{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T16:41:11Z","timestamp":1765557671076,"version":"3.48.0"},"reference-count":43,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Knowledge-Based Systems"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1016\/j.knosys.2025.114812","type":"journal-article","created":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T16:02:00Z","timestamp":1762012920000},"page":"114812","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Anomaly detection based self-healing mechanism using dynamic diffusion spatial-temporal graph convolutional network in industrial IoT"],"prefix":"10.1016","volume":"331","author":[{"given":"Sudhakar","family":"K","sequence":"first","affiliation":[]},{"given":"Arun Kumar","family":"N","sequence":"additional","affiliation":[]},{"given":"Archana R","family":"A","sequence":"additional","affiliation":[]},{"given":"Sivakumar","family":"N","sequence":"additional","affiliation":[]},{"given":"Vocaturo","family":"E","sequence":"additional","affiliation":[]},{"given":"Sai Kiran","family":"Oruganti","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.knosys.2025.114812_bib0001","doi-asserted-by":"crossref","first-page":"1037","DOI":"10.1109\/TGCN.2024.3403102","article-title":"Anomaly detection algorithm of industrial internet of things data platform based on deep learning","volume":"8","author":"Li","year":"2024","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"10.1016\/j.knosys.2025.114812_bib0002","doi-asserted-by":"crossref","first-page":"34720","DOI":"10.1109\/ACCESS.2024.3371996","article-title":"SmartSentry: cyber threat intelligence in industrial IoT","volume":"12","author":"Sadhwani","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.knosys.2025.114812_bib0003","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.aej.2025.02.004","article-title":"Leveraging sparrow search optimization with deep learning-based cybersecurity detection in industrial internet of things environment","volume":"121","author":"Alrayes","year":"2025","journal-title":"Alex. Eng. J."},{"key":"10.1016\/j.knosys.2025.114812_bib0004","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101280","article-title":"Real-time AIoT anomaly detection for industrial diesel generator based an efficient deep learning CNN-LSTM in industry 4.0","volume":"27","author":"Nguyen-Da","year":"2024","journal-title":"Internet Things"},{"issue":"5","key":"10.1016\/j.knosys.2025.114812_bib0005","doi-asserted-by":"crossref","first-page":"6491","DOI":"10.1007\/s10586-024-04303-y","article-title":"Enhanced pelican optimization algorithm with ensemble-based anomaly detection in industrial internet of things environment","volume":"27","author":"Chander","year":"2024","journal-title":"Clust. Comput."},{"year":"2025","series-title":"Intrusion Detection and Prevention System (IDPS) Model for IIoT Environments Using Hybridized Framework","author":"Srinivasan","key":"10.1016\/j.knosys.2025.114812_bib0006"},{"key":"10.1016\/j.knosys.2025.114812_bib0007","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.104130","article-title":"An explainable unsupervised anomaly detection framework for industrial internet of things","volume":"148","author":"Abudurexiti","year":"2025","journal-title":"Comput. Secur."},{"issue":"3","key":"10.1016\/j.knosys.2025.114812_bib0008","doi-asserted-by":"crossref","first-page":"3639","DOI":"10.1007\/s10586-023-04163-y","article-title":"A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things","volume":"27","author":"Souri","year":"2024","journal-title":"Clust. Comput."},{"issue":"7","key":"10.1016\/j.knosys.2025.114812_bib0009","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1007\/s42452-024-06044-4","article-title":"Development of lightweight intrusion model in Industrial Internet of Things using deep learning technique","volume":"6","author":"Sinha","year":"2024","journal-title":"Discov. Appl. Sci."},{"key":"10.1016\/j.knosys.2025.114812_bib0010","first-page":"1","article-title":"An unsupervised machine learning algorithm for attack and anomaly detection in IoT sensors","author":"Alangari","year":"2024","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.knosys.2025.114812_bib0011","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.aej.2024.03.106","article-title":"Enhancing electrical panel anomaly detection for predictive maintenance with machine learning and IoT","volume":"96","author":"Pek\u015fen","year":"2024","journal-title":"Alex. Eng. J."},{"issue":"7","key":"10.1016\/j.knosys.2025.114812_bib0012","first-page":"3519","article-title":"Bearing anomaly detection in an air compressor using an LSTM and RNN-based machine learning model","volume":"134","author":"Joung","year":"2024","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"10.1016\/j.knosys.2025.114812_bib0013","article-title":"Intrusion detection approach for industrial Internet of Things traffic using deep recurrent reinforcement learning assisted federated learning","author":"Kaur","year":"2024","journal-title":"IEEE Trans. Artif. Intell."