{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T10:05:56Z","timestamp":1772445956606,"version":"3.50.1"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T00:00:00Z","timestamp":1769817600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T00:00:00Z","timestamp":1772409600000},"content-version":"vor","delay-in-days":30,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-026-00847-z","type":"journal-article","created":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T14:34:12Z","timestamp":1769870052000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Self-supervised graph neural networks for network intrusion detection in cloud-edge collaboration environments"],"prefix":"10.1186","volume":"15","author":[{"given":"Haiyang","family":"Diao","sequence":"first","affiliation":[]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yan Sibyl","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,31]]},"reference":[{"issue":"5s","key":"847_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2983642","volume":"12","author":"T Wu","year":"2016","unstructured":"Wu T, Dou W, Wu F, Tang S, Hu C, Chen J (2016) A deployment optimization scheme over multimedia big data for large-scale media streaming application. ACM Trans Multimedia Comput Commun Appl (TOMM) 12(5s):1\u201323","journal-title":"ACM Trans Multimedia Comput, Commun, Appl (TOMM)"},{"key":"847_CR2","doi-asserted-by":"crossref","unstructured":"Gu R, Wang S, Dai H, Chen X, Wang Z, Bao W, Zheng J, Tu Y, Huang Y, Qi L et al (2024) Fluid-shuttle: efficient cloud data transmission based on serverless computing compression. In IEEE\/ACM Transactions on Networking","DOI":"10.1109\/TNET.2024.3402561"},{"key":"847_CR3","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1016\/j.ins.2018.12.051","volume":"527","author":"W Dou","year":"2020","unstructured":"Dou W, Tang W, Wu X, Qi L, Xu X, Zhang X, Hu C (2020) An insurance theory based optimal cyber-insurance contract against moral hazard. Inf Sci 527:576\u2013589","journal-title":"Inf Sci"},{"issue":"2","key":"847_CR4","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/TSUSC.2017.2733018","volume":"4","author":"F Fei","year":"2017","unstructured":"Fei F, Li S, Dai H, Hu C, Dou W, Ni Q (2017) A k-anonymity based schema for location privacy preservation. IEEE Trans Sustain Comput 4(2):156\u2013167","journal-title":"IEEE Trans Sustain Comput"},{"key":"847_CR5","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.ins.2018.11.030","volume":"480","author":"L Qi","year":"2019","unstructured":"Qi L, Wang R, Hu C, Li S, He Q, Xu X (2019) Time-aware distributed service recommendation with privacy-preservation. Inf Sci 480:354\u2013364","journal-title":"Inf Sci"},{"issue":"10","key":"847_CR6","doi-asserted-by":"publisher","first-page":"3161","DOI":"10.1109\/JSAC.2023.3310077","volume":"41","author":"L Qi","year":"2023","unstructured":"Qi L, Xu X, Wu X, Ni Q, Yuan Y, Zhang X (2023) Digital-twin-enabled 6g mobile network video streaming using mobile crowdsourcing. IEEE J Sel Areas Commun 41(10):3161\u20133174","journal-title":"IEEE J Sel Areas Commun"},{"issue":"4","key":"847_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3620677","volume":"15","author":"Y Liu","year":"2024","unstructured":"Liu Y, Zhou X, Kou H, Zhao Y, Xu X, Zhang X, Qi L (2024) Privacy-preserving point-of-interest recommendation based on simplified graph convolutional network for geological traveling. ACM Trans Intell Syst Technol 15(4):1\u201317","journal-title":"ACM Trans Intell Syst Technol"},{"key":"847_CR8","doi-asserted-by":"crossref","unstructured":"Dutta S, Mawla T, Rabbi MF (2019) A comparison study of temporal signature mining