{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T17:10:31Z","timestamp":1773853831368,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:00:00Z","timestamp":1773792000000},"content-version":"vor","delay-in-days":34,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100019286","name":"Ajman University","doi-asserted-by":"publisher","award":["2024-IRG-ENIT-8"],"award-info":[{"award-number":["2024-IRG-ENIT-8"]}],"id":[{"id":"10.13039\/501100019286","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-026-00284-z","type":"journal-article","created":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T12:57:58Z","timestamp":1770901078000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Intrusion detection in industrial internet of things network using feature optimization and hybrid deep learning"],"prefix":"10.1007","volume":"6","author":[{"given":"Salam","family":"Fraihat","sequence":"first","affiliation":[]},{"given":"Qussai","family":"Yaseen","sequence":"additional","affiliation":[]},{"given":"Yousef","family":"Sanjalawe","sequence":"additional","affiliation":[]},{"given":"Aymen","family":"Abu-Errub","sequence":"additional","affiliation":[]},{"given":"Sharif Naser","family":"Makhadmeh","sequence":"additional","affiliation":[]},{"given":"Mohammed Azmi","family":"Al-Betar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,12]]},"reference":[{"issue":"8","key":"284_CR1","doi-asserted-by":"publisher","first-page":"23083","DOI":"10.1007\/s11042-023-16395-6","volume":"83","author":"K Bansal","year":"2024","unstructured":"Bansal K, Singhrova A. Review on intrusion detection system for iot\/iiot-brief study. Multimedia Tools Appl. 2024;83(8):23083\u2013108.","journal-title":"Multimedia Tools Appl"},{"issue":"9","key":"284_CR2","first-page":"7749","volume":"10","author":"I Bibi","year":"2022","unstructured":"Bibi I, Akhunzada A, Kumar N. Deep ai-powered cyber threat analysis in iiot. IEEE Int Things J. 2022;10(9):7749\u201360.","journal-title":"IEEE Int Things J"},{"key":"284_CR3","volume":"45","author":"J Malik","year":"2025","unstructured":"Malik J, Akhunzada A, Al-Shamayleh AS, Zeadally S, Almogren A. Hybrid deep learning based threat intelligence framework for industrial iot systems. J Ind Inf Integr. 2025;45:100846.","journal-title":"J Ind Inf Integr"},{"issue":"11","key":"284_CR4","doi-asserted-by":"publisher","first-page":"4724","DOI":"10.1109\/TII.2018.2852491","volume":"14","author":"E Sisinni","year":"2018","unstructured":"Sisinni E, Saifullah A, Han S, Jennehag U, Gidlund M. Industrial internet of things: challenges, opportunities, and directions. IEEE Trans Industr Inf. 2018;14(11):4724\u201334.","journal-title":"IEEE Trans Industr Inf"},{"key":"284_CR5","doi-asserted-by":"crossref","unstructured":"Maaz M, Ahmed G, Al-Shamayleh AS, Akhunzada A, Siddiqui S, Al-Ghushami AH. Empowering iot resilience: hybrid deep learning techniques for enhanced security. IEEE Access 2024.","DOI":"10.1109\/ACCESS.2024.3482005"},{"key":"284_CR6","doi-asserted-by":"crossref","unstructured":"Makhadmeh SN, Fraihat S, Awad M, Sanjalawe Y, Al-Betar MA, Awadallah MA. A crossover-integrated marine predator algorithm for feature selection in intrusion detection systems within iot environments. Internet of Things, 101536, 2025.","DOI":"10.1016\/j.iot.2025.101536"},{"key":"284_CR7","first-page":"34","volume":"12","author":"D Attique","year":"2024","unstructured":"Attique D, Hao W, Ping W, Javeed D, Kumar P. Explainable and data-efficient deep learning for enhanced attack detection in iiot ecosystem. IEEE Int Things J. 2024;12:34.","journal-title":"IEEE Int Things J"},{"key":"284_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109609","volume":"119","author":"A