{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T03:26:52Z","timestamp":1773372412633,"version":"3.50.1"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T00:00:00Z","timestamp":1770595200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T00:00:00Z","timestamp":1773273600000},"content-version":"vor","delay-in-days":31,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-026-00288-9","type":"journal-article","created":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T14:10:07Z","timestamp":1770646207000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A minimalistic yet effective domain adaptation strategy for IoMT network intrusion detection"],"prefix":"10.1007","volume":"6","author":[{"given":"Mahir","family":"Mahbub","sequence":"first","affiliation":[]},{"given":"Md. Tanjib","family":"Riasat","sequence":"additional","affiliation":[]},{"given":"Tasnima","family":"Hamid","sequence":"additional","affiliation":[]},{"given":"Sujon Chandra","family":"Sutradhar","sequence":"additional","affiliation":[]},{"given":"Mohammed Shafiul Alam","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,9]]},"reference":[{"key":"288_CR1","doi-asserted-by":"publisher","first-page":"8176","DOI":"10.1016\/j.egyr.2021.08.126","volume":"7","author":"Y Li","year":"2021","unstructured":"Li Y, Liu Q. A comprehensive review study of cyber-attacks and cyber security; emerging trends and recent developments. Energy Rep. 2021;7:8176\u201386. https:\/\/doi.org\/10.1016\/j.egyr.2021.08.126.","journal-title":"Energy Rep"},{"key":"288_CR2","unstructured":"Li L. Comprehensive survey on adversarial examples in cybersecurity: Impacts, challenges, and mitigation strategies, 2024. arXiv preprint arXiv:2412.12217."},{"issue":"1","key":"288_CR3","first-page":"1","volume":"190","author":"MAI Mallick","year":"2024","unstructured":"Mallick MAI, Nath R. Navigating the cyber security landscape: a comprehensive review of cyber-attacks, emerging trends, and recent developments. World Sci News. 2024;190(1):1\u201369.","journal-title":"World Sci News"},{"key":"288_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jiixd.2024.09.001","author":"T Sasi","year":"2024","unstructured":"Sasi T, Lashkari AH, Lu R, Xiong P, Iqbal S. An efficient self attention-based 1D-CNN-LSTM network for IoT attack detection and identification using network traffic. J Inf Intell. 2024. https:\/\/doi.org\/10.1016\/j.jiixd.2024.09.001.","journal-title":"J Inf Intell"},{"key":"288_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101351","volume":"28","author":"S Dadkhah","year":"2024","unstructured":"Dadkhah S, Neto ECP, Ferreira R, Molokwu RC, Sadeghi S, Ghorbani AA. CICIoMT2024: A benchmark dataset for multi-protocol security assessment in IoMT. Internet of Things. 2024;28:101351. https:\/\/doi.org\/10.1016\/j.iot.2024.101351.","journal-title":"Internet of Things"},{"key":"288_CR6","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-319-58347-1_8","volume-title":"Correlation alignment for unsupervised domain adaptation","author":"B Sun","year":"2017","unstructured":"Sun B, Feng J, Saenko K. Correlation alignment for unsupervised domain adaptation. Cham: Springer; 2017. p. 153\u201371. https:\/\/doi.org\/10.1007\/978-3-319-58347-1_8."},{"key":"288_CR7","doi-asserted-by":"publisher","unstructured":"Fernando B, Habrard A, Sebban M, Tuytelaars T. Unsupervised visual domain adaptation using subspace alignment. In: 2013 IEEE international conference on computer vision, pp. 2960\u20132967 (2013). https:\/\/doi.org\/10.1109\/ICCV.2013.368","DOI":"10.1109\/ICCV.2013.368"},{"key":"288_CR8","unstructured":"Fernando B, Habrard A, Sebban M, Tuytelaars T. Subspace alignment for domain adaptation, 2014. arXiv preprint arXiv:1409.5241."