":"158","author":"S Hosseini","year":"2019","unstructured":"Hosseini S, Azizi M. The hybrid technique for DDoS detection with supervised learning algorithms. Comput Netw. 2019;158:35\u201345. https:\/\/doi.org\/10.1016\/j.comnet.2019.04.027.","journal-title":"Comput Netw"},{"issue":"15","key":"281_CR7","doi-asserted-by":"publisher","first-page":"17403","DOI":"10.1007\/s11227-022-04568-3","volume":"78","author":"A Binbusayyis","year":"2022","unstructured":"Binbusayyis A, Alaskar H, Vaiyapuri T, Dinesh M. An investigation and comparison of machine learning approaches for intrusion detection in IoMT network. J Supercomput. 2022;78(15):17403\u201322. https:\/\/doi.org\/10.1007\/s11227-022-04568-3.","journal-title":"J Supercomput"},{"issue":"10","key":"281_CR8","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12102252","volume":"12","author":"RA Alsemmeari","year":"2023","unstructured":"Alsemmeari RA, Dahab MY, Alsulami AA, Alturki B, Algarni S. Resilient security framework using TNN and blockchain for IoMT. Electronics. 2023;12(10):2252. https:\/\/doi.org\/10.3390\/electronics12102252.","journal-title":"Electronics"},{"issue":"5","key":"281_CR9","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1016\/j.icte.2023.03.006","volume":"9","author":"V Gugueoth","year":"2023","unstructured":"Gugueoth V, Safavat S, Shetty S. Security of internet of things (IoT) using federated learning and deep learning \u2014 recent advancements, issues and prospects. ICT Express. 2023;9(5):941\u201360. https:\/\/doi.org\/10.1016\/j.icte.2023.03.006.","journal-title":"ICT Express"},{"issue":"4","key":"281_CR10","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography6040062","volume":"6","author":"S Chauhan","year":"2022","unstructured":"Chauhan S, Gangopadhyay S, Gangopadhyay AK. Intrusion detection system for IoT using logical analysis of data and information gain ratio. Cryptography. 2022;6(4):62. https:\/\/doi.org\/10.3390\/cryptography6040062.","journal-title":"Cryptography"},{"key":"281_CR11","doi-asserted-by":"publisher","unstructured":"Wu J, Xing N, Liu S. Maximum likelihood Estimation for Gamma Distributions. J Adv Stat. 2017. https:\/\/doi.org\/10.22606\/jas.2017.21007.","DOI":"10.22606\/jas.2017.21007"},{"key":"281_CR12","doi-asserted-by":"publisher","DOI":"10.1002\/0471722065","author":"S Kotz","year":"2000","unstructured":"Kotz S, Balakrishnan N, Johnson NL. Continuous multivariate distributions. 2000. https:\/\/doi.org\/10.1002\/0471722065.","journal-title":"Continuous multivariate distributions"},{"key":"281_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2025.113420","volume":"180","author":"N Sharma","year":"2025","unstructured":"Sharma N, Shambharkar PG. Transforming security in internet of medical things with advanced deep learning-based intrusion detection frameworks. Appl Soft Comput. 2025;180:113420. https:\/\/doi.org\/10.1016\/j.asoc.2025.113420.","journal-title":"Appl Soft Comput"},{"issue":"9","key":"281_CR14","doi-asserted-by":"publisher","first-page":"6399","DOI":"10.1007\/s13042-025-02628-7","volume":"16","author":"N Sharma","year":"2025","unstructured":"Sharma N, Shambharkar PG. Multi-layered security architecture for IoMT systems: integrating dynamic key management, decentralized storage, and dependable intrusion detection framework. Int J Mach Learn Cybern. 