{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T23:20:29Z","timestamp":1773962429797,"version":"3.50.1"},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:00:00Z","timestamp":1770336000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.future.2026.108422","type":"journal-article","created":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T16:03:22Z","timestamp":1770307402000},"page":"108422","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["ZAD-ML: Dual-layer Learning for zero-Day attack detection in multivariate time series"],"prefix":"10.1016","volume":"180","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2911-8112","authenticated-orcid":false,"given":"Edward Kwadwo","family":"Boahen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2115-6269","authenticated-orcid":false,"given":"Ahmad","family":"Salehi Shahraki","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.future.2026.108422_bib0001","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.111507","article-title":"Transformer-based multivariate time series anomaly detection using inter-variable attention mechanism","author":"Kang","year":"2024","journal-title":"Knowl. Based Syst."},{"key":"10.1016\/j.future.2026.108422_bib0002","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.111671","article-title":"Multivariate time series anomaly detection via separation, decomposition, and dual transformer-based autoencoder","author":"Fu","year":"2024","journal-title":"Appl Soft Comp."},{"key":"10.1016\/j.future.2026.108422_bib0003","first-page":"1","article-title":"RACEMAN: cross-platform intrusion detection in online social networks","author":"Boahen","year":"2025","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.future.2026.108422_bib0004","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119914","article-title":"Refining one-class representation: a unified transformer for unsupervised time-series anomaly detection","volume":"656","author":"Zhong","year":"2024","journal-title":"Inf. Sci. (Ny)"},{"key":"10.1016\/j.future.2026.108422_bib0005","series-title":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","first-page":"41","article-title":"STL-ConvTransformer: series decomposition and convolution-infused transformer architecture in multivariate time series anomaly detection","author":"Wu","year":"2024"},{"key":"10.1016\/j.future.2026.108422_bib0006","doi-asserted-by":"crossref","DOI":"10.1109\/TFUZZ.2024.3449769","article-title":"Long-term multivariate time series forecasting model based on Gaussian fuzzy information granules","author":"Zhu","year":"2024","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"10.1016\/j.future.2026.108422_bib0007","doi-asserted-by":"crossref","DOI":"10.1109\/TFUZZ.2024.3393622","article-title":"A fuzzy c-means clustering-based hybrid multivariate time series prediction framework with feature selection","author":"Zhan","year":"2024","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"10.1016\/j.future.2026.108422_bib0008","article-title":"Securing cross-domain data access with decentralized attribute-based access control","volume":"173","author":"Shahraki","year":"2025","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.future.2026.108422_bib0009","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.110049","article-title":"DACP: enforcing a dynamic access control policy in cross-domain environments","volume":"237","author":"Salehi","year":"2023","journal-title":"Comput. Netw."},{"key":"10.1016\/j.future.2026.108422_bib0010","article-title":"Leveraging blockchain and federated learning in edge-Fog-Cloud computing environments for intelligent decision-making with ECG data in IoT","volume":"233","author":"Rajagopal","year":"2025","journal-title":"J. Netw. Comp. Appl."},{"key":"10.1016\/j.future.2026.108422_bib0011","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.111912","article-title":"AFMF: time series anomaly detection framework with modified forecasting","author":"Shen","year":"2024","journal-title":"Knowl. Based Syst."},{"key":"10.1016\/j.future.2026.108422_bib0012","first-page":"1","article-title":"Calibrated one-class classification for unsupervised time series anomaly detection","author":"Xu","year":"2024","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"10.1016\/j.future.2026.108422_bib0013","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/s10618-023-00948-2","article-title":"Improving position encoding of transformers for multivariate time series classification","volume":"38","author":"Foumani","year":"2024","journal-title":"Data Min. Knowl. Discov."},{"key":"10.1016\/j.future.2026.108422_bib0014","first-page":"1","article-title":"Dual-constraint autoencoder and adaptive weighted similarity spatial attention for unsupervised anomaly detection","author":"Zhang","year":"2024","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.future.2026.108422_bib0015","doi-asserted-by":"crossref","DOI":"10.1145\/3663573","article-title":"Variate associated domain adaptation for unsupervised multivariate time series anomaly detection","author":"He","year":"2024","journal-title":"ACM Trans. Knowl. Discov. Data"},{"issue":"12","key":"10.1016\/j.future.2026.108422_bib0016","doi-asserted-by":"crossref","first-page":"16006","DOI":"10.1109\/TITS.2023.3286611","article-title":"Deep learning-based anomaly detection for connected autonomous vehicles using spatiotemporal information","volume":"24","author":"Mansourian","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.future.2026.108422_bib0017","first-page":"1","article-title":"Improving logic bomb identification in android apps via context-aware anomaly detection","author":"Alecci","year":"2024","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"key":"10.1016\/j.future.2026.108422_bib0018","doi-asserted-by":"crossref","unstructured":"S. Tuli, G. Casale, N.R. Jennings, Tranad: deep transformer networks for anomaly detection in multivariate time series data,(2022). arXiv prep. arXiv.2201.07284.","DOI":"10.14778\/3514061.3514067"},{"key":"10.1016\/j.future.2026.108422_bib0019","article-title":"Collaborative device-level botnet detection for internet of things","volume":"129","author":"Nasir","year":"2023","journal-title":"Comp. Sec."},{"key":"10.1016\/j.future.2026.108422_bib0020","article-title":"RT-APT: a real-time APT anomaly detection method for large-scale provenance graph","volume":"233","author":"Weng","year":"2025","journal-title":"J. Netw. Comp. Appl."