{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T21:27:18Z","timestamp":1765229238891,"version":"3.46.0"},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Knowledge-Based Systems"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1016\/j.knosys.2025.114718","type":"journal-article","created":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T22:24:28Z","timestamp":1760999068000},"page":"114718","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"PC","title":["Advanced detection and classification of bot attacks through multi-model ensemble learning for enhanced security in smart network infrastructures"],"prefix":"10.1016","volume":"330","author":[{"given":"G\u2024Janani Alias","family":"Pandeeswari","sequence":"first","affiliation":[]},{"given":"D.M.D.","family":"Preethi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.knosys.2025.114718_bib0001","doi-asserted-by":"crossref","first-page":"40682","DOI":"10.1109\/ACCESS.2024.3376400","article-title":"Hybrid machine learning model for efficient botnet attack detection in iot environment","volume":"12","author":"Ali","year":"2024","journal-title":"IEEe Access"},{"issue":"2","key":"10.1016\/j.knosys.2025.114718_bib0002","first-page":"811","article-title":"Enhancing energy efficiency and imbalance handling in botnet detection in IoT networks: a multi-stage feature reduction and weighted approach","volume":"17","author":"Krishnan","year":"2025","journal-title":"Int. J. Inf. Technol."},{"key":"10.1016\/j.knosys.2025.114718_bib0003","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2025.101621","article-title":"Memory-efficient and robust detection of Mirai botnet for future 6G-enabled IoT networks","author":"Alwaisi","year":"2025","journal-title":"Internet Things"},{"key":"10.1016\/j.knosys.2025.114718_bib0004","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.aej.2024.05.113","article-title":"A novel approach of botnet detection using hybrid deep learning for enhancing security in IoT networks","volume":"103","author":"Ali","year":"2024","journal-title":"Alex. Eng. J."},{"key":"10.1016\/j.knosys.2025.114718_bib0005","article-title":"Development of an intelligent intrusion detection system for IoT networks using deep learning","volume":"74","author":"Zhang","year":"2025","journal-title":"Discov. Internet Things"},{"issue":"3","key":"10.1016\/j.knosys.2025.114718_bib0006","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/s42979-024-02636-4","article-title":"An approach for detection of botnet based on machine learning classifier","volume":"5","author":"Tikekar","year":"2024","journal-title":"SN Comput. Sci."},{"issue":"17","key":"10.1016\/j.knosys.2025.114718_bib0007","article-title":"Machine learning-based DDOS Attack Detection and Mitigation in SDNs for IoT environments","volume":"361","author":"Kavitha","year":"2024","journal-title":"J. Frankl. Inst."},{"issue":"7","key":"10.1016\/j.knosys.2025.114718_bib0008","doi-asserted-by":"crossref","first-page":"1702","DOI":"10.1080\/01969722.2022.2145660","article-title":"IoT attack detection and mitigation with optimized deep learning techniques","volume":"55","author":"Brindha Devi","year":"2024","journal-title":"Cybern. Syst."},{"issue":"8","key":"10.1016\/j.knosys.2025.114718_bib0009","doi-asserted-by":"crossref","first-page":"1056","DOI":"10.1007\/s42979-024-03429-5","article-title":"Detection and classification of novel attacks and anomaly in IoT network using rule based deep learning model","volume":"5","author":"Chakraborty","year":"2024","journal-title":"SN Comput. Sci."},{"issue":"1","key":"10.1016\/j.knosys.2025.114718_bib0010","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1186\/s40537-024-00900-1","article-title":"B-CAT: a model for detecting botnet attacks using deep attack behavior analysis on network traffic flows","volume":"11","author":"Putra","year":"2024","journal-title":"J. Big. Data"},{"key":"10.1016\/j.knosys.2025.114718_bib0011","doi-asserted-by":"crossref","DOI":"10.1016\/j.rineng.2024.103171","article-title":"Xaiensembletl-iov: a new explainable artificial intelligence ensemble transfer learning for zero-day botnet attack detection in the internet of vehicles","volume":"24","author":"Saheed","year":"2024","journal-title":"Results Eng."},{"key":"10.1016\/j.knosys.2025.114718_bib0012","doi-asserted-by":"crossref","first-page":"35521","DOI":"10.1109\/ACCESS.2024.3371992","article-title":"Skipgatenet: a lightweight cnn-lstm hybrid model with learnable skip connections for efficient botnet attack detection in iot","volume":"12","author":"Alshehri","year":"2024","journal-title":"IEEe Access."