{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T04:03:44Z","timestamp":1748923424308,"version":"3.41.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Intell Syst"],"DOI":"10.1007\/s44196-025-00864-x","type":"journal-article","created":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T12:04:34Z","timestamp":1748865874000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SIP Flooding Attack Detection Technology of Multi-agent System Covert Network Based on BiGRU Algorithm"],"prefix":"10.1007","volume":"18","author":[{"given":"Tong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Hengyu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Dawei","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Jianshi","family":"Bai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,2]]},"reference":[{"issue":"8","key":"864_CR1","doi-asserted-by":"publisher","first-page":"4812","DOI":"10.1002\/ett.4812","volume":"34","author":"NA Darwin","year":"2023","unstructured":"Darwin, N.A., Rukmani, D.S., Inbamalar, T.M., Pavithra, K.N.: Byzantine attack detection using optimized dual-channel capsule generative adversarial network for securing cognitive radio network. Trans. Emerg. Telecommun. Technol. 34(8), 4812\u20134831 (2023)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"3","key":"864_CR2","first-page":"911","volume":"21","author":"M Kumar","year":"2022","unstructured":"Kumar, M., Ali, J.: Taylor sailfish optimizer-based deep stacked auto encoder for blackhole attack detection in wireless sensor network. J. Web Eng. 21(3), 911\u2013940 (2022)","journal-title":"J. Web Eng."},{"issue":"7","key":"864_CR3","doi-asserted-by":"publisher","first-page":"529","DOI":"10.23940\/ijpe.22.07.p8.529536","volume":"18","author":"T Yerriswamy","year":"2022","unstructured":"Yerriswamy, T., Murtugudde, G.: Signature-based traffic classification for ddos attack detection and analysis of mitigation for ddos attacks using programmable commodity switches. Int. J. Performab. Eng. 18(7), 529\u2013536 (2022)","journal-title":"Int. J. Performab. Eng."},{"key":"864_CR4","doi-asserted-by":"publisher","first-page":"100646.1","DOI":"10.1016\/j.ejcon.2022.100646","volume":"66","author":"A Mousavi","year":"2022","unstructured":"Mousavi, A., Aryankia, K., Selmic, R.R.: A distributed fdi cyber-attack detection in discrete-time nonlinear multi-agent systems using neural networks. Eur. J. Control 66, 100646.1-100646.10 (2022)","journal-title":"Eur. J. Control"},{"key":"864_CR5","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/j.comcom.2022.05.011","volume":"191","author":"J Shahid","year":"2022","unstructured":"Shahid, J., Zia, M., Iqbal, Z., Almadhor, A.S., Javed, A.R.: Cellular automata trust-based energy drainage attack detection and prevention in wireless sensor networks. Comput. Commun. 191, 360\u2013367 (2022)","journal-title":"Comput. Commun."},{"issue":"3","key":"864_CR6","first-page":"4736","volume":"34","author":"B Raveendranadh","year":"2023","unstructured":"Raveendranadh, B., Tamilselvan, S.: An accurate attack detection framework based on exponential polynomial kernel-centered deep neural networks in the wireless sensor network. Trans. Emerg. Telecommun. Technol. 34(3), 4736\u20134746 (2023)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"2","key":"864_CR7","first-page":"179","volume":"21","author":"A Al-Nawasrah","year":"2022","unstructured":"Al-Nawasrah, A., Almomani, A., Al-Issa, H.A., Alaboudi, A.A., Alissa, K., Alrosan, A., et al.: Botnet attack detection using a hybrid supervised fast-flux killer system. J. Web Eng. 21(2), 179\u2013201 (2022)","journal-title":"J. Web Eng."},{"key":"864_CR8","doi-asserted-by":"publisher","DOI":"10.22541\/au.170526630.07302484\/v1","author":"Monika Roopak","year":"2024","unstructured":"Roopak, Monika, et al.: An unsupervised approach for the detection of zero-day DDoS attacks in IoT networks. Authorea (2024). https:\/\/doi.org\/10.22541\/au.170526630.07302484\/v1","journal-title":"Authorea"},{"issue":"4","key":"864_CR9","first-page":"1295","volume":"21","author":"KMK Raghunath","year":"2022","unstructured":"Raghunath, K.M.K., Kumar, V.V., Venkatesan, M., Singh, K.K., Mahesh, T.R., Singh, A.: Xgboost regression classifier (xrc) model for cyber attack detection and classification using inception v4. J. Web Eng. 21(4), 1295\u20131321 (2022)","journal-title":"J. Web Eng."},{"issue":"12","key":"864_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/aic.17875","volume":"68","author":"S Narasimhan","year":"2022","unstructured":"Narasimhan, S., El-Farra, N.H., Ellis, M.J.: A control-switching approach for cyberattack detection in process systems with minimal false alarms. AIChE J. 68(12), 1\u201317 (2022)","journal-title":"AIChE J."},{"issue":"9","key":"864_CR11","doi-asserted-by":"publisher","first-page":"4561","DOI":"10.1002\/ett.4561","volume":"33","author":"K Devi","year":"2022","unstructured":"Devi, K., Muthusenthil, B.: Intrusion detection framework for securing privacy attack in cloud computing environment using dccgan-rfoa. Trans. Emerg. Telecommun. Technol. 33(9), 4561\u20134583 (2022)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"4","key":"864_CR12","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s10207-023-00676-0","volume":"22","author":"S Mohanad","year":"2023","unstructured":"Mohanad, S., Siamak, L., Marcus, G., Marius, P.: From zero-shot machine learning to zero-day attack detection. Int. J. Inf. Secur. 