},{"key":"288_CR9","unstructured":"Zhang Y, Liu T, Long M, Jordan M. Bridging theory and algorithm for domain adaptation. In: International Conference on Machine Learning, 2019; pp. 7404\u20137413. PMLR."},{"issue":"59","key":"288_CR10","first-page":"1","volume":"17","author":"Y Ganin","year":"2016","unstructured":"Ganin Y, Ustinova E, Ajakan H, Germain P, Larochelle H, Laviolette F, et al. Domain-adversarial training of neural networks. J Mach Learn Res. 2016;17(59):1\u201335.","journal-title":"J Mach Learn Res"},{"key":"288_CR11","doi-asserted-by":"crossref","unstructured":"Tzeng E, Hoffman J, Saenko K, Darrell T. Adversarial discriminative domain adaptation. In: Proceedings of the IEEE conference on computer vision and pattern recognition, 2017; pp. 7167\u20137176.","DOI":"10.1109\/CVPR.2017.316"},{"key":"288_CR12","doi-asserted-by":"crossref","unstructured":"Shen J, Qu Y, Zhang W, Yu Y. Wasserstein distance guided representation learning for domain adaptation. In: Proceedings of the AAAI conference on artificial intelligence, vol. 32, 2018.","DOI":"10.1609\/aaai.v32i1.11784"},{"key":"288_CR13","doi-asserted-by":"crossref","unstructured":"Kennedy J, Eberhart R. Particle swarm optimization. In: Proceedings of ICNN\u201995-international Conference on Neural Networks, 1995; vol. 4, pp. 1942\u20131948. ieee.","DOI":"10.1109\/ICNN.1995.488968"},{"issue":"2","key":"288_CR14","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/21672857.2012.11519700","volume":"7","author":"SD Mohanty","year":"2012","unstructured":"Mohanty SD. Particle swarm optimization and regression analysis-i. Astronom Rev. 2012;7(2):29\u201335.","journal-title":"Astronom Rev"},{"key":"288_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109129","volume":"115","author":"G Nagarajan","year":"2024","unstructured":"Nagarajan G, Margala M, Shankar SS, Chakrabarti P, Minu R. A trust-centric approach to intrusion detection in edge networks for medical Internet of Thing ecosystems. Comput Electr Eng. 2024;115:109129. https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109129.","journal-title":"Comput Electr Eng"},{"key":"288_CR16","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10212562","author":"G Zachos","year":"2021","unstructured":"Zachos G, Essop I, Mantas G, Porfyrakis K, Ribeiro JC, Rodriguez J. An anomaly-based intrusion detection system for Internet of Medical Things networks. Electronics. 2021. https:\/\/doi.org\/10.3390\/electronics10212562.","journal-title":"Electronics"},{"key":"288_CR17","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.comcom.2020.05.048","volume":"160","author":"SP RM","year":"2020","unstructured":"RM SP, Maddikunta PKR, Koppu S, Gadekallu TR, Chowdhary CL, Alazab M. An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Comput Commun. 2020;160:139\u201349. https:\/\/doi.org\/10.1016\/j.comcom.2020.05.048.","journal-title":"Comput Commun"},{"key":"288_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101437","volume":"29","author":"RM Czekster","year":"2025","unstructured":"Czekster RM, Webber T, Furstenau LB, Marcon C. Dynamic risk assessment approach for analysing cyber security events in medical IoT networks. Internet of Things. 2025;29:101437.","journal-title":"Internet of Things"},{"issue":"2","key":"288_CR19","doi-asserted-by":"publisher","first-page":"13726","DOI":"10.1111\/exsy.13726","volume":"42","author":"QA Al-Haija","year":"2025","unstructured":"Al-Haija QA, Droos A. A comprehensive survey on deep learning-based intrusion detection systems in Internet of Things (IoT). Expert Syst. 2025;42(2):13726.","journal-title":"Expert Syst"},{"issue":"1","key":"288_CR20","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s42452-024-06351-w","volume":"7","author":"B Alturki","year":"2024","unstructured":"Alturki B, Abu Al-Haija Q, Alsemmeari RA, Alsulami AA, Alqahtani A, Alghamdi BM, et al. IoMT landscape: navigating current