{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T09:28:03Z","timestamp":1770715683745,"version":"3.49.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T00:00:00Z","timestamp":1768176000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T00:00:00Z","timestamp":1770595200000},"content-version":"vor","delay-in-days":28,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-025-00834-w","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T09:04:21Z","timestamp":1768208661000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Luminous defense: XAI-driven adaptive security for critical IoT infrastructures"],"prefix":"10.1186","volume":"15","author":[{"given":"Faisal S.","family":"Alsubaei","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,12]]},"reference":[{"key":"834_CR1","doi-asserted-by":"crossref","unstructured":"Aslan \u00d6, Aktu\u011f SS, Ozkan-Okay M, Yilmaz AA, Akin E (2023) A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics 12(6):1333","DOI":"10.3390\/electronics12061333"},{"key":"834_CR2","doi-asserted-by":"crossref","unstructured":"Gao H, Xin R, Chen P, Li X, Lu N, You P (2025) Memory-augment graph transformer based unsupervised detection model for identifying performance anomalies in highly-dynamic cloud environments. J Cloud Comput 14(1):40","DOI":"10.1186\/s13677-025-00766-5"},{"key":"834_CR3","doi-asserted-by":"crossref","unstructured":"Lei J, Fang H, Zhu Y, Chen Z, Wang X, Xue B, Yang M, Wang N (2024) Gpr detection localization of underground structures based on deep learning and reverse time migration. NDT E Int 143:103043","DOI":"10.1016\/j.ndteint.2024.103043"},{"key":"834_CR4","doi-asserted-by":"crossref","unstructured":"Qiao Y, L\u00fc J, Wang T, Liu K, Zhang B, Snoussi (2023) H.: a multihead attention self-supervised representation model for industrial sensors anomaly detection. IEEE Trans on Ind Inf 20(2):2190\u20132199","DOI":"10.1109\/TII.2023.3280337"},{"key":"834_CR5","doi-asserted-by":"crossref","unstructured":"Li Y-F, Zhao W, Zhang C, Ye J, He (2024) H.: a study on the prediction of service reliability of wireless telecommunication system via distribution regression. Reliab Eng System Saf 250:110291","DOI":"10.1016\/j.ress.2024.110291"},{"key":"834_CR6","doi-asserted-by":"crossref","unstructured":"Li Y, Yi Z, Guo D, Luo L, Ren B, Zhang Q (2025) Joint communication and offloading strategy of CoMP UAV-assisted MEC networks. IEEE Internet Things J 1","DOI":"10.1109\/JIOT.2025.3588840"},{"key":"834_CR7","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.jmsy.2025.06.018","volume":"82","author":"Z Wang","year":"2025","unstructured":"Wang Z, Gao D, Lu Y, Deng K, Yuan Z, Huang M, Jiang (2025) T.: a mutual cross-attention fusion network for surface roughness prediction in robotic machining process using internal and external signals. J Manuf Syst 82:284\u2013300","journal-title":"J Manuf Syst"},{"key":"834_CR8","doi-asserted-by":"publisher","first-page":"13510","DOI":"10.1109\/ACCESS.2023.3240162","volume":"11","author":"Q Meng","year":"2023","unstructured":"Meng Q, Song Y, Mu J, Lv Y, Yang J, Xu L, Zhao J, Ma J, Yao W, Wang R et al. (2023) Electric power audit text classification with multi-grained pre-trained language model. IEEE Access 11:13510\u201313518","journal-title":"IEEE Access"},{"key":"834_CR9","doi-asserted-by":"crossref","unstructured":"Shen X, Li L, Ma Y, Xu S, Liu J, Yang Z, Shi Y (2025) Vlcim: a vision-language cyclic interaction model for industrial defect detection. In