{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T15:06:50Z","timestamp":1775574410622,"version":"3.50.1"},"reference-count":181,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T00:00:00Z","timestamp":1775520000000},"content-version":"vor","delay-in-days":37,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-026-00285-y","type":"journal-article","created":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T14:11:10Z","timestamp":1772374270000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A review of artificial intelligence-based intrusion detection in industrial internet of things"],"prefix":"10.1007","volume":"6","author":[{"given":"Yousef","family":"Sanjalawe","sequence":"first","affiliation":[]},{"given":"Salam","family":"Fraihat","sequence":"additional","affiliation":[]},{"given":"Salam","family":"Al-E\u2019mari","sequence":"additional","affiliation":[]},{"given":"Sharif Naser","family":"Makhadmeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,1]]},"reference":[{"key":"285_CR1","doi-asserted-by":"crossref","unstructured":"Malik PK, Sharma R, Singh R, Gehlot A, Satapathy SC, Alnumay WS, et al. Industrial internet of things and its applications in industry 4.0: state of the art. Comput Commun. 2021;166:125\u201339.","DOI":"10.1016\/j.comcom.2020.11.016"},{"issue":"1","key":"285_CR2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/JSYST.2023.3270620","volume":"18","author":"B Babayigit","year":"2023","unstructured":"Babayigit B, Abubaker M. Industrial internet of things: a review of improvements over traditional scada systems for industrial automation. IEEE Syst J. 2023;18(1):120\u201333.","journal-title":"IEEE Syst J"},{"issue":"18","key":"285_CR3","first-page":"16494","volume":"10","author":"M Alam","year":"2023","unstructured":"Alam M, Ahmed N, Matam R, Mukherjee M, Barbhuiya FA. Sdn-based reconfigurable edge network architecture for industrial internet of things. IEEE Int Things J. 2023;10(18):16494\u2013503.","journal-title":"IEEE Int Things J"},{"issue":"4","key":"285_CR4","first-page":"2633","volume":"16","author":"J Wan","year":"2020","unstructured":"Wan J, Tang S, Li D, Liu C, Zomaya AY. Industrial internet of things: a review of intelligent manufacturing. IEEE Trans Industr Inf. 2020;16(4):2633\u201344.","journal-title":"IEEE Trans Industr Inf"},{"key":"285_CR5","unstructured":"Lee J, Kao H-A, Yang S. Service innovation and smart analytics for industry 4.0 and smart manufacturing. Procedia CIRP. 2020;93:411\u20136."},{"issue":"1","key":"285_CR6","doi-asserted-by":"publisher","first-page":"163","DOI":"10.3390\/iot2010009","volume":"2","author":"K Tsiknas","year":"2021","unstructured":"Tsiknas K, Taketzis D, Demertzis K, Skianis C. Cyber threats to industrial iot: a survey on attacks and countermeasures. IoT. 2021;2(1):163\u201386.","journal-title":"IoT"},{"key":"285_CR7","doi-asserted-by":"crossref","unstructured":"Xenofontos C, Zografopoulos I, Konstantinou C, Jolfaei A, Khan MK, Choo K-KR. Consumer, commercial, and industrial iot (in) security: attack taxonomy and case studies. IEEE Internet of Things J. 2021;9(1):199\u2013221.","DOI":"10.1109\/JIOT.2021.3079916"},{"issue":"11","key":"285_CR8","doi-asserted-by":"publisher","first-page":"4724","DOI":"10.1109\/TII.2018.2852491","volume":"14","author":"E Sisinni","year":"2018","unstructured":"Sisinni E, Saifullah A, Han S, Jennehag U, Gidlund M. Industrial internet of things: challenges, opportunities, and directions. IEEE Trans Industr Inf. 2018;14(11):4724\u201334.","journal-title":"IEEE Trans Industr Inf"},{"issue":"5","key":"285_CR9","doi-asserted-by":"publisher","first-page":"2985","DOI":"10.1109\/TII.2020.3023507","volume":"17","author":"M Serror","year":"2020","unstructured":"Serror M, Hack S, Henze M, Schuba M, Wehrle K. Challenges and opportunities in securing the industrial internet of things. IEEE Trans Industr Inf. 2020;17(5):2985\u201396.","journal-title":"IEEE Trans Industr Inf"},{"key":"285_CR10","doi-asserted-by":"crossref","unstructured":"Beerman J, Berent D, Falter Z, Bhunia S. A review of colonial pipeline ransomware attack. In 2023 IEEE\/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW), 2023. pp. 8\u201315. IEEE.","DOI":"10.1109\/CCGridW59191.2023.00017"},{"key":"285_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.107450","volume":"154","author":"Y Li","year":"2020","unstructured":"Li Y, Yingying X, Liu Z, Hou H, Zheng Y, Xin Y, et al. Robust detection for network intrusion of industrial iot based on multi-cnn fusion. Measurement. 2020;154:107450.","journal-title":"Measurement"},{"key":"285_CR12","volume":"38","author":"HC Altunay","year":"2023","unstructured":"Altunay HC, Albayrak Z. A hybrid cnn+ lstm-based intrusion detection system for industrial iot networks. Eng Sci Technol Int J. 2023;38:101322.","journal-title":"Eng Sci Technol Int J"},{"issue":"3","key":"285_CR13","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s10922-021-09589-6","volume":"29","author":"Y Otoum","year":"2021","unstructured":"Otoum Y, Nayak A. As-ids: anomaly and signature based ids for the internet of things. J Netw Syst Manage. 2021;29(3):23.","journal-title":"J Netw Syst Manage"},{"key":"285_CR14","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.aej.2023.09.023","volume":"81","author":"S Soliman","year":"2023","unstructured":"Soliman S, Oudah W, Aljuhani A. Deep learning-based intrusion detection approach for securing industrial internet of things. Alex Eng J. 2023;81:371\u201383.","journal-title":"Alex Eng J"},{"key":"285_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103315","volume":"132","author":"PLS Jayalaxmi","year":"2023","unstructured":"Jayalaxmi PLS, Saha R, Kumar G, Alazab M, Conti M, Cheng X. Pignus: a deep learning model for ids in industrial internet-of-things. Comput Sec. 2023;132:103315.","journal-title":"Comput Sec"},{"issue":"2","key":"285_CR16","doi-asserted-by":"publisher","first-page":"1058","DOI":"10.1109\/JIOT.2023.3314890","volume":"11","author":"A Saied","year":"2024","unstructured":"Saied A, Al-Ayyoub M, Jararweh Y, Benkhelifa E. Ai-based intrusion detection systems in the internet of things: a survey and taxonomy. IEEE Internet Things J. 2024;11(2):1058\u201375. https:\/\/doi.org\/10.1109\/JIOT.2023.3314890.","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"285_CR17","doi-asserted-by":"publisher","first-page":"45","DOI":"10.3390\/fi17010045","volume":"17","author":"S Mallidi","year":"2025","unstructured":"Mallidi S, Ramisetty S. Training and deployment considerations for ai-powered ids in iot. Future Internet. 2025;17(1):45. https:\/\/doi.org\/10.3390\/fi17010045.","journal-title":"Future Internet"},{"key":"285_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103448","volume":"205","author":"M Sowmya","year":"2023","unstructured":"Sowmya M, Mary AS. A survey of machine learning, deep learning, and ensemble techniques for ids in iot networks. J Netw Comput Appl. 2023;205:103448. https:\/\/doi.org\/10.1016\/j.jnca.2022.103448.","journal-title":"J Netw Comput Appl"},{"key":"285_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103637","volume":"223","author":"M Nuaimi","year":"2023","unstructured":"Nuaimi M, Fourati LC, Hamed BB. Intelligent approaches toward intrusion detection systems for industrial internet of things: a systematic comprehensive review. J Netw Comput Appl. 2023;223:103637. https:\/\/doi.org\/10.1016\/j.jnca.2023.103637.","journal-title":"J Netw Comput Appl"},{"key":"285_CR20","doi-asserted-by":"publisher","first-page":"78238","DOI":"10.1109\/ACCESS.2018.2884906","volume":"6","author":"X Hansong","year":"2018","unstructured":"Hansong X, Yu W, Griffith D, Golmie N. A survey on industrial internet of things: a cyber-physical systems perspective. IEEE Access. 