{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T12:00:40Z","timestamp":1761739240452,"version":"build-2065373602"},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1016\/j.future.2025.108102","type":"journal-article","created":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T22:24:33Z","timestamp":1755987873000},"page":"108102","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Intrusion detection with improved quantum neural network: A bigdata perspective"],"prefix":"10.1016","volume":"175","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1746-2338","authenticated-orcid":false,"given":"Nithya","family":"BN","sequence":"first","affiliation":[]},{"given":"Hemanth","family":"Uppala","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.future.2025.108102_bib0001","doi-asserted-by":"crossref","DOI":"10.1007\/978-981-19-9530-9_22","article-title":"Evolution of Quantum machine learning and an attempt of its application for SDN intrusion detection, Quantum computing: a shift from bits to qubits","volume":"1085","author":"Shinde","year":"2023","journal-title":"Stud. Comput. Intell"},{"key":"10.1016\/j.future.2025.108102_bib0002","first-page":"169","article-title":"Collaborative quantum optimization network intrusion detection research","volume":"19","author":"Zeng","year":"2019","journal-title":"J. Comput. Methods Sci. Eng"},{"key":"10.1016\/j.future.2025.108102_bib0003","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103447","article-title":"Incremental hybrid intrusion detection for 6LoWPAN","volume":"135","author":"Pasikhan","year":"2023","journal-title":"Comput. Secur"},{"issue":"3","key":"10.1016\/j.future.2025.108102_bib0004","article-title":"A novel feature selection with fuzzy deep neural network for attack detection In big data environment","volume":"12","author":"Vijaya Kumar","year":"2021","journal-title":"Indian J. Comput. Sci. Eng. (IJCSE)"},{"issue":"3","key":"10.1016\/j.future.2025.108102_bib0005","doi-asserted-by":"crossref","first-page":"972","DOI":"10.1016\/j.jksuci.2019.05.001","article-title":"Application of OPTICS and ensemble learning for Database intrusion detection","volume":"34","author":"Subudhi","year":"2022","journal-title":"J. King Saud Univ. - Comput. Inf. Sci"},{"key":"10.1016\/j.future.2025.108102_bib0006","doi-asserted-by":"crossref","DOI":"10.1016\/j.array.2023.100330","article-title":"Towards efficient multi-granular anomaly detection in distributed systems","volume":"21","author":"Tu","year":"2024","journal-title":"Array"},{"key":"10.1016\/j.future.2025.108102_bib0007","article-title":"An ensemble learning approach for anomaly detection in credit card data with imbalanced and overlapped classes","volume":"78","author":"Islam","year":"2023","journal-title":"J. Inf. Secur. Appl"},{"key":"10.1016\/j.future.2025.108102_bib0008","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2023.110626","article-title":"DI-NIDS: domain invariant network intrusion detection system","volume":"273","author":"Layeghy","year":"2023","journal-title":"Knowl. Based Syst"},{"key":"10.1016\/j.future.2025.108102_bib0009","series-title":"Proceedings of the Australasian computer science week multiconference","first-page":"1","article-title":"Improving performance of intrusion detection system using ensemble methods and feature selection","author":"Pham","year":"2018"},{"key":"10.1016\/j.future.2025.108102_bib0010","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/s11416-022-00435-0","article-title":"Security intrusion detection using quantum machine learning techniques","volume":"19","author":"Kalinin","year":"2023","journal-title":"J. Comput. Virol. Hacking Tech"},{"key":"10.1016\/j.future.2025.108102_bib0011","series-title":"2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)","first-page":"1","article-title":"Towards quantum-enhanced machine learning for network intrusion detection","author":"Gouveia","year":"2020"},{"issue":"1","key":"10.1016\/j.future.2025.108102_bib0012","article-title":"Intrusion detection using normalized mutual information feature selection and parallel quantum genetic algorithm","volume":"18","author":"Ling","year":"2022","journal-title":"Int J Semant Web Inf Syst"},{"key":"10.1016\/j.future.2025.108102_bib0013","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2020.106167","article-title":"Quantum-inspired ant lion optimized hybrid k-means for cluster analysis and intrusion detection","volume":"203","author":"Chen","year":"2020","journal-title":"Knowl. Based Syst"},{"issue":"3","key":"10.1016\/j.future.2025.108102_bib0014","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1109\/TETCI.2021.3074916","article-title":"Training