Akhunzada","year":"2024","unstructured":"Akhunzada A, Al-Shamayleh AS, Zeadally S, Almogren A, Abu-Shareha AA. Design and performance of an ai-enabled threat intelligence framework for iot-enabled autonomous vehicles. Comput Electr Eng. 2024;119:109609.","journal-title":"Comput Electr Eng"},{"key":"284_CR9","doi-asserted-by":"crossref","unstructured":"Kulrujiphat S, Kulrujiphat P. A survey of ai-based attack detection models on the edge-iiotset dataset. In: 2024 8th International Conference on Business and Information Management (ICBIM), pp. 127\u2013131, 2024. IEEE","DOI":"10.1109\/ICBIM63313.2024.10823532"},{"key":"284_CR10","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1016\/j.comcom.2020.07.006","volume":"160","author":"S Liaqat","year":"2020","unstructured":"Liaqat S, Akhunzada A, Shaikh FS, Giannetsos A, Jan MA. Sdn orchestration to combat evolving cyber threats in internet of medical things (iomt). Comput Commun. 2020;160:697\u2013705.","journal-title":"Comput Commun"},{"key":"284_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102002","volume":"101","author":"IA Khan","year":"2024","unstructured":"Khan IA, Razzak I, Pi D, Khan N, Hussain Y, Li B, et al. Fed-inforce-fusion: a federated reinforcement-based fusion model for security and privacy protection of iomt networks against cyber-attacks. Information Fusion. 2024;101:102002.","journal-title":"Information Fusion"},{"key":"284_CR12","first-page":"34","volume":"12","author":"IA Khan","year":"2024","unstructured":"Khan IA, Pi D, Kamal S, Alsuhaibani M, Alshammari BM. Federated-boosting: a distributed and dynamic boosting-powered cyber-attack detection scheme for security and privacy of consumer iot. IEEE Trans Consumer Electron. 2024;12:34.","journal-title":"IEEE Trans Consumer Electron"},{"issue":"6","key":"284_CR13","doi-asserted-by":"publisher","first-page":"3228","DOI":"10.1109\/JBHI.2024.3352013","volume":"28","author":"IA Khan","year":"2024","unstructured":"Khan IA, Razzak I, Pi D, Zia U, Kamal S, Hussain Y. A novel collaborative sru network with dynamic behaviour aggregation, reduced communication overhead and explainable features. IEEE J Biomed Health Inform. 2024;28(6):3228\u201335.","journal-title":"IEEE J Biomed Health Inform"},{"issue":"1","key":"284_CR14","doi-asserted-by":"publisher","first-page":"21789","DOI":"10.1038\/s41598-024-72049-z","volume":"14","author":"A Qaddos","year":"2024","unstructured":"Qaddos A, Yaseen MU, Al-Shamayleh AS, Imran M, Akhunzada A, Alharthi SZ. A novel intrusion detection framework for optimizing iot security. Sci Rep. 2024;14(1):21789.","journal-title":"Sci Rep"},{"key":"284_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.103980","volume":"230","author":"SA Abdulkareem","year":"2024","unstructured":"Abdulkareem SA, Foh CH, Carrez F, Moessner K. A lightweight sel for attack detection in iot\/iiot networks. J Netw Comput Appl. 2024;230:103980.","journal-title":"J Netw Comput Appl"},{"key":"284_CR16","first-page":"1","volume":"12","author":"RS Tiwari","year":"2021","unstructured":"Tiwari RS, Lakshmi D, Das TK, Tripathy AK, Li K-C. A lightweight optimized intrusion detection system using machine learning for edge-based iiot security. Telecommun Syst. 2021;12:1\u201320.","journal-title":"Telecommun Syst"},{"key":"284_CR17","doi-asserted-by":"publisher","first-page":"123456","DOI":"10.1109\/ACCESS.2025.3557959","volume":"13","author":"SI Popoola","year":"2025","unstructured":"Popoola SI, Tsado Y, Ogunjinmi AA, Sanchez-Velazquez E, Peng Y, Rawat DB. Multistage deep learning for intrusion detection in industrial internet of things. IEEE Access. 