2018;6:78238\u201359. https:\/\/doi.org\/10.1109\/ACCESS.2018.2884906.","journal-title":"IEEE Access"},{"issue":"5","key":"285_CR21","doi-asserted-by":"publisher","first-page":"2985","DOI":"10.1109\/TII.2020.3023507","volume":"17","author":"M Serror","year":"2021","unstructured":"Serror M, Hack S, Henze M, Schuba M, Wehrle K. Challenges and opportunities in securing the industrial internet of things. IEEE Trans Industr Inf. 2021;17(5):2985\u201396. https:\/\/doi.org\/10.1109\/TII.2020.3023507.","journal-title":"IEEE Trans Industr Inf"},{"issue":"17","key":"285_CR22","doi-asserted-by":"publisher","first-page":"7470","DOI":"10.3390\/s23177470","volume":"23","author":"B Alotaibi","year":"2023","unstructured":"Alotaibi B. A survey on industrial internet of things security: requirements, attacks, ai-based solutions, and edge computing opportunities. Sensors. 2023;23(17):7470. https:\/\/doi.org\/10.3390\/s23177470.","journal-title":"Sensors"},{"key":"285_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2024.102685","volume":"62","author":"M Shahin","year":"2024","unstructured":"Shahin M, Maghanaki M, Hosseinzadeh A, Frank CF. Advancing network security in industrial iot: a deep dive into ai-enabled intrusion detection systems. Adv Eng Inform. 2024;62:102685. https:\/\/doi.org\/10.1016\/j.aei.2024.102685.","journal-title":"Adv Eng Inform"},{"issue":"6","key":"285_CR24","doi-asserted-by":"publisher","first-page":"161","DOI":"10.3390\/technologies11060161","volume":"11","author":"AM Alnajim","year":"2023","unstructured":"Alnajim AM, Habib S, Muhammad Islam S, Thwin M, Alotaibi F. A comprehensive survey of cybersecurity threats, attacks, and effective countermeasures in industrial internet of things. Technologies. 2023;11(6):161. https:\/\/doi.org\/10.3390\/technologies11060161.","journal-title":"Technologies"},{"issue":"1","key":"285_CR25","doi-asserted-by":"publisher","first-page":"2163","DOI":"10.34218\/IJCET_16_01_155","volume":"16","author":"A Ronad","year":"2025","unstructured":"Ronad A. Industrial iot networks: architecture, components, and security considerations. Int J Comput Eng Tech. 2025;16(1):2163\u201382.","journal-title":"Int J Comput Eng Tech"},{"issue":"6","key":"285_CR26","doi-asserted-by":"publisher","first-page":"331","DOI":"10.9734\/jerr\/2025\/v27i61548","volume":"27","author":"OF Olaitan","year":"2025","unstructured":"Olaitan OF, Akatakpo ON, Emejulu CJ, et al. Secure and resilient industrial iot architectures for smart manufacturing: a comprehensive review. J Eng Res Reports. 2025;27(6):331\u201344.","journal-title":"J Eng Res Reports"},{"issue":"12","key":"285_CR27","doi-asserted-by":"publisher","first-page":"256","DOI":"10.3390\/computers12120256","volume":"12","author":"H Zhou","year":"2023","unstructured":"Zhou H, Pal S, Jadidi Z, Jolfaei A. Security issues on industrial internet of things: overview and research challenges. Computers. 2023;12(12):256. https:\/\/doi.org\/10.3390\/computers12120256.","journal-title":"Computers"},{"key":"285_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121462","volume":"237","author":"A Kumar","year":"2024","unstructured":"Kumar A, Singh R, Goel A, Verma A, Tripathi A. Attacknet: deep learning enabled intrusion detection system for industrial iot. Expert Syst Appl. 2024;237:121462. https:\/\/doi.org\/10.1016\/j.eswa.2023.121462.","journal-title":"Expert Syst Appl"},{"key":"285_CR29","unstructured":"ZeroTier Blog. What is industrial iot (iiot)? your 2023 guide. https:\/\/www.zerotier.com\/blog\/what-is-industrial-iot-your-2023-guide\/, 2023. Accessed 15 July 2025."},{"key":"285_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109412","volume":"228","author":"MA Khan","year":"2023","unstructured":"Khan MA, Javaid N, Qamar F, Mahmood A, Alrajeh N. Cybersecurity for industrial iot (iiot): threats, countermeasures and future directions. Comput Netw. 2023;228:109412. https:\/\/doi.org\/10.1016\/j.comnet.2023.109412.","journal-title":"Comput Netw"},{"issue":"4","key":"285_CR31","doi-asserted-by":"publisher","first-page":"7137","DOI":"10.1109\/JIOT.2019.2914390","volume":"6","author":"M Al-Hawawreh","year":"2019","unstructured":"Al-Hawawreh M, Den Hartog F, Sitnikova E. Targeted ransomware: a new cyber threat to edge system of brownfield industrial internet of things. IEEE Internet Things J. 2019;6(4):7137\u201351.","journal-title":"IEEE Internet Things J"},{"key":"285_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103809","volume":"223","author":"M Al-Hawawreh","year":"2024","unstructured":"Al-Hawawreh M, Alazab M, Ferrag MA, Shamim HM. Securing the industrial internet of things against ransomware attacks: a comprehensive analysis of the emerging threat landscape and detection mechanisms. J Netw Comput Appl. 2024;223:103809.","journal-title":"J Netw Comput Appl"},{"key":"285_CR33","doi-asserted-by":"crossref","unstructured":"Saran N, Kesswani N. An analytics-driven framework for securing industrial iot-enabled supply chain management systems. Supply Chain Analytics, 2025. pp. 100128.","DOI":"10.1016\/j.sca.2025.100128"},{"key":"285_CR34","doi-asserted-by":"crossref","unstructured":"Hildebrandt M, Lamsh\u00f6ft K, Dittmann J, Neubert T, Vielhauer C. Information hiding in industrial control systems: An opc ua based supply chain attack and its detection. In Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security, 2020. pp. 115\u2013120.","DOI":"10.1145\/3369412.3395068"},{"key":"285_CR35","unstructured":"Xue Y, Spero E, Koh YS, Russello G. Multiphishguard: An llm-based multi-agent system for phishing email detection. arXiv preprint arXiv:2505.23803, 2025."},{"key":"285_CR36","doi-asserted-by":"crossref","unstructured":"Uddin MA, Sarker IH. An explainable transformer-based model for phishing email detection: a large language model approach. arXiv preprint arXiv:2402.13871, 2024.","DOI":"10.2139\/ssrn.4785953"},{"key":"285_CR37","doi-asserted-by":"crossref","unstructured":"von der Assen J, Celdr\u00e1n AH, et\u00a0al. Ransomai: Ai-powered ransomware for stealthy encryption. In IEEE GLOBECOM, 2023.","DOI":"10.1109\/GLOBECOM54140.2023.10437393"},{"key":"285_CR38","doi-asserted-by":"crossref","unstructured":"Gueriani A, Kheddar H, et\u00a0al. Kheddar. Adaptive cyber-attack detection in iiot using attention-based lstm-cnn models. arXiv preprint arXiv:2501.13962, 2025.","DOI":"10.1109\/ICTIS62692.2024.10894509"},{"key":"285_CR39","unstructured":"Zhang Q, Li X. Modbus-nfa behavior model for enhanced anomaly detection. J Indust Inform Integration, 2025."},{"key":"285_CR40","unstructured":"Tschofenig H, et\u00a0al. Tls\/dtls 1.3 profiles for the internet of things. Internet-draft, IETF, 2024."},{"issue":"9","key":"285_CR41","first-page":"196","volume":"25","author":"A Cinar","year":"2023","unstructured":"Cinar A. Supply chain cybersecurity: risks, challenges, and strategies. J Supply Chain Cybersecur. 2023;25(9):196\u2013210.","journal-title":"J Supply Chain Cybersecur"},{"key":"285_CR42","unstructured":"Lee S, Kim J. Strengthening network ddos attack detection in heterogeneous iot. Sci Reports. 2024."},{"key":"285_CR43","unstructured":"Sivasankari A, Kamalakkannan J. Intrusion detection in iot networks using machine learning and deep learning techniques. SN Computer Science, 2025."},{"key":"285_CR44","unstructured":"Ali A, Husain M, Hans P. Federated learning-enhanced blockchain framework for privacy-preserving intrusion detection in industrial iot. 2025. arXiv preprint arXiv:2505.15376."