{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T10:35:56Z","timestamp":1766054156020,"version":"3.48.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,1]]},"DOI":"10.1109\/pimrc62392.2025.11274841","type":"proceedings-article","created":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T18:33:25Z","timestamp":1765564405000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Transparent Intrusion Detection Using ML: Integrating Explainable Models for Cybersecurity"],"prefix":"10.1109","author":[{"given":"Mohammad","family":"Abdussami","sequence":"first","affiliation":[{"name":"SRM University,Department of CSE,AP,India"}]},{"given":"Sri Pranav","family":"N","sequence":"additional","affiliation":[{"name":"SRM University,Department of CSE,AP,India"}]},{"given":"Madhu Sudan Rao","family":"Ramani","sequence":"additional","affiliation":[{"name":"SRM University,Department of CSE,AP,India"}]},{"given":"Krishna Manikanta","family":"Singothu","sequence":"additional","affiliation":[{"name":"SRM University,Department of CSE,AP,India"}]},{"given":"Sai Krishna","family":"Gurram","sequence":"additional","affiliation":[{"name":"SRM University,Department of CSE,AP,India"}]},{"given":"Aswani Devi","family":"Aguru","sequence":"additional","affiliation":[{"name":"SRM University,Department of CSE,AP,India"}]},{"given":"Md Muzakkir","family":"Hussain","sequence":"additional","affiliation":[{"name":"SRM University,Department of CSE,AP,India"}]},{"given":"Firoj","family":"Gazi","sequence":"additional","affiliation":[{"name":"SRM University,Department of CSE,AP,India"}]}],"member":"263","reference":[{"issue":"3","key":"ref1","first-page":"45","article-title":"Ensemble models for intrusion detection systems: Optimizing XGBoost and Random Forest for network security","volume":"12","author":"Bangui","year":"2024","journal-title":"Journal of Network and Systems Management"},{"issue":"5","key":"ref2","first-page":"7892","article-title":"Federated Learning with a zero-trust security model for IoT intrusion detection","volume":"11","author":"Javeed","year":"2024","journal-title":"IEEE Internet of Things Journal"},{"key":"ref3","first-page":"102801","article-title":"Explainable AI for intrusion detection systems using LIME: Enhancing interpretability in cybersecurity","volume":"119","author":"Peddabachigari","year":"2024","journal-title":"Computers & Security"},{"key":"ref4","first-page":"1125","article-title":"AI-powered Network Intrusion Detection Systems: A comparative study of ensemble methods","volume":"19","author":"Gomez","year":"2024","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref5","first-page":"210","article-title":"Intelligent Intrusion Detection for 5G Software-Defined Networks: A hybrid Random Forest and k-means++ approach","volume":"131","author":"Li","year":"2025","journal-title":"Future Generation Computer Systems"},{"key":"ref6","first-page":"103456","article-title":"Deep learning-based intrusion detection for real-time traffic analysis: Challenges and solutions","volume":"75","author":"Sharma","year":"2024","journal-title":"Journal of Information Security and Applications"},{"key":"ref7","first-page":"45678","article-title":"AI-driven intrusion detection: Integrating machine learning, deep learning, and federated learning for cybersecurity","volume":"12","author":"Muneer","year":"2024","journal-title":"IEEE Access"},{"key":"ref8","first-page":"124567","article-title":"Machine learning-based optimized framework for intrusion detection systems","volume":"240","author":"Babu","year":"2025","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"ref9","first-page":"89","article-title":"Hybrid machine learning and deep learning models for enhanced intrusion detection in network security","volume":"24","author":"Gala","year":"2025","journal-title":"International Journal of Information Security"},{"issue":"1","key":"ref10","first-page":"34","article-title":"Hybrid AI-powered intrusion detection for botnet attack prevention","volume":"8","author":"Repalle","year":"2025","journal-title":"Journal of Cybersecurity"},{"issue":"1","key":"ref11","first-page":"456","article-title":"AI-based intrusion detection for critical infrastructure: Challenges and solutions","volume":"19","author":"Otoum","year":"2025","journal-title":"IEEE Systems Journal"},{"key":"ref12","first-page":"210","article-title":"Deep learning-based intrusion detection using autoencoders and shallow neural networks","volume":"158","author":"Hidalgo-Espinoza","year":"2025","journal-title":"Neural Networks"},{"issue":"1","key":"ref13","first-page":"1","article-title":"Deep learning-based intrusion detection systems: A systematic review of techniques and challenges","volume":"57","author":"Lansky","year":"2025","journal-title":"ACM Computing Surveys"},{"key":"ref14","first-page":"103246","article-title":"Machine learning and deep learning approaches for intrusion detection: A comprehensive review","volume":"198","author":"Halbouni","year":"2025","journal-title":"Journal of Network and Computer Applications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/app14104170"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.33545\/27076571.2024.v5.i2a.91"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3368377"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119000"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-66428-1_18"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SIN60469.2023.10475080"}],"event":{"name":"2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","start":{"date-parts":[[2025,9,1]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2025,9,4]]}},"container-title":["2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11274530\/11274549\/11274841.pdf?arnumber=11274841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T10:32:18Z","timestamp":1766053938000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11274841\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,1]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/pimrc62392.2025.11274841","relation":{},"subject":[],"published":{"date-parts":[[2025,9,1]]}}}