a quantum annealing based restricted Boltzmann machine on cybersecurity data","volume":"6","author":"Dixit","year":"2022","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell"},{"issue":"1","key":"10.1016\/j.future.2025.108102_bib0015","doi-asserted-by":"crossref","DOI":"10.4018\/IJWP.2020010105","article-title":"Enhanced learning vector quantization for detecting intrusions In IDS","volume":"12","author":"Sandosh","year":"2020","journal-title":"Int. J. Web Portals"},{"key":"10.1016\/j.future.2025.108102_bib0016","doi-asserted-by":"crossref","unstructured":"D. Herr, B. Obert, M. Rosenkranz, Anomaly detection with variational quantum generative adversarial networks, arXiv:2010.10492v2. (2021). doi: 10.48550\/arXiv.2010.10492.","DOI":"10.1088\/2058-9565\/ac0d4d"},{"issue":"1","key":"10.1016\/j.future.2025.108102_bib0017","doi-asserted-by":"crossref","DOI":"10.4018\/IJWP.2020010105","article-title":"Enhanced learning vector quantization for detecting intrusions In IDS","volume":"12","author":"Sandosh","year":"2020","journal-title":"Int. J. Web Portals"},{"key":"10.1016\/j.future.2025.108102_bib0018","article-title":"Securing the digital world: protecting smart infrastructures and digital industries with artificial intelligence (AI)-enabled malware and intrusion detection","volume":"36","author":"Schmitt","year":"2023","journal-title":"J. Ind. Inf. Integr"},{"key":"10.1016\/j.future.2025.108102_bib0019","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103631","article-title":"Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security","volume":"137","author":"Wurzenberger","year":"2024","journal-title":"Comput. Secur"},{"key":"10.1016\/j.future.2025.108102_bib0020","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1016\/j.aej.2023.03.072","article-title":"Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security","volume":"71","author":"Kadry","year":"2023","journal-title":"Alex. Eng. J"},{"key":"10.1016\/j.future.2025.108102_bib0021","doi-asserted-by":"crossref","first-page":"96081","DOI":"10.1109\/ACCESS.2023.3304331","article-title":"A novel hybrid quantum-Classical framework for an In-vehicle controller area network intrusion detection","volume":"11","author":"Salek","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.future.2025.108102_bib0022","doi-asserted-by":"crossref","first-page":"110570","DOI":"10.1109\/ACCESS.2023.3322723","article-title":"DEQSVC: dimensionality reduction and encoding technique for quantum support vector classifier approach to detect DDoS attacks","volume":"11","author":"Alomari","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.future.2025.108102_bib0023","doi-asserted-by":"crossref","first-page":"45893","DOI":"10.1109\/ACCESS.2022.3169137","article-title":"The\u201cCyber security via determinism\u201d paradigm for a quantum safe zero trust deterministic internet of things (IoT)","volume":"10","author":"Szymanski","year":"2022","journal-title":"IEEE Access"},{"issue":"12","key":"10.1016\/j.future.2025.108102_bib0024","doi-asserted-by":"crossref","first-page":"12497","DOI":"10.1016\/j.aej.2022.06.029","article-title":"Quantum computing optimization technique for IoT platform using modified deep residual approach","volume":"61","author":"El-Aziz","year":"2022","journal-title":"Alex. Eng. J"},{"issue":"1","key":"10.1016\/j.future.2025.108102_bib0025","first-page":"1","article-title":"An intrusion detection system based on normalized mutual information antibodies feature selection and adaptive quantum artificial immune system","volume":"18","author":"Ling","year":"2022","journal-title":"Int. J. Semant. Web. Inf. Syst"},{"issue":"8","key":"10.1016\/j.future.2025.108102_bib0026","doi-asserted-by":"crossref","first-page":"436","DOI":"10.3390\/systems11080436","article-title":"VBQ-Net: a novel vectorization-based boost quantized network model for maximizing the security level of IoT system to prevent intrusions","volume":"11","author":"Perumal","year":"2023","journal-title":"Systems"},{"key":"10.1016\/j.future.2025.108102_bib0027","doi-asserted-by":"crossref","first-page":"13421","DOI":"10.1007\/s11227-023-05158-7","article-title":"QGA\u2013QGCNN: A model of quantum gate circuit neural network optimized by quantum genetic algorithm","volume":"79","author":"Gong","year":"2023","journal-title":"J. Supercomput"},{"issue":"1","key":"10.1016\/j.future.2025.108102_bib0028","first-page":"13","article-title":"Comparison of min-max normalization and Z-score normalization in the K-nearest neighbor (kNN) algorithm to test