2025;16(9):6399\u2013446. https:\/\/doi.org\/10.1007\/s13042-025-02628-7.","journal-title":"Int J Mach Learn Cybern"},{"issue":"10","key":"281_CR15","doi-asserted-by":"publisher","first-page":"1386","DOI":"10.1093\/comjnl\/bxaf045","volume":"68","author":"N Sharma","year":"2025","unstructured":"Sharma N, Shambharkar PG. Towards secure healthcare: SA-GBO-ODBN model utilizing Blockchain and deep learning for data handling and diagnosis. Comput J. 2025;68(10):1386\u2013423. https:\/\/doi.org\/10.1093\/comjnl\/bxaf045.","journal-title":"Comput J"},{"issue":"7","key":"281_CR16","doi-asserted-by":"publisher","first-page":"5783","DOI":"10.1007\/s10115-025-02402-9","volume":"67","author":"N Sharma","year":"2025","unstructured":"Sharma N, Shambharkar PG. Multi-attention DeepCRNN: an efficient and explainable intrusion detection framework for Internet of Medical Things environments. Knowl Inf Syst. 2025;67(7):5783\u2013849. https:\/\/doi.org\/10.1007\/s10115-025-02402-9.","journal-title":"Knowl Inf Syst"},{"key":"281_CR17","unstructured":"Ahammed A, Hajdu A, Harangi B. Hybrid AdaBoost and Na\u00efve Bayes Classifier for Supervised Learning. In: Proceedings of the 1st Conference on Information Technology and Data Science. CEUR Workshop Proceedings (2874). CEUR-WS Team, Redaktion Sun SITE, Informatik V, Aachen, pp. 1\u201318. 2020.\u00a0http:\/\/real.mtak.hu\/131351\/"},{"key":"281_CR18","doi-asserted-by":"publisher","unstructured":"Zachos G, Mantas G, Porfyrakis K, Bastos JMC, Rodriguez J. Anomaly-Based Intrusion Detection for IoMT Networks: Design, Implementation, Dataset Generation and ML Algorithms Evaluation.\u00a0IEEE Access. 2025.\u00a0https:\/\/doi.org\/10.1109\/ACCESS.2025.3547572.","DOI":"10.1109\/ACCESS.2025.3547572"},{"key":"281_CR19","doi-asserted-by":"publisher","first-page":"138432","DOI":"10.1109\/access.2021.3118573","volume":"9","author":"T Wisanwanichthan","year":"2021","unstructured":"Wisanwanichthan T, Thammawichai M. A double-layered hybrid approach for network intrusion detection system using combined Naive Bayes and SVM. IEEE Access. 2021;9:138432\u201350. https:\/\/doi.org\/10.1109\/access.2021.3118573.","journal-title":"IEEE Access"},{"issue":"13","key":"281_CR20","doi-asserted-by":"publisher","first-page":"14866","DOI":"10.1007\/s11227-022-04453-z","volume":"78","author":"J Nayak","year":"2022","unstructured":"Nayak J, Meher SK, Souri A, Naik B, Vimal S. Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection. J Supercomputing. 2022;78(13):14866\u201391. https:\/\/doi.org\/10.1007\/s11227-022-04453-z.","journal-title":"J Supercomputing"},{"issue":"8","key":"281_CR21","doi-asserted-by":"publisher","DOI":"10.3390\/math11081878","volume":"11","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, Wang L. An AdaBoost method with K\u2032K-means Bayes classifier for imbalanced data. Mathematics. 2023;11(8):1878. https:\/\/doi.org\/10.3390\/math11081878.","journal-title":"Mathematics"},{"key":"281_CR22","doi-asserted-by":"publisher","unstructured":"Umar Z, Gabi D, Ibrahim NM. Tri-Hybrid Naive Bayes classification model for early cardiovascular disease detection. FUOYE J Eng Technol. 2023. https:\/\/doi.org\/10.46792\/fuoyejet.v8i2.980.","DOI":"10.46792\/fuoyejet.v8i2.980"},{"key":"281_CR23","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1016\/j.aej.2024.10.101","volume":"112","author":"C Rajathi","year":"2025","unstructured":"Rajathi C, Rukmani P. Hybrid learning model for intrusion detection system: a combination of parametric and non-parametric classifiers. Alex Eng J. 2025;112:384\u201396. https:\/\/doi.org\/10.1016\/j.aej.2024.10.101.","journal-title":"Alex Eng J"},{"issue":"1","key":"281_CR24","doi-asserted-by":"publisher","DOI":"10.1155\/2024\/5775671","volume":"2024","author":"GA Mills","year":"2024","unstructured":"Mills GA, Acquah DK, Sowah RA. Network intrusion detection and prevention system using hybrid machine learning with supervised ensemble stacking model. J Comput Netw Commun. 