{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T08:43:19Z","timestamp":1766306599870,"version":"3.48.0"},"reference-count":28,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T00:00:00Z","timestamp":1758412800000},"content-version":"vor","delay-in-days":263,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1016\/j.procs.2025.09.255","type":"journal-article","created":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T22:13:24Z","timestamp":1762467204000},"page":"1341-1350","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Comprehensive Comparison of Streaming Clustering-Based IDS: Evaluation Across Clustering Families with a Novel Ensemble Classifier"],"prefix":"10.1016","volume":"270","author":[{"given":"Bilel","family":"Saghrouchni","sequence":"first","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric Le","family":"Mou\u00ebl","sequence":"additional","affiliation":[]},{"given":"Bogdan","family":"Szanto","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2025.09.255_bib1","article-title":"Traffic anomaly detection using k-means clustering","volume":"7","author":"M\u00fcnz","year":"2007","journal-title":"in: Gi\/itg workshop mmbnet, Vol."},{"key":"10.1016\/j.procs.2025.09.255_bib2","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.knosys.2015.01.009","article-title":"Cann: An intrusion detection system based on combining cluster centers and nearest neighbors","volume":"78","author":"Lin","year":"2015","journal-title":"Knowledge-Based Systems"},{"key":"10.1016\/j.procs.2025.09.255_bib3","doi-asserted-by":"crossref","unstructured":"S. Rezvy, Y. Luo, M. Petridis, A. Lasebae, T. Zebin, An efficient deep learning model for intrusion classification and prediction in 5g and iot networks, in: 2019 53rd Annual Conference on information sciences and systems (CISS), IEEE, 2019, pp. 1\u20136.","DOI":"10.1109\/CISS.2019.8693059"},{"key":"10.1016\/j.procs.2025.09.255_bib4","doi-asserted-by":"crossref","unstructured":"A. E. Ezugwu, A. M. Ikotun, O. O. Oyelade, L. Abualigah, J. O. Agushaka, C. I. Eke, A. A. Akinyelu, A comprehensive survey of clustering algorithms: State-of-the-art machine learning applications, taxonomy, challenges, and future research prospects, Engineering Applications of Artificial Intelligence 110 (2022) 104743.","DOI":"10.1016\/j.engappai.2022.104743"},{"issue":"2","key":"10.1016\/j.procs.2025.09.255_bib5","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.1007\/s10462-020-09874-x","article-title":"Data stream clustering: a review","volume":"54","author":"Zubaro\u011flu","year":"2021","journal-title":"Artificial Intelligence Review"},{"key":"10.1016\/j.procs.2025.09.255_bib6","doi-asserted-by":"crossref","unstructured":"M. A. Jabbar, R. Aluvalu, S. S. S. Reddy, Cluster based ensemble classification for intrusion detection system, in: Proceedings of the 9th International Conference on ML and Computing, ICMLC17, Association for Computing Machinery, New York, USA, 2017, p. 253\u2013257.","DOI":"10.1145\/3055635.3056595"},{"key":"10.1016\/j.procs.2025.09.255_bib7","doi-asserted-by":"crossref","unstructured":"I. Syarif, A. Prugel-Bennett, G. Wills, Unsupervised clustering approach for network anomaly detection, in: R. Benlamri (Ed.), Networked Digital Technologies, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 135\u2013145.","DOI":"10.1007\/978-3-642-30507-8_13"},{"key":"10.1016\/j.procs.2025.09.255_bib8","doi-asserted-by":"crossref","unstructured":"D. A. A. Zainaddin, Z. M. Hanapi, Hybrid of fuzzy clustering neural network over nsl dataset for intrusion detection system, Journal of Computer Science 9 (3) (2013) 391.","DOI":"10.3844\/jcssp.2013.391.403"},{"key":"10.1016\/j.procs.2025.09.255_bib9","doi-asserted-by":"crossref","unstructured":"A. S. Alfoudi, M. R. Aziz, Z. A. A. Alyasseri, A. H. Alsaeedi, R. R. Nuiaa, M. A. Mohammed, K. H. Abdulkareem, M. M. Jaber, Hyper clustering model for dynamic network intrusion detection, IET Communications (2022).","DOI":"10.1049\/cmu2.12523"},{"key":"10.1016\/j.procs.2025.09.255_bib10","doi-asserted-by":"crossref","unstructured":"U. Ahmed, Z. Jiangbin, A. Almogren, S. Khan, M. T. Sadiq, A. Altameem, A. U. Rehman, Explainable ai-based innovative hybrid ensemble model for intrusion detection, Journal of Cloud Computing 13 (1) (2024) 150.","DOI":"10.1186\/s13677-024-00712-x"},{"key":"10.1016\/j.procs.2025.09.255_bib11","unstructured":"K. Leung, C. Leckie, Unsupervised anomaly detection in network intrusion detection using clusters, in: Proceedings of the Twenty-eighth Australasian conference on Computer Science-Volume 38, 2005, pp. 333\u2013342."