{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T16:48:27Z","timestamp":1776358107742,"version":"3.51.2"},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1016\/j.compeleceng.2025.110793","type":"journal-article","created":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T09:18:54Z","timestamp":1761729534000},"page":"110793","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"PA","title":["Q-FlexiViT: A quantum-flexible vision transformer optimized by Octopus-inspired algorithm for intrusion detection"],"prefix":"10.1016","volume":"129","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4396-1629","authenticated-orcid":false,"given":"Prem Kumar","family":"Santhanam","sequence":"first","affiliation":[]},{"given":"Himaja Chowdary","family":"Vellanki","sequence":"additional","affiliation":[]},{"given":"Sai Rohith","family":"Reddy Bellapu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2547-3248","authenticated-orcid":false,"given":"K","family":"Mithra","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"8","key":"10.1016\/j.compeleceng.2025.110793_bib0001","doi-asserted-by":"crossref","first-page":"4921","DOI":"10.3390\/app13084921","article-title":"HDLNIDS: hybrid deep-learning-based network intrusion detection system","volume":"13","author":"Qazi","year":"2023","journal-title":"Appl Sci"},{"key":"10.1016\/j.compeleceng.2025.110793_bib0002","article-title":"BBO-CFAT: network intrusion detection model based on BBO algorithm and hierarchical transformer","author":"Jiang","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2025.110793_bib0003","volume":"1","author":"Awotunde","year":"2021"},{"issue":"01","key":"10.1016\/j.compeleceng.2025.110793_bib0004","doi-asserted-by":"crossref","first-page":"283","DOI":"10.71426\/jmt.v2.i1.pp283-291","article-title":"Hybrid RNN-GRU-LSTM model for accurate detection of DDoS attackson IDS dataset","volume":"2","author":"kumar Soma","year":"2025","journal-title":"J Mod Technol"},{"key":"10.1016\/j.compeleceng.2025.110793_bib0005","series-title":"Cyber Security for Intelligent Systems the Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity","first-page":"133","author":"Inbamani","year":"2024"},{"issue":"12","key":"10.1016\/j.compeleceng.2025.110793_bib0006","first-page":"2370","article-title":"Insights into modern intrusion detection strategies for Internet of things ecosystems","volume":"13","author":"Isong","year":"2024","journal-title":"Electron (Basel)"},{"issue":"20","key":"10.1016\/j.compeleceng.2025.110793_bib0007","doi-asserted-by":"crossref","first-page":"7896","DOI":"10.3390\/s22207896","article-title":"Network threat detection using machine\/deep learning in sdn-based platforms: a comprehensive analysis of state-of-the-art solutions, discussion, challenges, and future research direction","volume":"22","author":"Ahmed","year":"2022","journal-title":"Sensors"},{"issue":"1","key":"10.1016\/j.compeleceng.2025.110793_bib0008","doi-asserted-by":"crossref","first-page":"e4150","DOI":"10.1002\/ett.4150","article-title":"Network intrusion detection system: a systematic study of machine learning and deep learning approaches","volume":"32","author":"Ahmad","year":"2021","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"1","key":"10.1016\/j.compeleceng.2025.110793_bib0009","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/s10922-024-09874-0","article-title":"Enhancing network threat detection with random forest-based NIDS and permutation feature importance","volume":"33","author":"Abdelaziz","year":"2025","journal-title":"J Netw Syst Manag"},{"key":"10.1016\/j.compeleceng.2025.110793_bib0010","article-title":"Automatic decision tree-based NIDPS ruleset generation for DoS\/DDoS attacks","volume":"82","author":"Coscia","year":"2024","journal-title":"J Inf Secur Appl"},{"key":"10.1016\/j.compeleceng.2025.110793_bib0011","doi-asserted-by":"crossref","first-page":"82443","DOI":"10.1109\/ACCESS.2024.3404778","article-title":"Securing the IoT cyber environment: enhancing intrusion anomaly detection with vision transformers","volume":"12","author":"Sana","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2025.110793_bib0012","first-page":"249","article-title":"Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm","volume":"13","author":"Jama","year":"2021","journal-title":"Int J Commun Netw Inf