2024;2024(1): 5775671. https:\/\/doi.org\/10.1155\/2024\/5775671.","journal-title":"J Comput Netw Commun"},{"issue":"1","key":"281_CR25","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-11348-5","volume":"15","author":"M Umer","year":"2025","unstructured":"Umer M, Tahir M, Sardaraz M, Sharif M, Elmannai H, Algarni AD. Network intrusion detection model using wrapper based feature selection and multi head attention transformers. Sci Rep. 2025;15(1):28718. https:\/\/doi.org\/10.1038\/s41598-025-11348-5.","journal-title":"Sci Rep"},{"issue":"1","key":"281_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s43926-025-00156-y","volume":"5","author":"M Zahid","year":"2025","unstructured":"Zahid M, Bharati TS. Enhancing cybersecurity in IoT systems: a hybrid deep learning approach for real-time attack detection. Discover Internet Things. 2025;5(1):73. https:\/\/doi.org\/10.1007\/s43926-025-00156-y.","journal-title":"Discover Internet Things"},{"key":"281_CR27","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2025.1520741","volume":"7","author":"VZ Mohale","year":"2025","unstructured":"Mohale VZ, Obagbuwa IC. Evaluating machine learning-based intrusion detection systems with explainable AI: enhancing transparency and interpretability. Front Comput Sci. 2025;7: 1520741. https:\/\/doi.org\/10.3389\/fcomp.2025.1520741.","journal-title":"Front Comput Sci"},{"key":"281_CR28","unstructured":"Akif MA, Butun I, Williams A, Mahgoub I. Hybrid machine learning models for intrusion detection in IoT: leveraging a real-world IoT dataset. 2025. arXiv preprint arXiv:2502.12382. https:\/\/arxiv.org\/abs\/2502.12382."},{"key":"281_CR29","doi-asserted-by":"publisher","unstructured":"Amouri A, Al Rahhal MM, Bazi Y, Butun I, Mahgoub I. Enhancing intrusion detection in IoT environments: an advanced ensemble approach using Kolmogorov-Arnold networks. In 2024 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1\u20136). IEEE. 2024.\u00a0https:\/\/doi.org\/10.1109\/ISNCC62547.2024.10758956 .","DOI":"10.1109\/ISNCC62547.2024.10758956"},{"issue":"9","key":"281_CR30","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0308206","volume":"19","author":"A Sharma","year":"2024","unstructured":"Sharma A, Rani S, Driss M. Hybrid evolutionary machine learning model for advanced intrusion detection architecture for cyber threat identification. PLoS One. 2024;19(9):e0308206. https:\/\/doi.org\/10.1371\/journal.pone.0308206.","journal-title":"PLoS One"},{"key":"281_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3566980","author":"YK Saheed","year":"2025","unstructured":"Saheed YK, Chukwuere JE. CPS-IIoT-P2Attention: explainable privacy-preserving with scaled dot-product attention in cyber physical system-industrial IoT network. IEEE Access. 2025. https:\/\/doi.org\/10.1109\/ACCESS.2025.3566980.","journal-title":"IEEE Access"},{"issue":"5","key":"281_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.03.010","volume":"35","author":"YK Saheed","year":"2023","unstructured":"Saheed YK, Abdulganiyu OH, Ait Tchakoucht T. A novel hybrid ensemble learning for anomaly detection in industrial sensor networks and SCADA systems for smart city infrastructures. J King Saud Univ-Comput Inf Sci. 2023;35(5):101532. https:\/\/doi.org\/10.1016\/j.jksuci.2023.03.010.","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"281_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.sintl.2024.100297","volume":"6","author":"YK Saheed","year":"2025","unstructured":"Saheed YK, Omole AI, Sabit MO. GA-mADAM-IIoT: a new lightweight threats detection in the industrial IoT via genetic algorithm with attention mechanism and LSTM on multivariate time series sensor data. Sens Int. 2025;6: 100297. https:\/\/doi.org\/10.1016\/j.sintl.2024.100297.","journal-title":"Sens Int"},{"key":"281_CR34","doi-asserted-by":"publisher","unstructured":"Saheed YK. A binary firefly algorithm based feature selection method on high dimensional intrusion detection data. In Illumination of artificial intelligence in cybersecurity and forensics (pp. 273\u2013288). Cham: Springer International Publishing. 