{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T03:05:40Z","timestamp":1775531140210,"version":"3.50.1"},"reference-count":95,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100003444","name":"Beijing University of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003444","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.eswa.2026.131859","type":"journal-article","created":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T00:26:23Z","timestamp":1773361583000},"page":"131859","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Meta-learning meets transformers: A novel approach to enterprise network intrusion detection"],"prefix":"10.1016","volume":"318","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2393-7600","authenticated-orcid":false,"given":"Ali Haider","family":"Khan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4896-2025","authenticated-orcid":false,"given":"Muhammad","family":"Sajid","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4538-3095","authenticated-orcid":false,"given":"Kaleem Razzaq","family":"Malik","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2035-8865","authenticated-orcid":false,"given":"Ayesha","family":"Afzal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1995-9249","authenticated-orcid":false,"given":"Jianqiang","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/j.eswa.2026.131859_bib0001","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1007\/s10207-023-00682-2","article-title":"A systematic literature review for network intrusion detection system (IDS)","volume":"22","author":"Abdulganiyu","year":"2023","journal-title":"International Journal of Information Security"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0002","doi-asserted-by":"crossref","first-page":"1726","DOI":"10.1038\/s41598-025-85866-7","article-title":"Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering","volume":"15","author":"Ahmed","year":"2025","journal-title":"Scientific Reports"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0003","doi-asserted-by":"crossref","DOI":"10.1155\/2024\/2625922","article-title":"Anomaly-based intrusion detection system in wireless sensor networks using machine learning algorithms","volume":"2024","author":"Al-Fuhaidi","year":"2024","journal-title":"Applied Computational Intelligence and Soft Computing"},{"key":"10.1016\/j.eswa.2026.131859_bib0004","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/01969722.2024.2375148","article-title":"Classification of diabetic retinopathy severity using deep learning techniques on retinal images","volume":"55","author":"Aruna Kumari","year":"2024","journal-title":"Cybernetics and Systems"},{"key":"10.1016\/j.eswa.2026.131859_bib0005","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/j.procs.2021.05.025","article-title":"Network intrusion detection system using deep learning","volume":"185","author":"Ashiku","year":"2021","journal-title":"Procedia Computer Science"},{"issue":"22","key":"10.1016\/j.eswa.2026.131859_bib0006","doi-asserted-by":"crossref","first-page":"4560","DOI":"10.3390\/electronics13224560","article-title":"Boosting few-shot network intrusion detection with adaptive feature fusion mechanism","volume":"13","author":"Bo","year":"2024","journal-title":"Electronics"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0007","doi-asserted-by":"crossref","first-page":"1409","DOI":"10.1038\/s41598-021-02038-z","article-title":"An improved density peaks clustering algorithm based on grid screening and mutual neighborhood degree for network anomaly detection","volume":"12","author":"Chen","year":"2022","journal-title":"Scientific Reports"},{"key":"10.1016\/j.eswa.2026.131859_bib0008","doi-asserted-by":"crossref","DOI":"10.1016\/j.jisa.2024.103736","article-title":"Automatic decision tree-based NIDPS ruleset generation for dos\/DDos attacks","volume":"82","author":"Coscia","year":"2024","journal-title":"Journal of Information Security and Applications"},{"key":"10.1016\/j.eswa.2026.131859_bib0009","series-title":"2023\u202fIEEE 20th consumer communications & networking conference (CCNC)","first-page":"497","article-title":"UNR-IDD: Intrusion detection dataset using network port statistics","author":"Das","year":"2023"},{"issue":"16","key":"10.1016\/j.eswa.2026.131859_bib0010","doi-asserted-by":"crossref","first-page":"12499","DOI":"10.1007\/s00521-020-04708-x","article-title":"An efficient XGBoost\u2013DNN-based classification model for network intrusion detection