Secur"},{"key":"10.1016\/j.compeleceng.2025.110793_bib0013","doi-asserted-by":"crossref","first-page":"37131","DOI":"10.1109\/ACCESS.2023.3266979","article-title":"A novel two-stage deep learning model for network intrusion detection: LSTM-AE","volume":"11","author":"Hnamte","year":"2023","journal-title":"IEEE Access"},{"issue":"15","key":"10.1016\/j.compeleceng.2025.110793_bib0014","doi-asserted-by":"crossref","first-page":"7050","DOI":"10.3390\/app11157050","article-title":"Anomaly detection using deep neural network for IoT architecture","volume":"11","author":"Ahmad","year":"2021","journal-title":"Appl Sci"},{"issue":"1","key":"10.1016\/j.compeleceng.2025.110793_bib0015","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/s11277-021-09139-y","article-title":"Detection and multi-class classification of intrusion in software defined networks using stacked auto-encoders and CICIDS2017 dataset","volume":"123","author":"Choobdar","year":"2022","journal-title":"Wirel Pers Commun"},{"issue":"6","key":"10.1016\/j.compeleceng.2025.110793_bib0016","first-page":"1108","article-title":"Machine-learning-based traffic classification in software-defined networks","volume":"13","author":"Serag","year":"2024","journal-title":"Electron (Basel)"},{"issue":"1","key":"10.1016\/j.compeleceng.2025.110793_bib0017","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1038\/s41598-023-50554-x","article-title":"Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection","volume":"14","author":"Karthikeyan","year":"2024","journal-title":"Sci Rep"},{"issue":"12","key":"10.1016\/j.compeleceng.2025.110793_bib0018","doi-asserted-by":"crossref","first-page":"4459","DOI":"10.3390\/s22124459","article-title":"A novel deep supervised learning-based approach for intrusion detection in IoT systems","volume":"22","author":"Baniasadi","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.compeleceng.2025.110793_bib0019","series-title":"Illumination of artificial intelligence in cybersecurity and forensics","first-page":"273","article-title":"A binary firefly algorithm based feature selection method on high dimensional intrusion detection data","author":"Saheed","year":"2022"},{"issue":"2","key":"10.1016\/j.compeleceng.2025.110793_bib0020","first-page":"219","article-title":"A novel PCA-firefly based XGBoost classification model for intrusion detection in networks using GPU","volume":"9","author":"Bhattacharya","year":"2020","journal-title":"Electron (Basel)"},{"issue":"1","key":"10.1016\/j.compeleceng.2025.110793_bib0021","doi-asserted-by":"crossref","first-page":"418","DOI":"10.11591\/eei.v12i1.4555","article-title":"Man-in-the-middle and denial of service attacks detection using machine learning algorithms","volume":"12","author":"Al-Juboori","year":"2023","journal-title":"Bull Electr Eng Inform"},{"key":"10.1016\/j.compeleceng.2025.110793_bib0022","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1016\/j.future.2022.01.026","article-title":"Imbalanced data classification: a KNN and generative adversarial networks-based hybrid approach for intrusion detection","volume":"131","author":"Ding","year":"2022","journal-title":"Future Gener Comput Syst"},{"issue":"3","key":"10.1016\/j.compeleceng.2025.110793_bib0023","article-title":"DDoS attack detection via Multi-scale convolutional neural network","volume":"62","author":"Cheng","year":"2020","journal-title":"Comput Mater Contin"},{"issue":"6","key":"10.1016\/j.compeleceng.2025.110793_bib0024","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0299666","article-title":"Advancements in intrusion detection: a lightweight hybrid RNN-RF model","volume":"19","author":"Khan","year":"2024","journal-title":"Plos one"},{"issue":"1","key":"10.1016\/j.compeleceng.2025.110793_bib0025","article-title":"A few-shot learning-based siamese capsule network for intrusion detection with imbalanced training data","volume":"2021","author":"Wang","year":"2021","journal-title":"Comput Intell Neurosci"},{"issue":"1","key":"10.1016\/j.compeleceng.2025.110793_bib0026","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.dcan.2023.03.008","article-title":"IDS-INT: intrusion detection system using transformer-based transfer learning for imbalanced network traffic","volume":"10","author":"Ullah","year":"2024","journal-title":"Digit Commun