{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T23:58:48Z","timestamp":1774483128402,"version":"3.50.1"},"reference-count":31,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T00:00:00Z","timestamp":1773705600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.adhoc.2026.104227","type":"journal-article","created":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T14:09:03Z","timestamp":1773756543000},"page":"104227","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A hybrid inference pipeline for IDS: Combining DNNs and XGBoost through stacking for real-world intrusion detection"],"prefix":"10.1016","volume":"188","author":[{"given":"Antonio","family":"Villafranca","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4952-0325","authenticated-orcid":false,"given":"Maria-Dolores","family":"Cano","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.adhoc.2026.104227_bib0001","article-title":"Machine learning-inspired intrusion detection system for IoT: security issues and future challenges","author":"Ahanger","year":"2025","journal-title":"Elsevier Ltd"},{"key":"10.1016\/j.adhoc.2026.104227_bib0002","article-title":"Enhancing IoT network security through deep learning-powered Intrusion Detection System","volume":"24","author":"Bakhsh","year":"2023","journal-title":"Internet Things (Neth.)"},{"key":"10.1016\/j.adhoc.2026.104227_bib0003","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121751","article-title":"Explainable artificial intelligence for intrusion detection in IoT networks: a deep learning based approach","volume":"238","author":"Sharma","year":"2024","journal-title":"Expert. Syst. Appl."},{"key":"10.1016\/j.adhoc.2026.104227_bib0004","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1016\/j.procs.2024.05.048","article-title":"A blockchain-based Intrusion Detection\/Prevention Systems in IoT Network: a systematic review","author":"Shalabi","year":"2024","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"10.1016\/j.adhoc.2026.104227_bib0005","article-title":"Testing commercial intrusion detection systems for Industrial Control Systems in a substation hardware in the loop testlab","volume":"13","author":"Storm","year":"2024","journal-title":"Electron. (Switz.)"},{"key":"10.1016\/j.adhoc.2026.104227_bib0006","article-title":"Anomaly-based intrusion Detection System for smart lighting","volume":"28","author":"Lara","year":"2024","journal-title":"Internet Things (Neth.)"},{"key":"10.1016\/j.adhoc.2026.104227_bib0007","article-title":"2020 IEEE\/PES Transmission and Distribution Conference and Exposition (T&D)","volume":"0105","author":"Mohan","year":"2021","journal-title":"IEEE"},{"key":"10.1016\/j.adhoc.2026.104227_bib0008","series-title":"Proceedings - 2022 32nd International Conference on Field-Programmable Logic and Applications, FPL 2022","first-page":"425","article-title":"A lightweight Multi-attack CAN intrusion detection system on hybrid FPGAs","author":"Khandelwal","year":"2022"},{"key":"10.1016\/j.adhoc.2026.104227_bib0009","doi-asserted-by":"crossref","unstructured":"\u00c1.L.P. G\u00f3mez, \u00c1.M. Navarro, L.F. Maim\u00f3, \u00d3.C. Reverte, and F.J.G. Clemente, \u201cReal-time zero-day threat detection in fog environments,\u201d May 07, 2025. doi: 10.21203\/rs.3.rs-6557761\/v1.","DOI":"10.21203\/rs.3.rs-6557761\/v1"},{"issue":"1","key":"10.1016\/j.adhoc.2026.104227_bib0010","doi-asserted-by":"crossref","DOI":"10.1186\/s13677-024-00609-9","article-title":"A fog-edge-enabled intrusion detection system for smart grids","volume":"13","author":"Tariq","year":"2024","journal-title":"J. Cloud Comput."},{"issue":"1","key":"10.1016\/j.adhoc.2026.104227_bib0011","doi-asserted-by":"crossref","DOI":"10.3390\/s25010010","article-title":"FFL-IDS: a fog-enabled federated learning-based intrusion detection system to counter jamming and spoofing attacks for the industrial Internet of things","volume":"25","author":"Rehman","year":"2025","journal-title":"Sensors"},{"key":"10.1016\/j.adhoc.2026.104227_bib0012","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103299","article-title":"Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks","volume":"131","author":"S\u00e1ez-de-C\u00e1mara","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.adhoc.2026.104227_bib0013","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2024.112142","article-title":"Evaluating intrusion detection for microservice applications: benchmark, dataset, and case studies \u2729","volume":"216","author":"Flora","year":"2024","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.adhoc.2026.104227_bib0014","doi-asserted-by":"crossref","unstructured":"M.S. Ataa, E.E. Sanad, and R.A. El-khoribi, \u201cRyu-IDS: intrusion Detection System for Modern Networks,\u201d Apr. 28, 2025. doi: 10.21203\/rs.3.rs-6092259\/v1.","DOI":"10.21203\/rs.3.rs-6092259\/v1"},{"key":"10.1016\/j.adhoc.2026.104227_bib0015","article-title":"A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning","volume":"49","author":"Althunayyan","year":"2024","journal-title":"Veh. Commun."