system","volume":"32","author":"Devan","year":"2020","journal-title":"Neural Computing and Applications"},{"issue":"4","key":"10.1016\/j.eswa.2026.131859_bib0011","doi-asserted-by":"crossref","first-page":"3835","DOI":"10.1080\/03772063.2023.2206367","article-title":"Square static\u2013deep hyper optimization and genetic meta-learning approach for disease classification","volume":"70","author":"Dhivya","year":"2024","journal-title":"IETE Journal of Research"},{"key":"10.1016\/j.eswa.2026.131859_bib0012","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10115-025-02366-w","article-title":"Cybersecurity in the AI era: Analyzing the impact of machine learning on intrusion detection","volume":"67","author":"Dong","year":"2025","journal-title":"Knowledge and Information Systems"},{"issue":"11","key":"10.1016\/j.eswa.2026.131859_bib0013","doi-asserted-by":"crossref","first-page":"2102","DOI":"10.3390\/electronics13112102","article-title":"Learning to diagnose: meta-learning for efficient adaptation in few-shot AIOps scenarios","volume":"13","author":"Duan","year":"2024","journal-title":"Electronics"},{"key":"10.1016\/j.eswa.2026.131859_bib0014","series-title":"2020\u202fIEEE cloud summit","first-page":"46","article-title":"Evaluation of cicids2017 with qualitative comparison of machine learning algorithm","author":"Elmasri","year":"2020"},{"key":"10.1016\/j.eswa.2026.131859_bib0015","doi-asserted-by":"crossref","first-page":"58851","DOI":"10.1109\/ACCESS.2024.3389096","article-title":"A comparative study of using deep learning algorithms in network intrusion detection","volume":"12","author":"Elsayed","year":"2024","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0016","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1186\/s42400-023-00171-y","article-title":"Fmsa: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems","volume":"6","author":"Fan","year":"2023","journal-title":"Cybersecurity"},{"issue":"3","key":"10.1016\/j.eswa.2026.131859_bib0017","doi-asserted-by":"crossref","DOI":"10.32604\/jiot.2022.039271","article-title":"Signature-based intrusion detection system in wireless 6g iot networks","volume":"4","author":"Farooq","year":"2022","journal-title":"Journal on Internet of Things"},{"key":"10.1016\/j.eswa.2026.131859_bib0018","first-page":"139","article-title":"When digitalization pervades, business models converge: A conceptual model for the electricity industry","volume":"68","author":"Fuentes","year":"2025","journal-title":"Business Horizons"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0019","article-title":"Network intrusion detection method combining CNN and biLSTM in cloud computing environment","volume":"2022","author":"Gao","year":"2022","journal-title":"Computational Intelligence and Neuroscience"},{"key":"10.1016\/j.eswa.2026.131859_bib0020","doi-asserted-by":"crossref","first-page":"12699","DOI":"10.1109\/ACCESS.2024.3355312","article-title":"Machine learning solutions for the security of wireless sensor networks: A review","volume":"12","author":"Ghadi","year":"2024","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.eswa.2026.131859_bib0021","doi-asserted-by":"crossref","first-page":"2173","DOI":"10.1007\/s11276-023-03637-6","article-title":"A new intrusion detection system based on SVM\u2013GWO algorithms for internet of things","volume":"30","author":"Ghasemi","year":"2024","journal-title":"Wireless Networks"},{"issue":"2","key":"10.1016\/j.eswa.2026.131859_bib0022","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1177\/14673584231198414","article-title":"Digital transformation and the new combinations in tourism: A systematic literature review","volume":"25","author":"Gutierriz","year":"2025","journal-title":"Tourism and Hospitality Research"},{"key":"10.1016\/j.eswa.2026.131859_bib0023","doi-asserted-by":"crossref","first-page":"4741","DOI":"10.1109\/TIFS.2024.3372771","article-title":"Double-layer detection of internal threat in enterprise systems based on deep learning","volume":"19","author":"He","year":"2024","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0024","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1109\/COMST.2022.3233793","article-title":"Adversarial machine learning for network intrusion detection systems: A comprehensive survey","volume":"25","author":"He","year":"2023","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"10.1016\/j.eswa.2026.131859_bib0025","doi-asserted-by":"crossref","DOI":"10.1016\/j.teler.2023.100053","article-title":"Dcnnbilstm: An efficient