},{"key":"10.1016\/j.knosys.2025.114718_bib0013","article-title":"Computationally efficient deep federated learning with optimized feature selection for iot botnet attack detection","volume":"25","author":"Danquah","year":"2025","journal-title":"Intell. Syst. Appl."},{"key":"10.1016\/j.knosys.2025.114718_bib0014","doi-asserted-by":"crossref","first-page":"8337","DOI":"10.1109\/ACCESS.2024.3352568","article-title":"Enhancing cybersecurity in the internet of things environment using bald eagle search optimization with hybrid deep learning","volume":"12","author":"Maghrabi","year":"2024","journal-title":"IEEe Access"},{"key":"10.1016\/j.knosys.2025.114718_bib0015","article-title":"Enhancing DDoS attack detection in IoT using PCA","volume":"25","author":"Dash","year":"2024","journal-title":"Egypt. Inform. J."},{"issue":"1","key":"10.1016\/j.knosys.2025.114718_bib0016","doi-asserted-by":"crossref","DOI":"10.1016\/j.jfranklin.2024.107440","article-title":"Intelligent parameter-based in-network IDS for IoT using UNSW-NB15 and BoT-IoT datasets","volume":"362","author":"Luqman","year":"2025","journal-title":"J. Frankl. Inst."},{"doi-asserted-by":"crossref","unstructured":"N. Kavitha, KR. Soundar, R. Karthick, J. Kohila. Automatic video captioning using tree hierarchical deep convolutional neural network and ASRNN-bi-directional LSTM. Computing. (2024) 106(11):3691-709.","key":"10.1016\/j.knosys.2025.114718_bib36","DOI":"10.1007\/s00607-024-01334-6"},{"issue":"4","key":"10.1016\/j.knosys.2025.114718_bib37","volume":"9","author":"Kiruthiga","year":"2024","journal-title":"Optimizing harmonic mitigation for smooth integration of renewable energy: A novel approach using atomic orbital search and feedback artificial tree control. Protection and Control of Modern Power Systems"},{"doi-asserted-by":"crossref","unstructured":"R. Karthick, M. Prabha, SR. Sabapathy, D. Jiju, RS. Selvan. Inspired by social-spider behavior for microwave filter optimization, swarm optimization algorithm. In2023 International Conference on New Frontiers in Communication, Automation, Management and Security (ICCAMS) (2023) (Vol. 1, pp. 1-4). IEEE.","key":"10.1016\/j.knosys.2025.114718_bib38","DOI":"10.1109\/ICCAMS60113.2023.10525828"},{"issue":"24","key":"10.1016\/j.knosys.2025.114718_bib0017","doi-asserted-by":"crossref","first-page":"38976","DOI":"10.1109\/JIOT.2024.3384374","article-title":"Explainable and data-efficient deep learning for enhanced attack detection in iiot ecosystem","volume":"11","author":"Attique","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.knosys.2025.114718_bib0018","article-title":"Intelligent detection framework for IoT-botnet detection: DBN-RNN with improved feature set","volume":"89","author":"Bobade","year":"2025","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.knosys.2025.114718_bib0019","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.123808","article-title":"Deep learning enabled intrusion detection system for industrial IOT environment","volume":"249","author":"Nandanwar","year":"2024","journal-title":"Expert. Syst. Appl."},{"key":"10.1016\/j.knosys.2025.114718_bib0020","doi-asserted-by":"crossref","first-page":"69397","DOI":"10.1109\/ACCESS.2024.3401853","article-title":"Tackling evolving botnet threats: a gradual self-training neural network approach","volume":"12","author":"Lo","year":"2024","journal-title":"IEEe Access."},{"issue":"4","key":"10.1016\/j.knosys.2025.114718_bib0021","doi-asserted-by":"crossref","first-page":"3549","DOI":"10.1007\/s10115-024-02322-0","article-title":"Machine learning and metaheuristic optimization algorithms for feature selection and botnet attack detection","volume":"67","author":"Maazalahi","year":"2025","journal-title":"Knowl. Inf. Syst."