{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T18:09:43Z","timestamp":1778782183841,"version":"3.51.4"},"reference-count":39,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.engappai.2026.114581","type":"journal-article","created":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T07:31:44Z","timestamp":1774596704000},"page":"114581","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Enhancing intrusion detection for network and IoT traffic with Dynamic Tanh: A comparative deep learning study"],"prefix":"10.1016","volume":"175","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0785-9069","authenticated-orcid":false,"given":"Ahmad","family":"Houkan","sequence":"first","affiliation":[]},{"given":"Aditi","family":"Chatterjee","sequence":"additional","affiliation":[]},{"given":"Ashwin Kumar","family":"Sahoo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.engappai.2026.114581_bib1","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2025.104326","article-title":"Next-generation AI for advanced threat detection and security enhancement in DNS over HTTPS","author":"Ali","year":"2025","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.engappai.2026.114581_bib2","article-title":"Proactive and privacy-preserving defense for DNS over HTTPS via federated AI attestation (PAFA-DoH)","author":"Ali","year":"2025","journal-title":"Neural Netw."},{"issue":"12","key":"10.1016\/j.engappai.2026.114581_bib3","doi-asserted-by":"crossref","first-page":"9463","DOI":"10.1109\/JIOT.2020.2996590","article-title":"A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks","volume":"8","author":"Alkadi","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.engappai.2026.114581_bib4","doi-asserted-by":"crossref","first-page":"45762","DOI":"10.1109\/ACCESS.2024.3380816","article-title":"A self-attention-based deep convolutional neural networks for IIoT networks intrusion detection","volume":"12","author":"Alshehri","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2026.114581_bib5","series-title":"Proc. Int. Conf. Comput. Charact. Tech. Eng. Sci.","first-page":"1","article-title":"A comparative study of machine learning models for intrusion detection in 5G traffic","author":"Ayush","year":"2024"},{"issue":"5","key":"10.1016\/j.engappai.2026.114581_bib6","doi-asserted-by":"crossref","first-page":"3827","DOI":"10.1109\/JIOT.2022.3172393","article-title":"Novel online network intrusion detection system for industrial IoT based on OI-SVDD and AS-ELM","volume":"10","author":"Gyamfi","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.engappai.2026.114581_bib7","doi-asserted-by":"crossref","DOI":"10.1088\/2631-8695\/adf527","article-title":"Dynamic Tanh\u2013enhanced transformer architecture for scalable and high-accuracy cyber threat detection in IoT environments","volume":"7","author":"Houkan","year":"2025","journal-title":"Eng. Res. Express"},{"key":"10.1016\/j.engappai.2026.114581_bib8","series-title":"Proc. IEEE 3rd Int. Conf. Sustainable Energy Future Electric Transp. (SEFET)","first-page":"1","article-title":"Industry 5.0 and sustainable development in the developing world","author":"Houkan","year":"2023"},{"key":"10.1016\/j.engappai.2026.114581_bib9","series-title":"Advances in Electrical Power and Embedded Drive Control, ICPEDC","first-page":"367","article-title":"Industrial IoT-intrusion detection using PCA-driven decision tree","volume":"1371","author":"Houkan","year":"2024"},{"key":"10.1016\/j.engappai.2026.114581_bib10","doi-asserted-by":"crossref","first-page":"160864","DOI":"10.1109\/ACCESS.2024.3481459","article-title":"Enhancing security in industrial IoT networks: machine learning solutions for feature selection and reduction","volume":"12","author":"Houkan","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2026.114581_bib11","doi-asserted-by":"crossref","DOI":"10.1016\/j.est.2024.111444","article-title":"Interface synergistic stabilization of zinc anodes via polyacrylic acid-doped polyvinyl alcohol ultra-thin coating","volume":"87","author":"Hu","year":"2024","journal-title":"J. Energy Storage"},{"issue":"16","key":"10.1016\/j.engappai.2026.114581_bib12","doi-asserted-by":"crossref","first-page":"26955","DOI":"10.1109\/JIOT.2024.3397364","article-title":"Scalable graph-aware edge representation learning for wireless IoT intrusion