hybrid deep learning-based intrusion detection system","volume":"10","author":"Hnamte","year":"2023","journal-title":"Telematics and Informatics Reports"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0026","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-025-07790-0","article-title":"Xai-xgboost: An innovative explainable intrusion detection approach for securing internet of medical things systems","volume":"15","author":"Hosain","year":"2025","journal-title":"Scientific Reports"},{"issue":"3","key":"10.1016\/j.eswa.2026.131859_bib0027","doi-asserted-by":"crossref","first-page":"2549","DOI":"10.1109\/TNSE.2023.3304556","article-title":"Privacy-preserving few-shot traffic detection against advanced persistent threats via federated meta learning","volume":"11","author":"Hu","year":"2023","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"10.1016\/j.eswa.2026.131859_bib0028","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121000","article-title":"Fed-anids: Federated learning for anomaly-based network intrusion detection systems","volume":"234","author":"Idrissi","year":"2023","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2026.131859_bib0029","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101162","article-title":"A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on iot networks","volume":"26","author":"Inuwa","year":"2024","journal-title":"Internet of Things"},{"issue":"3","key":"10.1016\/j.eswa.2026.131859_bib0030","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s12083-025-01944-7","article-title":"Network security based combined CNN-RNN models for iot intrusion detection system","volume":"18","author":"Jablaoui","year":"2025","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"10.1016\/j.eswa.2026.131859_bib0031","article-title":"Unified deep learning approach for efficient intrusion detection system using integrated spatial\u2013temporal features","volume":"226","author":"Kanna","year":"2021","journal-title":"Knowledge-Based Systems"},{"issue":"4","key":"10.1016\/j.eswa.2026.131859_bib0032","doi-asserted-by":"crossref","first-page":"2407","DOI":"10.1007\/s11277-024-11607-0","article-title":"An enhanced hybrid intrusion detection using mapreduce-optimized black widow convolutional lstm neural networks","volume":"138","author":"Kanna","year":"2024","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0033","doi-asserted-by":"crossref","first-page":"71","DOI":"10.14257\/ijsia.2017.11.1.07","article-title":"A defensive mechanism based on PCA to defend denial of-service attack","volume":"11","author":"Kanna","year":"2017","journal-title":"International Journal of Security and its Applications"},{"issue":"5","key":"10.1016\/j.eswa.2026.131859_bib0034","doi-asserted-by":"crossref","first-page":"834","DOI":"10.3390\/pr9050834","article-title":"Hcrnnids: Hybrid convolutional recurrent neural network-based network intrusion detection system","volume":"9","author":"Khan","year":"2021","journal-title":"Processes"},{"issue":"6","key":"10.1016\/j.eswa.2026.131859_bib0035","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0299666","article-title":"Advancements in intrusion detection: A lightweight hybrid RNN-RF model","volume":"19","author":"Khan","year":"2024","journal-title":"PloS One"},{"issue":"2","key":"10.1016\/j.eswa.2026.131859_bib0036","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1109\/LCOMM.2020.3029580","article-title":"Ml\/cgan: Network attack analysis using cgan as meta-learning","volume":"25","author":"Kim","year":"2020","journal-title":"IEEE Communications Letters"},{"key":"10.1016\/j.eswa.2026.131859_bib0037","article-title":"No more privacy concern: A privacy-chain based homomorphic encryption scheme and statistical method for privacy preservation of user\u2019s private and sensitive data","volume":"234","author":"Kumar","year":"2023","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2026.131859_bib0038","article-title":"Differential privacy scheme using laplace mechanism and statistical method computation in deep neural network for privacy preservation","volume":"128","author":"Kumar","year":"2024","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"10.1016\/j.eswa.2026.131859_bib0039","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2023.103784","article-title":"Dtl-ids: An optimized intrusion detection framework using deep transfer learning and genetic algorithm","volume":"221","author":"Latif","year":"2024","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"10.1016\/j.eswa.2026.131859_bib0040","first-page":"443","article-title":"A