{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T00:05:01Z","timestamp":1758758701225,"version":"3.44.0"},"reference-count":25,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T00:00:00Z","timestamp":1736726400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1016\/j.hcc.2025.100298","type":"journal-article","created":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T17:23:48Z","timestamp":1736961828000},"page":"100298","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced Meta-IDS: Adaptive multi-stage IDS with sequential model adjustments"],"prefix":"10.1016","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5636-5808","authenticated-orcid":false,"given":"Nadia","family":"Niknami","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7598-1941","authenticated-orcid":false,"given":"Vahid","family":"Mahzoon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5884-6293","authenticated-orcid":false,"given":"Slobadan","family":"Vucetic","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jie","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.hcc.2025.100298_b1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection: A survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.hcc.2025.100298_b2","article-title":"Network intrusion detection system: A systematic study of machine learning and deep learning approaches","volume":"32","author":"Ahmad","year":"2021","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"10.1016\/j.hcc.2025.100298_b3","article-title":"A survey of intrusion detection techniques on software-defined networking","author":"Ahmad","year":"2021","journal-title":"Intl. J. Innov. Sci. Res. Technol."},{"key":"10.1016\/j.hcc.2025.100298_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102600","article-title":"An efficient network behavior anomaly detection using a hybrid DBN-LSTM network","volume":"114","author":"Chen","year":"2022","journal-title":"Comput. Secur."},{"key":"10.1016\/j.hcc.2025.100298_b5","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.neucom.2022.03.007","article-title":"ABL-TC: A lightweight design for network traffic classification empowered by deep learning","volume":"489","author":"Wei","year":"2022","journal-title":"Neurocomputing"},{"key":"10.1016\/j.hcc.2025.100298_b6","series-title":"1st IEEE International Conference on Meta Computing","article-title":"Meta-IDS: A multi-stage deep intrusion detection system with optimal CPU usage","author":"Niknami","year":"2024"},{"year":"2016","series-title":"Deep learning","author":"Goodfellow","key":"10.1016\/j.hcc.2025.100298_b7"},{"key":"10.1016\/j.hcc.2025.100298_b8","series-title":"Proceedings of the 32nd ACM International Conference on Information and Knowledge Management","first-page":"1897","article-title":"Contrastive learning of temporal distinctiveness for survival analysis in electronic health records","author":"Nayebi\u00a0Kerdabadi","year":"2023"},{"key":"10.1016\/j.hcc.2025.100298_b9","doi-asserted-by":"crossref","DOI":"10.1109\/TIFS.2024.3468632","article-title":"Cyber-AnDe: Cybersecurity framework with adaptive distributed sampling for anomaly detection on SDNs","author":"Niknami","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.hcc.2025.100298_b10","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2020.107688","article-title":"A kangaroo-based intrusion detection system on software-defined networks","volume":"184","author":"Yazdinejadna","year":"2021","journal-title":"Comput. Netw."},{"key":"10.1016\/j.hcc.2025.100298_b11","doi-asserted-by":"crossref","first-page":"9960","DOI":"10.1109\/JIOT.2021.3119055","article-title":"A novel intrusion detection method based on lightweight neural network for internet of things","volume":"9","author":"Zhao","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.hcc.2025.100298_b12","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.117671","article-title":"A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning","volume":"206","author":"Wang","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.hcc.2025.100298_b13","series-title":"Proc. of the IEEE Intl. Conf. on Communications","first-page":"3000","article-title":"A lightweight approach for network intrusion detection based on self-knowledge distillation","author":"Yang","year":"2023"},{"key":"10.1016\/j.hcc.2025.100298_b14","first-page":"1","article-title":"MetaCluster: a universal interpretable classification framework for cybersecurity","author":"Ge","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.hcc.2025.100298_b15","series-title":"IEEE 49th Conference on Local Computer Networks","first-page":"1","article-title":"PTN-IDS: Prototypical network solution for the few-shot detection in intrusion detection systems","author":"Niknami","year":"2024"},{"key":"10.1016\/j.hcc.2025.100298_b16","series-title":"Proc. of the IEEE Intl. Conf. on Networking and Advanced Systems","first-page":"1","article-title":"A multi-agent system based on dynamic load balancing for collaborative intrusion detection","author":"Hocine","year":"2023"},{"key":"10.1016\/j.hcc.2025.100298_b17","series-title":"Proc. of the IEEE Conf. on Communications and Network Security","first-page":"264","article-title":"Enhancing load balancing by intrusion detection system chain on SDN data plane","author":"Niknami","year":"2022"},{"key":"10.1016\/j.hcc.2025.100298_b18","doi-asserted-by":"crossref","DOI":"10.1109\/TNSM.2023.3259474","article-title":"A novel multi-stage approach for hierarchical intrusion detection","author":"Verkerken","year":"2023","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.hcc.2025.100298_b19","series-title":"Proc. of the IEEE Conf. on Communications and Network Security","article-title":"CrossAlert: Enhancing multi-stage attack detection through semantic embedding of alerts across targeted domain","author":"Niknami","year":"2024"},{"key":"10.1016\/j.hcc.2025.100298_b20","article-title":"Meta computing","author":"Cheng","year":"2023","journal-title":"IEEE Netw."},{"key":"10.1016\/j.hcc.2025.100298_b21","article-title":"Task assignment and capacity allocation for ML-based intrusion detection in resource-constrained edge networks","author":"Liu","year":"2022","journal-title":"IEEE Xplore"},{"key":"10.1016\/j.hcc.2025.100298_b22","article-title":"Fair resource allocation in an intrusion-detection system for edge computing","author":"Gupta","year":"2018","journal-title":"IEEE Xplore"},{"key":"10.1016\/j.hcc.2025.100298_b23","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/s00521-013-1368-0","article-title":"A review of feature selection methods based on mutual information","volume":"24","author":"Vergara","year":"2014","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.hcc.2025.100298_b24","doi-asserted-by":"crossref","first-page":"1226","DOI":"10.1109\/TPAMI.2005.159","article-title":"Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy","volume":"27","author":"Peng","year":"2005","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.hcc.2025.100298_b25","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/MCS.2018.2810460","article-title":"Data-driven sparse sensor placement for reconstruction: Demonstrating the benefits of exploiting known patterns","volume":"38","author":"Manohar","year":"2018","journal-title":"IEEE Control Syst. Mag."}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295225000029?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295225000029?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T04:28:28Z","timestamp":1758688108000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295225000029"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["S2667295225000029"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2025.100298","relation":{},"ISSN":["2667-2952"],"issn-type":[{"type":"print","value":"2667-2952"}],"subject":[],"published":{"date-parts":[[2025,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Enhanced Meta-IDS: Adaptive multi-stage IDS with sequential model adjustments","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2025.100298","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100298"}}