2022.\u00a0https:\/\/doi.org\/10.1007\/978-3-030-93453-8_12.","DOI":"10.1007\/978-3-030-93453-8_12"},{"issue":"2","key":"281_CR35","doi-asserted-by":"publisher","first-page":"426","DOI":"10.15676\/ijeei.2022.14.2.11","volume":"14","author":"YK Saheed","year":"2022","unstructured":"Saheed YK, Arowolo MO, Tosho AU. An efficient hybridization of k-means and genetic algorithm based on support vector machine for cyber intrusion detection system. Int J Electr Eng Inform. 2022;14(2):426\u201342. https:\/\/doi.org\/10.15676\/ijeei.2022.14.2.11.","journal-title":"Int J Electr Eng Inform"},{"key":"281_CR36","doi-asserted-by":"publisher","unstructured":"Webb GI. Na\u00efve Bayes. In Springer eBooks (pp. 713\u2013714). 2011.\u00a0https:\/\/doi.org\/10.1007\/978-0-387-30164-8_576.","DOI":"10.1007\/978-0-387-30164-8_576"},{"issue":"7","key":"281_CR37","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0069566","volume":"8","author":"RDS Raizada","year":"2013","unstructured":"Raizada RDS, Lee YS. Smoothness without smoothing: why Gaussian naive bayes is not naive for multi-subject searchlight studies. PLoS One. 2013;8(7):e69566. https:\/\/doi.org\/10.1371\/journal.pone.0069566.","journal-title":"PLoS One"},{"key":"281_CR38","unstructured":"Chauhan NS. Na\u00efve Bayes Algorithm: Everything You Need to Know - KDnuggets. KDnuggets. 2022. Retrieved October 20, 2023, from https:\/\/www"},{"issue":"2","key":"281_CR39","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/tgrs.1986.289643","volume":"GE-24","author":"F Ulaby","year":"1986","unstructured":"Ulaby F, Kouyate F, Brisco B, Williams TH. Textural infornation in SAR images. IEEE Trans Geosci Remote Sens. 1986;GE-24(2):235\u201345. https:\/\/doi.org\/10.1109\/tgrs.1986.289643.","journal-title":"IEEE Trans Geosci Remote Sens"},{"issue":"1","key":"281_CR40","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1080\/00224065.2022.2053794","volume":"55","author":"P Chen","year":"2022","unstructured":"Chen P, Buis K, Zhao X. A comprehensive toolbox for the gamma distribution: the gammadist package. J Qual Technol. 2022;55(1):75\u201387. https:\/\/doi.org\/10.1080\/00224065.2022.2053794.","journal-title":"J Qual Technol"},{"key":"281_CR41","doi-asserted-by":"publisher","unstructured":"Sharafaldin I, Lashkari AH, Ghorbani AA. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.\u00a04th International Conference on Information Systems Security and Privacy, pp. 108\u2013116, 2018. https:\/\/doi.org\/10.5220\/0006639801080116.","DOI":"10.5220\/0006639801080116"},{"issue":"3","key":"281_CR42","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/s0031-3203(01)00070-x","volume":"35","author":"AE Zaart","year":"2002","unstructured":"Zaart AE, Ziou D, Wang S, Jiang Q. Segmentation of SAR images. Pattern Recogn. 2002;35(3):713\u201324. https:\/\/doi.org\/10.1016\/s0031-3203(01)00070-x.","journal-title":"Pattern Recogn"},{"key":"281_CR43","doi-asserted-by":"publisher","unstructured":"Sivanathan A. IoT behavioral monitoring via network traffic analysis. arXiv (Cornell University). 2020. https:\/\/doi.org\/10.48550\/arxiv.2001.10632.","DOI":"10.48550\/arxiv.2001.10632"},{"key":"281_CR44","unstructured":"Kumar A. Machine Learning - Sensitivity vs Specificity Differences, Examples. Analytics Yogi. 2023. Retrieved October 22, 2023 from https:\/\/vitalflux"},{"key":"281_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110576","author":"Z Chen","year":"2024","unstructured":"Chen Z, Simsek M, Kantarci B, Bagheri M, Djukic P. Machine learning-enabled hybrid intrusion detection system with host data transformation and an advanced two-stage classifier. Comput Networks. 