meta-learning approach for few-shot network intrusion detection using depthwise separable convolution","volume":"12","author":"Li","year":"2024","journal-title":"Journal of ICT Standardization"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0041","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1186\/s40537-024-00892-y","article-title":"Optimizing iot intrusion detection system: Feature selection versus feature extraction in machine learning","volume":"11","author":"Li","year":"2024","journal-title":"Journal of Big Data"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0042","first-page":"1","article-title":"Research on the effect of e-leadership on employee innovation behavior in the context of \u201dself\u201d and \u201drelationship\u201d","volume":"35","author":"Li","year":"2023","journal-title":"Journal of Organizational and End User Computing (JOEUC)"},{"issue":"24","key":"10.1016\/j.eswa.2026.131859_bib0043","doi-asserted-by":"crossref","first-page":"21309","DOI":"10.1109\/JIOT.2023.3283408","article-title":"A few-shot-based model-agnostic meta-learning for intrusion detection in security of internet of things","volume":"10","author":"Lu","year":"2023","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0044","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-025-01054-7","article-title":"A hybrid steganography framework using DCT and GAN for secure data communication in the big data era","volume":"15","author":"Malik","year":"2025","journal-title":"Scientific Reports"},{"key":"10.1016\/j.eswa.2026.131859_bib0045","series-title":"2015 military communications and information systems conference (milCIS)","first-page":"1","article-title":"Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set)","author":"Moustafa","year":"2015"},{"key":"10.1016\/j.eswa.2026.131859_bib0046","series-title":"2021 international conference on advancements in electrical, electronics, communication, computing and automation (ICAECA)","first-page":"1","article-title":"Intrusion detection system using deep neural networks (DNN)","author":"Navya","year":"2021"},{"key":"10.1016\/j.eswa.2026.131859_bib0047","series-title":"Cyber security for next-generation computing technologies","first-page":"141","article-title":"Signature-based intrusion detection system for iot","author":"Nawaal","year":"2024"},{"key":"10.1016\/j.eswa.2026.131859_bib0048","first-page":"1","article-title":"Depth-bounded fuzzy bisimulation for fuzzy modal logic","volume":"55","author":"Nguyen","year":"2023","journal-title":"Cybernetics and Systems"},{"key":"10.1016\/j.eswa.2026.131859_bib0049","doi-asserted-by":"crossref","first-page":"55389","DOI":"10.1109\/ACCESS.2023.3282110","article-title":"Transformer-based attention network for in-vehicle intrusion detection","volume":"11","author":"Nguyen","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2026.131859_bib0050","series-title":"2020 international conference in mathematics, computer engineering and computer science (ICMCECS)","first-page":"1","article-title":"Evaluation of selected meta learning algorithms for the prediction improvement of network intrusion detection system","author":"Olasehinde","year":"2020"},{"issue":"3","key":"10.1016\/j.eswa.2026.131859_bib0051","doi-asserted-by":"crossref","DOI":"10.32604\/cmc.2023.042469","article-title":"One dimensional conv-biLSTMNetwork with attentionmechanism for iot intrusion detection","volume":"77","author":"Omarov","year":"2023","journal-title":"Computers, Materials & Continua"},{"key":"10.1016\/j.eswa.2026.131859_bib0052","series-title":"2024 8th international conference on i-SMAC (iot in social, mobile, analytics and cloud)(i-SMAC)","first-page":"1030","article-title":"Assessing secure cloud information sharing through authentication and encoded indexing","author":"Pandiaraja","year":"2024"},{"key":"10.1016\/j.eswa.2026.131859_bib0053","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102709","article-title":"Hybrid intrusion detection system based on dempster-shafer evidence theory","volume":"117","author":"Qiu","year":"2022","journal-title":"Computers & Security"},{"issue":"2","key":"10.1016\/j.eswa.2026.131859_bib0054","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/s10207-025-00999-0","article-title":"The SPADA methodology for threat modelling","volume":"24","author":"Raciti","year":"2025","journal-title":"International Journal of Information