{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T08:38:13Z","timestamp":1766306293766,"version":"3.48.0"},"reference-count":16,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T00:00:00Z","timestamp":1759017600000},"content-version":"vor","delay-in-days":270,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012639","name":"Prince Sultan University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012639","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1016\/j.procs.2025.09.526","type":"journal-article","created":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T22:15:25Z","timestamp":1762467325000},"page":"4014-4023","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Adaptive Diffusion Markov-Enhanced GCN with LLM Explanations for IoT Attack Detection"],"prefix":"10.1016","volume":"270","author":[{"given":"Safa Ben","family":"Atitallah","sequence":"first","affiliation":[]},{"given":"Maha","family":"Driss","sequence":"additional","affiliation":[]},{"given":"Arwa","family":"Alsehibani","sequence":"additional","affiliation":[]},{"given":"Wadii","family":"Boulila","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2025.09.526_bib1","doi-asserted-by":"crossref","first-page":"4302","DOI":"10.3390\/s22114302","article-title":"A novel detection and multi-classification approach for iot-malware using random forest voting of fine-tuning convolutional neural networks","volume":"22","author":"Atitallah","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.procs.2025.09.526_bib2","doi-asserted-by":"crossref","first-page":"100303","DOI":"10.1016\/j.cosrev.2020.100303","article-title":"Leveraging deep learning and iot big data analytics to support the smart cities development: Review and future directions","volume":"38","author":"Atitallah","year":"2020","journal-title":"Computer Science Review"},{"key":"10.1016\/j.procs.2025.09.526_bib3","unstructured":"Atitallah, S.B., Driss, M., Boulila, W., Koubaa, A., 2024. Enhancing internet of things security through self-supervised graph neural networks. arXiv preprint arXiv:2412.13240."},{"key":"10.1016\/j.procs.2025.09.526_bib4","doi-asserted-by":"crossref","first-page":"100845","DOI":"10.1016\/j.iot.2023.100845","article-title":"Fedmicro-ida: A federated learning and microservices-based framework for iot data analytics","volume":"23","author":"Atitallah","year":"2023","journal-title":"Internet of Things"},{"key":"10.1016\/j.procs.2025.09.526_bib5","series-title":"An adaptive end-to-end iot security framework using explainable ai and llms, in: 2024 IEEE 10th World Forum on Internet of Things (WF-IoT)","first-page":"469","author":"Baral","year":"2024"},{"key":"10.1016\/j.procs.2025.09.526_bib6","series-title":"An effective detection and classification approach for dos attacks in wireless sensor networks using deep transfer learning models and majority voting, in: International Conference on Computational Collective Intelligence","first-page":"180","author":"Ben Atitallah","year":"2022"},{"key":"10.1016\/j.procs.2025.09.526_bib7","series-title":"Strengthening network intrusion detection in iot environments with self-supervised learning and few shot learning, in: International Conference on Computational Collective Intelligence","first-page":"83","author":"Ben Atitallah","year":"2024"},{"key":"10.1016\/j.procs.2025.09.526_bib8","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1109\/JIOT.2021.3085194","article-title":"Ton iot: The role of heterogeneity and the need for standardization of features and attack types in iot network intrusion data sets","volume":"9","author":"Booij","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"10.1016\/j.procs.2025.09.526_bib9","doi-asserted-by":"crossref","unstructured":"Farrukh, Y.A., Wali, S., Khan, I., Bastian, N.D., 2024. Xg-nid: Dual-modality network intrusion detection using a heterogeneous graph neural network and large language model. arXiv preprint arXiv:2408.16021.","DOI":"10.1016\/j.eswa.2025.128089"},{"key":"10.1016\/j.procs.2025.09.526_bib10","doi-asserted-by":"crossref","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","article-title":"Edge-iiotset: A new comprehensive realistic cyber security dataset of iot and iiot applications for centralized and federated learning","volume":"10","author":"Ferrag","year":"2022","journal-title":"IEEe Access"},{"key":"10.1016\/j.procs.2025.09.526_bib11","series-title":"E-graphsage: A graph neural network based intrusion detection system for iot, in: NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","first-page":"1","author":"Lo","year":"2022"},{"key":"10.1016\/j.procs.2025.09.526_bib12","doi-asserted-by":"crossref","unstructured":"Rahman, M.K., Agrawal, A., Azad, A., 2022. Markovgnn: Graph neural networks on markov diffusion, in: Companion Proceedings of the Web Conference 2022, pp. 1019\u20131029.","DOI":"10.1145\/3487553.3524713"},{"key":"10.1016\/j.procs.2025.09.526_bib13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3690639","article-title":"Artificial intelligence of things: A survey","volume":"21","author":"Siam","year":"2025","journal-title":"ACM Transactions on Sensor Networks"},{"key":"10.1016\/j.procs.2025.09.526_bib14","doi-asserted-by":"crossref","unstructured":"Sun, Z., Teixeira, A.M., Toor, S., 2024. Gnn-ids: Graph neural network based intrusion detection system, in: Proceedings of the 19th International Conference on Availability, Reliability and Security, pp. 1\u201312.","DOI":"10.1145\/3664476.3664515"},{"year":"2025","series-title":"Intrusion detection in iot networks using dynamic graph modeling and graph-based neural networks","author":"Villegas-Ch","key":"10.1016\/j.procs.2025.09.526_bib15"},{"key":"10.1016\/j.procs.2025.09.526_bib16","series-title":"Simplifying graph convolutional networks, in: International conference on machine learning","first-page":"6861","author":"Wu","year":"2019"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050925031990?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050925031990?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T08:33:14Z","timestamp":1766305994000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050925031990"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":16,"alternative-id":["S1877050925031990"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2025.09.526","relation":{},"ISSN":["1877-0509"],"issn-type":[{"type":"print","value":"1877-0509"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Adaptive Diffusion Markov-Enhanced GCN with LLM Explanations for IoT Attack Detection","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2025.09.526","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}