IEEE Transactions on Instrumentation and Measurement","DOI":"10.1109\/TIM.2025.3583364"},{"key":"834_CR10","doi-asserted-by":"crossref","unstructured":"Chen X, Chen M, Chen Y, Lin Y, Ke B, Ni B (2025) Large generative model impulsed lightweight gaze estimator via deformable approximate large kernel pursuit. In IEEE Transactions on Image Processing","DOI":"10.1109\/TIP.2025.3529379"},{"issue":"8","key":"834_CR11","first-page":"11","volume":"13","author":"M Aminu","year":"2024","unstructured":"Aminu M, Akinsanya A, Dako DA, Oyedokun O (2024) Enhancing cyber threat detection through real-time threat intelligence and adaptive defense mechanisms. Int J Comput Appl Technol Res 13(8):11\u201327","journal-title":"Int J Comput Appl Technol And Res"},{"issue":"4","key":"834_CR12","doi-asserted-by":"publisher","first-page":"3011","DOI":"10.1007\/s10586-021-03309-0","volume":"24","author":"H Aldabbas","year":"2021","unstructured":"Aldabbas H, Amin R (2021) A novel mechanism to handle address spoofing attacks in SND based iot. Cluster Comput 24(4):3011\u20133026","journal-title":"Cluster Comput"},{"key":"834_CR13","doi-asserted-by":"crossref","unstructured":"Xue B, Zheng Q, Li Z, Wang J, Mu C, Yang J, Feng X, Fan H, Li X (2024) Isar weak feature enhancement with perturbation defense using hybrid clustering oversegmentation. IEEE Trans Aerosp Electron Syst 60(5):6256\u20136274","DOI":"10.1109\/TAES.2024.3408139"},{"key":"834_CR14","unstructured":"Sharif F (2024) The role of ensemble learning in strengthening intrusion detection systems: a machine learning perspective"},{"key":"834_CR15","doi-asserted-by":"crossref","unstructured":"Xu G, Wang L, Chen S, Zhu L, Guizani M, Shi L (2025) Mpaee: a multi-path adaptive energy-efficient routing scheme for low earth orbit-based industrial internet of things. In IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2025.3581314"},{"key":"834_CR16","doi-asserted-by":"crossref","unstructured":"Aouedi O, Vu T-H, Sacco A, Nguyen DC, Piamrat K, Marchetto G, Pham (2024) Q.-V.: a survey on intelligent internet of things: applications, security, privacy, and future directions. In IEEE communications surveys & tutorials","DOI":"10.1109\/COMST.2024.3430368"},{"key":"834_CR17","doi-asserted-by":"crossref","unstructured":"Akhtar MAK, Kumar M, Nayyar A (2024) Privacy and security considerations in explainable ai. In: Towards ethical and socially responsible explainable AI: challenges and opportunities. Springer, pp 193\u2013226","DOI":"10.1007\/978-3-031-66489-2_7"},{"key":"834_CR18","doi-asserted-by":"publisher","first-page":"109420","DOI":"10.1016\/j.engappai.2024.109420","volume":"138","author":"B Xue","year":"2024","unstructured":"Xue B, Zheng Q, Li Z, Wang J, Mu C, Yang J, Fan H, Feng X, Li X (2024) Perturbation defense ultra high-speed weak target recognition. Eng Appl Artif Intel 138:109420","journal-title":"Eng Appl Of Artif Intel"},{"key":"834_CR19","doi-asserted-by":"publisher","first-page":"100071","DOI":"10.1016\/j.dajour.2022.100071","volume":"3","author":"M Bansal","year":"2022","unstructured":"Bansal M, Goyal A, Choudhary A (2022) A comparative analysis of k-nearest neighbor, genetic, support vector machine, decision tree, and long short term memory algorithms in machine learning. Decis Analytics J 3:100071","journal-title":"Decis Analytics J"},{"key":"834_CR20","unstructured":"Lella KK, Alluri S, Chopparapu SR, Boddu N, Bn J, Balakrishna N, Reddy SR, Padma M (2025) Advanced AI-machine learning methods for