{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:47:17Z","timestamp":1776876437496,"version":"3.51.2"},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.asoc.2026.114900","type":"journal-article","created":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T08:53:55Z","timestamp":1772700835000},"page":"114900","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Behavior-aware deep learning framework for risk activity detection using the RBD24 dataset"],"prefix":"10.1016","volume":"197","author":[{"given":"Dipti","family":"Bhojwani","sequence":"first","affiliation":[]},{"given":"Subhash Chandra","family":"Patel","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2026.114900_bib0005","article-title":"Rbd24 - risk activities dataset 2024","volume":"150","author":"Albert","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.asoc.2026.114900_bib0010","first-page":"479","article-title":"A detailed analysis of cicids2017 dataset for designing intrusion detection systems","volume":"7","author":"Panigrahi","year":"2018","journal-title":"Int. J. Eng. Technol."},{"key":"10.1016\/j.asoc.2026.114900_bib0015","first-page":"1","article-title":"Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set)","author":"Moustafa","year":"2015","journal-title":"Mil.Commun.Inf.Syst.Conf."},{"issue":"4","key":"10.1016\/j.asoc.2026.114900_bib0020","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1177\/15485129221094881","article-title":"Machine learning to combat cyberattack: a survey of datasets and challenges","volume":"20","author":"Prasad","year":"2023","journal-title":"J. Def. Model. Simul."},{"key":"10.1016\/j.asoc.2026.114900_bib0025","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: bot-iot dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Futur. Gener. Comput. Syst."},{"key":"10.1016\/j.asoc.2026.114900_bib0030","article-title":"Ugr\u201916: a new dataset for the evaluation of cyclostationarity-based network IDS","volume":"125","author":"Maci\u00e1-Fern\u00e1ndez","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.asoc.2026.114900_bib0040","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1038\/s41597-025-04439-5","article-title":"A dataset for cyber threat intelligence modeling of connected autonomous vehicles","volume":"12","author":"Wang","year":"2025","journal-title":"Sci. Data"},{"issue":"5","key":"10.1016\/j.asoc.2026.114900_bib0045","first-page":"1","article-title":"Uwf-zeekdata24: enterprise-scale mitre att&ck annotated dataset","volume":"10","year":"2025","journal-title":"Data (MDPI)"},{"key":"10.1016\/j.asoc.2026.114900_bib0050","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.104290","article-title":"Rbd24: a labelled dataset with risk activities using log application data","volume":"150","author":"Calvo","year":"2025","journal-title":"Comput. Secur."},{"issue":"6","key":"10.1016\/j.asoc.2026.114900_bib0055","first-page":"112","article-title":"Unsupervised anomaly detection on cybersecurity data streams","volume":"13","author":"Eremin","year":"2025","journal-title":"Int. J. Open Inf. Technol."},{"key":"10.1016\/j.asoc.2026.114900_bib0060","article-title":"Omm-2022: a ransomware behavior dataset for c2 detection","volume":"8","author":"John","year":"2022","journal-title":"PeerJ Comput. Sci."},{"key":"10.1016\/j.asoc.2026.114900_bib0065","article-title":"A survey on deep learning approaches in cybersecurity and intrusion detection","volume":"195","author":"Podder","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"10.1016\/j.asoc.2026.114900_bib0070","first-page":"1524","article-title":"Review on IOT intrusion detection datasets","volume":"25","year":"2023","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"10.1016\/j.asoc.2026.114900_bib0075","article-title":"Deep learning for cyber security intrusion detection: approaches, datasets and challenges","volume":"50","author":"Ferrag","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.asoc.2026.114900_bib0080","author":"Nguyen"},{"key":"10.1016\/j.asoc.2026.114900_bib0085","author":"Zhao"},{"key":"10.1016\/j.asoc.2026.114900_bib0090","author":"Shahriar"},{"issue":"22","key":"10.1016\/j.asoc.2026.114900_bib0095","doi-asserted-by":"crossref","DOI":"10.3390\/s24227389","article-title":"Privacy-preserving synthetic data generation method for IoT-sensor network IDS using CTGAN","volume":"24","author":"Alabdulwahab","year":"2024","journal-title":"Sensors"},{"key":"10.1016\/j.asoc.2026.114900_bib0100","author":"Liu"},{"key":"10.1016\/j.asoc.2026.114900_bib0105","doi-asserted-by":"crossref","DOI":"10.1016\/j.compbiomed.2025.110442","article-title":"Dft_anpd: a dual-feature two-sided attention network for anticancer natural products detection","volume":"194","author":"Norouzi","year":"2025","journal-title":"Comput. Biol. Med."},{"key":"10.1016\/j.asoc.2026.114900_bib0110","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2020.113662","article-title":"Incorporating part-whole hierarchies into fully convolutional network for scene parsing","volume":"160","author":"Abbasi","year":"2020","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2026.114900_bib0115","series-title":"Artificial Neural Networks and Machine Learning \u2013 ICANN 2019: Text and Time Series","first-page":"703","article-title":"MAD-GAN: multivariate anomaly detection for time series data with generative adversarial networks","volume":"vol. 11730","author":"Li","year":"2019"},{"key":"10.1016\/j.asoc.2026.114900_bib0120","first-page":"447","article-title":"Machine learning for cybersecurity data science: explainable models and challenges","volume":"108","author":"Sarker","year":"2020","journal-title":"Futur. Gener. Comput. Syst."