},{"key":"285_CR45","doi-asserted-by":"crossref","unstructured":"Hamouda D, Ferrag MA, Benhamida N, Seridi H. Intrusion detection systems for industrial internet of things: A survey. In 2021 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS), 2021. pp. 1\u20138. IEEE.","DOI":"10.1109\/ICTAACS53298.2021.9715177"},{"issue":"12","key":"285_CR46","doi-asserted-by":"publisher","first-page":"8786","DOI":"10.1109\/TII.2022.3145834","volume":"18","author":"J Pang","year":"2022","unstructured":"Pang J, Xiaokun P, Li C. A hybrid algorithm incorporating vector quantization and one-class support vector machine for industrial anomaly detection. IEEE Trans Industr Inf. 2022;18(12):8786\u201396.","journal-title":"IEEE Trans Industr Inf"},{"issue":"10","key":"285_CR47","doi-asserted-by":"publisher","first-page":"6575","DOI":"10.1109\/TII.2020.2976747","volume":"16","author":"JE Rubio","year":"2020","unstructured":"Rubio JE, Roman R, Lopez J. Integration of a threat traceability solution in the industrial internet of things. IEEE Trans Indust Inform. 2020;16(10):6575\u201383.","journal-title":"IEEE Trans Indust Inform"},{"key":"285_CR48","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/s43926-025-00099-4","volume":"5","author":"SKR Mallidi","year":"2025","unstructured":"Mallidi SKR, Ramisetty RR. Advancements in training and deployment strategies for ai-based intrusion detection systems in iot: a systematic literature review. Discover Internet of Things. 2025;5:8.","journal-title":"Discover Internet of Things"},{"key":"285_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2025.100644","volume":"30","author":"SS Qureshi","year":"2025","unstructured":"Qureshi SS, He J, Qureshi SU, Zhu N, Wajahat A, Nazir A, et al. Advanced ai-driven intrusion detection for securing cloud-based industrial iot. Egyptian Inform J. 2025;30:100644.","journal-title":"Egyptian Inform J"},{"issue":"8","key":"285_CR50","doi-asserted-by":"publisher","first-page":"14739","DOI":"10.1109\/JIOT.2023.3344457","volume":"11","author":"S Liu","year":"2023","unstructured":"Liu S, Yu Y, Zong Y, Yeoh PL, Guo L, Vucetic B, et al. Delay and energy-efficient asynchronous federated learning for intrusion detection in heterogeneous industrial internet of things. IEEE Internet of Things J. 2023;11(8):14739\u201354.","journal-title":"IEEE Internet of Things J"},{"issue":"17","key":"285_CR51","doi-asserted-by":"crossref","first-page":"5516","DOI":"10.3390\/s24175516","volume":"24","author":"P Pereira","year":"2024","unstructured":"Pereira P, Mendes P, Vitorino J, Maia E, Pra\u00e7a I. Intelligent green efficiency for intrusion detection. Sensors (Basel). 2024;24(17):5516.","journal-title":"Sensors (Basel)"},{"issue":"5","key":"285_CR52","doi-asserted-by":"publisher","first-page":"7399","DOI":"10.1109\/JIOT.2023.3332507","volume":"11","author":"I Behnke","year":"2023","unstructured":"Behnke I, Austad H. Real-time performance of industrial iot communication technologies: a review. IEEE Internet Things J. 2023;11(5):7399\u2013410.","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"285_CR53","doi-asserted-by":"publisher","first-page":"321","DOI":"10.3390\/s23010321","volume":"23","author":"N Abosata","year":"2022","unstructured":"Abosata N, Al-Rubaye S, Inalhan G. Customised intrusion detection for an industrial iot heterogeneous network based on machine learning algorithms called ftl-cid. Sensors. 2022;23(1):321.","journal-title":"Sensors"},{"issue":"2","key":"285_CR54","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1109\/TII.2021.3126728","volume":"19","author":"P Ruzafa-Alc\u00e1zar","year":"2021","unstructured":"Ruzafa-Alc\u00e1zar P, Fern\u00e1ndez-Saura P, M\u00e1rmol-Campos E, Gonz\u00e1lez-Vidal A, Hern\u00e1ndez-Ramos JL, Bernal-Bernabe J, et al. Intrusion detection based on privacy-preserving federated learning for the industrial iot. IEEE Trans Indust Inform. 2021;19(2):1145\u201354.","journal-title":"IEEE Trans Indust Inform"},{"key":"285_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100081","volume":"10","author":"Q Wang","year":"2020","unstructured":"Wang Q, Zhu X, Ni Y, Li G, Zhu H. Blockchain for the iot and industrial iot: a review. Intern Things. 2020;10:100081.","journal-title":"Intern Things"},{"key":"285_CR56","doi-asserted-by":"publisher","first-page":"25655","DOI":"10.1038\/s41598-025-09696-3","volume":"15","author":"U Islam","year":"2025","unstructured":"Islam U, et al. A hybrid fog-edge computing architecture for real-time health monitoring in iomt systems with optimized latency and threat resilience. Sci Rep. 2025;15:25655.","journal-title":"Sci Rep"},{"key":"285_CR57","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi A, Moustafa N, Tari Z, Mahmood A, Anwar A. Ton_iot telemetry dataset: a new generation dataset of iot and iiot for data-driven intrusion detection systems. Ieee Access. 2020;8:165130\u201350.","journal-title":"Ieee Access"},{"issue":"4","key":"285_CR58","doi-asserted-by":"publisher","first-page":"6822","DOI":"10.1109\/JIOT.2019.2912022","volume":"6","author":"M Zolanvari","year":"2019","unstructured":"Zolanvari M, Teixeira MA, Gupta L, Khan KM, Jain R. Machine learning-based network vulnerability analysis of industrial internet of things. IEEE Internet of Things J. 2019;6(4):6822\u201334.","journal-title":"IEEE Internet of Things J"},{"key":"285_CR59","unstructured":"Ghiasvand E, Ray S, Iqbal S, Dadkhah S, Ghorbani AA. Cicapt-iiot: a provenance-based apt attack dataset for iiot environment. arXiv preprint arXiv:2407.11278, 2024."},{"key":"285_CR60","unstructured":"Patnaik PDR, Gengaje SR. A systematic review of hardware-in-the-loop (hil) frameworks for internet of things applications. Grenze Int J Eng Tech (GIJET), 2024;10."},{"issue":"1","key":"285_CR61","first-page":"1","volume":"40","author":"S Al-E\u2019mari","year":"2022","unstructured":"Al-E\u2019mari S, Anbar M, Sanjalawe Y, Manickam S, Hasbullah I. Intrusion detection systems using blockchain technology: a review, issues and challenges. Comp Syst Sci Eng. 2022;40(1):1.","journal-title":"Comp Syst Sci Eng"},{"issue":"1","key":"285_CR62","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"Modi C, Patel D, Borisaniya B, Patel H, Patel A, Rajarajan M. A survey of intrusion detection techniques in cloud. J Netw Comput Appl. 2013;36(1):42\u201357.","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"285_CR63","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/s11036-022-01937-3","volume":"28","author":"IH Sarker","year":"2023","unstructured":"Sarker IH, Khan AI, Abushark YB, Alsolami F. Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mobile Netw Appl. 2023;28(1):296\u2013312.","journal-title":"Mobile Netw Appl"},{"key":"285_CR64","doi-asserted-by":"crossref","unstructured":"Hoque MM, Ahmad I, Suomalainen J, Dini P, Tahir M. On resource consumption of machine learning in communications security. Authorea Preprints, 2024.","DOI":"10.36227\/techrxiv.173152709.90384402\/v1"},{"key":"285_CR65","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102074","volume":"102","author":"MM Salim","year":"2024","unstructured":"Salim MM, El Azzaoui A, Deng X, Park JH. Fl-ctif: a federated learning based cti framework based on information fusion for secure iiot. Inform Fusion. 2024;102:102074.","journal-title":"Inform Fusion"},{"issue":"18","key":"285_CR66","doi-asserted-by":"publisher","first-page":"16504","DOI":"10.1109\/JIOT.2023.3268474","volume":"10","author":"A Irshad","year":"2023","unstructured":"Irshad A, Mallah GA, Bilal M, Chaudhry SA, Shafiq M, Song H. Susic: a secure user access control mechanism for sdn-enabled iiot and cyber-physical systems. IEEE Internet of Things J. 2023;10(18):16504\u201315.","journal-title":"IEEE Internet of Things J"},{"issue":"4","key":"285_CR67","doi-asserted-by":"publisher","first-page":"616","DOI":"10.3390\/sym17040616","volume":"17","author":"A Almalawi","year":"2025","unstructured":"Almalawi A, Hassan S, Fahad A, Iqbal A, Khan AI. Hybrid cybersecurity for asymmetric threats: intrusion detection and scada system protection innovations. Symmetry. 