},{"issue":"10","key":"10.1016\/j.adhoc.2026.104227_bib0016","doi-asserted-by":"crossref","first-page":"8514","DOI":"10.1109\/JIOT.2022.3194813","article-title":"CADeSH: collaborative anomaly Detection for Smart homes","volume":"10","author":"Meidan","year":"2023","journal-title":"IEEe Internet. Things. J."},{"key":"10.1016\/j.adhoc.2026.104227_bib0017","article-title":"A deep learning approach for intrusion detection in Internet of Things using focal loss function","volume":"22","author":"Dina","year":"2023","journal-title":"Internet Things (Neth.)"},{"key":"10.1016\/j.adhoc.2026.104227_bib0018","article-title":"Dependable intrusion detection system using deep convolutional neural network: a novel framework and performance evaluation approach","volume":"11","author":"Hnamte","year":"2023","journal-title":"Telemat. Inform. Rep."},{"issue":"1","key":"10.1016\/j.adhoc.2026.104227_bib0019","doi-asserted-by":"crossref","DOI":"10.1007\/s10791-025-09632-z","article-title":"A multi-level intrusion detection system for industrial IoT using bowerbird courtship-inspired feature selection and hybrid data balancing","volume":"28","author":"Mallidi","year":"2025","journal-title":"Discov. Comput."},{"key":"10.1016\/j.adhoc.2026.104227_bib0020","article-title":"SCADA intrusion detection scheme exploiting the fusion of modified decision tree and Chi-square feature selection","volume":"21","author":"Ahakonye","year":"2023","journal-title":"Internet Things (Neth.)"},{"key":"10.1016\/j.adhoc.2026.104227_bib0021","doi-asserted-by":"crossref","first-page":"50078","DOI":"10.1109\/ACCESS.2021.3068961","article-title":"Anomaly-based intrusion detection by machine learning: a case study on probing attacks to an institutional network","volume":"9","author":"Tufan","year":"2021","journal-title":"IEEe Access."},{"issue":"4","key":"10.1016\/j.adhoc.2026.104227_bib0022","doi-asserted-by":"crossref","first-page":"115","DOI":"10.3390\/make7040115","article-title":"AI-enabled IoT intrusion detection: unified conceptual framework and research roadmap","volume":"7","author":"Villafranca","year":"2025","journal-title":"Mach. Learn. Knowl. Extr"},{"key":"10.1016\/j.adhoc.2026.104227_bib0023","unstructured":"\u201cAWID Dataset\u201d, [Online]. Available: https:\/\/icsdweb.aegean.gr\/awid\/ Accessed March 18, 2026."},{"key":"10.1016\/j.adhoc.2026.104227_bib0024","unstructured":"\u201cMQTT-IoT2020\u201d, [Online]. Available: https:\/\/ieee-dataport.org\/open-access\/mqtt-iot-ids2020-mqtt-internet-things-intrusion-detection-dataset Accessed March 18, 2026. Published 2020."},{"key":"10.1016\/j.adhoc.2026.104227_bib0025","unstructured":"\u201cCEC-CICIDS2018.\u201d [Online]. Available: https:\/\/www.unb.ca\/cic\/datasets\/ids-2018.html Accessed March 18, 2026. Published 2018."},{"key":"10.1016\/j.adhoc.2026.104227_bib0026","unstructured":"\u201cCICIDS2017 Dataset.\u201d [Online]. Available: https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html Accessed March 18, 2026. Published 2017."},{"key":"10.1016\/j.adhoc.2026.104227_bib0027","unstructured":"\u201cNSL-KDD.\u201d [Online]. Available: https:\/\/www.kaggle.com\/datasets\/hassan06\/nslkdd Accessed March 18, 2026."},{"key":"10.1016\/j.adhoc.2026.104227_bib0028","unstructured":"\u201cKDD-99 Dataset.\u201d [Online]. Available: https:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html Accessed March 18, 2026. Published 1999."},{"key":"10.1016\/j.adhoc.2026.104227_bib0029","unstructured":"\u201cIoTID20\u201d, [Online]. Available: https:\/\/www.kaggle.com\/datasets\/rohulaminlabid\/iotid20-dataset Accessed March 18, 2026. Published 2020."},{"key":"10.1016\/j.adhoc.2026.104227_bib0030","unstructured":"\u201cCICFlowMeter.\u201d [Online]. Available: https:\/\/www.unb.ca\/cic\/research\/applications.html#CICFlowMeter Accessed March 18, 2026. Published 2016."},{"key":"10.1016\/j.adhoc.2026.104227_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2025.101818","article-title":"A lightweight edge-DL intrusion detection system for IoT sustainable smart-agriculture","volume":"34","author":"Villafranca","year":"2025","journal-title":"Internet Things"}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870526000934?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870526000934?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T23:42:10Z","timestamp":1774482130000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870526000934"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":31,"alternative-id":["S1570870526000934"],"URL":"https:\/\/doi.org\/10.1016\/j.adhoc.2026.104227","relation":{},"ISSN":["1570-8705"],"issn-type":[{"value":"1570-8705","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A hybrid inference pipeline for IDS: Combining DNNs and XGBoost through stacking for real-world intrusion detection","name":"articletitle","label":"Article Title"},{"value":"Ad Hoc Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.adhoc.2026.104227","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"104227"}}