{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T09:37:12Z","timestamp":1765877832791,"version":"3.48.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T00:00:00Z","timestamp":1765843200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T00:00:00Z","timestamp":1765843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100002383","name":"King Saud University","doi-asserted-by":"publisher","award":["ORF-2025-R295"],"award-info":[{"award-number":["ORF-2025-R295"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"DOI":"10.1186\/s40537-025-01329-w","type":"journal-article","created":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T06:45:23Z","timestamp":1765867523000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DeepSecure: a novel deep learning model for effective detection of attacks on big data in Internet of Urban Things"],"prefix":"10.1186","volume":"12","author":[{"given":"Laiba","family":"Sabir","sequence":"first","affiliation":[]},{"given":"Nadeem","family":"Javaid","sequence":"additional","affiliation":[]},{"given":"Mariam","family":"Akbar","sequence":"additional","affiliation":[]},{"given":"Nabil","family":"Alrajeh","sequence":"additional","affiliation":[]},{"given":"Safdar","family":"Hussain Bouk","sequence":"additional","affiliation":[]},{"given":"Abdulaziz","family":"Aldegheishem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,16]]},"reference":[{"key":"1329_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2024.e34821","author":"X Ma","year":"2024","unstructured":"Ma X, Li J, Guo Z, Wan Z. Role of big data and technological advancements in monitoring and development of smart cities. Heliyon. 2024. https:\/\/doi.org\/10.1016\/j.heliyon.2024.e34821.","journal-title":"Heliyon"},{"key":"1329_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2025.103123","author":"MA Khan","year":"2025","unstructured":"Khan MA, Javaid N, Alrajeh N, Bouk SH. Topology rewiring strategies to construct robust scale-free medical Internet of Things networks. Simul Model Pract Theory. 2025. https:\/\/doi.org\/10.1016\/j.simpat.2025.103123.","journal-title":"Simul Model Pract Theory"},{"key":"1329_CR3","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1016\/j.comcom.2020.01.016","volume":"151","author":"MA Amanullah","year":"2020","unstructured":"Amanullah MA, Habeeb RAA, Nasaruddin FH, Gani A, Ahmed E, Nainar ASM, et al. Deep learning and big data technologies for IoT security. Comput Commun. 2020;151:495\u2013517.","journal-title":"Comput Commun"},{"issue":"11","key":"1329_CR4","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.3390\/electronics10111257","volume":"10","author":"MA Ferrag","year":"2021","unstructured":"Ferrag MA, Shu L, Djallel H, Choo KKR. Deep learning-based intrusion detection for distributed denial of service attack in agriculture 4.0. Electron. 2021;10(11):1257.","journal-title":"Electron"},{"key":"1329_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2021.12.013","volume":"185","author":"MA Khan","year":"2022","unstructured":"Khan MA, Javaid N. Computationally efficient topology optimization of scale-free IoT networks. Comput Commun. 2022;185:1\u201312.","journal-title":"Comput Commun"},{"key":"1329_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100631","volume":"52","author":"B Bala","year":"2024","unstructured":"Bala B, Behal S. AI techniques for IoT-based DDoS attack detection: taxonomies, comprehensive review and research challenges. Comput Sci Rev. 2024;52:100631.","journal-title":"Comput Sci Rev"},{"issue":"2","key":"1329_CR7","first-page":"34","volume":"12","author":"A Awajan","year":"2023","unstructured":"Awajan A. A novel deep learning-based intrusion detection system for IOT networks. Computing. 