over traditional data mining techniques to detect network intrusion, in Proceedings of 2018 emerging technologies in data mining and information security pp 757\u2013763","DOI":"10.1007\/978-981-13-1498-8_66"},{"issue":"2","key":"847_CR9","doi-asserted-by":"publisher","first-page":"852","DOI":"10.3390\/app12020852","volume":"12","author":"J D\u00edaz-Verdejo","year":"2022","unstructured":"D\u00edaz-Verdejo J, Mu\u00f1oz-Calle J, Alonso AE, Alonso RE, Madinabeitia G (2022) On the detection capabilities of signature-based intrusion detection systems in the context of web attacks. Appl Sci 12(2):852","journal-title":"Appl Sci"},{"key":"847_CR10","doi-asserted-by":"publisher","first-page":"105124","DOI":"10.1016\/j.knosys.2019.105124","volume":"189","author":"A Aldweesh","year":"2020","unstructured":"Aldweesh A, Derhab A, Emam AZ (2020) Deep learning approaches for anomalybased intrusion detection systems: a survey, taxonomy, and open issues. Knowl-Based Syst 189:105124","journal-title":"Knowl-Based Syst"},{"key":"847_CR11","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.comcom.2021.01.021","volume":"170","author":"M Abbasi","year":"2021","unstructured":"Abbasi M, Shahraki A, Taherkordi A (2021) Deep learning for network traffic monitoring and analysis (ntma): a survey. Comput Commun 170:19\u201341","journal-title":"Comput Commun"},{"key":"847_CR12","doi-asserted-by":"publisher","first-page":"102810","DOI":"10.1016\/j.cose.2022.102810","volume":"120","author":"JL Guerra","year":"2022","unstructured":"Guerra JL, Catania C, Veas E (2022) Datasets are not enough: challenges in labeling network traffic. Comput Secur 120:102810","journal-title":"Comput Secur"},{"issue":"3","key":"847_CR13","doi-asserted-by":"publisher","first-page":"311","DOI":"10.26599\/BDMA.2022.9020038","volume":"6","author":"H Attou","year":"2023","unstructured":"Attou H, Guezzaz A, Benkirane S, Azrour M, Farhaoui Y (2023) Cloud-based intrusion detection approach using machine learning techniques. Big Data Min Analytics 6(3):311\u2013320","journal-title":"Big Data Min Analytics"},{"key":"847_CR14","unstructured":"F.Wei HL, Zhao Z, Hu H (2023) xNIDS: explaining Deep learning-based network intrusion detection systems for active intrusion responses, in 32nd USENIX security symposium 4337\u20134354"},{"key":"847_CR15","unstructured":"Rieger P, Chilese M, Mohamed R, Miettinen M, Fereidooni H, Sadeghi AR (2023) ARGUS: Context-based detection of stealthy IoT infiltration attacks, in 32nd USENIX security symposium 4301\u20134318"},{"key":"847_CR16","doi-asserted-by":"crossref","unstructured":"Gori M, Monfardini G, Scarselli F (2005) A new model for learning in graph domains. In 2005 IEEE International Joint Conference on Neural Networks, vol 2. pp 729\u2013734","DOI":"10.1109\/IJCNN.2005.1555942"},{"issue":"4","key":"847_CR17","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1145\/3543146.3543171","volume":"49","author":"D Pujol-Perich","year":"2022","unstructured":"Pujol-Perich D, Su\u00e1rez-Varela J, Cabellos-Aparicio A, Barlet-Ros P (2022) Unveiling the potential of graph neural networks for robust intrusion detection. ACM SIGMETRICS Perform Evaluation Rev 49(4):111\u2013117","journal-title":"ACM SIGMETRICS Perform Evaluation Rev"},{"issue":"1","key":"847_CR18","first-page":"4611331","volume":"2022","author":"W Guo","year":"2022","unstructured":"Guo W, Qiu H, Liu Z, Zhu J, Wang Q (2022) Gld-net: deep learning to detect ddos attack via topological and traffic feature fusion. Comput Intel Neurosci 2022(1):4611331","journal-title":"Comput Intel Neurosci"},{"issue":"6","key":"847_CR19","first-page":"5444","volume":"35","author":"L