iot environment attack detection using mountain gazelle optimizer with optimal deep belief network. J Theor Appl Inf Technol 103(4)"},{"key":"834_CR21","unstructured":"Jyothi D, Vijay PJ, Kumar MK, Lakshmi RV, Popelo O, Marhasova V, Perepeliukova O, Kakhovska O, Oprysok M, Khomenko S et al. (2025) Design of an improved method for intrusion detection using CNN, lstm, and block chain. J Theor Appl Inf Technol 102(1)"},{"key":"834_CR22","doi-asserted-by":"crossref","unstructured":"Vila M, Sancho M-R, Teniente E, Vilajosana X (2023) Critical infrastructure awareness based on IoT context data. Internet of Things 23:100855","DOI":"10.1016\/j.iot.2023.100855"},{"key":"834_CR23","doi-asserted-by":"crossref","unstructured":"Senevirathna T, La VH, Marchal S, Siniarski B, Liyanage M, Wang S (2024) A survey on XAI for 5G and beyond security: technical aspects, challenges and research directions. IEEE Commun Surv Tutor","DOI":"10.1109\/COMST.2024.3437248"},{"key":"834_CR24","unstructured":"Singh D, Mohan S, Dubey P (2024) Identifying cyber threats in metaverse learning environment using explainable deep neural networks. Int J Perform Eng 20(12)"},{"key":"834_CR25","doi-asserted-by":"crossref","unstructured":"Jiang W, Han H, Zhang Y, Wang J, He M, Gu W, Mu J, Cheng X (2024) Graph neural networks for routing optimization: challenges and opportunities. Sustainability 16(21):9239","DOI":"10.3390\/su16219239"},{"issue":"6","key":"834_CR26","doi-asserted-by":"publisher","first-page":"1526","DOI":"10.1007\/s11263-022-01611-x","volume":"130","author":"P Soviany","year":"2022","unstructured":"Soviany P, Ionescu RT, Rota P, Sebe N (2022) Curriculum learning: a survey. Int J Comput Vision 130(6):1526\u20131565","journal-title":"Int J Comput Vision"},{"key":"834_CR27","doi-asserted-by":"crossref","unstructured":"Kostric I, Balog K, Radlinski F (2024) Recommender systems. ACM Trans 2(2)","DOI":"10.1145\/3629981"},{"key":"834_CR28","doi-asserted-by":"crossref","unstructured":"Dini P, Elhanashi A, Begni A, Saponara S, Zheng Q, Gasmi K (2023) Overview on intrusion detection systems design exploiting machine learning for networking cybersecurity. Appl Sci 13(13):7507","DOI":"10.3390\/app13137507"},{"issue":"7","key":"834_CR29","doi-asserted-by":"publisher","first-page":"1308","DOI":"10.1007\/s42452-020-3060-1","volume":"2","author":"EK Sahin","year":"2020","unstructured":"Sahin EK (2020) Assessing the predictive capability of ensemble tree methods for landslide susceptibility mapping using XGBoost, gradient boosting machine, and random forest. SN Appl Sci 2(7):1308","journal-title":"SN Appl Sci"},{"key":"834_CR30","doi-asserted-by":"crossref","unstructured":"Ihekoronye VU, Ajakwe SO, Lee JM, Kim D-S (2024) Droneguard: an explainable and efficient machine learning framework for intrusion detection in drone networks. In IEEE Internet Things Journal","DOI":"10.1109\/JIOT.2024.3519633"},{"issue":"4","key":"834_CR31","doi-asserted-by":"publisher","first-page":"401","DOI":"10.62411\/faith.3048-3719-63","volume":"1","author":"JP Ntayagabiri","year":"2025","unstructured":"Ntayagabiri JP, Bentaleb Y, Ndikumagenge J, El Makhtoum H: (2025) Omic: a bagging-based ensemble learning framework for large-scale IoT intrusion detection. J Future Artif Intel Technol 1(4):401\u2013416","journal-title":"J Future Artif Intel And Technol"},{"key":"834_CR32","doi-asserted-by":"crossref","unstructured":"Yulianto A, Sukarno P, Suwastika NA (2019) Improving AdaBoost-based intrusion detection