Security"},{"issue":"8","key":"10.1016\/j.eswa.2026.131859_bib0055","doi-asserted-by":"crossref","first-page":"3211","DOI":"10.1007\/s12652-024-04794-y","article-title":"Exploring the landscape of network security: A comparative analysis of attack detection strategies","volume":"15","author":"Rajesh Kanna","year":"2024","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"7","key":"10.1016\/j.eswa.2026.131859_bib0056","doi-asserted-by":"crossref","first-page":"8655","DOI":"10.1007\/s10586-024-04388-5","article-title":"Intrusion detection systems for iot based on bio-inspired and machine learning techniques: A systematic review of the literature","volume":"27","author":"Saadouni","year":"2024","journal-title":"Cluster Computing"},{"key":"10.1016\/j.eswa.2026.131859_bib0057","doi-asserted-by":"crossref","first-page":"52565","DOI":"10.1109\/ACCESS.2024.3380014","article-title":"Intrusion detection system for wireless sensor networks: A machine learning based approach","volume":"12","author":"Sadia","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2026.131859_bib0058","unstructured":"Sajid, M., MAML-Transformer-IDS: Model-agnostic meta-learning with transformer for intrusion detection systems. https:\/\/github.com\/auksajid\/MAML-Transformer-IDS. 2025Accessed: 2025-06-13."},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0059","doi-asserted-by":"crossref","DOI":"10.1002\/ima.70016","article-title":"Enhancing melanoma diagnostic: Harnessing the synergy of AI and CNNs for groundbreaking advances in early melanoma detection and treatment strategies","volume":"35","author":"Sajid","year":"2025","journal-title":"International Journal of Imaging Systems and Technology"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0060","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1186\/s13677-024-00685-x","article-title":"Enhancing intrusion detection: A hybrid machine and deep learning approach","volume":"13","author":"Sajid","year":"2024","journal-title":"Journal of Cloud Computing"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0061","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0307718","article-title":"Next-generation diabetes diagnosis and personalized diet-activity management: A hybrid ensemble paradigm","volume":"20","author":"Sajid","year":"2025","journal-title":"PloS One"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0062","doi-asserted-by":"crossref","first-page":"3164","DOI":"10.1038\/s41598-025-87376-y","article-title":"Leveraging two-dimensional pre-trained vision transformers for three-dimensional model generation via masked autoencoders","volume":"15","author":"Sajid","year":"2025","journal-title":"Scientific Reports"},{"issue":"4","key":"10.1016\/j.eswa.2026.131859_bib0063","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0319551","article-title":"Comparative analysis of text-based plagiarism detection techniques","volume":"20","author":"Sajid","year":"2025","journal-title":"PloS One"},{"key":"10.1016\/j.eswa.2026.131859_bib0064","doi-asserted-by":"crossref","DOI":"10.1016\/j.dajour.2024.100478","article-title":"A comparative assessment of machine learning algorithms in the iot-based network intrusion detection systems","volume":"11","author":"Samantaray","year":"2024","journal-title":"Decision Analytics Journal"},{"issue":"2","key":"10.1016\/j.eswa.2026.131859_bib0065","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1108\/EJIM-01-2023-0078","article-title":"Decoding the data economy: A literature review of its impact on business, society and digital transformation","volume":"28","author":"Sestino","year":"2025","journal-title":"European Journal of Innovation Management"},{"key":"10.1016\/j.eswa.2026.131859_bib0066","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2024.102685","article-title":"Advancing network security in industrial iot: A deep dive into AI-enabled intrusion detection systems","volume":"62","author":"Shahin","year":"2024","journal-title":"Advanced Engineering Informatics"},{"key":"10.1016\/j.eswa.2026.131859_bib0067","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2017). Cicids2017 dataset. Intrusion Detection Evaluation Dataset https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html.","DOI":"10.13052\/jsn2445-9739.2017.009"},{"key":"10.1016\/j.eswa.2026.131859_bib0068","unstructured":"Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018). A realistic cyber defense dataset (CSE-CIC-IDS2018). Registry of Open Data on AWS. Publicly available on AWS Open Data Registry https:\/\/registry.opendata.aws\/cse-cic-ids2018\/."