Qi","year":"2022","unstructured":"Qi L, Lin W, Zhang X, Dou W, Xu X, Chen J (2022) A correlation graph based approach for personalized and compatible web apis recommendation in mobile app development. IEEE Trans Knowl Data Eng 35(6):5444\u20135457","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"2","key":"847_CR20","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1109\/TCSS.2022.3168595","volume":"10","author":"S Wu","year":"2022","unstructured":"Wu S, Shen S, Xu X, Chen Y, Zhou X, Liu D, Xue X, Qi L (2022) Popularityaware and diverse web apis recommendation based on correlation graph. IEEE Trans Comput Soc Syst 10(2):771\u2013782","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"847_CR21","doi-asserted-by":"crossref","unstructured":"Iliofotou M, Pappu P, Faloutsos M, Mitzenmacher M, Singh S, Varghese G (2007) Network monitoring using traffic dispersion graphs (tdgs). In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pp 315\u2013320","DOI":"10.1145\/1298306.1298349"},{"issue":"3","key":"847_CR22","doi-asserted-by":"publisher","first-page":"730","DOI":"10.26599\/BDMA.2023.9020037","volume":"7","author":"L Chen","year":"2024","unstructured":"Chen L, Li Y, Liu H, Guo H (2024) Node and edge joint embedding for heterogeneous information network. Big Data Min Analytics 7(3):730\u2013752","journal-title":"Big Data Min Analytics"},{"key":"847_CR23","unstructured":"Gilmer J, Schoenholz SS, Riley PF, Vinyals O, Dahl GE (2017) Neural message passing for quantum chemistry. In International Conference on Machine Learning, pp 1263\u20131272"},{"key":"847_CR24","unstructured":"Hamilton W, Ying Z, Leskovec J (2017) Inductive representation learning on large graphs. Adv Neural Inf Process Syst 30:1025\u20131035"},{"key":"847_CR25","doi-asserted-by":"crossref","unstructured":"Zhang H, Qi G, Sun P, Dong S, Liu X, Tan J (2025) Decision-making approach for complex network defense based on flipit game. Tsinghua Sci Technol. https:\/\/www.sciopen.com\/article\/10.26599\/TST.2024.9010206","DOI":"10.26599\/TST.2024.9010206"},{"key":"847_CR26","volume-title":"Pure-gnn: a lightweight purified graph neural network against adversarial attacks","author":"Y Xiao","year":"2025","unstructured":"Xiao Y, Ma Z, Huang W, Qiao C, Zhao B, Zhang D, Pei Q (2025) Pure-gnn: a lightweight purified graph neural network against adversarial attacks. Tsinghua Science and Technology"},{"key":"847_CR27","doi-asserted-by":"crossref","unstructured":"Lei K, Fu Q, Ni J, Wang F, Yang M, Xu K (2019) Detecting malicious domains with behavioral modeling and graph embedding. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), (IEEE), pp 601\u2013611","DOI":"10.1109\/ICDCS.2019.00066"},{"key":"847_CR28","doi-asserted-by":"crossref","unstructured":"Diao H, Li X, Jiang X, Zhang J (2025) Self-supervised graph multi-head attention networks for network intrusion detection. In Proceedings of the 22nd IEEE International Conference on Ubiquitous Intelligence and Computing (UIC)","DOI":"10.1109\/SWC65939.2025.00104"},{"issue":"3","key":"847_CR29","doi-asserted-by":"publisher","first-page":"273","DOI":"10.26599\/BDMA.2022.9020032","volume":"6","author":"M Mohy-Eddine","year":"2023","unstructured":"Mohy-Eddine M, Guezzaz A, Benkirane S, Azrour M, Farhaoui Y (2023) An ensemble learning based intrusion detection model for industrial iot security. Big Data Min Analytics 6(3):273\u2013287","journal-title":"Big Data Min Analytics"},{"issue":"4","key":"847_CR30","doi-asserted-by":"publisher","first-page":"948","DOI":"10.26599\/TST.2023.9010032","volume":"29","author":"A Eljialy","year":"2024","unstructured":"Eljialy A, Uddin MY, Ahmad S (2024) Novel framework for an intrusion