},{"issue":"13","key":"10.1016\/j.knosys.2025.114812_bib0014","doi-asserted-by":"crossref","first-page":"22869","DOI":"10.1109\/JIOT.2024.3358871","article-title":"Intelligent bearing anomaly detection for industrial Internet of Things based on auto-encoder Wasserstein generative adversarial network","volume":"11","author":"Liu","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.knosys.2025.114812_bib0015","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1016\/j.aej.2024.10.009","article-title":"Artificial intelligence driven cyberattack detection system using integration of deep belief network with convolution neural network on industrial IoT","volume":"110","author":"Ragab","year":"2025","journal-title":"Alex. Eng. J."},{"year":"2024","series-title":"An Edge Computing-Based Preventive Framework With Machine Learning-Integration For Anomaly Detection and Risk Management in Maritime Wireless Communications","author":"Algarni","key":"10.1016\/j.knosys.2025.114812_bib0016"},{"issue":"13","key":"10.1016\/j.knosys.2025.114812_bib0017","doi-asserted-by":"crossref","first-page":"18325","DOI":"10.1007\/s11227-024-06153-2","article-title":"A federated learning approach to network intrusion detection using residual networks in industrial IoT networks","volume":"80","author":"Chaurasia","year":"2024","journal-title":"J Supercomput."},{"issue":"1","key":"10.1016\/j.knosys.2025.114812_bib0018","doi-asserted-by":"crossref","DOI":"10.1049\/cps2.70015","article-title":"CIDER: cyber-security in industrial IoT using deep learning and ring learning with errors","volume":"10","author":"Tsoi","year":"2025","journal-title":"IET Cyber-Phys. Syst.: Theory Appl."},{"key":"10.1016\/j.knosys.2025.114812_bib0019","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.104191","article-title":"Trust my IDS: an explainable AI integrated deep learning-based transparent threat detection system for industrial networks","volume":"149","author":"Shoukat","year":"2025","journal-title":"Comput. Secur."},{"volume":"29","year":"2025","author":"Rodr\u00edguez","key":"10.1016\/j.knosys.2025.114812_bib0020"},{"key":"10.1016\/j.knosys.2025.114812_bib0021","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119169","article-title":"Blockchain and digital twin empowered trustworthy self-healing for edge-AI enabled industrial internet of things","volume":"642","author":"Feng","year":"2023","journal-title":"Inf Sci (Ny)"},{"year":"2025","series-title":"Multi-stage Deep Learning For Intrusion Detection in Industrial Internet of Things","author":"Popoola","key":"10.1016\/j.knosys.2025.114812_bib0022"},{"key":"10.1016\/j.knosys.2025.114812_bib0023","series-title":"Integrated Genetic Algorithm and Deep Learning Approach For Effective Cyber-Attack detection and Classification in Industrial Internet of Things (IIoT) Environments","first-page":"1","author":"Alkhafaji","year":"2024"},{"volume":"28","year":"2024","author":"Cherfi","key":"10.1016\/j.knosys.2025.114812_bib0024"},{"key":"10.1016\/j.knosys.2025.114812_bib0025","first-page":"1","article-title":"Enhancing network security in industrial IoT environments: a DeepCLG hybrid learning model for cyberattack detection","author":"Gulzar","year":"2025","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"10.1016\/j.knosys.2025.114812_bib0026","first-page":"1","article-title":"Deep learning-based stacked models for cyber-attack detection in industrial internet of things","author":"Wu","year":"2025","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.knosys.2025.114812_bib0027","doi-asserted-by":"crossref","first-page":"45762","DOI":"10.1109\/ACCESS.2024.3380816","article-title":"A self-attention-based deep convolutional neural networks for IIoT networks intrusion detection","volume":"12","author":"Alshehri","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.knosys.2025.114812_bib0028","doi-asserted-by":"crossref","unstructured":"Shahin, M., Maghanaki, M., Hosseinzadeh, A. and Chen, F.F., 2024. Advancing network security in industrial IoT: a deep dive into AI-enabled intrusion detection systems. Advanced Engineering Informatics, 62, p.102685.","DOI":"10.1016\/j.aei.2024.102685"},{"key":"10.1016\/j.knosys.2025.114812_bib0029","unstructured":"https:\/\/www.cse.wustl.edu\/~jain\/iiot2\/index.html."},{"key":"10.1016\/j.knosys.2025.114812_bib0030","unstructured":"https:\/\/www.kaggle.com\/datasets\/francoisxa\/ds2ostraffictraces."