detection","volume":"11","author":"Jiang","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.engappai.2026.114581_bib13","series-title":"Proc. Int. Wireless Commun. Mobile Comput. Conf. (IWCMC), Ayia Napa, Cyprus","first-page":"1558","article-title":"Lightweight CNN-BiLSTM based intrusion detection systems for resource-constrained IoT devices","author":"Jouhari","year":"2024"},{"key":"10.1016\/j.engappai.2026.114581_bib14","series-title":"Proc. IEEE Int. Conf. Mach. Learn. Appl. Netw. Technol. (ICMLANT)","first-page":"90","article-title":"Non-payload based 5G attack detection with qualitative hybrid feature engineering","author":"Kale","year":"2024"},{"key":"10.1016\/j.engappai.2026.114581_bib15","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119000","article-title":"An explainable deep learning-enabled intrusion detection framework in IoT networks","volume":"639","author":"Keshk","year":"2023","journal-title":"Inf. Sci."},{"issue":"21","key":"10.1016\/j.engappai.2026.114581_bib16","doi-asserted-by":"crossref","first-page":"35465","DOI":"10.1109\/JIOT.2024.3437448","article-title":"SITRAN: Self-supervised IDS with transferable techniques for 5G industrial environments","volume":"11","author":"Kim","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.engappai.2026.114581_bib17","article-title":"DeepTransIDS: Transformer-based deep learning model for detecting DDoS attacks on 5G NIDD","volume":"26","author":"Kumar","year":"2025","journal-title":"Results Eng."},{"key":"10.1016\/j.engappai.2026.114581_bib18","article-title":"A comparative analysis of single and multi-view deep learning for cybersecurity anomaly detection","author":"Li","year":"2025","journal-title":"IEEE Access"},{"issue":"12","key":"10.1016\/j.engappai.2026.114581_bib19","article-title":"Analysis of anomaly detection method for internet of Things based on deep learning","volume":"31","author":"Ma","year":"2020","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"4","key":"10.1016\/j.engappai.2026.114581_bib20","doi-asserted-by":"crossref","first-page":"1981","DOI":"10.1007\/s11277-024-11260-7","article-title":"ABCNN-IDS: Attention-based convolutional neural network for intrusion detection in IoT networks","volume":"136","author":"Momand","year":"2024","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.engappai.2026.114581_bib21","series-title":"Proc. Mil. Commun. Inf. Syst. Conf. (Milcis)","first-page":"1","article-title":"UNSW-NB15: a comprehensive data set for network intrusion detection systems","author":"Moustafa","year":"2015"},{"key":"10.1016\/j.engappai.2026.114581_bib22","first-page":"79","article-title":"The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 dataset and the comparison with the KDD99 data set","volume":"25","author":"Moustafa","year":"2016","journal-title":"Inf. Secur. J."},{"key":"10.1016\/j.engappai.2026.114581_bib23","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2023.103637","article-title":"Intelligent approaches toward intrusion detection systems for industrial internet of things: a systematic comprehensive review","volume":"215","author":"Nuaimi","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.engappai.2026.114581_bib24","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-024-72049-z","article-title":"A novel intrusion detection framework for optimizing IoT security","volume":"14","author":"Qaddos","year":"2024","journal-title":"Sci. Rep."},{"key":"10.1016\/j.engappai.2026.114581_bib25","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121751","article-title":"Explainable artificial intelligence for intrusion detection in IoT networks: a deep learning based approach","volume":"238","author":"Sharma","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.engappai.2026.114581_bib26","doi-asserted-by":"crossref","DOI":"10.1109\/IEEEDATA.2025.3592888","article-title":"Descriptor: 5G wireless network intrusion detection dataset (5G-NIDD)","author":"Siriwardhana","year":"2025","journal-title":"IEEE Data Descriptions"},{"key":"10.1016\/j.engappai.2026.114581_bib27","series-title":"Plant Nutrition and Food Security in the Era of Climate Change","first-page":"1","article-title":"Entangling the interaction between essential and nonessential nutrients: implications for global food security","author":"Tanveer","year":"2022"},{"key":"10.1016\/j.engappai.2026.114581_bib28","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.100902","article-title":"CMAF-IIoT: chaotic map-based authentication framework for industrial internet of things","volume":"23","author":"Tanveer","year":"2023","journal-title":"Internet Things"},{"key":"10.1016\/j.engappai.2026.114581_bib29","first-page":"1","article-title":"Intelligent network intrusion detection system using optimized deep CNN-LSTM with UNSW-NB15","author":"Thaljaoui","year":"2025","journal-title":"Int. J. Inf. Technol."