detection system using multiple feature selection methods based on deep learning. Tsinghua Sci Technol 29(4):948\u2013958","journal-title":"Tsinghua Sci Technol"},{"issue":"2","key":"847_CR31","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/TVT.2021.3051026","volume":"70","author":"HM Song","year":"2021","unstructured":"Song HM, Kim HK (2021) Self-supervised anomaly detection for in-vehicle network using noised pseudo normal data. IEEE Trans Veh Technol 70(2):1098\u20131108","journal-title":"IEEE Trans Veh Technol"},{"key":"847_CR32","doi-asserted-by":"publisher","first-page":"103131","DOI":"10.1016\/j.cose.2023.103131","volume":"128","author":"W Wang","year":"2023","unstructured":"Wang W, Jian S, Tan Y, Wu Q, Huang C (2023) Robust unsupervised network intrusion detection with self-supervised masked context reconstruction. Comput Secur 128:103131","journal-title":"Comput Secur"},{"key":"847_CR33","volume-title":"Caeif: an anomaly detection approach based on temporal representation of the reconstruction error","author":"H Geng","year":"2025","unstructured":"Geng H, Zhang Z, Qian Y, Yang B, Ma Q, Chi H, Yang J, Yin X (2025) Caeif: an anomaly detection approach based on temporal representation of the reconstruction error. Tsinghua Science and Technology"},{"key":"847_CR34","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.aiopen.2021.01.001","volume":"1","author":"J Zhou","year":"2020","unstructured":"Zhou J, Cui G, Hu S, Zhang Z, Yang C, Liu Z, Wang L, Li C, Sun M (2020) Graph neural networks: a review of methods and applications. AI Open 1:57\u201381","journal-title":"AI Open"},{"key":"847_CR35","unstructured":"Zhou J, Xu Z, Rush AM, Yu M (2020) Automating botnet detection with graph neural networks. arXiv preprint arXiv:2003.06344. https:\/\/arxiv.org\/abs\/2003.06344"},{"key":"847_CR36","doi-asserted-by":"crossref","unstructured":"Xiao Q, Liu J, Wang Q, Jiang Z, Wang X, Yao Y (2020) Towards network anomaly detection using graph embedding. In Proceedings of 20th International Conference on Computational Science, pp 156\u2013169","DOI":"10.1007\/978-3-030-50423-6_12"},{"key":"847_CR37","doi-asserted-by":"crossref","unstructured":"Lo WW, Layeghy S, Sarhan M, Gallagher M, Portmann M (2022) E-Graphsage: a graph neural network based intrusion detection system for IoT. In NOMS 2022\u2013 2022 IEEE\/IFIP Network Operations and Management Symposium, pp 1\u20139","DOI":"10.1109\/NOMS54207.2022.9789878"},{"issue":"12","key":"847_CR38","doi-asserted-by":"publisher","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","volume":"9","author":"X Zhou","year":"2021","unstructured":"Zhou X, Liang W, Li W, Yan K, Shimizu S, Kevin I, Wang K (2021) Hierarchical adversarial attacks against graph-neural-network-based iot network intrusion detection system. IEEE Internet Things J 9(12):9310\u20139319","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"847_CR39","doi-asserted-by":"publisher","first-page":"273","DOI":"10.26599\/BDMA.2024.9020060","volume":"8","author":"Z Gong","year":"2025","unstructured":"Gong Z, Chen S, Dai Q, Feng Y, Wang J, Zhang J (2025) Scoamps: semi-supervised graph contrastive learning based on associative memory network and pseudo-label similarity. Big Data Min Analytics 8(2):273\u2013291","journal-title":"Big Data Min Analytics"},{"key":"847_CR40","doi-asserted-by":"publisher","first-page":"110030","DOI":"10.1016\/j.knosys.2022.110030","volume":"258","author":"E Caville","year":"2022","unstructured":"Caville E, Lo WW, Layeghy S, Portmann M (2022) Anomal-e: a self-supervised network intrusion detection system based on graph neural networks. Knowl- Based Syst 258:110030","journal-title":"Knowl- Based