},{"key":"10.1016\/j.knosys.2025.114812_bib0031","article-title":"Data-driven dynamic State estimation of photovoltaic systems via sparse regression unscented Kalman filter","author":"Jamalinia","year":"2024","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"2","key":"10.1016\/j.knosys.2025.114812_bib0032","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s40747-024-01769-6","article-title":"Short-term urban traffic forecasting in smart cities: a dynamic diffusion spatial-temporal graph convolutional network","volume":"11","author":"Yin","year":"2025","journal-title":"Complex Intell. Syst."},{"issue":"5","key":"10.1016\/j.knosys.2025.114812_bib0033","doi-asserted-by":"crossref","first-page":"3641","DOI":"10.1007\/s00521-024-10694-1","article-title":"Starfish optimization algorithm (SFOA): a bio-inspired metaheuristic algorithm for global optimization compared with 100 optimizers","volume":"37","author":"Zhong","year":"2025","journal-title":"Neural Comput. Appl."},{"year":"2024","series-title":"Proof of Trust and Expertise (PoTE): A novel Consensus Mechanism For Enhanced Security and Scalability in Electronic Health Record Management","author":"Rahman","key":"10.1016\/j.knosys.2025.114812_bib0034"},{"issue":"5","key":"10.1016\/j.knosys.2025.114812_bib0035","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/07366981.2025.2454095","article-title":"Enhancing IoT security through blockchain an in-depth analysis of the proof-of-work consensus mechanism","volume":"70","author":"Maadallah","year":"2025","journal-title":"EDPACS"},{"key":"10.1016\/j.knosys.2025.114812_bib0036","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2023.102027","article-title":"POS-GIFT: a geometric and intensity-invariant feature transformation for multimodal images","volume":"102","author":"Hou","year":"2024","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.knosys.2025.114812_bib0037","doi-asserted-by":"crossref","DOI":"10.1016\/j.future.2024.07.007","article-title":"DBPBFT: a hierarchical PBFT consensus algorithm with dual blockchain for IoT","volume":"162","author":"Wu","year":"2025","journal-title":"Future Gener. Comput. Syst."},{"year":"2025","series-title":"Intrusion Detection in IoT Networks Using Dynamic Graph Modeling and Graph-Based Neural Networks","author":"Villegas-Ch","key":"10.1016\/j.knosys.2025.114812_bib0038"},{"key":"10.1016\/j.knosys.2025.114812_bib0039","article-title":"FTG-net-E: a hierarchical ensemble graph neural network for DDoS attack detection","volume":"250","author":"Bakar","year":"2024","journal-title":"Comput. Netw."},{"issue":"4","key":"10.1016\/j.knosys.2025.114812_bib0040","first-page":"2705","article-title":"Enhancing IoT intrusion detection system with modified E-GraphSAGE: a graph neural network approach","volume":"16","author":"Mirlashari","year":"2024","journal-title":"Int. J. Inf. Technol."},{"issue":"3","key":"10.1016\/j.knosys.2025.114812_bib41","doi-asserted-by":"crossref","first-page":"2733","DOI":"10.1007\/s11277-017-4998-1","article-title":"Network selection in wireless heterogeneous environment by CPF hybrid algorithm","volume":"98","author":"Ahuja","year":"2018","journal-title":"Wirel. Pers. Commun."},{"issue":"3","key":"10.1016\/j.knosys.2025.114812_bib42","doi-asserted-by":"crossref","first-page":"2839","DOI":"10.1007\/s11277-021-09032-8","article-title":"Compact sub-6 GHz and mmWave 5G wideband 2\u00d7 1 MIMO antenna with high isolation using parasitically placed double negative (DNG) isolator","volume":"122","author":"Sharma","year":"2022","journal-title":"Wire. Pers. Commun."},{"issue":"11","key":"10.1016\/j.knosys.2025.114812_bib43","doi-asserted-by":"crossref","first-page":"2491","DOI":"10.1002\/mop.31924","article-title":"Design and development of low radar cross section antenna using hybrid metamaterial absorber","volume":"61","author":"Sharma","year":"2019","journal-title":"Micro. Optical Technol. Lett."}],"container-title":["Knowledge-Based Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705125018507?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705125018507?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T16:27:16Z","timestamp":1765556836000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950705125018507"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":43,"alternative-id":["S0950705125018507"],"URL":"https:\/\/doi.org\/10.1016\/j.knosys.2025.114812","relation":{},"ISSN":["0950-7051"],"issn-type":[{"type":"print","value":"0950-7051"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Anomaly detection based self-healing mechanism using dynamic diffusion spatial-temporal graph convolutional network in industrial IoT","name":"articletitle","label":"Article Title"},{"value":"Knowledge-Based Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.knosys.2025.114812","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"114812"}}