challenges and pioneering future research trends. Discov Appl Sci. 2024;7(1):26.","journal-title":"Discov Appl Sci"},{"key":"288_CR21","doi-asserted-by":"crossref","unstructured":"Guida C, Nascita A, Montieri A, Pescap\u00e9 A. Cross-evaluation of deep learning-based network intrusion detection systems. In: 2023 10th international conference on future Internet of Things and cloud (FiCloud), IEEE. 2023, pp. 328\u2013335.","DOI":"10.1109\/FiCloud58648.2023.00055"},{"issue":"4","key":"288_CR22","doi-asserted-by":"publisher","first-page":"5152","DOI":"10.1109\/TNSM.2022.3157344","volume":"19","author":"G Apruzzese","year":"2022","unstructured":"Apruzzese G, Pajola L, Conti M. The cross-evaluation of machine learning-based network intrusion detection systems. IEEE Trans Netw Serv Manage. 2022;19(4):5152\u201369. https:\/\/doi.org\/10.1109\/TNSM.2022.3157344.","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"288_CR23","doi-asserted-by":"crossref","unstructured":"Cantone M, Marrocco C, Bria A. Machine learning in network intrusion detection: a cross-dataset generalization study. IEEE Access, 2024.","DOI":"10.1109\/ACCESS.2024.3472907"},{"key":"288_CR24","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2021.782902","volume":"4","author":"Q Abu Al-Haija","year":"2022","unstructured":"Abu Al-Haija Q. Top-down machine learning-based architecture for cyberattacks identification and classification in IoT communication networks. Front Big Data. 2022;4:782902.","journal-title":"Front Big Data"},{"issue":"2","key":"288_CR25","doi-asserted-by":"publisher","first-page":"6340","DOI":"10.1109\/TCE.2024.3499942","volume":"71","author":"IA Khan","year":"2025","unstructured":"Khan IA, Pi D, Kamal S, Alsuhaibani M, Alshammari BM. Federated-boosting: a distributed and dynamic boosting-powered cyber-attack detection scheme for security and privacy of consumer IoT. IEEE Trans Consum Electron. 2025;71(2):6340\u20137. https:\/\/doi.org\/10.1109\/TCE.2024.3499942.","journal-title":"IEEE Trans Consum Electron"},{"key":"288_CR26","doi-asserted-by":"publisher","first-page":"7002","DOI":"10.1109\/ACCESS.2025.3526883","volume":"13","author":"G Akar","year":"2025","unstructured":"Akar G, Sahmoud S, Onat M, Cavusoglu Malondo E. L2D2: A novel LSTM model for multi-class intrusion detection systems in the era of IoMT. IEEE Access. 2025;13:7002\u20138. https:\/\/doi.org\/10.1109\/ACCESS.2025.3526883.","journal-title":"IEEE Access."},{"key":"288_CR27","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-024-00184-1","author":"A Shebl","year":"2024","unstructured":"Shebl A, Elsedimy EI, Ismail A, Salama AA, Herajy M. DCNN: A novel binary and multi-class network intrusion detection model via deep convolutional neural network. EURASIP J Inf Secur. 2024. https:\/\/doi.org\/10.1186\/s13635-024-00184-1.","journal-title":"EURASIP J Inf Secur"},{"key":"288_CR28","doi-asserted-by":"crossref","unstructured":"Fan M, Zuo J, Zhu J, Lu Y. Explainable anomaly-based intrusion detection for specialized IoT environments enabled by rule extraction from autoencoder. IEEE Internet of Things J, 2025.","DOI":"10.1109\/JIOT.2025.3542142"},{"key":"288_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102002","volume":"101","author":"IA Khan","year":"2024","unstructured":"Khan IA, Razzak I, Pi D, Khan N, Hussain Y, Li B, et al. Fed-Inforce-Fusion: a federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks. Inf Fus. 2024;101:102002. https:\/\/doi.org\/10.1016\/j.inffus.2023.102002.","journal-title":"Inf Fus"},{"issue":"4","key":"288_CR30","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10586-024-04904-7","volume":"28","author":"K Kharoubi","year":"2025","unstructured":"Kharoubi K, Cherbal S, Mechta D, Gawanmeh A. Network intrusion detection system using convolutional neural networks: NIDS-DL-CNN for IOT security. Clust Comput. 