2025;17(4):616.","journal-title":"Symmetry"},{"issue":"1","key":"285_CR68","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/s43926-025-00099-4","volume":"5","author":"SKR Mallidi","year":"2025","unstructured":"Mallidi SKR, Ramisetty RR. Advancements in training and deployment strategies for ai-based intrusion detection systems in iot: A systematic literature review. Discover Internet of Things. 2025;5(1):8.","journal-title":"Discover Internet of Things"},{"key":"285_CR69","doi-asserted-by":"crossref","unstructured":"Popoola SI, Tsado Y, Ogunjinmi AA, Sanchez-Velazquez E, Peng Y, Rawat DB. Multi-stage deep learning for intrusion detection in industrial internet of things. IEEE Access. 2025.","DOI":"10.1109\/ACCESS.2025.3557959"},{"key":"285_CR70","unstructured":"Rahman A, Kundu D, Debnath T, Rahman M, Islam MJ. Blockchain-based ai methods for managing industrial iot: Recent developments, integration challenges and opportunities. arXiv preprint arXiv:2405.12550, 2024."},{"key":"285_CR71","doi-asserted-by":"crossref","unstructured":"Ismail S, Dandan S, Qushou A. Intrusion detection in iot and iiot: Comparing lightweight machine learning techniques using ton_iot, wustl-iiot-2021, and edge-iiotset datasets. IEEE Access, 2025. In press.","DOI":"10.1109\/ACCESS.2025.3554083"},{"key":"285_CR72","doi-asserted-by":"crossref","unstructured":"Wu W, Fouzi H, Benamar B, Sidi-Mohammed S, Ying S. Deep learning-based stacked models for cyber-attack detection in industrial internet of things. Neural Computing and Applications, 2025. pp. 1\u201335.","DOI":"10.1007\/s00521-025-11418-9"},{"issue":"4","key":"285_CR73","doi-asserted-by":"publisher","first-page":"71","DOI":"10.3390\/jsan11040071","volume":"11","author":"G Rathee","year":"2022","unstructured":"Rathee G, Kerrache CA, Ferrag MA. A blockchain-based intrusion detection system using viterbi algorithm and indirect trust for iiot systems. J Sens Actuator Netw. 2022;11(4):71.","journal-title":"J Sens Actuator Netw"},{"key":"285_CR74","doi-asserted-by":"crossref","unstructured":"Wankhade KK, Dongre S, Chandra R, Krishnan KV, Arasavilli S. Machine learning-based detection of attacks and anomalies in industrial internet of things (iiot) networks. In International Conference on Applied Soft Computing and Communication Networks. Springer; 2023. pp. 91\u2013109.","DOI":"10.1007\/978-981-97-2004-0_7"},{"key":"285_CR75","doi-asserted-by":"crossref","unstructured":"Srinivasan M, Senthilkumar NC. Intrusion detection and prevention system (idps) model for iiot environments using hybridized framework. IEEE Access, 2025.","DOI":"10.1109\/ACCESS.2025.3538461"},{"issue":"2","key":"285_CR76","doi-asserted-by":"publisher","first-page":"139","DOI":"10.22452\/mjcs.vol37no2.3","volume":"37","author":"OF Awad","year":"2024","unstructured":"Awad OF, Hazim LR, Jasim AA, Ata O. Enhancing iiot security with machine learning and deep learning for intrusion detection. Malays J Comput Sci. 2024;37(2):139\u201353.","journal-title":"Malays J Comput Sci"},{"key":"285_CR77","doi-asserted-by":"crossref","unstructured":"Eid AM, Nassif AB, Soudan B, Injadat MN. Iiot network intrusion detection using machine learning. In 2023 6th International Conference on Intelligent Robotics and Control Engineering (IRCE), 2023. pp. 196\u2013201. IEEE.","DOI":"10.1109\/IRCE59430.2023.10255088"},{"key":"285_CR78","doi-asserted-by":"publisher","first-page":"113199","DOI":"10.1109\/ACCESS.2021.3104113","volume":"9","author":"SM Kasongo","year":"2021","unstructured":"Kasongo SM. An advanced intrusion detection system for iiot based on ga and tree based algorithms. IEEE Access. 2021;9:113199\u2013212.","journal-title":"IEEE Access"},{"key":"285_CR79","doi-asserted-by":"crossref","unstructured":"Mallidi SKR, Ramisetty RRAA. Multi-level intrusion detection system for industrial iot using bowerbird courtship-inspired feature selection and hybrid data balancing: SKR Mallidi, et al. Discover Comput. 2025;28(1):109.","DOI":"10.1007\/s10791-025-09632-z"},{"key":"285_CR80","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102930","volume":"134","author":"IA Khan","year":"2022","unstructured":"Khan IA, Keshk M, Pi D, Khan N, Hussain Y, Soliman H. Enhancing iiot networks protection: a robust security model for attack detection in internet industrial control systems. Ad Hoc Netw. 2022;134:102930.","journal-title":"Ad Hoc Netw"},{"key":"285_CR81","doi-asserted-by":"crossref","unstructured":"Gulzar Q, Mustafa K. Intrusion detection in industrial iot using deep learning. In International Conference on Data Analytics & Management. Springer; 2024. pp. 281\u2013301.","DOI":"10.1007\/978-981-96-3352-4_20"},{"key":"285_CR82","doi-asserted-by":"crossref","unstructured":"Gueriani A, Kheddar H, Mazari AC. Adaptive cyber-attack detection in iiot using attention-based lstm-cnn models. In 2024 International Conference on Telecommunications and Intelligent Systems (ICTIS), 2024. pp. 1\u20136. IEE.","DOI":"10.1109\/ICTIS62692.2024.10894509"},{"issue":"1","key":"285_CR83","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/s43621-025-01141-9","volume":"6","author":"MZ Khan","year":"2025","unstructured":"Khan MZ, Reshi AA, Shafi S, Aljubayri I. An adaptive hybrid framework for iiot intrusion detection using neural networks and feature optimization using genetic algorithms. Discov Sustain. 2025;6(1):382.","journal-title":"Discov Sustain"},{"issue":"1","key":"285_CR84","doi-asserted-by":"publisher","first-page":"23694","DOI":"10.1038\/s41598-025-08436-x","volume":"15","author":"M Aly","year":"2025","unstructured":"Aly M, Behiry MH. Enhancing anomaly detection in iot-driven factories using logistic boosting, random forest, and svm: a comparative machine learning approach. Sci Rep. 2025;15(1):23694.","journal-title":"Sci Rep"},{"issue":"12","key":"285_CR85","doi-asserted-by":"publisher","first-page":"5568","DOI":"10.3390\/s23125568","volume":"23","author":"Y Alotaibi","year":"2023","unstructured":"Alotaibi Y, Ilyas M. Ensemble-learning framework for intrusion detection to enhance internet of things\u2019 devices security. Sensors. 2023;23(12):5568.","journal-title":"Sensors"},{"key":"285_CR86","doi-asserted-by":"crossref","unstructured":"Shen J, Yang W, Chu Z, Fan J, Niyato D, Lam KY. Effective intrusion detection in heterogeneous internet-of-things networks via ensemble knowledge distillation-based federated learning. In ICC 2024-IEEE International Conference on Communications, 2024. pp. 2034\u20132039. IEEE.","DOI":"10.1109\/ICC51166.2024.10622262"},{"key":"285_CR87","doi-asserted-by":"crossref","unstructured":"Injadat M. Optimized ensemble model towards secured industrial iot devices. In 2023 24th International Arab Conference on Information Technology (ACIT), 2023. pp. 1\u20135. IEEE.","DOI":"10.1109\/ACIT58888.2023.10453914"},{"issue":"1","key":"285_CR88","doi-asserted-by":"publisher","first-page":"13642","DOI":"10.1038\/s41598-025-98604-w","volume":"15","author":"PA Doost","year":"2025","unstructured":"Doost PA, Moghadam SS, Khezri E, Basem A, Trik M. A new intrusion detection method using ensemble classification and feature selection. Sci Rep. 2025;15(1):13642.","journal-title":"Sci Rep"},{"issue":"1","key":"285_CR89","doi-asserted-by":"publisher","first-page":"20843","DOI":"10.1038\/s41598-023-46746-0","volume":"13","author":"V Ellappan","year":"2023","unstructured":"Ellappan V, Mahendran A, Subramanian M, Jotheeswaran J, Khadidos AO, Khadidos AO, et al. Sliding principal component and dynamic reward reinforcement learning based iiot attack detection. Sci Rep. 2023;13(1):20843.","journal-title":"Sci Rep"},{"key":"285_CR90","doi-asserted-by":"crossref","unstructured":"Tellache A, Mokhtari A, Korba AA, Ghamri-Doudane Y. Multi-agent reinforcement learning-based network intrusion detection system. In NOMS 2024-2024 IEEE Network Operations and Management Symposium. 