Syst"},{"key":"847_CR41","doi-asserted-by":"publisher","first-page":"110966","DOI":"10.1016\/j.knosys.2023.110966","volume":"279","author":"H Nguyen","year":"2023","unstructured":"Nguyen H, Kashef R (2023) Ts-ids: traffic-aware self-supervised learning for iot network intrusion detection. Knowl-Based Syst 279:110966","journal-title":"Knowl-Based Syst"},{"key":"847_CR42","doi-asserted-by":"crossref","unstructured":"Xie L, Ye M, Chen B (2023) A network intrusion detection system based on self-supervised co-contrastive learning. In International Conference on Network Simulation and Evaluation, pp 387\u2013399","DOI":"10.1007\/978-981-97-4522-7_27"},{"key":"847_CR43","doi-asserted-by":"publisher","first-page":"110495","DOI":"10.1016\/j.comnet.2024.110495","volume":"248","author":"R Xu","year":"2024","unstructured":"Xu R, G.Wu WW, Gao X, He A, Zhang Z (2024) Applying self-supervised learning to network intrusion detection for network flows with graph neural network. Comput Networks 248:110495","journal-title":"Comput Networks"},{"key":"847_CR44","doi-asserted-by":"crossref","unstructured":"Liu Y, Xia L, Huang C (2024) Selfgnn: self-supervised graph neural networks for sequential recommendation, in Proceedings of the 47th international ACM SIGIR conference on research and development in information retrieval pp 1609\u20131618","DOI":"10.1145\/3626772.3657716"},{"key":"847_CR45","doi-asserted-by":"crossref","unstructured":"Shen J, Shen Z, Xiong C, Wang C, Wang K, Han J (2020) TaxoExpan: selfsupervised taxonomy expansion with position-enhanced graph neural network. In Proceedings of the web conference 2020, pp 486\u2013497","DOI":"10.1145\/3366423.3380132"},{"key":"847_CR46","doi-asserted-by":"crossref","unstructured":"Liu Q, Zhang H, Zhang Y, Fan L, Jin X (2024) SSA-GAT: graph-based selfsupervised learning for network intrusion detection. In International Conference on Artificial Neural Networks, Springer, pp 476\u2013491","DOI":"10.1007\/978-3-031-72356-8_31"},{"key":"847_CR47","doi-asserted-by":"publisher","first-page":"111973","DOI":"10.1016\/j.engappai.2025.111973","volume":"160","author":"Z Chen","year":"2025","unstructured":"Chen Z, Zou H, Hu T, Fang X, Zheng J, Li J, Pan Y (2025) A network intrusion detection system based on self-supervised learning of traffic differentiation in internet of things. Eng Appl Artif Intel 160:111973","journal-title":"Eng Appl Artif Intel"},{"issue":"20","key":"847_CR48","first-page":"10","volume":"1050","author":"P Velickovic","year":"2017","unstructured":"Velickovic P, Cucurull G, Casanova A, Romero A, Lio P, Bengio Y et al (2017) Graph attention networks. STAT 1050(20):10\u201348550","journal-title":"STAT"},{"issue":"1","key":"847_CR49","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z Wu","year":"2020","unstructured":"Wu Z, Pan S, Chen F, Long G, Zhang C, Philip SY (2020) A comprehensive survey on graph neural networks. IEEE Trans Neural Networks Learn Syst 32(1):4\u201324","journal-title":"IEEE Trans Neural Networks Learn Syst"},{"key":"847_CR50","doi-asserted-by":"crossref","unstructured":"Han Y, Hui L, Jiang H, Qian J, Xie J (2022) Generative subgraph contrast for selfsupervised graph representation learning. In European Conference on Computer Vision, pp 91\u2013107","DOI":"10.1007\/978-3-031-20056-4_6"},{"key":"847_CR51","unstructured":"Wang MY (2019) Deep graph library: towards efficient and scalable deep learning on graphs. In ICLR Workshop on Representation Learning on Graphs and Manifolds"},{"key":"847_CR52","doi-asserted-by":"crossref","unstructured":"Bundy A, Wallen L (1984) Breadth-first search. Catalogue Artif Intel Tools 