2025;13:123456\u201367.","journal-title":"IEEE Access"},{"issue":"6","key":"284_CR18","doi-asserted-by":"publisher","first-page":"4486","DOI":"10.1109\/JIOT.2021.3053401","volume":"8","author":"M Zolanvari","year":"2021","unstructured":"Zolanvari M, Yang Z, Khan K, Jain R, Meskin N. Trust xai: a novel model for explainable ai with an example using iiot security. IEEE Int Things J. 2021;8(6):4486\u201396. https:\/\/doi.org\/10.1109\/JIOT.2021.3053401.","journal-title":"IEEE Int Things J"},{"key":"284_CR19","doi-asserted-by":"crossref","unstructured":"Radhakrishnan V, Kabilan N, Ravi V, Sowmya V. Unsupervised representation learning approach for intrusion detection in the industrial internet of things network environment. In: Analytics Modeling in Reliability and Machine Learning and Its Applications, pp. 41\u201376. Springer. 2025.","DOI":"10.1007\/978-3-031-72636-1_3"},{"key":"284_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101252","volume":"27","author":"SMS Bukhari","year":"2024","unstructured":"Bukhari SMS, Zafar MH, Houran MA, Qadir Z, Moosavi SKR, Sanfilippo F. Enhancing cybersecurity in edge iiot networks: an asynchronous federated learning approach with a deep hybrid detection model. Int Things. 2024;27:101252. https:\/\/doi.org\/10.1016\/j.iot.2024.101252.","journal-title":"Int Things"},{"issue":"12","key":"284_CR21","first-page":"24","volume":"2024","author":"GT Francis","year":"2024","unstructured":"Francis GT, Souri A, Inan\u00e7 N. A hybrid intrusion detection approach based on message queuing telemetry transport (mqtt) protocol in industrial internet of things. Trans Emerg Telecommun Technol. 2024;2024(12):24.","journal-title":"Trans Emerg Telecommun Technol"},{"key":"284_CR22","first-page":"2121","volume":"76","author":"A Sezgin","year":"2023","unstructured":"Sezgin A, Boyac\u0131 A. Aid4i: An intrusion detection framework for industrial internet of things using automated machine learning. Computers Mater Contin. 2023;76:2121\u201343.","journal-title":"Computers Mater Contin"},{"key":"284_CR23","doi-asserted-by":"publisher","first-page":"20080","DOI":"10.1007\/s11227-024-06166-x","volume":"80","author":"S Ruiz-Villafranca","year":"2024","unstructured":"Ruiz-Villafranca S, Rold\u00e1n-G\u00f3mez J, G\u00f3mez JMC, et al. A tabpfn-based intrusion detection system for the industrial internet of things. J Supercomputing. 2024;80:20080\u2013117. https:\/\/doi.org\/10.1007\/s11227-024-06166-x.","journal-title":"J Supercomputing"},{"key":"284_CR24","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.aej.2023.01.012","volume":"81","author":"S Soliman","year":"2023","unstructured":"Soliman S, Oudah W, Aljuhani A. Deep learning-based intrusion detection approach for securing industrial internet of things. Alexandria Eng J. 2023;81:371\u201383. https:\/\/doi.org\/10.1016\/j.aej.2023.01.012.","journal-title":"Alexandria Eng J"},{"key":"284_CR25","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/s42452-024-06044-4","volume":"6","author":"R Sinha","year":"2024","unstructured":"Sinha R, Thakur P, Gupta S, et al. Development of lightweight intrusion model in industrial internet of things using deep learning technique. Disc Appl Sci. 2024;6:346. https:\/\/doi.org\/10.1007\/s42452-024-06044-4.","journal-title":"Disc Appl Sci"},{"key":"284_CR26","doi-asserted-by":"publisher","first-page":"14643","DOI":"10.1007\/s00521-024-09857-x","volume":"36","author":"AM Eid","year":"2024","unstructured":"Eid AM, Soudan B, Nassif AB, et al. Enhancing intrusion detection in iiot: Optimized cnn model with multi-class smote balancing. Neural Comput Appl. 2024;36:14643\u201359.","journal-title":"Neural Comput Appl"},{"key":"284_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1049\/cit2.12352","volume":"9","author":"MA Qathrady","year":"2024","unstructured":"Qathrady MA, Ullah S, Alshehri MS, Ahmad J, Almakdi S, Alqhtani SM, et al. Sacnn-ids: a self-attention convolutional neural network for intrusion detection in industrial internet of things. CAAI Trans Intell Technol. 