2024. pp. 1\u20139. IEEE.","DOI":"10.1109\/NOMS59830.2024.10575541"},{"key":"285_CR91","doi-asserted-by":"crossref","unstructured":"Ahmad T. Ai-driven dynamic firewall optimization using reinforcement learning for anomaly detection and prevention. 2025. arXiv preprint arXiv:2506.05356.","DOI":"10.36227\/techrxiv.174952992.29897123\/v1"},{"issue":"3","key":"285_CR92","doi-asserted-by":"publisher","first-page":"2442","DOI":"10.1109\/TNSM.2023.3299606","volume":"20","author":"A Zainudin","year":"2023","unstructured":"Zainudin A, Akter R, Kim D-S, Lee J-M. Federated learning inspired low-complexity intrusion detection and classification technique for sdn-based industrial cps. IEEE Trans Netw Serv Manage. 2023;20(3):2442\u201359.","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"7","key":"285_CR93","doi-asserted-by":"publisher","first-page":"8159","DOI":"10.1109\/TII.2022.3216575","volume":"19","author":"J Zhang","year":"2022","unstructured":"Zhang J, Luo C, Carpenter M, Min G. Federated learning for distributed iiot intrusion detection using transfer approaches. IEEE Trans Industr Inf. 2022;19(7):8159\u201369.","journal-title":"IEEE Trans Industr Inf"},{"issue":"1","key":"285_CR94","doi-asserted-by":"publisher","first-page":"158","DOI":"10.3390\/network3010008","volume":"3","author":"MM Rashid","year":"2023","unstructured":"Rashid MM, Khan SU, Eusufzai F, Redwan MA, Sabuj SR, Elsharief M. A federated learning-based approach for improving intrusion detection in industrial internet of things networks. Network. 2023;3(1):158\u201379.","journal-title":"Network"},{"key":"285_CR95","doi-asserted-by":"crossref","unstructured":"Kaur A. Intrusion detection approach for industrial internet of things traffic using deep recurrent reinforcement learning assisted federated learning. IEEE Transa Artif Intell. 2024.","DOI":"10.1109\/TAI.2024.3443787"},{"key":"285_CR96","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104191","volume":"149","author":"S Shoukat","year":"2025","unstructured":"Shoukat S, Gao T, Javeed D, Saeed MS, Adil M. Trust my ids: an explainable ai integrated deep learning-based transparent threat detection system for industrial networks. Comp Secur. 2025;149:104191.","journal-title":"Comp Secur"},{"key":"285_CR97","doi-asserted-by":"publisher","first-page":"115047","DOI":"10.1109\/ACCESS.2023.3323573","volume":"11","author":"MBM Shtayat","year":"2023","unstructured":"Shtayat MBM, Hasan MK, Sulaiman R, Islam S, Khan AUR. An explainable ensemble deep learning approach for intrusion detection in industrial internet of things. IEEE Access. 2023;11:115047\u201361.","journal-title":"IEEE Access"},{"key":"285_CR98","doi-asserted-by":"crossref","unstructured":"Attique D, Hao W, Ping W, Javeed D, Adil M. Ex-dfl: An explainable deep federated-based intrusion detection system for industrial iot. In 2024 21st International Joint Conference on Computer Science and Software Engineering (JCSSE), 2024. pp. 358\u2013364. IEEE.","DOI":"10.1109\/JCSSE61278.2024.10613665"},{"key":"285_CR99","doi-asserted-by":"crossref","unstructured":"Ahmad J, Latif S, Khan IU, Alshehri MS, Khan MS, Alasbali N, Jiang W. An interpretable deep learning framework for intrusion detection in industrial internet of things. Internet Things. 2025;101681.","DOI":"10.1016\/j.iot.2025.101681"},{"key":"285_CR100","doi-asserted-by":"crossref","unstructured":"Inoue J, Yamagata Y, Chen Y, Poskitt CC, Sun J. Anomaly detection for a water treatment system using unsupervised machine learning. In IEEE International Conference on Data Mining Workshops, 2017. pp. 1058\u20131065.","DOI":"10.1109\/ICDMW.2017.149"},{"key":"285_CR101","volume":"108","author":"R Ghafouri","year":"2021","unstructured":"Ghafouri R, Cardellini V, Presti FL. Adversarial attacks on industrial control system anomaly detection. Comput Secur. 2021;108:102345.","journal-title":"Comput Secur"},{"key":"285_CR102","first-page":"1253","volume-title":"Li B","author":"M Jagielski","year":"2018","unstructured":"Jagielski M, Oprea A, Biggio B, Liu C, Nita-Rotaru C. Li B. Manipulating machine learning: Poisoning attacks and countermeasures. In IEEE Symposium on Security and Privacy; 2018. p. 1253\u201370."},{"key":"285_CR103","volume":"96","author":"A Erba","year":"2020","unstructured":"Erba A, Tippenhauer NO. Poisoning attacks on industrial control system anomaly detectors. Comput Secur. 2020;96:101912.","journal-title":"Comput Secur"},{"key":"285_CR104","unstructured":"Tram\u00e8r F, Zhang F, Juels A, Reiter MK, Ristenpart T. Stealing machine learning models via prediction apis. In USENIX Security Symposium. 2016. pp. 601\u2013618."},{"key":"285_CR105","doi-asserted-by":"crossref","unstructured":"Shokri R, Stronati M, Song C, Shmatikov V. Membership inference attacks against machine learning models. In IEEE Symposium on Security and Privacy. 2017. pp. 3\u201318.","DOI":"10.1109\/SP.2017.41"},{"issue":"3","key":"285_CR106","first-page":"762","volume":"8","author":"H Zhenyu","year":"2022","unstructured":"Zhenyu H, Zhang X, Gong NZ. Membership inference attacks against federated learning: a survey. IEEE Trans Big Data. 2022;8(3):762\u201382.","journal-title":"IEEE Trans Big Data"},{"key":"285_CR107","unstructured":"Lundberg S, Lee SI. A unified approach to interpreting model predictions. In Advances in Neural Information Processing Systems (NeurIPS). 2017. pp. 4765\u20134774."},{"key":"285_CR108","doi-asserted-by":"crossref","unstructured":"Ribeiro MT, Singh S, Guestrin C. \u201cwhy should i trust you?\u201d explaining the predictions of any classifier. In ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2016. pp. 1135\u20131144.","DOI":"10.1145\/2939672.2939778"},{"key":"285_CR109","doi-asserted-by":"crossref","unstructured":"Selvaraju RR, Cogswell M, Das A, Vedantam R, Parikh D, Batra D. Grad-cam: Visual explanations from deep networks via gradient-based localization. In IEEE International Conference on Computer Vision (ICCV), 2017. pp. 618\u2013626.","DOI":"10.1109\/ICCV.2017.74"},{"issue":"6","key":"285_CR110","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.3390\/app15063121","volume":"15","author":"A Orman","year":"2025","unstructured":"Orman A. Cyberattack detection systems in industrial internet of things (iiot) networks in big data environments. Appl Sci. 2025;15(6):3121.","journal-title":"Appl Sci"},{"issue":"1","key":"285_CR111","first-page":"3939895","volume":"2023","author":"T Gaber","year":"2023","unstructured":"Gaber T, Awotunde JB, Folorunso SO, Ajagbe SA, Eldesouky E. Industrial internet of things intrusion detection method using machine learning and optimization techniques. Wireless Commun Mobile Comput. 2023;2023(1):3939895.","journal-title":"Wireless Commun Mobile Comput"},{"key":"285_CR112","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.procs.2024.11.109","volume":"251","author":"A Ba","year":"2024","unstructured":"Ba A, Adda M. Intrusion detection in iiot using machine learning. Procedia Comput Sci. 2024;251:265\u201372.","journal-title":"Procedia Comput Sci"},{"issue":"13","key":"285_CR113","doi-asserted-by":"publisher","first-page":"23577","DOI":"10.1109\/JIOT.2024.3385278","volume":"11","author":"Y Chang","year":"2024","unstructured":"Chang Y, Chen J, Rong S, Xie J, Li A. Two-phase dual-adversarial agents with multivariate information for unsupervised anomaly detection of iiot-edge devices. IEEE Internet Things J. 2024;11(13):23577\u201391.","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"285_CR114","doi-asserted-by":"publisher","first-page":"175","DOI":"10.4236\/jsea.2025.186012","volume":"18","author":"M Koroma","year":"2025","unstructured":"Koroma M, Mansaray A, Kamara YL, Jalloh CG, Bah ISO. Enhancing cybersecurity in iot & iiot: a machine learning approach for anomaly detection. J Softw Eng Appl. 2025;18(6):175\u201393.","journal-title":"J Softw Eng Appl"},{"key":"285_CR115","doi-asserted-by":"crossref","unstructured":"Zeng GQ, Yang YW, Lu KD, Geng GG, Weng J. Evolutionary adversarial autoencoder for unsupervised anomaly detection of industrial internet of things. IEEE Trans Reliab. 