2025;28(4):219.","journal-title":"Clust Comput"},{"key":"288_CR31","doi-asserted-by":"publisher","DOI":"10.3390\/info16080669","author":"H Benahmed","year":"2025","unstructured":"Benahmed H, M\u2019hamedi M, Merzoug M, Hadjila M, Bekkouche A, Etchiali A, et al. HBiLD-IDS: An efficient hybrid BiLSTM-DNN model for real-time intrusion detection in IoMT networks. Information. 2025. https:\/\/doi.org\/10.3390\/info16080669.","journal-title":"Information"},{"issue":"3","key":"288_CR32","doi-asserted-by":"publisher","first-page":"2185","DOI":"10.32604\/cmes.2024.056308","volume":"141","author":"H Naeem","year":"2024","unstructured":"Naeem H, Alsirhani A, Alserhani FM, Ullah F, Krejcar O. Augmenting internet of medical things security: deep ensemble integration and methodological fusion. CMES Comput Model Eng Sci. 2024;141(3):2185\u2013223. https:\/\/doi.org\/10.32604\/cmes.2024.056308.","journal-title":"CMES Comput Model Eng Sci"},{"key":"288_CR33","doi-asserted-by":"crossref","unstructured":"Sharma N, Shambharkar PG. Multi-layered security architecture for IoMT systems: integrating dynamic key management, decentralized storage, and dependable intrusion detection framework. Int J Mach Learn Cybern, 2025; pp. 1\u201348.","DOI":"10.1007\/s13042-025-02628-7"},{"key":"288_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2025.101527","volume":"30","author":"M Ali","year":"2025","unstructured":"Ali M, Saleem Y, Hina S, Shah GA. DDoSViT: IoT DDoS attack detection for fortifying firmware Over-The-Air (OTA) updates using vision transformer. Internet of Things. 2025;30:101527. https:\/\/doi.org\/10.1016\/j.iot.2025.101527.","journal-title":"Internet of Things"},{"key":"288_CR35","doi-asserted-by":"publisher","first-page":"57589","DOI":"10.1109\/ACCESS.2025.3553966","volume":"13","author":"A Mezina","year":"2025","unstructured":"Mezina A, Nurmi J, Ometov A. Novel hybrid UNet++ and LSTM model for enhanced attack detection and classification in IoMT traffic. IEEE Access. 2025;13:57589\u2013603. https:\/\/doi.org\/10.1109\/ACCESS.2025.3553966.","journal-title":"IEEE Access"},{"key":"288_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2024.109603","volume":"186","author":"M Pinar","year":"2025","unstructured":"Pinar M, Aktas A, Ulku EE. Feature efficiency in IoMT security: a comprehensive framework for threat detection with DNN and ML. Comput Biol Med. 2025;186:109603. https:\/\/doi.org\/10.1016\/j.compbiomed.2024.109603.","journal-title":"Comput Biol Med"},{"key":"288_CR37","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2025.3605098","author":"J Yang","year":"2025","unstructured":"Yang J, Govindarajan V, Por LY, Shaikh ZA, Xin Q, Bhattacharya P, et al. DDoS attack detection in consumer IoT-based healthcare systems using improved off-policy proximal policy optimization and generative adversarial network. IEEE Trans Consum Electr. 2025. https:\/\/doi.org\/10.1109\/TCE.2025.3605098.","journal-title":"IEEE Trans Consum Electr"},{"key":"288_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2025.101631","volume":"32","author":"J Dom\u00e9nech","year":"2025","unstructured":"Dom\u00e9nech J, Le\u00f3n O, Siddiqui MS, Pegueroles J. Evaluating and enhancing intrusion detection systems in IoMT: the importance of domain-specific datasets. Internet of Things. 