2024;9:1\u201314.","journal-title":"CAAI Trans Intell Technol"},{"key":"284_CR28","doi-asserted-by":"publisher","first-page":"92","DOI":"10.20998\/2522-9052.2024.3.11","volume":"8","author":"V Sobchuk","year":"2024","unstructured":"Sobchuk V, Pykhnivskyi R, Barabash O, Korotin S, Omarov S. Sequential intrusion detection system for zero-trust cyber defense of iot\/iiot networks. Adv Inform Syst. 2024;8:92\u20139.","journal-title":"Adv Inform Syst"},{"issue":"1","key":"284_CR29","doi-asserted-by":"publisher","first-page":"219","DOI":"10.37391\/IJEER.120131","volume":"12","author":"E Anbalagan","year":"2024","unstructured":"Anbalagan E, Rao PS, Vijayan P, Alluri A, Nageswari D, Kalaivani R. Improving intrusion detection using satin bowerbird optimization with deep learning model for iiot environment. Int J Electr Electron Res. 2024;12(1):219\u201327.","journal-title":"Int J Electr Electron Res"},{"issue":"1","key":"284_CR30","doi-asserted-by":"publisher","first-page":"10","DOI":"10.3390\/s25010010","volume":"25","author":"T Rehman","year":"2024","unstructured":"Rehman T, Tariq N, Khan FA, Rehman SU. Ffl-ids: a fog-enabled federated learning-based intrusion detection system to counter jamming and spoofing attacks for the industrial internet of things. Sensors. 2024;25(1):10.","journal-title":"Sensors"},{"key":"284_CR31","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.aej.2025.02.004","volume":"121","author":"FS Alrayes","year":"2025","unstructured":"Alrayes FS, Nemri N, Mansouri W, Alshuhail A, Almukadi WS, Al-Sharafi AM, et al. Leveraging sparrow search optimization with deep learning-based cybersecurity detection in industrial internet of things environment. Alex Eng J. 2025;121:128\u201337.","journal-title":"Alex Eng J"},{"issue":"19","key":"284_CR32","doi-asserted-by":"publisher","first-page":"4091","DOI":"10.3390\/electronics12194091","volume":"12","author":"LA Maghrabi","year":"2023","unstructured":"Maghrabi LA, Alzahrani IR, Alsalman D, AlKubaisy ZM, Hamed D, Ragab M. Golden jackal optimization with a deep learning-based cybersecurity solution in industrial internet of things systems. Electronics. 2023;12(19):4091.","journal-title":"Electronics"},{"key":"284_CR33","volume":"38","author":"HC Altunay","year":"2023","unstructured":"Altunay HC, Albayrak Z. A hybrid cnn+ lstm-based intrusion detection system for industrial iot networks. Eng Sci Technol Int J. 2023;38:101322.","journal-title":"Eng Sci Technol Int J"},{"key":"284_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103784","volume":"221","author":"S Latif","year":"2024","unstructured":"Latif S, Boulila W, Koubaa A, Zou Z, Ahmad J. Dtl-ids: An optimized intrusion detection framework using deep transfer learning and genetic algorithm. J Netw Comput Appl. 2024;221:103784.","journal-title":"J Netw Comput Appl"},{"key":"284_CR35","doi-asserted-by":"publisher","first-page":"26766","DOI":"10.1109\/ACCESS.2021.3056407","volume":"9","author":"P Agrawal","year":"2021","unstructured":"Agrawal P, Abutarboush HF, Ganesh T, Mohamed AW. Metaheuristic algorithms on feature selection: a survey of one decade of research (2009\u20132019). Ieee Access. 