2025.","DOI":"10.1109\/TR.2025.3528256"},{"issue":"9","key":"285_CR116","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/s42452-024-06165-w","volume":"6","author":"SA Elsaid","year":"2024","unstructured":"Elsaid SA, Binbusayyis A. An optimized isolation forest based intrusion detection system for heterogeneous and streaming data in the industrial internet of things (iiot) networks. Discov Appl Sci. 2024;6(9):483.","journal-title":"Discov Appl Sci"},{"key":"285_CR117","unstructured":"Rieser D. Semi-supervised federated learning based intrusion detection in a heterogeneous Industrial IoT setting. PhD thesis, Technische Universit\u00e4t Wien, 2025."},{"issue":"1","key":"285_CR118","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1109\/TII.2022.3156642","volume":"19","author":"O Aouedi","year":"2022","unstructured":"Aouedi O, Piamrat K, Muller G, Singh K. Federated semisupervised learning for attack detection in industrial internet of things. IEEE Trans Industr Inf. 2022;19(1):286\u201395.","journal-title":"IEEE Trans Industr Inf"},{"key":"285_CR119","doi-asserted-by":"crossref","unstructured":"Uthradevi G, Thiruvasagam P, Mythili S, Manoj SO. A semi-supervised deep learning approach for intrusion detection and classification for the internet of things. Biomed Mater Devices. 2025. pp. 1\u201317.","DOI":"10.1007\/s44174-025-00321-5"},{"key":"285_CR120","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108826","volume":"135","author":"Z Zhang","year":"2024","unstructured":"Zhang Z, Zhang Y, Li H, Liu S, Chen W, Zhang Z, et al. Federated continual representation learning for evolutionary distributed intrusion detection in industrial internet of things. Eng Appl Artif Intell. 2024;135:108826.","journal-title":"Eng Appl Artif Intell"},{"key":"285_CR121","doi-asserted-by":"crossref","unstructured":"Sen S, Nielsen SM, Husom EJ, Goknil A, Tverdal S, Pinilla LS. Replay-driven continual learning for the industrial internet of things. In 2023 IEEE\/ACM 2nd International Conference on AI Engineering\u2013Software Engineering for AI (CAIN), 2023. pp. 43\u201355. IEEE Computer Society.","DOI":"10.1109\/CAIN58948.2023.00014"},{"issue":"5","key":"285_CR122","doi-asserted-by":"publisher","first-page":"3827","DOI":"10.1109\/JIOT.2022.3172393","volume":"10","author":"E Gyamfi","year":"2022","unstructured":"Gyamfi E, Jurcut AD. Novel online network intrusion detection system for industrial iot based on oi-svdd and as-elm. IEEE Internet Things J. 2022;10(5):3827\u201339.","journal-title":"IEEE Internet Things J"},{"key":"285_CR123","doi-asserted-by":"crossref","unstructured":"Vyas A, Lin PC, Hwang RH. Fedsplit-hids: A host-based intrusion detection framework for heterogeneous industrial iot environments. In 2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). 2024. pp. 1\u20134. IEEE.","DOI":"10.1109\/ANTS63515.2024.10898417"},{"key":"285_CR124","doi-asserted-by":"crossref","unstructured":"Alla O, Mocanu S. Host-based intrusion detection for industrial control systems. In 11th IEEE International Conference on Network Softwarization (NetSoft 2025), 2025.","DOI":"10.1109\/NetSoft64993.2025.11080639"},{"issue":"5","key":"285_CR125","doi-asserted-by":"publisher","first-page":"3962","DOI":"10.1109\/JIOT.2021.3102056","volume":"9","author":"M Al-Hawawreh","year":"2021","unstructured":"Al-Hawawreh M, Sitnikova E, Aboutorab N. X-iiotid: a connectivity-agnostic and device-agnostic intrusion data set for industrial internet of things. IEEE Internet Things J. 2021;9(5):3962\u201377.","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"285_CR126","doi-asserted-by":"publisher","first-page":"7154587","DOI":"10.1155\/2021\/7154587","volume":"2021","author":"JB Awotunde","year":"2021","unstructured":"Awotunde JB, Chakraborty C, Adeniyi AE. Intrusion detection in industrial internet of things network-based on deep learning model with rule-based feature selection. Wirel Commun Mob Comput. 2021;2021(1):7154587.","journal-title":"Wirel Commun Mob Comput"},{"key":"285_CR127","doi-asserted-by":"publisher","first-page":"45762","DOI":"10.1109\/ACCESS.2024.3380816","volume":"12","author":"MS Alshehri","year":"2024","unstructured":"Alshehri MS, Saidani O, Alrayes FS, Abbasi SF, Ahmad J. A self-attention-based deep convolutional neural networks for iiot networks intrusion detection. IEEE Access. 2024;12:45762\u201372.","journal-title":"IEEE Access"},{"issue":"3","key":"285_CR128","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1007\/s11235-024-01200-y","volume":"87","author":"RS Tiwari","year":"2024","unstructured":"Tiwari RS, Lakshmi D, Das TK, Tripathy AK, Li K-C. A lightweight optimized intrusion detection system using machine learning for edge-based iiot security. Telecommun Syst. 2024;87(3):605\u201324.","journal-title":"Telecommun Syst"},{"issue":"3","key":"285_CR129","doi-asserted-by":"publisher","first-page":"92","DOI":"10.20998\/2522-9052.2024.3.11","volume":"8","author":"V Sobchuk","year":"2024","unstructured":"Sobchuk V, Pykhnivskyi R, Barabash O, Korotin S, Omarov S. Sequential intrusion detection system for zero-trust cyber defense of iot\/iiot networks. Adv Inform Syst. 2024;8(3):92\u20139.","journal-title":"Adv Inform Syst"},{"key":"285_CR130","doi-asserted-by":"crossref","unstructured":"Hasan T, Hossain A, Ansari MQ, Syed TH. Enhanced intrusion detection in iiot networks: a lightweight approach with autoencoder-based feature learning. arXiv preprint arXiv:2501.15266, 2025.","DOI":"10.5220\/0013203700003944"},{"issue":"10","key":"285_CR131","doi-asserted-by":"publisher","first-page":"850","DOI":"10.3390\/machines10100850","volume":"10","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Tang D, Zhu H, Zhou S, Zhao Z. An efficient iiot gateway for cloud-edge collaboration in cloud manufacturing. Machines. 2022;10(10):850.","journal-title":"Machines"},{"issue":"4","key":"285_CR132","doi-asserted-by":"publisher","first-page":"152","DOI":"10.36348\/sjet.2025.v10i04.005","volume":"10","author":"MM Enam","year":"2025","unstructured":"Enam MM, Joarder MM, Taimun MT, Sharan SM. Framework for smart scada systems: integrating cloud computing, iiot, and cybersecurity for enhanced industrial automation. Saudi J Eng Technol. 2025;10(4):152\u20138.","journal-title":"Saudi J Eng Technol"},{"issue":"5","key":"285_CR133","doi-asserted-by":"publisher","first-page":"2924","DOI":"10.1109\/TNSE.2022.3187992","volume":"10","author":"Z Wang","year":"2022","unstructured":"Wang Z, Zhu Y, Wang D, Han Z. Federated analytics informed distributed industrial iot learning with non-iid data. IEEE Trans Netw Sci Eng. 2022;10(5):2924\u201339.","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"14","key":"285_CR134","doi-asserted-by":"publisher","first-page":"4309","DOI":"10.3390\/s25144309","volume":"25","author":"H Peng","year":"2025","unstructured":"Peng H, Chunming W, Xiao Y. Fd-ids: federated learning with knowledge distillation for intrusion detection in non-iid iot environments. Sensors. 2025;25(14):4309.","journal-title":"Sensors"},{"issue":"1","key":"285_CR135","doi-asserted-by":"publisher","first-page":"10","DOI":"10.3390\/s25010010","volume":"25","author":"T Rehman","year":"2024","unstructured":"Rehman T, Tariq N, Khan FA, Rehman SU. Ffl-ids: a fog-enabled federated learning-based intrusion detection system to counter jamming and spoofing attacks for the industrial internet of things. Sensors. 