{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T20:51:58Z","timestamp":1774558318371,"version":"3.50.1"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Consumer Electron."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1109\/tce.2025.3634568","type":"journal-article","created":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T18:45:40Z","timestamp":1763577940000},"page":"1524-1531","source":"Crossref","is-referenced-by-count":0,"title":["FusedBoostNet: A Lightweight Hybrid Model for Consumer-Grade Intrusion Detection"],"prefix":"10.1109","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5523-052X","authenticated-orcid":false,"given":"Ankita","family":"Sharma","sequence":"first","affiliation":[{"name":"Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8474-9435","authenticated-orcid":false,"given":"Shalli","family":"Rani","sequence":"additional","affiliation":[{"name":"Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3550392"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13234611"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3551750"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.34218\/IJCET_16_01_266"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3547433"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3486659"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s22249957"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18379-6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s19091977"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/s21227518"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3071766"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.12.015"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-030-76613-9_10","volume-title":"AI-Enabled Threat Detection and Security Analysis for Industrial IoT","author":"Rouzbahani","year":"2021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117597"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6473507"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-021-02866-x"},{"key":"ref17","article-title":"A survey on scalable LoRaWAN for massive IoT: Recent advances, potentials, and challenges","author":"Jouhari","year":"2022","journal-title":"arXiv:2202.11082"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2018.8629718"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52988-8_7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00535-6"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3018691"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789878"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100729"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3130434"},{"key":"ref25","first-page":"2616","article-title":"The impact of artificial intelligence on the future of cybersecurity","volume":"71","author":"Aldhamer","year":"2023","journal-title":"Multi-Knowl. Electron. Comprehensive J. Educ. Sci. Publication"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/math10122141"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2478\/kbo-2023-0072"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2025.100765"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11233934"},{"key":"ref30","article-title":"Autonomous threat hunting: A future paradigm for AI-driven threat intelligence","author":"Sindiramutty","year":"2023","journal-title":"arXiv:2401.00286"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/s24113509"}],"container-title":["IEEE Transactions on Consumer Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/30\/11456295\/11260469.pdf?arnumber=11260469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:50:13Z","timestamp":1774554613000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11260469\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":31,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tce.2025.3634568","relation":{},"ISSN":["0098-3063","1558-4127"],"issn-type":[{"value":"0098-3063","type":"print"},{"value":"1558-4127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]}}}