2025;32:101631. https:\/\/doi.org\/10.1016\/j.iot.2025.101631.","journal-title":"Internet of Things"},{"key":"288_CR39","doi-asserted-by":"publisher","unstructured":"Dom\u00e9nech J, Mhiri S, Shuaib\u00a0Siddiqui M, Pegueroles J. Preventive and reactive cybersecurity techniques on IoT devices in healthcare environments. In: 2025 IEEE 11th international conference on network softwarization (NetSoft), 2025; pp. 261\u2013264. https:\/\/doi.org\/10.1109\/NetSoft64993.2025.11080634.","DOI":"10.1109\/NetSoft64993.2025.11080634"},{"key":"288_CR40","doi-asserted-by":"publisher","DOI":"10.3389\/fmed.2025.1524286","author":"JA Shaikh","year":"2025","unstructured":"Shaikh JA, Wang C, Sima MWU, Arshad M, Owais M, Hassan DSM, et al. A deep reinforcement learning-based robust intrusion detection system for securing IoMT healthcare networks. Front Med. 2025. https:\/\/doi.org\/10.3389\/fmed.2025.1524286.","journal-title":"Front Med"},{"key":"288_CR41","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14081653","author":"N Aroon","year":"2025","unstructured":"Aroon N, Kane L, Liu V, Li Y. Detection of TCP and MQTT-based DoS\/DDoS attacks on MUD IoT networks. Electronics. 2025. https:\/\/doi.org\/10.3390\/electronics14081653.","journal-title":"Electronics"},{"issue":"10","key":"288_CR42","doi-asserted-by":"publisher","first-page":"1574","DOI":"10.3390\/math13101574","volume":"13","author":"A Hafid","year":"2025","unstructured":"Hafid A, Rahouti M, Aledhari M. Optimizing intrusion detection in IoMT networks through interpretable and cost-aware machine learning. Mathematics. 2025;13(10):1574.","journal-title":"Mathematics"},{"key":"288_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2025.102398","volume":"103","author":"ML Hernandez-Jaimes","year":"2025","unstructured":"Hernandez-Jaimes ML, Martinez-Cruz A, Ram\u00edrez-Guti\u00e9rrez KA, Morales-Reyes A. Network traffic inspection to enhance anomaly detection in the internet of things using attention-driven deep learning. Integration. 2025;103:102398.","journal-title":"Integration"},{"issue":"5","key":"288_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42452-025-07071-5","volume":"7","author":"MA Alsharaiah","year":"2025","unstructured":"Alsharaiah MA, Almaiah MA, Shehab R, Obeidat M, El-Qirem FA, Aldhyani T. An explainable AI-driven transformer model for spoofing attack detection in Internet of Medical Things (IoMT) networks. Discov Appl Sci. 2025;7(5):1\u201314.","journal-title":"Discov Appl Sci"},{"key":"288_CR45","doi-asserted-by":"crossref","unstructured":"Li D, Yuan Q, Li T, Chen S, Yang J. Cross-domain network traffic classification using unsupervised domain adaptation. In: 2020 international conference on information networking (ICOIN). IEEE, 2020; pp. 245\u2013250.","DOI":"10.1109\/ICOIN48656.2020.9016470"},{"issue":"2","key":"288_CR46","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/TNN.2010.2091281","volume":"22","author":"SJ Pan","year":"2011","unstructured":"Pan SJ, Tsang IW, Kwok JT, Yang Q. Domain adaptation via transfer component analysis. IEEE Trans Neural Netw. 2011;22(2):199\u2013210. https:\/\/doi.org\/10.1109\/TNN.2010.2091281.","journal-title":"IEEE Trans Neural Netw"},{"key":"288_CR47","doi-asserted-by":"crossref","unstructured":"Taghiyarrenani Z, Farsi H. Domain adaptation with maximum margin criterion with application to network traffic classification. In: joint european conference on machine learning and knowledge discovery in databases, Springer. 2022; pp. 159\u2013169.","DOI":"10.1007\/978-3-031-23633-4_12"},{"issue":"6","key":"288_CR48","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1016\/j.comnet.2008.11.016","volume":"53","author":"W Li","year":"2009","unstructured":"Li W, Canini M, Moore AW, Bolla R. Efficient application identification and the temporal and spatial stability of classification schema. Comput Netw. 2009;53(6):790\u2013809. https:\/\/doi.org\/10.1016\/j.comnet.2008.11.016.","journal-title":"Comput Netw"},{"key":"288_CR49","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1016\/j.ins.2023.02.031","volume":"629","author":"W Ma","year":"2023","unstructured":"Ma W, Liu R, Li K, Yan S, Guo J. An adversarial domain adaptation approach combining dual domain pairing strategy for IoT intrusion detection under few-shot samples. Inf Sci. 