the accuracy of types of breast cancer","volume":"4","author":"Henderi","year":"2021","journal-title":"Int. J. Inform. Inf. Syst"},{"key":"10.1016\/j.future.2025.108102_bib0029","series-title":"Proc. Internat. Conf. MATHMOD","first-page":"2450","article-title":"A comparison of feature normalization techniques for PCA-based palmprint recognition","author":"\u0160truc","year":"2009"},{"issue":"12","key":"10.1016\/j.future.2025.108102_bib0030","doi-asserted-by":"crossref","first-page":"2719","DOI":"10.1049\/iet-ipr.2019.0899","article-title":"MapReduce framework based big data clustering using fractional integrated sparse fuzzy C means algorithm","volume":"14","author":"Kulkarni","year":"2020","journal-title":"IET Image Proc."},{"key":"10.1016\/j.future.2025.108102_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2019.105052","article-title":"Distributed multi-label feature selection using individual mutual information measures","volume":"188","author":"Gonzalez-Lopez","year":"2020","journal-title":"Knowl. Based. Syst"},{"issue":"17","key":"10.1016\/j.future.2025.108102_bib0032","doi-asserted-by":"crossref","first-page":"6391","DOI":"10.3390\/s22176391","article-title":"An improved entropy-weighted topsis method for decision-level fusion evaluation system of multi-source data","volume":"22","author":"Liu","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.future.2025.108102_bib0033","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2020.107804","article-title":"Feature selection using bare-bones particle swarm optimization with mutual information","volume":"112","author":"Song","year":"2021","journal-title":"Pattern Recognit"},{"key":"10.1016\/j.future.2025.108102_bib0034","article-title":"Retinal blood vessel segmentation using pixel-based feature vector","volume":"70","author":"Topta\u015f","year":"2021","journal-title":"Biomed. Signal Proc. Control"},{"issue":"1","key":"10.1016\/j.future.2025.108102_bib0035","first-page":"256","article-title":"Classification of EMG signal for multiple hand gestures based on neural network","volume":"17","author":"Abu","year":"2020","journal-title":"Indones. J. Electr. Eng. Comput. Sci"},{"issue":"2","key":"10.1016\/j.future.2025.108102_bib0036","first-page":"117","article-title":"Overview of Quantum computing in Quantum Neural network and Artificial intelligence","volume":"2","author":"Vasuki","year":"2023","journal-title":"Quing: Int. J. Innov. Res. Sci. Eng"},{"issue":"1","key":"10.1016\/j.future.2025.108102_bib0037","doi-asserted-by":"crossref","first-page":"808","DOI":"10.1038\/s41467-020-14454-2","article-title":"Training deep quantum neural networks","volume":"11","author":"Beer","year":"2020","journal-title":"Nat Commun"},{"key":"10.1016\/j.future.2025.108102_bib0038","series-title":"2021 IEEE\/ACM International Conference On Computer Aided Design (ICCAD)","first-page":"1","article-title":"Exploration of Quantum neural architecture by mixing Quantum Neuron designs: (Invited Paper)","author":"Wang","year":"2021"},{"key":"10.1016\/j.future.2025.108102_bib0039","doi-asserted-by":"crossref","DOI":"10.1016\/j.rineng.2023.101029","article-title":"Analyzing the impact of activation functions on the performance of the data-driven gait model","volume":"18","author":"Singh","year":"2023","journal-title":"Results Eng"},{"key":"10.1016\/j.future.2025.108102_bib0040","unstructured":"Z. Sobhaninia, S. Rezaei, A. Noroozi, M. Ahmadi, H. Zarrabi, N. Karimi, A. Emami, S. Samavi, Brain tumor segmentation using deep learning by type specific sorting of images, arXiv preprint arXiv:1809.07786. (2018). DOI: https:\/\/doi.org\/10.48550\/arXiv.1809.07786."},{"key":"10.1016\/j.future.2025.108102_bib0041","unstructured":"https:\/\/www.kaggle.com\/datasets\/galaxyh\/kdd-cup-1999-data."}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X25003966?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X25003966?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T05:48:27Z","timestamp":1761716907000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X25003966"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":41,"alternative-id":["S0167739X25003966"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2025.108102","relation":{},"ISSN":["0167-739X"],"issn-type":[{"type":"print","value":"0167-739X"}],"subject":[],"published":{"date-parts":[[2026,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Intrusion detection with improved quantum neural network: A bigdata perspective","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2025.108102","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"108102"}}