},{"key":"10.1016\/j.eswa.2026.131859_bib0069","series-title":"IEEE 53rd international carnahan conference on security technology","article-title":"Developing realistic distributed denial of service (DDos) attack dataset and taxonomy","author":"Sharafaldin","year":"2019"},{"issue":"6","key":"10.1016\/j.eswa.2026.131859_bib0070","doi-asserted-by":"crossref","DOI":"10.1080\/17517575.2022.2025545","article-title":"Intellectual structure of cybersecurity research in enterprise information systems","volume":"17","author":"Singh","year":"2023","journal-title":"Enterprise Information Systems"},{"key":"10.1016\/j.eswa.2026.131859_bib0071","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2025.128149","article-title":"Scalable hierarchical balanced clustering-based routing with multipath authentication for secured data transmission in large-scale multicast group communications","author":"Somasundaram","year":"2025","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2026.131859_bib0072","first-page":"1","article-title":"In the era of responsible artificial intelligence and digitalization: Business group digitalization, operations and subsidiary performance","author":"Sun","year":"2025","journal-title":"Annals of Operations Research"},{"key":"10.1016\/j.eswa.2026.131859_bib0073","doi-asserted-by":"crossref","DOI":"10.1016\/j.csa.2024.100063","article-title":"A novel approach for handling missing data to enhance network intrusion detection system","volume":"3","author":"Tahir","year":"2025","journal-title":"Cyber Security and Applications"},{"issue":"3","key":"10.1016\/j.eswa.2026.131859_bib0074","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.28991\/ESJ-2024-08-03-024","article-title":"Implications of big data in accounting: challenges and opportunities","volume":"8","author":"Theodorakopoulos","year":"2024","journal-title":"Emerging Science Journal"},{"issue":"2","key":"10.1016\/j.eswa.2026.131859_bib0075","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s10044-024-01271-2","article-title":"Mac: A meta-learning approach for feature learning and recombination","volume":"27","author":"Tiwari","year":"2024","journal-title":"Pattern Analysis and Applications"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0076","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.dcan.2023.03.008","article-title":"Ids-int: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic","volume":"10","author":"Ullah","year":"2024","journal-title":"Digital Communications and Networks"},{"key":"10.1016\/j.eswa.2026.131859_bib0077","first-page":"5998","article-title":"Attention is all you need","volume":"30","author":"Vaswani","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"03","key":"10.1016\/j.eswa.2026.131859_bib0078","doi-asserted-by":"crossref","first-page":"191","DOI":"10.53469\/jtpes.2024.04(03).18","article-title":"Advanced network intrusion detection with tabtransformer","volume":"4","author":"Wang","year":"2024","journal-title":"Journal of Theory and Practice of Engineering Science"},{"key":"10.1016\/j.eswa.2026.131859_bib0079","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102177","article-title":"Intrusion detection methods based on integrated deep learning model","volume":"103","author":"Wang","year":"2021","journal-title":"Computers & Security"},{"key":"10.1016\/j.eswa.2026.131859_bib0080","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00521-024-10942-4","article-title":"Intrusion detection system model: A white-box decision tree with feature selection optimization","volume":"37","author":"Wong","year":"2025","journal-title":"Neural Computing and Applications"},{"key":"10.1016\/j.eswa.2026.131859_bib0081","doi-asserted-by":"crossref","first-page":"64375","DOI":"10.1109\/ACCESS.2022.3182333","article-title":"Rtids: A robust transformer-based approach for intrusion detection system","volume":"10","author":"Wu","year":"2022","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0082","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-024-74214-w","article-title":"A novel multi-scale network intrusion detection model with transformer","volume":"14","author":"Xi","year":"2024","journal-title":"Scientific Reports"},{"key":"10.1016\/j.eswa.2026.131859_bib0083","doi-asserted-by":"crossref","first-page":"738","DOI":"10.1109\/TIP.2023.3349004","article-title":"Ttst: A top-k token selective transformer for remote sensing image super-resolution","volume":"33","author":"Xiao","year":"2024","journal-title":"IEEE