2023;12(2):34.","journal-title":"Computing"},{"key":"1329_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2023.102211","author":"RA Elsayed","year":"2023","unstructured":"Elsayed RA, Hamada RA, Abdalla MI, Elsaid SA. Securing IoT and SDN systems using deep-learning based automatic intrusion detection. Ain Shams Eng J. 2023. https:\/\/doi.org\/10.1016\/j.asej.2023.102211.","journal-title":"Ain Shams Eng J"},{"key":"1329_CR9","doi-asserted-by":"crossref","unstructured":"Nascita A, Cerasuolo F, Di Monda D, Garcia JTA, Montieri A, Pescape A. Machine and deep learning approaches for IoT attack classification. In: IEEE INFOCOM 2022-IEEE conference on computer communications workshops (INFOCOM WKSHPS). IEEE; 2022. p. 1\u20136.","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9797971"},{"key":"1329_CR10","doi-asserted-by":"crossref","unstructured":"Kale R, Lu Z, Fok KW, Thing VL. A hybrid deep learning anomaly detection framework for intrusion detection. In: 2022 IEEE 8th international conference on big data security on cloud (BigDataSecurity), IEEE international conference on high performance and smart computing (HPSC) and IEEE international conference on intelligent data and security (IDS). IEEE; 2022. p. 137\u2013142.","DOI":"10.1109\/BigDataSecurityHPSCIDS54978.2022.00034"},{"key":"1329_CR11","doi-asserted-by":"crossref","unstructured":"Tasnim A, Hossain N, Parvin N, Tabassum S, Rahman R, Hossain MI. Experimental analysis of classification for different Internet of Things (IoT) network attacks using machine learning and deep learning. In: 2022 international conference on decision aid sciences and applications (DASA). IEEE; 2022. p. 406\u201310.","DOI":"10.1109\/DASA54658.2022.9765108"},{"key":"1329_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108661","volume":"203","author":"EM Campos","year":"2022","unstructured":"Campos EM, Saura PF, Gonzalez-Vidal A, Hernandez-Ramos JL, Bernabe JB, Baldini G, et al. Evaluating federated learning for intrusion detection in Internet of Things: review and challenges. Comput Netw. 2022;203:108661.","journal-title":"Comput Netw"},{"issue":"9","key":"1329_CR13","doi-asserted-by":"publisher","first-page":"8852","DOI":"10.1109\/JIOT.2020.2996425","volume":"7","author":"M Saharkhizan","year":"2020","unstructured":"Saharkhizan M, Azmoodeh A, Dehghantanha A, Choo KKR, Parizi RM. An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic. IEEE Internet Things J. 2020;7(9):8852\u20139.","journal-title":"IEEE Internet Things J"},{"key":"1329_CR14","doi-asserted-by":"publisher","first-page":"138509","DOI":"10.1109\/ACCESS.2021.3118642","volume":"9","author":"MA Ferrag","year":"2021","unstructured":"Ferrag MA, Friha O, Maglaras L, Janicke H, Shu L. Federated deep learning for cyber security in the internet of things: concepts, applications, and experimental analysis. IEEE Access. 2021;9:138509\u201342.","journal-title":"IEEE Access"},{"key":"1329_CR15","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.ins.2023.03.052","volume":"634","author":"W Ding","year":"2023","unstructured":"Ding W, Abdel-Basset M, Mohamed R. DeepAK-IoT: an effective deep learning model for cyberattack detection in IoT networks. Inf Sci. 2023;634:157\u201371.","journal-title":"Inf Sci"},{"key":"1329_CR16","doi-asserted-by":"crossref","unstructured":"Guo G, Pan X, Liu H, Li F, Pei L, Hu K. An IoT intrusion detection system based on TON IoT network dataset. In: 2023 IEEE 13th annual computing and communication workshop and conference (CCWC). IEEE; 2023. p. 0333\u20138.","DOI":"10.1109\/CCWC57344.2023.10099144"},{"key":"1329_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102662","volume":"163","author":"GDLT Parra","year":"2020","unstructured":"Parra GDLT, Rad P, Choo KKR, Beebe N. Detecting internet of things attacks using distributed deep learning. J Netw Comput Appl. 2020;163:102662.","journal-title":"J Netw Comput Appl"},{"key":"1329_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108214","volume":"102","author":"PLS Jayalaxmi","year":"2022","unstructured":"Jayalaxmi PLS, Kumar G, Saha R, Conti M, Kim TH, Thomas R. DeBot: a deep learning-based model for bot detection in