2024;25(1):10.","journal-title":"Sensors"},{"key":"285_CR136","doi-asserted-by":"publisher","first-page":"63584","DOI":"10.1109\/ACCESS.2024.3396461","volume":"12","author":"S Racherla","year":"2024","unstructured":"Racherla S, Sripathi P, Faruqui N, Kabir MA, Whaiduzzaman M, Shah SA. Deep-ids: a real-time intrusion detector for iot nodes using deep learning. IEEE Access. 2024;12:63584\u201397.","journal-title":"IEEE Access"},{"issue":"2","key":"285_CR137","first-page":"1","volume":"15","author":"MM Abou-Elasaad","year":"2025","unstructured":"Abou-Elasaad MM, Sayed SG, El-Dakroury MM. Securing the future: real-time intrusion detection in iiot smart grids through innovative ai solutions. J CyberSec Inform Manag. 2025;15(2):1.","journal-title":"J CyberSec Inform Manag"},{"issue":"23","key":"285_CR138","doi-asserted-by":"publisher","first-page":"22836","DOI":"10.1109\/JSEN.2022.3211874","volume":"22","author":"H Nizam","year":"2022","unstructured":"Nizam H, Zafar S, Lv Z, Wang F, Xiaopeng H. Real-time deep anomaly detection framework for multivariate time-series data in industrial iot. IEEE Sens J. 2022;22(23):22836\u201349.","journal-title":"IEEE Sens J"},{"key":"285_CR139","doi-asserted-by":"publisher","first-page":"117354","DOI":"10.1109\/ACCESS.2020.3004711","volume":"8","author":"KA Abuhasel","year":"2020","unstructured":"Abuhasel KA, Khan MA. A secure industrial internet of things (iiot) framework for resource management in smart manufacturing. IEEE Access. 2020;8:117354\u201364.","journal-title":"IEEE Access"},{"issue":"12","key":"285_CR140","doi-asserted-by":"publisher","first-page":"6448","DOI":"10.3390\/app15126448","volume":"15","author":"S Peng","year":"2025","unstructured":"Peng S, Han Y, Li R, Liu L, Liu J, Gu Z. Rose-box: a lightweight and efficient intrusion detection framework for resource-constrained iiot environments. Appl Sci. 2025;15(12):6448.","journal-title":"Appl Sci"},{"key":"285_CR141","doi-asserted-by":"crossref","unstructured":"Yao W, Peng H, Li Q, Shen X. Modeling realistic adversarial traffic against deep learning-based intrusion detection system in industrial iot. IEEE Internet of Things J. 2025.","DOI":"10.1109\/JIOT.2025.3568503"},{"key":"285_CR142","doi-asserted-by":"crossref","unstructured":"Li S, Wang J, Wang Y, Zhou G, Zhao Y. Eifdaa: evaluation of an ids with function-discarding adversarial attacks in the iiot. Heliyon. 2023;9(2).","DOI":"10.1016\/j.heliyon.2023.e13520"},{"key":"285_CR143","doi-asserted-by":"crossref","unstructured":"Xu B, Liu Z, Zhu H, Dong B, Zhao B, Yan B, Wei J. A novel adversarial attack method for time-series regression models in iiot-based digital twins. IEEE Inter Things J. 2025.","DOI":"10.1109\/JIOT.2025.3569857"},{"key":"285_CR144","doi-asserted-by":"crossref","unstructured":"Dong C, Jiang F, Li X, Yao A, Li G, Liu X. A blockchain-aided self-sovereign identity framework for edge-based uav delivery system. In 2021 IEEE\/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid), 2021. pp. 622\u2013624. IEEE.","DOI":"10.1109\/CCGrid51090.2021.00074"},{"key":"285_CR145","doi-asserted-by":"crossref","unstructured":"Yao A, Jiang F, Li X, Dong C, Xu J, Xu Y, Liu X. A novel security framework for edge computing based uav delivery system. In 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021. pp. 1031\u20131038. IEEE.","DOI":"10.1109\/TrustCom53373.2021.00142"},{"key":"285_CR146","doi-asserted-by":"crossref","unstructured":"Yao A, Pal S, Dong C, Li X, Liu X. A framework for user biometric privacy protection in uav delivery systems with edge computing. In 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 2024. pp. 631\u2013636. IEEE.","DOI":"10.1109\/PerComWorkshops59983.2024.10502849"},{"key":"285_CR147","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103532","volume":"161","author":"A Yao","year":"2024","unstructured":"Yao A, Pal S, Li X, Zhang Z, Dong C, Jiang F, et al. A privacy-preserving location data collection framework for intelligent systems in edge computing. Ad Hoc Netw. 2024;161:103532.","journal-title":"Ad Hoc Netw"},{"key":"285_CR148","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2025.107706","volume":"166","author":"A Yao","year":"2025","unstructured":"Yao A, Pal S, Li G, Li X, Zhang Z, Jiang F, et al. Fedshufde: a privacy preserving framework of federated learning for edge-based smart uav delivery system. Future Gener Comput Syst. 2025;166:107706.","journal-title":"Future Gener Comput Syst"},{"key":"285_CR149","doi-asserted-by":"crossref","unstructured":"Nuaimi M, Fourati LC, Hamed BB. A scalable intrusion detection approach for industrial internet of things based on federated learning and attention mechanism. In 2023 IEEE Symposium on Computers and Communications (ISCC), 2023. pp. 1\u20134. IEEE.","DOI":"10.1109\/ISCC58397.2023.10218054"},{"key":"285_CR150","doi-asserted-by":"publisher","first-page":"42546","DOI":"10.1109\/ACCESS.2023.3268223","volume":"11","author":"DL Gomez","year":"2023","unstructured":"Gomez DL, Montoya GA, Lozano-Garzon C, Donoso Y. Strategies for assuring low latency, scalability and interoperability in edge computing and tsn networks for critical iiot services. IEEE Access. 2023;11:42546\u201377.","journal-title":"IEEE Access"},{"key":"285_CR151","unstructured":"Saheed YK, Chukwuere JE. Cps-iiot-p2attention: explainable privacy-preserving with scaled dot-product attention in cyber physical system-industrial iot network. IEEE Access. 2025."},{"key":"285_CR152","doi-asserted-by":"publisher","first-page":"23733","DOI":"10.1109\/ACCESS.2024.3363469","volume":"12","author":"MA Ferrag","year":"2024","unstructured":"Ferrag MA, Ndhlovu M, Tihanyi N, Cordeiro LC, Debbah M, Lestable T, et al. Revolutionizing cyber threat detection with large language models: a privacy-preserving bert-based lightweight model for iot\/iiot devices. IEEE Access. 2024;12:23733\u201350.","journal-title":"IEEE Access"},{"issue":"6","key":"285_CR153","doi-asserted-by":"publisher","first-page":"7389","DOI":"10.1109\/TII.2022.3210216","volume":"19","author":"R Li","year":"2022","unstructured":"Li R, Qin Y, Wang C, Li M, Chu X. A blockchain-enabled framework for enhancing scalability and security in iiot. IEEE Trans Industr Inf. 2022;19(6):7389\u2013400.","journal-title":"IEEE Trans Industr Inf"},{"key":"285_CR154","doi-asserted-by":"crossref","unstructured":"Mathur AP, Tippenhauer NO. Swat: A water treatment testbed for research and training on ics security. In 2016 international workshop on cyber-physical systems for smart water networks (CySWater), 2016. pp. 31\u201336. IEEE.","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"285_CR155","doi-asserted-by":"crossref","unstructured":"Kravchik M, Shabtai A. Detecting cyber attacks in industrial control systems using convolutional neural networks. arXiv preprint arXiv:1806.08110, 2018.","DOI":"10.1145\/3264888.3264896"},{"key":"285_CR156","doi-asserted-by":"publisher","unstructured":"Fahrmann A, Garca F, M\u00fchlh\u00e4user M. Security through digital twin-based intrusion detection: A swat and wadi dataset analysis. Proceedings of the 2021 ACM Workshop on Cyber-Physical Systems Security and Privacy (CPSS), 2021. pp. 31\u201342. https:\/\/doi.org\/10.1145\/3439517.3450549.","DOI":"10.1145\/3439517.3450549"},{"key":"285_CR157","doi-asserted-by":"crossref","unstructured":"Ahmed CM, Palleti VR, Mathur AP. Wadi: a water distribution testbed for research in the design of secure cyber physical systems. In Proceedings of the 3rd international workshop on cyber-physical systems for smart water networks, 2017. p. 25\u201328.","DOI":"10.1145\/3055366.3055375"},{"key":"285_CR158","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H. Edge-iiotset: a new comprehensive realistic cyber security dataset of iot and iiot applications for centralized and federated learning. IEEE Access. 