2023;629:719\u201345. https:\/\/doi.org\/10.1016\/j.ins.2023.02.031.","journal-title":"Inf Sci"},{"issue":"15","key":"288_CR50","doi-asserted-by":"publisher","first-page":"13205","DOI":"10.1109\/JIOT.2023.3262458","volume":"10","author":"J Wu","year":"2023","unstructured":"Wu J, Wang Y, Dai H, Xu C, Kent KB. Adaptive bi-recommendation and self-improving network for heterogeneous domain adaptation-assisted IoT intrusion detection. IEEE Internet Things J. 2023;10(15):13205\u201320. https:\/\/doi.org\/10.1109\/JIOT.2023.3262458.","journal-title":"IEEE Internet Things J"},{"key":"288_CR51","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-030-89137-4_3","volume-title":"Sci Cyber Secur","author":"Y Fan","year":"2021","unstructured":"Fan Y, Li Y, Cui H, Yang H, Zhang Y, Wang W. An intrusion detection framework for IoT using partial domain adaptation. In: Lu W, Sun K, Yung M, Liu F, editors. Sci Cyber Secur. Cham: Springer; 2021. p. 36\u201350."},{"key":"288_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124352","volume":"254","author":"K Li","year":"2024","unstructured":"Li K, Ma W, Duan H, Xie H. Multi-source refined adversarial domain adaptation with transfer complementarity infusion for IoT intrusion detection under limited samples. Expert Syst Appl. 2024;254:124352. https:\/\/doi.org\/10.1016\/j.eswa.2024.124352.","journal-title":"Expert Syst Appl"},{"key":"288_CR53","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-031-12097-8_28","volume-title":"Advances in computing systems and applications","author":"S-A Ayoub","year":"2022","unstructured":"Ayoub S-A, Mohammed Ali A-G, Narhimene B. Enhanced intrusion detection system for remote healthcare. In: Senouci MR, Boulahia SY, Benatia MA, editors. Advances in computing systems and applications. Cham: Springer; 2022. p. 323\u201333."},{"key":"288_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.fraope.2023.100056","volume":"6","author":"Z Sun","year":"2024","unstructured":"Sun Z, An G, Yang Y, Liu Y. Optimized machine learning enabled intrusion detection 2 system for Internet of Medical Things. Franklin Open. 2024;6:100056. https:\/\/doi.org\/10.1016\/j.fraope.2023.100056.","journal-title":"Franklin Open"},{"issue":"1","key":"288_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-025-02462-z","volume":"2025","author":"M Ramya","year":"2025","unstructured":"Ramya M, Sudhakaran P, Sivagnanam Y, Krishnan CS. Advanced Intrusion Detection Technique (AIDT) for secure communication among devices in Internet of Medical Things (IoMT). EURASIP J Wirel Commun Netw. 2025;2025(1):1\u201319.","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"288_CR56","doi-asserted-by":"publisher","first-page":"106576","DOI":"10.1109\/ACCESS.2020.3000421","volume":"8","author":"AA Hady","year":"2020","unstructured":"Hady AA, Ghubaish A, Salman T, Unal D, Jain R. Intrusion detection system for healthcare systems using medical and network data: a comparison study. IEEE Access. 2020;8:106576\u201384.","journal-title":"IEEE Access"},{"key":"288_CR57","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102621","volume":"122","author":"M Ahmed","year":"2021","unstructured":"Ahmed M, Byreddy S, Nutakki A, Sikos LF, Haskell-Dowland P. ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things. Ad Hoc Netw. 2021;122:102621. https:\/\/doi.org\/10.1016\/j.adhoc.2021.102621.","journal-title":"Ad Hoc Netw"},{"issue":"21","key":"288_CR58","doi-asserted-by":"publisher","first-page":"8280","DOI":"10.3390\/s22218280","volume":"22","author":"M Zubair","year":"2022","unstructured":"Zubair M, Ghubaish A, Unal D, Al-Ali A, Reimann T, Alinier G, et al. Secure bluetooth communication in smart healthcare systems: a novel community dataset and intrusion detection system. Sensors. 