industrial internet-of-things. Comput Electr Eng. 2022;102:108214.","journal-title":"Comput Electr Eng"},{"issue":"2","key":"1329_CR19","first-page":"1059","volume":"23","author":"I Idrissi","year":"2021","unstructured":"Idrissi I, Azizi M, Moussaoui O. Accelerating the update of a DL-based IDS for IoT using deep transfer learning. Indones J Electr Eng Comput Sci. 2021;23(2):1059\u201367.","journal-title":"Indones J Electr Eng Comput Sci"},{"issue":"3","key":"1329_CR20","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1109\/LWC.2021.3133479","volume":"11","author":"NAE Kuadey","year":"2021","unstructured":"Kuadey NAE, Maale GT, Kwantwi T, Sun G, Liu G. DeepSecure: detection of distributed denial of service attacks on 5G network slicing deep learning approach. IEEE Wirel Commun Lett. 2021;11(3):488\u201392.","journal-title":"IEEE Wirel Commun Lett"},{"key":"1329_CR21","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi A, Moustafa N, Tari Z, Mahmood A, Anwar A. TON_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access. 2020;8:165130\u201350.","journal-title":"IEEE Access"},{"key":"1329_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124182","volume":"253","author":"N Shahzadi","year":"2024","unstructured":"Shahzadi N, Javaid N, Akbar M, Aldegheishem A, Alrajeh N, Bouk SH. A novel data driven approach for combating energy theft in urbanized smart grids using artificial intelligence. Expert Syst Appl. 2024;253:124182.","journal-title":"Expert Syst Appl"},{"key":"1329_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2024.100434","volume":"7","author":"E Osa","year":"2024","unstructured":"Osa E, Orukpe PE, Iruansi U. Design and implementation of a deep neural network approach for intrusion detection systems. e-Prime-Adv Elect Eng Electron Energy. 2024;7:100434.","journal-title":"e-Prime-Adv Elect Eng Electron Energy"},{"issue":"1","key":"1329_CR24","first-page":"1519","volume":"46","author":"D Durairaj","year":"2024","unstructured":"Durairaj D, Venkatasamy TK, Mehbodniya A, Umar S, Alam T. Intrusion detection and mitigation of attacks in microgrid using enhanced deep belief network. Energy Sources Part A Recover Util Environ Eff. 2024;46(1):1519\u201341.","journal-title":"Energy Sources Part A Recover Util Environ Eff"},{"key":"1329_CR25","unstructured":"Ahmad MA. Advancing generative modelling and applications with Boltzmann machines, restricted Boltzmann machines, and sum-product networks. 2025."},{"issue":"3","key":"1329_CR26","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1016\/j.icte.2024.04.012","volume":"10","author":"R Sahay","year":"2024","unstructured":"Sahay R, Nayyar A, Shrivastava RK, Bilal M, Singh SP, Pack S. Routing attack induced anomaly detection in IoT network using RBM-LSTM. ICT Express. 2024;10(3):459\u201364.","journal-title":"ICT Express"},{"key":"1329_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2025.113284","volume":"315","author":"I Shaheen","year":"2025","unstructured":"Shaheen I, Javaid N, Rahim A, Alrajeh N, Kumar N. Empowering early predictions: a paradigm shift in diabetes risk assessment with deep active learning. Knowl Based Syst. 2025;315:113284.","journal-title":"Knowl Based Syst"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01329-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01329-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01329-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T09:34:05Z","timestamp":1765877645000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s40537-025-01329-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,16]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1329"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01329-w","relation":{},"ISSN":["2196-1115"],"issn-type":[{"type":"electronic","value":"2196-1115"}],"subject":[],"published":{"date-parts":[[2025,12,16]]},"assertion":[{"value":"1 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"273"}}