2022;10:40281\u2013306.","journal-title":"IEEE Access"},{"key":"285_CR159","unstructured":"Gueriani D, et\u00a0al. Attention-lstm-cnn model for intrusion detection in iiot using edge-iiotset dataset. arXiv preprint arXiv:2501.13962, 2025."},{"key":"285_CR160","doi-asserted-by":"publisher","first-page":"122385","DOI":"10.1109\/ACCESS.2021.3109465","volume":"9","author":"L Faramondi","year":"2021","unstructured":"Faramondi L, Flammini F, Guarino S, Setola R. A hardware-in-the-loop water distribution testbed dataset for cyber-physical security testing. IEEE Access. 2021;9:122385\u201396.","journal-title":"IEEE Access"},{"issue":"4","key":"285_CR161","first-page":"2035","volume":"19","author":"F Ahmed","year":"2023","unstructured":"Ahmed F, Sadiq D. Delay-aware metrics for streaming intrusion detection in industrial control systems. IEEE Trans Industr Inf. 2023;19(4):2035\u201345.","journal-title":"IEEE Trans Industr Inf"},{"issue":"17","key":"285_CR162","doi-asserted-by":"crossref","first-page":"5516","DOI":"10.3390\/s24175516","volume":"24","author":"P Pereira","year":"2024","unstructured":"Pereira P, Mendes P, Vitorino J, Maia E. Green ids: energy-efficient methodologies for iot intrusion detection. Sensors. 2024;24(17):5516.","journal-title":"Sensors"},{"key":"285_CR163","first-page":"71234","volume":"13","author":"S Ismail","year":"2025","unstructured":"Ismail S, Dandan S, Qushou A. Intrusion detection in iot and iiot: cross-dataset generalizability using ton_iot and wustl-iiot. IEEE Access. 2025;13:71234\u201349.","journal-title":"IEEE Access"},{"issue":"2","key":"285_CR164","first-page":"17","volume":"7","author":"J Lindemann","year":"2023","unstructured":"Lindemann J, Bauer M. Design and evaluation of online learning-based intrusion detection in industrial environments. ACM Trans Cyber-Physical Syst. 2023;7(2):17.","journal-title":"ACM Trans Cyber-Physical Syst"},{"key":"285_CR165","first-page":"207","volume":"70","author":"S Kriaa","year":"2023","unstructured":"Kriaa S, Tordsson J, Schmitt C. Operational impacts of false positives in industrial anomaly detection. J Manuf Syst. 2023;70:207\u201319.","journal-title":"J Manuf Syst"},{"issue":"1","key":"285_CR166","first-page":"112","volume":"21","author":"M Keller","year":"2024","unstructured":"Keller M, Li Y. Explainable ids for critical infrastructure: benchmarks and methodologies. IEEE Trans Dependable Secure Comput. 2024;21(1):112\u201326.","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"285_CR167","first-page":"374","volume":"1","author":"K Bonawitz","year":"2019","unstructured":"Bonawitz K, Eichner H, Granqvist N, et al. Towards federated learning at scale: system design. Proc Mach Learn Syst (MLSys). 2019;1:374.","journal-title":"Proc Mach Learn Syst (MLSys)"},{"key":"285_CR168","first-page":"429","volume":"2","author":"T Li","year":"2020","unstructured":"Li T, Sahu AK, Talwalkar A, Smith V. Federated optimization in heterogeneous networks. Proc Mach Learn Syst (MLSys). 2020;2:429.","journal-title":"Proc Mach Learn Syst (MLSys)"},{"issue":"1","key":"285_CR169","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","volume":"33","author":"I Chillotti","year":"2020","unstructured":"Chillotti I, Gama N, Georgieva M, Izabach\u00e8ne M. Tfhe: fast fully homomorphic encryption over the torus. J Cryptol. 2020;33(1):34\u201391.","journal-title":"J Cryptol"},{"key":"285_CR170","first-page":"90743","volume":"10","author":"Y Kim","year":"2022","unstructured":"Kim Y, Choi W, Jeong H. Efficient privacy-preserving machine learning based on homomorphic encryption. IEEE Access. 2022;10:90743\u201356.","journal-title":"IEEE Access"},{"key":"285_CR171","unstructured":"Lashkari AH, Draper-Gil G, Mamun MA, Ghorbani AA. Toward generating a new intrusion detection dataset and intrusion traffic characterization. Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP), 2020."},{"key":"285_CR172","first-page":"86572","volume":"11","author":"H Alsarhan","year":"2023","unstructured":"Alsarhan H, Alazab M, Basheri M, Khan SZ. A comprehensive survey of iiot datasets for intrusion detection: gaps, trends, and future directions. IEEE Access. 2023;11:86572\u201395.","journal-title":"IEEE Access"},{"key":"285_CR173","volume":"82","author":"S Gade","year":"2022","unstructured":"Gade S, Gudla AK, Ramesh R, et al. Explainable ai in iiot intrusion detection: opportunities and challenges. Comput Standards Interf. 2022;82:103628.","journal-title":"Comput Standards Interf"},{"issue":"8","key":"285_CR174","first-page":"5117","volume":"18","author":"I Ghafir","year":"2022","unstructured":"Ghafir I, Nweke H, Alazab M. Ai for industrial cybersecurity: review, challenges and future directions. IEEE Trans Industr Inf. 2022;18(8):5117\u201330.","journal-title":"IEEE Trans Industr Inf"},{"key":"285_CR175","first-page":"74796","volume":"8","author":"Y Li","year":"2020","unstructured":"Li Y, Liu S, Wang L, et al. Adversarial examples in deep learning: characteristics, methods, and applications. IEEE Access. 2020;8:74796\u2013824.","journal-title":"IEEE Access"},{"issue":"5","key":"285_CR176","first-page":"4375","volume":"7","author":"Z Lin","year":"2020","unstructured":"Lin Z, Wang Y, Dou W. Edge-ai in iiot: challenges and research opportunities. IEEE Internet Things J. 2020;7(5):4375\u201385.","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"285_CR177","first-page":"373","volume":"24","author":"S Choudhary","year":"2022","unstructured":"Choudhary S, Saini H, Kumar N. A survey on communication protocols for iiot: classification, challenges, and future directions. IEEE Commun Surv Tutor. 2022;24(1):373\u2013407.","journal-title":"IEEE Commun Surv Tutor"},{"issue":"11","key":"285_CR178","first-page":"7609","volume":"17","author":"DC Nguyen","year":"2021","unstructured":"Nguyen DC, Ding M, Pathirana PN, Seneviratne A. Federated learning for iiot intrusion detection: concepts, challenges, and future directions. IEEE Trans Industr Inform. 2021;17(11):7609\u201319.","journal-title":"IEEE Trans Industr Inform"},{"issue":"5","key":"285_CR179","first-page":"1","volume":"55","author":"H Zhang","year":"2022","unstructured":"Zhang H, Li W, Alazab M. Machine learning for iiot security: a survey of evaluation metrics and open issues. ACM Comput Surveys (CSUR). 2022;55(5):1\u201336.","journal-title":"ACM Comput Surveys (CSUR)"},{"key":"285_CR180","unstructured":"Hossain MS, Mohammad Fotouhi Md, Hasan M, et\u00a0al. Ai-based intrusion detection systems for iiot: taxonomy, research challenges, and future directions. JNetw Comput Appl. 2021;183:103074."},{"issue":"3","key":"285_CR181","first-page":"3431","volume":"19","author":"X Luo","year":"2023","unstructured":"Luo X, Chen X, Wang Z, et al. Deep learning and the security of ids frameworks: survey and future research. IEEE Trans Industr Inf. 2023;19(3):3431\u201342.","journal-title":"IEEE Trans Industr Inf"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-026-00285-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-026-00285-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-026-00285-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T14:23:06Z","timestamp":1775571786000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-026-00285-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,1]]},"references-count":181,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["285"],"URL":"https:\/\/doi.org\/10.1007\/s43926-026-00285-y","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,1]]},"assertion":[{"value":"17 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"44"}}