},{"issue":"12","key":"10.1016\/j.procs.2025.09.255_bib12","first-page":"1848","article-title":"A detailed analysis on nsl-kdd dataset using various machine learning techniques for intrusion detection","volume":"2","author":"Revathi","year":"2013","journal-title":"International Journal of Engineering Research & Technology (IJERT)"},{"key":"10.1016\/j.procs.2025.09.255_bib13","doi-asserted-by":"crossref","unstructured":"F. A. Mazarbhuiya, M. Y. AlZahrani, L. Georgieva, Anomaly detection using agglomerative hierarchical clustering algorithm, in: Information Science and Applications 2018: ICISA 2018, Springer, 2019, pp. 475\u2013484.","DOI":"10.1007\/978-981-13-1056-0_48"},{"key":"10.1016\/j.procs.2025.09.255_bib14","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/s00778-006-0002-5","article-title":"A new intrusion detection system using support vector machines and hierarchical clustering","volume":"16","author":"Khan","year":"2007","journal-title":"The VLDB journal"},{"key":"10.1016\/j.procs.2025.09.255_bib15","doi-asserted-by":"crossref","unstructured":"A. Mahfouz, A. Abuhussein, D. Venugopal, S. Shiva, Ensemble classifiers for network intrusion detection using a novel network attack dataset, Future Internet 12 (11) (2020) 180.","DOI":"10.3390\/fi12110180"},{"key":"10.1016\/j.procs.2025.09.255_bib16","doi-asserted-by":"crossref","unstructured":"I. Bibers, O. Arreche, M. Abdallah, A comprehensive comparative study of individual ml models and ensemble strategies for network intrusion detection systems, arXiv preprint arXiv:2410.15597 (2024).","DOI":"10.21203\/rs.3.rs-4862611\/v1"},{"issue":"5","key":"10.1016\/j.procs.2025.09.255_bib17","doi-asserted-by":"crossref","first-page":"5693","DOI":"10.1007\/s40747-023-01013-7","article-title":"A novel ensemble learning-based model for network intrusion detection","volume":"9","author":"Thockchom","year":"2023","journal-title":"Complex & Intelligent Systems"},{"issue":"3.24","key":"10.1016\/j.procs.2025.09.255_bib18","first-page":"479","article-title":"A detailed analysis of cicids2017 dataset for designing intrusion detection systems","volume":"7","author":"Panigrahi","year":"2018","journal-title":"International Journal of Engineering & Technology"},{"key":"10.1016\/j.procs.2025.09.255_bib19","doi-asserted-by":"crossref","unstructured":"N. Moustafa, J. Slay, Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set), in: 2015 military communications and information systems conference (MilCIS), IEEE, 2015, pp. 1\u20136.","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"10.1016\/j.procs.2025.09.255_bib20","doi-asserted-by":"crossref","unstructured":"Z. Aouini, A. Pekar, Nfstream: A flexible network data analysis framework, Computer Networks 204 (2022) 108719.","DOI":"10.1016\/j.comnet.2021.108719"},{"key":"10.1016\/j.procs.2025.09.255_bib21","unstructured":"J. MacQueen, Some methods for classification and analysis of multivariate observations, in: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Statistics, Vol. 5, University of California press, 1967, pp. 281\u2013298."},{"key":"10.1016\/j.procs.2025.09.255_bib22","unstructured":"M. Ester, et al., A density-based algorithm for discovering clusters in large spatial databases with noise, in: kdd, Vol. 96, 1996, pp. 226\u2013231."},{"key":"10.1016\/j.procs.2025.09.255_bib23","doi-asserted-by":"crossref","unstructured":"T. Zhang, R. Ramakrishnan, M. Livny, Birch: an efficient data clustering method for very large databases, ACM sigmod record 25 (2) (1996).","DOI":"10.1145\/235968.233324"},{"key":"10.1016\/j.procs.2025.09.255_bib24","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"the Journal of machine Learning research"},{"key":"10.1016\/j.procs.2025.09.255_bib25","doi-asserted-by":"crossref","first-page":"846","DOI":"10.1080\/01621459.1971.10482356","article-title":"Objective criteria for the evaluation of clustering methods","volume":"66","author":"Rand","year":"1971","journal-title":"Journal of the American Statistical association"},{"key":"10.1016\/j.procs.2025.09.255_bib26","doi-asserted-by":"crossref","unstructured":"K. R. Shahapure, C. Nicholas, Cluster quality analysis using silhouette score, in: 2020 IEEE 7th International Conference on Data Science and Advanced Analytics (DSAA), 2020, pp. 747\u2013748.","DOI":"10.1109\/DSAA49011.2020.00096"},{"key":"10.1016\/j.procs.2025.09.255_bib27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2018.06.056","article-title":"Improving imbalanced learning through a heuristic oversampling method based on k-means and smote","volume":"465","author":"Douzas","year":"2018","journal-title":"Information Sciences"},{"key":"10.1016\/j.procs.2025.09.255_bib28","doi-asserted-by":"crossref","unstructured":"Molchanov, et al., Overcoming the curse of dimensionality when clustering multivariate volume data., in: VISIGRAPP (3: IVAPP), 2018.","DOI":"10.5220\/0006541900290039"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S187705092502928X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S187705092502928X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T08:39:51Z","timestamp":1766306391000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S187705092502928X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":28,"alternative-id":["S187705092502928X"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2025.09.255","relation":{},"ISSN":["1877-0509"],"issn-type":[{"type":"print","value":"1877-0509"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Comprehensive Comparison of Streaming Clustering-Based IDS: Evaluation Across Clustering Families with a Novel Ensemble Classifier","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2025.09.255","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}