2021;9:26766\u201391.","journal-title":"Ieee Access"},{"key":"284_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108320","volume":"242","author":"FA Hashim","year":"2022","unstructured":"Hashim FA, Hussien AG. Snake optimizer: a novel meta-heuristic optimization algorithm. Knowl-Based Syst. 2022;242:108320.","journal-title":"Knowl-Based Syst"},{"key":"284_CR37","doi-asserted-by":"crossref","unstructured":"Yang X-S, Deb S. Cuckoo search via l\u00e9vy flights. In: 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC), 2009;pp. 210\u2013214 . IEEE","DOI":"10.1109\/NABIC.2009.5393690"},{"issue":"5","key":"284_CR38","doi-asserted-by":"publisher","first-page":"4677","DOI":"10.1103\/PhysRevE.49.4677","volume":"49","author":"RN Mantegna","year":"1994","unstructured":"Mantegna RN. Fast, accurate algorithm for numerical simulation of l\u00e9vy stable stochastic processes. Phys Rev E. 1994;49(5):4677\u201383. https:\/\/doi.org\/10.1103\/PhysRevE.49.4677.","journal-title":"Phys Rev E"},{"key":"284_CR39","unstructured":"Ghiasvand E, Ray S, Iqbal S, Dadkhah S, Ghorbani AA. Cicapt-iiot: A provenance-based apt attack dataset for iiot environment. arXiv preprint arXiv:2407.11278 2024."},{"key":"284_CR40","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H. Edge-iiotset: a new comprehensive realistic cyber security dataset of iot and iiot applications for centralized and federated learning. IEEe Access. 2022;10:40281\u2013306.","journal-title":"IEEe Access"},{"issue":"5","key":"284_CR41","first-page":"3962","volume":"9","author":"M Al-Hawawreh","year":"2021","unstructured":"Al-Hawawreh M, Sitnikova E, Aboutorab N. X-iiotid: a connectivity-agnostic and device-agnostic intrusion data set for industrial internet of things. IEEE Int Things J. 2021;9(5):3962\u201377.","journal-title":"IEEE Int Things J"},{"key":"284_CR42","doi-asserted-by":"publisher","unstructured":"Zolanvari M. WUSTL-IIOT-2021. https:\/\/doi.org\/10.21227\/yftq-n229.","DOI":"10.21227\/yftq-n229"},{"issue":"4","key":"284_CR43","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10586-024-04888-4","volume":"28","author":"QM Alzubi","year":"2025","unstructured":"Alzubi QM, Sanjalawe Y, Makhadmeh SN, Fakhouri HN. An enhanced method for intrusion detection systems in iot environment. Clust Comput. 2025;28(4):257.","journal-title":"Clust Comput"},{"key":"284_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103512","volume":"135","author":"Y Sanjalawe","year":"2023","unstructured":"Sanjalawe Y, Fraihat S, et al. Detection of obfuscated tor traffic based on bidirectional generative adversarial networks and vision transform. Computers & Security. 2023;135:103512.","journal-title":"Computers & Security"},{"key":"284_CR45","doi-asserted-by":"publisher","first-page":"98516","DOI":"10.1109\/ACCESS.2023.3313630","volume":"11","author":"YK Sanjalawe","year":"2023","unstructured":"Sanjalawe YK, Al-E\u2019mari SR. Abnormal transactions detection in the ethereum network using semi-supervised generative adversarial networks. IEEE Access. 2023;11:98516\u201331.","journal-title":"IEEE Access"},{"key":"284_CR46","doi-asserted-by":"crossref","unstructured":"Popoola SI, Tsado Y, Ogunjinmi AA, Sanchez-Velazquez E, Peng Y, Rawat DB. Multi-stage deep learning for intrusion detection in industrial internet of things. IEEE Access 2025.","DOI":"10.1109\/ACCESS.2025.3557959"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-026-00284-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-026-00284-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-026-00284-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T10:41:19Z","timestamp":1773830479000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-026-00284-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,12]]},"references-count":46,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["284"],"URL":"https:\/\/doi.org\/10.1007\/s43926-026-00284-z","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,12]]},"assertion":[{"value":"8 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"34"}}