22(4), 947\u2013959 (2023)","journal-title":"Int. J. Inf. Secur."},{"key":"864_CR13","first-page":"1","volume":"261","author":"SGSR Emil","year":"2023","unstructured":"Emil, S.G.S.R., Ganeshan, R., Jingle, I.D.J., Ananth, J.P.: Facvo-dnfn: deep learning-based feature fusion and distributed denial of service attack detection in cloud computing. Knowledge-Based Syst 261, 1\u201313 (2023)","journal-title":"Knowledge-Based Syst"},{"issue":"1","key":"864_CR14","first-page":"59","volume":"26","author":"F Al-Wesabi","year":"2023","unstructured":"Al-Wesabi, F., Mengash, H., Marzouk, R., Alruwais, N., Allafi, R., Alabdan, R., et al.: Pelican optimization algorithm with federated learning driven attack detection model in internet of things environment. Futur. Gener. Comput. Syst. 26(1), 59\u201370 (2023)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"5","key":"864_CR15","doi-asserted-by":"publisher","first-page":"291","DOI":"10.23940\/ijpe.23.05.p1.291302","volume":"19","author":"N Goutham","year":"2023","unstructured":"Goutham, N., Singh, K., Banda, L., Sharma, P., Verma, C., Goyal, S.B.: Shad-sef: an efficient model for shilling attack detection using stacking ensemble framework in recommender systems. Int. J. Performab. Eng. 19(5), 291\u2013302 (2023)","journal-title":"Int. J. Performab. Eng."},{"key":"864_CR16","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.patrec.2022.02.012","volume":"157","author":"Y Aoudni","year":"2022","unstructured":"Aoudni, Y., Donald, C., Farouk, A., Sahay, K.B., Babu, D.V., Tripathi, V., et al.: Cloud security based attack detection using transductive learning integrated with hidden markov model. Pattern Recognit. Lett 157, 16\u201326 (2022)","journal-title":"Pattern Recognit. Lett"},{"key":"864_CR17","doi-asserted-by":"publisher","first-page":"108702.1","DOI":"10.1016\/j.comnet.2021.108702","volume":"204","author":"K Hameed","year":"2022","unstructured":"Hameed, K., Garg, S., Amin, M.B., Kang, B.: Towards a formal modelling, analysis and verification of a clone node attack detection scheme in the internet of things. Comput. Netw. 204, 108702.1-108702.38 (2022)","journal-title":"Comput. Netw."},{"issue":"3","key":"864_CR18","doi-asserted-by":"publisher","first-page":"4446","DOI":"10.1002\/ett.4446","volume":"33","author":"K Yamini","year":"2022","unstructured":"Yamini, K., Stephy, J., Suthendran, K., Ravi, V.: Improving routing disruption attack detection in manets using efficient trust establishment. Trans. Emerg. Telecommun. Technol. 33(3), 4446\u20134463 (2022)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"864_CR19","doi-asserted-by":"publisher","first-page":"101685.1","DOI":"10.1016\/j.phycom.2022.101685","volume":"52","author":"T Gaber","year":"2022","unstructured":"Gaber, T., El-Ghamry, A., Hassanien, A.E.: Injection attack detection using machine learning for smart iot applications. Phys. Commun. 52, 101685.1-101685.14 (2022)","journal-title":"Phys. Commun."},{"key":"864_CR20","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.patrec.2022.04.007","volume":"159","author":"A Agarwal","year":"2022","unstructured":"Agarwal, A., Noore, A., Vatsa, M., Singh, R.: Enhanced iris presentation attack detection via contraction-expansion cnn. Pattern Recognit Lett 159, 61\u201369 (2022)","journal-title":"Pattern Recognit Lett"},{"issue":"8","key":"864_CR21","first-page":"413","volume":"40","author":"B Xu","year":"2023","unstructured":"Xu, B., Huang, C., Wu, D., Hua, B.: Experimental simulation testing for distributed network intrusion detection. Comput. Simul. 40(8), 413\u2013416 (2023)","journal-title":"Comput. Simul."},{"issue":"7","key":"864_CR22","doi-asserted-by":"publisher","first-page":"950611","DOI":"10.3389\/fenrg.2022.950611","volume":"10","author":"T Li","year":"2022","unstructured":"Li, T., Zhao, H., Song, S., et al.: Fifth generation mobile communication technology network attack defense based on software defined network technology in power internet of things. Front. Energy Res. 10(7), 950611\u2013950612 (2022)","journal-title":"Front. Energy Res."},{"key":"864_CR23","doi-asserted-by":"crossref","unstructured":"Nkoro EC, Nwakanma CI, Lee JM, et al (2022) Industrial Network Attack Vulnerability Detection and Analysis using Shodan Eye Scanning Technology.2022 13th International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea, Republic of. (8) 886\u2013889","DOI":"10.1109\/ICTC55196.2022.9952825"}],"container-title":["International Journal of Computational Intelligence Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-025-00864-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44196-025-00864-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-025-00864-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T12:04:37Z","timestamp":1748865877000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44196-025-00864-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,2]]},"references-count":23,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["864"],"URL":"https:\/\/doi.org\/10.1007\/s44196-025-00864-x","relation":{},"ISSN":["1875-6883"],"issn-type":[{"value":"1875-6883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,2]]},"assertion":[{"value":"19 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"135"}}