2022;22(21):8280.","journal-title":"Sensors"},{"issue":"9","key":"288_CR59","doi-asserted-by":"publisher","first-page":"3025","DOI":"10.3390\/s21093025","volume":"21","author":"F Hussain","year":"2021","unstructured":"Hussain F, Abbas SG, Shah GA, Pires IM, Fayyaz UU, Shahzad F, et al. A framework for malicious traffic detection in IoT healthcare environment. Sensors. 2021;21(9):3025.","journal-title":"Sensors"},{"issue":"3","key":"288_CR60","doi-asserted-by":"publisher","first-page":"2041","DOI":"10.1109\/TII.2021.3093905","volume":"18","author":"P Radoglou-Grammatikis","year":"2021","unstructured":"Radoglou-Grammatikis P, Rompolos K, Sarigiannidis P, Argyriou V, Lagkas T, Sarigiannidis A, et al. Modeling, detecting, and mitigating threats against industrial healthcare systems: a combined software defined networking and reinforcement learning approach. IEEE Trans Industr Inf. 2021;18(3):2041\u201352.","journal-title":"IEEE Trans Industr Inf"},{"issue":"9","key":"288_CR61","doi-asserted-by":"publisher","first-page":"1853","DOI":"10.1109\/TPAMI.2016.2615921","volume":"39","author":"N Courty","year":"2016","unstructured":"Courty N, Flamary R, Tuia D, Rakotomamonjy A. Optimal transport for domain adaptation. IEEE Trans Pattern Anal Mach Intell. 2016;39(9):1853\u201365.","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"288_CR62","unstructured":"Kochenderfer MJ, Wheeler TA. Algorithms for Optimization, vol. 1. Cambridge, Massachusetts, London, England: Illustrated edn. The MIT Press; 2019."},{"issue":"3","key":"288_CR63","doi-asserted-by":"publisher","first-page":"361","DOI":"10.2307\/2687754","volume":"7","author":"JD Clemens","year":"2001","unstructured":"Clemens JD, Gao S, Kechris AS. Polish metric spaces: their classification and isometry groups. Bull Symbol Logic. 2001;7(3):361\u201375.","journal-title":"Bull Symbol Logic"},{"key":"288_CR64","doi-asserted-by":"publisher","unstructured":"H\u00f6rmander F, Totaro N, Waldschmidt AVM. Grundlehren der Mathematischen Wissenschaften 332 vol. 5. Springer, Brown University, Providence, U.S.A. 2006. https:\/\/doi.org\/10.1007\/978-3-642-04048-1.","DOI":"10.1007\/978-3-642-04048-1"},{"issue":"4","key":"288_CR65","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/j.exmath.2011.06.005","volume":"29","author":"DA Edwards","year":"2011","unstructured":"Edwards DA. On the Kantorovich-Rubinstein theorem. Expo Math. 2011;29(4):387\u201398. https:\/\/doi.org\/10.1016\/j.exmath.2011.06.005.","journal-title":"Expo Math"},{"key":"288_CR66","unstructured":"Kantorovich LV, Rubinshtein S. On a space of totally additive functions. Vestnik of the St. Petersburg University: Mathematics, 1958; 13(7), 52\u201359."},{"issue":"8","key":"288_CR67","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1090\/S0002-9904-1937-06588-8","volume":"43","author":"EJ McShane","year":"1937","unstructured":"McShane EJ. Jensen\u2019s inequality. Bull Am Math Soc. 1937;43(8):521\u2013 527.","journal-title":"Bull Am Math Soc"},{"key":"288_CR68","volume-title":"Theory of Probability","author":"H Jeffreys","year":"1939","unstructured":"Jeffreys H. Theory of Probability. Oxford: England; 1939."}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-026-00288-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-026-00288-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-026-00288-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T16:55:14Z","timestamp":1773334514000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-026-00288-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,9]]},"references-count":68,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["288"],"URL":"https:\/\/doi.org\/10.1007\/s43926-026-00288-9","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,9]]},"assertion":[{"value":"16 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human or animals rights"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"28"}}