},{"key":"10.1016\/j.asoc.2026.114900_bib0125","series-title":"Proceedings of the IEEE 6th International Conference on Big Data Analytics (ICBDA)","first-page":"316","article-title":"Named entity recognition using BERT with whole word masking in cybersecurity domain","author":"Zhou","year":"2021"},{"key":"10.1016\/j.asoc.2026.114900_bib0130","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume":"1","author":"Sharafaldin","year":"2018","journal-title":"ICISSP"},{"key":"10.1016\/j.asoc.2026.114900_bib0135","article-title":"A stacked denoising autoencoder-based intrusion detection system for cybersecurity","volume":"113","author":"Zhang","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.asoc.2026.114900_bib0140","first-page":"29217","article-title":"Capsnet-gru: a capsule network and gru-based framework for intrusion detection","volume":"11","author":"Xie","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.asoc.2026.114900_bib0145","article-title":"Graph neural networks with attention mechanisms for IOT intrusion detection","volume":"215","author":"Wang","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"10.1016\/j.asoc.2026.114900_bib0150","first-page":"678","article-title":"Intrusion detection using optimized lightgbm with feature selection on unsw-nb15 dataset","volume":"24","author":"Ali","year":"2024","journal-title":"Sensors"},{"issue":"4","key":"10.1016\/j.asoc.2026.114900_bib0155","first-page":"1456","article-title":"Hybrid autoencoder and svm-based model for intrusion detection on cic-ids2018","volume":"14","author":"Nguyen","year":"2024","journal-title":"Appl. Sci."},{"key":"10.1016\/j.asoc.2026.114900_bib0160","author":"Xu"},{"issue":"3","key":"10.1016\/j.asoc.2026.114900_bib0165","doi-asserted-by":"crossref","first-page":"1552","DOI":"10.3390\/app15031552","article-title":"A comprehensive survey on deep learning applications in intrusion detection systems","volume":"15","author":"Maci\u00e1-Fern\u00e1ndez","year":"2025","journal-title":"Appl. Sci."},{"issue":"9","key":"10.1016\/j.asoc.2026.114900_bib0170","first-page":"2725","article-title":"Intrusion detection method based on hybrid cnn\u2013bilstm\u2013transformer","volume":"25","author":"Gong","year":"2024","journal-title":"Sensors"},{"key":"10.1016\/j.asoc.2026.114900_bib0175","series-title":"Proceedings of the 17th Cyber Security Experimentation and Test Workshop (CSET)","first-page":"34","article-title":"Introducing a comprehensive, continuous, and collaborative survey of intrusion detection datasets","author":"B\u00f6nninghausen","year":"2024"},{"key":"10.1016\/j.asoc.2026.114900_bib0180","article-title":"Enhancing network intrusion detection systems with combined network and host traffic features","volume":"215","author":"Sharafaldin","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.asoc.2026.114900_bib0185","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","article-title":"Distributed attack detection scheme using deep learning approach for Internet of Things","volume":"82","author":"Diro","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.asoc.2026.114900_bib0190","article-title":"5g-nidd: a comprehensive network intrusion detection dataset generated over 5g wireless network","author":"Siriwardhana","year":"2022","journal-title":"Univ. Oulu, CWC \u2013 Verkot J\u00e4rjest."},{"key":"10.1016\/j.asoc.2026.114900_bib0195","series-title":"2025 2nd International Conference on Trends in Engineering Systems and Technologies (ICTEST)","article-title":"Bayesian neural network uncertainty estimation for detecting adversarial attacks on network intrusion detection systems","author":"Bahl","year":"2025"},{"issue":"4","key":"10.1016\/j.asoc.2026.114900_bib0200","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1007\/s40860-024-00238-8","article-title":"Enhancing trustworthiness in ml-based network intrusion detection with uncertainty quantification","volume":"10","author":"Talpini","year":"2024","journal-title":"J. Rel. Intell. Environ."},{"key":"10.1016\/j.asoc.2026.114900_bib0205","author":"Fakour"},{"key":"10.1016\/j.asoc.2026.114900_bib0210","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111436","article-title":"Intrusion detection in software-defined networking using hybrid Bayesian model averaging for reliable uncertainty quantification","volume":"269","author":"Medjadba","year":"2025","journal-title":"Comput. Netw."}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626003480?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626003480?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:04:07Z","timestamp":1776873847000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494626003480"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":41,"alternative-id":["S1568494626003480"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2026.114900","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Behavior-aware deep learning framework for risk activity detection using the RBD24 dataset","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2026.114900","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"114900"}}