13\u201313","DOI":"10.1007\/978-3-642-96868-6_25"},{"issue":"1","key":"847_CR53","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1146\/annurev-statistics-030718-104938","volume":"6","author":"VM Panaretos","year":"2019","unstructured":"Panaretos VM, Zemel Y (2019) Statistical aspects of wasserstein distances. Annu Rev Stat Its Application 6(1):405\u2013431","journal-title":"Annu Rev Stat Its Application"},{"key":"847_CR54","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s10208-011-9093-5","volume":"11","author":"F M\u00e9moli","year":"2011","unstructured":"M\u00e9moli F (2011) Gromov\u2013wasserstein distances and the metric approach to object matching. Found Comput Math 11:417\u2013487","journal-title":"Found Comput Math"},{"key":"847_CR55","unstructured":"Chen L, Gan Z, Cheng Y, Li L, Carin L, Liu J (2020) Graph optimal transport for cross-domain alignment. In International Conference on Machine Learning, pp 1542\u20131553"},{"key":"847_CR56","unstructured":"Peyr\u00e9 G, Cuturi M, Solomon J (2016) Gromov-wasserstein averaging of kernel and distance matrices. In International Conference on Machine Learning, PMLR, pp 2664\u20132672"},{"key":"847_CR57","doi-asserted-by":"crossref","unstructured":"Livadas C, Walsh R, Lapsley D, Strayer WT (2006) Usilng machine learning technliques to identify botnet traffic. In 31st IEEE Conference on Local Computer Networks, pp 967\u2013974","DOI":"10.1109\/LCN.2006.322210"},{"key":"847_CR58","doi-asserted-by":"crossref","unstructured":"Sarhan M, Layeghy S, Moustafa N, Portmann M (2021) Netflow datasets for machine learning-based network intrusion detection systems. In Big Data Technologies and Applications: 10th EAI International Conference, BDTA 2020, and 13th EAI International Conference on Wireless Internet, WiCON 2020, pp 117\u2013135","DOI":"10.1007\/978-3-030-72802-1_9"},{"key":"847_CR59","doi-asserted-by":"crossref","unstructured":"Sarhan M, Layeghy S, Portmann M (2022) Towards a standard feature set for network intrusion detection system datasets. Mob Networks Appl 1\u201314","DOI":"10.1007\/s11036-021-01843-0"},{"key":"847_CR60","doi-asserted-by":"publisher","unstructured":"Moustafa N (2019) Ton-iot datasets. https:\/\/doi.org\/10.21227\/fesz-dm97","DOI":"10.21227\/fesz-dm97"},{"key":"847_CR61","doi-asserted-by":"crossref","unstructured":"Bitaab M, Hashemi S (2017) Hybrid intrusion detection: combining decision tree and gaussian mixture model. In 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), IEEE, pp 8\u201312","DOI":"10.1109\/ISCISC.2017.8488375"},{"issue":"1","key":"847_CR62","doi-asserted-by":"publisher","first-page":"496","DOI":"10.25046\/aj030160","volume":"3","author":"YY Aung","year":"2018","unstructured":"Aung YY, Min MM (2018) An analysis of k-means algorithm based network intrusion detection system. Adv Sci, Technol Eng Syst J 3(1):496\u2013501","journal-title":"Adv Sci, Technol Eng Syst J"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-026-00847-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00847-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00847-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T09:22:33Z","timestamp":1772443353000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13677-026-00847-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,31]]},"references-count":62,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["847"],"URL":"https:\/\/doi.org\/10.1186\/s13677-026-00847-z","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,31]]},"assertion":[{"value":"6 November 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors agree to publish the research in this journal.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"29"}}