},{"issue":"1","key":"10.1016\/j.knosys.2025.114718_bib0022","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1186\/s42400-024-00307-8","article-title":"A privacy-enhanced framework with deep learning for botnet detection","volume":"18","author":"Wu","year":"2025","journal-title":"Cybersecurity"},{"key":"10.1016\/j.knosys.2025.114718_bib0023","first-page":"1","article-title":"Botnet detection through flow-based deep feature extraction and ensemble classification","volume":"27","author":"Geetha","year":"2025","journal-title":"J. Inst. Eng. (India): B"},{"issue":"3","key":"10.1016\/j.knosys.2025.114718_bib0024","doi-asserted-by":"crossref","first-page":"1467","DOI":"10.1007\/s12083-024-01657-3","article-title":"Security-aware IoT botnet attack detection framework using dilated and cascaded deep learning mechanism with conditional adversarial autoencoder-based features","volume":"17","author":"Sakthipriya","year":"2024","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"2","key":"10.1016\/j.knosys.2025.114718_bib0025","doi-asserted-by":"crossref","first-page":"e355","DOI":"10.1002\/spy2.355","article-title":"Botnet-based IoT network traffic analysis using deep learning","volume":"7","author":"Singh","year":"2024","journal-title":"Secur. Priv."},{"key":"10.1016\/j.knosys.2025.114718_bib0026","series-title":"2025 IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI)","first-page":"1","article-title":"An ensembled multi-model approach for multi-class classification of attacks in network intrusion detection systems","volume":"3","author":"Gupta","year":"2025"},{"key":"10.1016\/j.knosys.2025.114718_bib0027","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.125919","article-title":"A neighborhood rough sets-based ensemble method, with application to software fault prediction","volume":"264","author":"Jiang","year":"2025","journal-title":"Expert. Syst. Appl."},{"key":"10.1016\/j.knosys.2025.114718_bib0028","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1016\/j.ins.2022.07.130","article-title":"A random approximate reduct-based ensemble learning approach and its application in software defect prediction","volume":"609","author":"Jiang","year":"2022","journal-title":"Inf Sci (Ny)"},{"unstructured":"https:\/\/www.kaggle.com\/datasets\/vigneshvenkateswaran\/bot-iot.","key":"10.1016\/j.knosys.2025.114718_bib0029"},{"issue":"2","key":"10.1016\/j.knosys.2025.114718_bib0030","article-title":"Bellman filtering and smoothing for state\u2013space models","volume":"238","author":"Lange","year":"2024","journal-title":"J Econ."},{"issue":"9","key":"10.1016\/j.knosys.2025.114718_bib0035","doi-asserted-by":"crossref","first-page":"2895","DOI":"10.3390\/s24092895","article-title":"Hybrid anomaly detection in time series by combining kalman filters and machine learning models","volume":"24","author":"Puder","year":"2024","journal-title":"Sensors"},{"issue":"1","key":"10.1016\/j.knosys.2025.114718_bib0031","article-title":"Smart Societal optimization-based deep learning convolutional neural network model for epileptic seizure prediction","volume":"12","author":"Sonawane","year":"2024","journal-title":"Comput. Methods Biomech. Biomed. Eng.: Imaging Vis."},{"issue":"4","key":"10.1016\/j.knosys.2025.114718_bib0032","doi-asserted-by":"crossref","first-page":"4254","DOI":"10.1109\/TDSC.2023.3348760","article-title":"vcnn: verifiable convolutional neural network based on zk-snarks","volume":"21","author":"Lee","year":"2024","journal-title":"IEEe Trans. Dependable Secure Comput."},{"key":"10.1016\/j.knosys.2025.114718_bib0033","doi-asserted-by":"crossref","DOI":"10.1016\/j.jcp.2023.112704","article-title":"Viscoelastic constitutive artificial neural networks (vCANNs)\u2013A framework for data-driven anisotropic nonlinear finite viscoelasticity","volume":"499","author":"Abdolazizi","year":"2024","journal-title":"J. Comput. Phys."},{"key":"10.1016\/j.knosys.2025.114718_bib0034","article-title":"Pixel-associated autoencoder for hyperspectral anomaly detection","volume":"129","author":"Xiang","year":"2024","journal-title":"Int. J. Appl. Earth Obs. Geoinf."}],"container-title":["Knowledge-Based Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705125017575?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705125017575?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T19:35:01Z","timestamp":1765222501000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950705125017575"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":38,"alternative-id":["S0950705125017575"],"URL":"https:\/\/doi.org\/10.1016\/j.knosys.2025.114718","relation":{},"ISSN":["0950-7051"],"issn-type":[{"type":"print","value":"0950-7051"}],"subject":[],"published":{"date-parts":[[2025,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Advanced detection and classification of bot attacks through multi-model ensemble learning for enhanced security in smart network infrastructures","name":"articletitle","label":"Article Title"},{"value":"Knowledge-Based Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.knosys.2025.114718","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"114718"}}