Transactions on Image Processing"},{"issue":"4","key":"10.1016\/j.eswa.2026.131859_bib0084","doi-asserted-by":"crossref","first-page":"2789","DOI":"10.1109\/TCSVT.2023.3312321","article-title":"Local-global temporal difference learning for satellite video super-resolution","volume":"34","author":"Xiao","year":"2023","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10.1016\/j.eswa.2026.131859_bib0085","doi-asserted-by":"crossref","first-page":"3540","DOI":"10.1109\/TIFS.2020.2991876","article-title":"A method of few-shot network intrusion detection based on meta-learning framework","volume":"15","author":"Xu","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"10.1016\/j.eswa.2026.131859_bib0086","doi-asserted-by":"crossref","first-page":"9848","DOI":"10.1038\/s41598-025-93185-0","article-title":"A few-shot network intrusion detection method based on mutual centralized learning","volume":"15","author":"Xu","year":"2025","journal-title":"Scientific Reports"},{"issue":"9","key":"10.1016\/j.eswa.2026.131859_bib0087","doi-asserted-by":"crossref","DOI":"10.1002\/ett.4522","article-title":"Intrusion detection: A model based on the improved vision transformer","volume":"33","author":"Yang","year":"2022","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"10.1016\/j.eswa.2026.131859_bib0088","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102675","article-title":"A systematic literature review of methods and datasets for anomaly-based network intrusion detection","volume":"116","author":"Yang","year":"2022","journal-title":"Computers & Security"},{"key":"10.1016\/j.eswa.2026.131859_bib0089","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2023.103622","article-title":"Scalable anomaly-based intrusion detection for secure internet of things using generative adversarial networks in fog environment","volume":"214","author":"Yao","year":"2023","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"10.1016\/j.eswa.2026.131859_bib0090","doi-asserted-by":"crossref","DOI":"10.32604\/cmc.2023.043752","article-title":"Intrusion detection system with customized machine learning techniques for NSL-KDD dataset","volume":"77","author":"Zakariah","year":"2023","journal-title":"Computers, Materials & Continua"},{"key":"10.1016\/j.eswa.2026.131859_bib0091","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102861","article-title":"Comparative research on network intrusion detection methods based on machine learning","volume":"121","author":"Zhang","year":"2022","journal-title":"Computers & Security"},{"key":"10.1016\/j.eswa.2026.131859_bib0092","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2020.107315","article-title":"An effective convolutional neural network based on SMOTE and gaussian mixture model for intrusion detection in imbalanced dataset","volume":"177","author":"Zhang","year":"2020","journal-title":"Computer Networks"},{"key":"10.1016\/j.eswa.2026.131859_bib0093","series-title":"2021 ninth international conference on advanced cloud and big data (CBD)","first-page":"248","article-title":"An efficient intrusion detection model based on convolutional neural network and transformer","author":"Zhang","year":"2022"},{"key":"10.1016\/j.eswa.2026.131859_bib0094","doi-asserted-by":"crossref","first-page":"71414","DOI":"10.1109\/ACCESS.2022.3186975","article-title":"A hybrid intrusion detection system based on feature selection and weighted stacking classifier","volume":"10","author":"Zhao","year":"2022","journal-title":"IEEE Access"},{"issue":"S2","key":"10.1016\/j.eswa.2026.131859_bib0095","first-page":"224","article-title":"Network intrusion detection method based on autoencoder and RESNET","volume":"37","author":"Zhou","year":"2020","journal-title":"Computer Application Research"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417426007724?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417426007724?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T02:03:45Z","timestamp":1775527425000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417426007724"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":95,"alternative-id":["S0957417426007724"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2026.131859","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Meta-learning meets transformers: A novel approach to enterprise network intrusion detection","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.eswa.2026.131859","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"131859"}}