Netw"},{"key":"10.1016\/j.compeleceng.2025.110793_bib0027","series-title":"Foundations and Practice of Security. FPS 2021","first-page":"191","article-title":"A comparative analysis of machine learning techniques for IoT intrusion detection","volume":"13291","author":"Vitorino","year":"2022"},{"issue":"Aug","key":"10.1016\/j.compeleceng.2025.110793_bib0028","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.ins.2021.03.060","article-title":"A novel IoT network intrusion detection approach based on Adaptive particle Swarm Optimization Convolutional Neural Network","volume":"568","author":"Kan","year":"2021","journal-title":"Inf Sci"},{"issue":"1","key":"10.1016\/j.compeleceng.2025.110793_bib0029","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1186\/s42400-023-00178-5","article-title":"Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT 2022 dataset","volume":"6","author":"Sharmila","year":"2023","journal-title":"Cybersecurity"},{"issue":"Jun","key":"10.1016\/j.compeleceng.2025.110793_bib0030","article-title":"Stacked recurrent neural network for botnet detection in smarthomes","volume":"92","author":"Popoola","year":"2021","journal-title":"Comput Electr Eng"},{"issue":"1","key":"10.1016\/j.compeleceng.2025.110793_bib0031","article-title":"Federated learning for network attack detection using attention-based graph neural networks","volume":"14","author":"Wu","year":"2024","journal-title":"Sci Rep"},{"key":"10.1016\/j.compeleceng.2025.110793_bib0032","series-title":"NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","first-page":"1","article-title":"E-GraphSAGE: a graph neural network based intrusion detection system for IoT","author":"Lo","year":"2022"},{"issue":"4","key":"10.1016\/j.compeleceng.2025.110793_bib0033","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MITP.2024.3396356","article-title":"A framework for the deployment of cybersecurity monitoring tools in the industrial environment","volume":"26","author":"Armellin","year":"2024","journal-title":"IT Prof"},{"key":"10.1016\/j.compeleceng.2025.110793_bib0034","series-title":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","first-page":"45","article-title":"Are IDS violating segmentation in Industrial networks?","author":"Gaggero","year":"2024"},{"issue":"6","key":"10.1016\/j.compeleceng.2025.110793_bib0035","doi-asserted-by":"crossref","first-page":"1752","DOI":"10.3390\/s25061752","article-title":"HiViT-IDS: an efficient network intrusion detection method based on vision transformer","volume":"25","author":"Zhou","year":"2025","journal-title":"Sensors"},{"key":"10.1016\/j.compeleceng.2025.110793_bib0036","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2022.108912","article-title":"\u2018Wrapper feature selection method based differential evolution and extreme learning machine for intrusion detection system","volume":"132","author":"Al-Yaseen","year":"2022","journal-title":"Pattern Recognit"},{"issue":"13","key":"10.1016\/j.compeleceng.2025.110793_bib0037","doi-asserted-by":"crossref","first-page":"19463","DOI":"10.1007\/s11042-022-14121-2","article-title":"\u2018A CNN-transformer hybrid approach for an intrusion detection system in advanced metering infrastructure","volume":"82","author":"Yao","year":"2023","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10.1016\/j.compeleceng.2025.110793_bib0038","doi-asserted-by":"crossref","first-page":"1396","DOI":"10.3390\/s22041396","article-title":"An effective feature selection model using hybrid metaheuristic algorithms for IoT intrusion detection","volume":"22","author":"Kareem","year":"2022","journal-title":"Sensors"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790625007360?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790625007360?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T14:10:57Z","timestamp":1764943857000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790625007360"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":38,"alternative-id":["S0045790625007360"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2025.110793","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Q-FlexiViT: A quantum-flexible vision transformer optimized by Octopus-inspired algorithm for intrusion detection","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2025.110793","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"110793"}}