system (IDS) performance on CIC IDS 2017 dataset. In J Phys: Conf Ser, vol 1192. IOP Publishing, p. 012018","DOI":"10.1088\/1742-6596\/1192\/1\/012018"},{"key":"834_CR33","doi-asserted-by":"crossref","unstructured":"Bala R, Nagpal R (2019) A review on KDD Cup 99 and NSL-KDD dataset. Int J Adv Res In Comput Sci 10(2)","DOI":"10.26483\/ijarcs.v10i2.6395"},{"key":"834_CR34","doi-asserted-by":"crossref","unstructured":"Neto ECP, Taslimasa H, Dadkhah S, Iqbal S, Xiong P, Rahman T, Ghorbani AA (2024) Ciciov2024: advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus. Internet Things 26:101209","DOI":"10.1016\/j.iot.2024.101209"},{"key":"834_CR35","doi-asserted-by":"crossref","unstructured":"Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H (2022) Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 10:40281\u201340306","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"834_CR36","doi-asserted-by":"crossref","unstructured":"Zhang Z, Al Hamadi H, Damiani E, Yeun CY, Taher F (2022) Explainable artificial intelligence applications in cyber security: state-of-the-art in research. IEEE Access 10:93104\u201393139","DOI":"10.1109\/ACCESS.2022.3204051"},{"key":"834_CR37","doi-asserted-by":"crossref","unstructured":"Singh A, Chatterjee K, Satapathy (2022) S.C.: an edge based hybrid intrusion detection framework for mobile edge computing. Complex Intell Syst 8(5):3719\u20133746","DOI":"10.1007\/s40747-021-00498-4"},{"key":"834_CR38","unstructured":"Ghiasvand E, Ray S, Iqbal S, Dadkhah S, Ghorbani AA (2024) Cicapt-iiot: a provenance-based APT attack dataset for iiot environment. arXiv preprint arXiv:2407.11278"},{"key":"834_CR39","doi-asserted-by":"crossref","unstructured":"Gueriani A, Kheddar H, Mazari AC (2024) Adaptive cyber-attack detection in IIoT using attention-based LSTM-CNN models. In 2024 International Conference on Telecommunications and Intelligent Systems (ICTIS), IEEE, pp. 1\u20136","DOI":"10.1109\/ICTIS62692.2024.10894509"},{"key":"834_CR40","doi-asserted-by":"crossref","unstructured":"Zahid M, Bharati TS (2025) Enhancing cybersecurity in IoT systems: a hybrid deep learning approach for real-time attack detection. Discover Internet of Things 5(1):73","DOI":"10.1007\/s43926-025-00156-y"},{"key":"834_CR41","doi-asserted-by":"crossref","unstructured":"Deshpande SN, Gore DV, Chavan AS, Nelli A (2025) Mod-xgboost: an adaptive machine learning model for internet of things environment to detect spoofing and DoS attacks. Int J on Inf Technol Secur 17(1)","DOI":"10.59035\/MZGI5749"},{"key":"834_CR42","doi-asserted-by":"crossref","unstructured":"Jablaoui R, Cheikhrouhou O, Hamdi M, Liouane N (2025) Deep learning enabled intrusion detection system for IoT security: R. jablaoui et al. EURASIP J on Wireless Commun Netw 66;2025(1)","DOI":"10.1186\/s13638-025-02477-6"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-025-00834-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00834-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00834-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T13:51:07Z","timestamp":1770645067000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13677-025-00834-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,12]]},"references-count":42,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["834"],"URL":"https:\/\/doi.org\/10.1186\/s13677-025-00834-w","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,12]]},"assertion":[{"value":"4 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"16"}}