},{"key":"10.1016\/j.engappai.2026.114581_bib30","series-title":"Lect. Notes Comput. Sci. (LNCS)","doi-asserted-by":"crossref","first-page":"508","DOI":"10.1007\/978-3-030-47358-7_52","article-title":"A scheme for generating a dataset for anomalous activity detection in IoT networks","author":"Ullah","year":"2020"},{"issue":"10","key":"10.1016\/j.engappai.2026.114581_bib31","doi-asserted-by":"crossref","first-page":"3607","DOI":"10.3390\/s22103607","article-title":"A new intrusion detection system for the internet of Things via deep convolutional neural network and feature engineering","volume":"22","author":"Ullah","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.engappai.2026.114581_bib32","series-title":"Proc. IEEE 98th Veh. Technol. Conf. (VTC-Fall)","first-page":"1","article-title":"Abdnn IDS: Attention-based deep neural networks for intrusion detection in industrial IoT","author":"Ullah","year":"2023"},{"key":"10.1016\/j.engappai.2026.114581_bib33","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2019.100081","article-title":"Blockchain for the IoT and industrial IoT: a review","volume":"10","author":"Wang","year":"2020","journal-title":"Internet Things"},{"issue":"6","key":"10.1016\/j.engappai.2026.114581_bib34","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/MNET.001.2100754","article-title":"Deep-learning based weak electromagnetic intrusion detection method for zero touch networks on industrial IoT","volume":"36","author":"Wang","year":"2022","journal-title":"IEEE Netw"},{"issue":"5","key":"10.1016\/j.engappai.2026.114581_bib35","doi-asserted-by":"crossref","first-page":"103","DOI":"10.23919\/PCMP.2024.000161","article-title":"Source-load coordinated optimization framework for distributed energy systems using quasi-potential game method","volume":"10","author":"Wang","year":"2025","journal-title":"Prot. Control Mod. Power Syst."},{"key":"10.1016\/j.engappai.2026.114581_bib36","doi-asserted-by":"crossref","DOI":"10.1016\/j.est.2025.117752","article-title":"Movable SiO2 reinforced polymethyl methacrylate dual network coating for highly stable zinc anodes","volume":"132","author":"Wu","year":"2025","journal-title":"J. Energy Storage"},{"issue":"5","key":"10.1016\/j.engappai.2026.114581_bib37","doi-asserted-by":"crossref","first-page":"2894","DOI":"10.1109\/TNSE.2022.3184975","article-title":"Intrusion detection of industrial internet-of-things based on reconstructed graph neural networks","volume":"10","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Netw. Sci. Eng"},{"key":"10.1016\/j.engappai.2026.114581_bib38","doi-asserted-by":"crossref","first-page":"2725","DOI":"10.3390\/s25092725","article-title":"Research on intrusion detection method based on Transformer and CNN-BiLSTM in Internet of things","volume":"25","author":"Zhang","year":"2025","journal-title":"Sensors"},{"key":"10.1016\/j.engappai.2026.114581_bib39","article-title":"Transformers without normalization","author":"Zhu","year":"2025","journal-title":"arXiv preprint arXiv:2503.10622"}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197626008626?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197626008626?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T17:20:21Z","timestamp":1778779221000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0952197626008626"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":39,"alternative-id":["S0952197626008626"],"URL":"https:\/\/doi.org\/10.1016\/j.engappai.2026.114581","relation":{},"ISSN":["0952-1976"],"issn-type":[{"value":"0952-1976","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Enhancing intrusion detection for network and IoT traffic with Dynamic Tanh: A comparative deep learning study","name":"articletitle","label":"Article Title"},{"value":"Engineering Applications of Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.engappai.2026.114581","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"114581"}}