},{"key":"10.1016\/j.future.2026.108422_bib0021","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.1109\/TIFS.2023.3240025","article-title":"Rtrap: trapping and containing ransomware with machine learning","volume":"18","author":"Ganfure","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.future.2026.108422_bib0022","first-page":"1","article-title":"Label-free multivariate time series anomaly detection","author":"Zhou","year":"2024","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.future.2026.108422_bib0023","doi-asserted-by":"crossref","first-page":"2356","DOI":"10.1109\/TIFS.2024.3349869","article-title":"On model outsourcing adaptive attacks to deep learning backdoor defenses","volume":"19","author":"Peng","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"10.1016\/j.future.2026.108422_bib0024","doi-asserted-by":"crossref","first-page":"3900","DOI":"10.1109\/TNSM.2023.3251282","article-title":"Automated, reliable zero-day malware detection based on autoencoding architecture","volume":"20","author":"Kim","year":"2023","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"4","key":"10.1016\/j.future.2026.108422_bib0025","doi-asserted-by":"crossref","first-page":"2944","DOI":"10.1109\/TNSM.2025.3564387","article-title":"Statavg: mitigating data heterogeneity in federated learning for intrusion detection systems","volume":"22","author":"Bouzinis","year":"2025","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"10.1016\/j.future.2026.108422_bib0026","unstructured":"J. Xu, Anomaly transformer: time series anomaly detection with association discrepancy, (2021). arXiv: 2110.02642."},{"key":"10.1016\/j.future.2026.108422_bib0027","series-title":"International Conference on Machine Learning","first-page":"19407","article-title":"Prototype-oriented unsupervised anomaly detection for multivariate time series","author":"Li","year":"2023"},{"key":"10.1016\/j.future.2026.108422_bib0028","series-title":"Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","first-page":"3033","article-title":"Dcdetector: dual attention contrastive representation learning for time series anomaly detection","author":"Yang","year":"2023"},{"key":"10.1016\/j.future.2026.108422_bib0029","article-title":"Long-term time series forecasting with multi-linear trend fuzzy information granules for LSTM in a periodic framework","author":"Zhu","year":"2023","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"10.1016\/j.future.2026.108422_bib0030","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1016\/j.procs.2024.03.285","article-title":"Towards detection of network anomalies using machine learning algorithms on the NSL-KDD benchmark datasets","volume":"233","author":"Vibhute","year":"2024","journal-title":"Proc. Comput. Sci."},{"issue":"1","key":"10.1016\/j.future.2026.108422_bib0031","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1049\/ntw2.12098","article-title":"Evaluating the impact of generative adversarial models on the performance of anomaly intrusion detection","volume":"13","author":"Arafah","year":"2024","journal-title":"IET Netw."},{"issue":"3","key":"10.1016\/j.future.2026.108422_bib0032","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0300821","article-title":"Anomaly based multi-stage attack detection method","volume":"19","author":"Ma","year":"2024","journal-title":"Plos one"},{"issue":"1","key":"10.1016\/j.future.2026.108422_bib0033","first-page":"1","article-title":"An efficient anomaly detection system in IoT edge using chi square-improved particle swarm optimization feature selection with ensemble classifiers","volume":"16","author":"Manokaran","year":"2024","journal-title":"Int. J. Comp. Digit. Syst."},{"issue":"3","key":"10.1016\/j.future.2026.108422_bib0034","first-page":"73","article-title":"Deep learning for intrusion detection systems (IDSs) in time series data","volume":"16","author":"Psychogyios","year":"2024","journal-title":"Fut. Int."},{"issue":"1","key":"10.1016\/j.future.2026.108422_bib0035","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/s44163-024-00120-9","article-title":"Self-healing hybrid intrusion detection system: an ensemble machine learning approach","volume":"4","author":"Kushal","year":"2024","journal-title":"Disc. Artif. Intell."},{"key":"10.1016\/j.future.2026.108422_bib0036","doi-asserted-by":"crossref","DOI":"10.1145\/3659575","article-title":"Applying generative machine learning to intrusion detection: a systematic mapping study and review","author":"Halvorsen","year":"2024","journal-title":"ACM Comp. Surv."},{"key":"10.1016\/j.future.2026.108422_bib0037","doi-asserted-by":"crossref","first-page":"1475","DOI":"10.1109\/TIFS.2025.3530702","article-title":"TCG-IDS : robust network intrusion detection via temporal contrastive graph learning","volume":"20","author":"Wu","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.future.2026.108422_bib0038","doi-asserted-by":"crossref","first-page":"3204","DOI":"10.1109\/TIFS.2025.3551643","article-title":"A-NIDS: adaptive network intrusion detection system based on clustering and stacked CTGAN","volume":"20","author":"Zha","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.future.2026.108422_bib0039","doi-asserted-by":"crossref","first-page":"5895","DOI":"10.1109\/TIFS.2024.3402439","article-title":"RFG-HELAD: a robust fine-grained network traffic anomaly detection model based on heterogeneous ensemble learning","volume":"19","author":"Zhong","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.future.2026.108422_bib0040","series-title":"2025 Information Science Frontier Forum and the Academic Conference on Information Security and Intelligent Control (ISF)","first-page":"1","article-title":"A hybrid framework for lithium-ion battery capacity prediction using timesnet and transformer","author":"Wu","year":"2025"}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X26000567?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X26000567?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T20:21:35Z","timestamp":1773951695000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X26000567"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":40,"alternative-id":["S0167739X26000567"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2026.108422","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"ZAD-ML: Dual-layer Learning for zero-Day attack detection in multivariate time series","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2026.108422","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"108422"}}