2024. https:\/\/doi.org\/10.1016\/j.comnet.2024.110576.","journal-title":"Comput Networks"},{"key":"281_CR46","doi-asserted-by":"publisher","unstructured":"ElRabaa R, Rawas S, El-Zaart A. Unlocking the Potential of Na\u00efve Bayes for Network Intrusion Detection: A RandomForest-Driven Feature Selection Strategy. In: Proceedings of 2023 International Conference on Computer and Applications (ICCA). 2023.\u00a0https:\/\/doi.org\/10.1109\/icca59364.2023.10401606.","DOI":"10.1109\/icca59364.2023.10401606"},{"key":"281_CR47","doi-asserted-by":"publisher","unstructured":"Kumar A, Gupta R, Kumar S, Dutta K, Rani M. Securing IoMT\u2010Based Healthcare System: Issues, Challenges, and Solutions.\u00a0Artificial Intelligence and Cybersecurity in Healthcare, 17\u201356. 2025.\u00a0https:\/\/doi.org\/10.1002\/9781394229826.ch2.","DOI":"10.1002\/9781394229826.ch2"},{"key":"281_CR48","doi-asserted-by":"publisher","DOI":"10.1007\/s42044-025-00240-0","author":"A Kanwal","year":"2025","unstructured":"Kanwal A, Masood N, Mustafa G, Ghafoor MA, Ayaz S. MK-SMOTE and M-SMOTE: enhanced techniques for handling class imbalance problem. Iran J Comput Sci. 2025. https:\/\/doi.org\/10.1007\/s42044-025-00240-0.","journal-title":"Iran J Comput Sci"},{"issue":"10","key":"281_CR49","doi-asserted-by":"publisher","DOI":"10.3390\/math13101574","volume":"13","author":"A Hafid","year":"2025","unstructured":"Hafid A, Rahouti M, Aledhari M. Optimizing intrusion detection in IOMT networks through interpretable and cost-aware machine learning. Mathematics. 2025;13(10):1574. https:\/\/doi.org\/10.3390\/math13101574.","journal-title":"Mathematics"},{"key":"281_CR50","doi-asserted-by":"publisher","unstructured":"Jouhari M, Guizani M. Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices.\u00a0arXiv (Cornell University), 2024. https:\/\/doi.org\/10.48550\/arxiv.2406.02768.","DOI":"10.48550\/arxiv.2406.02768"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00281-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00281-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00281-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T13:35:50Z","timestamp":1770125750000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00281-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,6]]},"references-count":50,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["281"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00281-8","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,6]]},"assertion":[{"value":"5 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable. This study is a computational analysis using the publicly available CSE-CIC-IDS2018 dataset. The creation of this dataset was conducted in a controlled lab environment by the Canadian Institute for Cybersecurity (CIC) and does not involve human participants or sensitive personal data. Therefore, ethical approval from an institutional review board was not required for this secondary analysis. Not applicable. This research utilizes a pre-existing, anonymized benchmark dataset (CSE-CIC-IDS2018) for network intrusion detection. No human participants were recruited or involved directly in this study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable. The dataset used in this study is publicly available and was published by the Canadian Institute for Cybersecurity (CIC) on the University of New Brunswick's website, which permits publication for academic and research purposes.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"10"}}