{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T01:40:40Z","timestamp":1775698840413,"version":"3.50.1"},"reference-count":88,"publisher":"Tech Science Press","issue":"2","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"vor","delay-in-days":328,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.055891","type":"journal-article","created":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T07:56:16Z","timestamp":1731398176000},"page":"2053-2076","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":6,"title":["A Review of Generative Adversarial Networks for Intrusion Detection Systems: Advances, Challenges, and Future Directions"],"prefix":"10.32604","volume":"81","author":[{"given":"Monirah","family":"Al-Ajlan","sequence":"first","affiliation":[]},{"given":"Mourad","family":"Ykhlef","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","first-page":"1525","article-title":"Advanced optimized anomaly detection system for IoT cyberattacks using Artificial Intelligence","volume":"78","author":"Farea","year":"2024","journal-title":"Comput. Mater. Contin."},{"key":"ref2","first-page":"25","article-title":"Network security concepts, dangers, and defense best practical","volume":"14","author":"Arogundade","year":"2023","journal-title":"Comput. Eng. Intell. Syst."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"25","DOI":"10.4236\/ojop.2023.122003","article-title":"Data integrity and risk","volume":"12","author":"Duggineni","year":"2023","journal-title":"Open J. Optim."},{"key":"ref4","first-page":"467","article-title":"Enhance intrusion detection in computer networks based on deep extreme learning machine","volume":"66","author":"Khan","year":"2021","journal-title":"Comput. Mater. Contin."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1016\/j.future.2018.09.051","article-title":"BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks","volume":"93","author":"Viegas","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref6","first-page":"671","article-title":"Deep learning-based hybrid intelligent intrusion detection system","volume":"68","author":"Khan","year":"2021","journal-title":"Comput. Mater. Contin."},{"key":"ref7","doi-asserted-by":"crossref","first-page":"65","DOI":"10.32604\/iasc.2021.016140","article-title":"Intrusion detection using a new hybrid feature selection model","volume":"30","author":"Mohammad","year":"2021","journal-title":"Intell. Autom. Soft Comput."},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110495","article-title":"Applying self-supervised learning to network intrusion detection for network flows with graph neural network","volume":"248","author":"Xu","year":"2024, Art. no. 110495","journal-title":"Comput. Netw."},{"key":"ref9","series-title":"2020 IEEE Int. Conf. Inform., IoT, Enabling Technol. (ICIoT)","first-page":"163","article-title":"Hybrid machine learning for network anomaly intrusion detection","author":"Chkirbene","year":"2020"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.3390\/info14080462","article-title":"A comprehensive study of ChatGPT: Advancements, limitations, and ethical considerations in natural language processing and cybersecurity","volume":"14","author":"Alawida","year":"2023, Art. no. 462","journal-title":"Information"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"14985","DOI":"10.1109\/ACCESS.2018.2886814","article-title":"Recent advances of generative adversarial networks in computer vision","volume":"7","author":"Cao","year":"2018","journal-title":"IEEE Access"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-018-1072-9","article-title":"Generative adversarial network for medical images (MI-GAN)","volume":"42","author":"Iqbal","year":"2018","journal-title":"J. Med. Syst."},{"key":"ref13","first-page":"2541","article-title":"Chained dual-generative adversarial network: A generalized defense against adversarial attacks","volume":"74","author":"Singh","year":"2023","journal-title":"Comput. Mater. Contin."},{"key":"ref14","first-page":"1","article-title":"How generative adversarial networks and their variants work: An overview","volume":"52","author":"Hong","year":"2019","journal-title":"ACM Comput. Surv."},{"key":"ref15","series-title":"Proc. IEEE\/CVF Int. Conf. Comput. Vis.","first-page":"6701","article-title":"When do gans replicate? On the choice of dataset size","author":"Feng","year":"2021"},{"key":"ref16","unstructured":"A. Brock, J. Donahue, and K. Simonyan, \u201cLarge scale GAN training for high fidelity natural image synthesis,\u201d 2018, arXiv:1809.11096."},{"key":"ref17","doi-asserted-by":"crossref","first-page":"108","DOI":"10.5220\/0006639801080116","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume":"1","author":"Sharafaldin","year":"2018","journal-title":"Proc. 4th Int. Conf. Inform. Syst. Secur. Priv. (ICISSP)"},{"key":"ref18","series-title":"Proc. Connect","first-page":"1","article-title":"An introduction to intrusion-detection systems","volume":"2000","author":"Debar","year":"2000"},{"key":"ref19","series-title":"Int. Workshop Recent Adv. Intrusion Detect.","first-page":"173","article-title":"Using decision trees to improve signature-based intrusion detection","author":"Kruegel","year":"2003"},{"key":"ref20","first-page":"3365","article-title":"N-GAN: A novel anomaly-based network intrusion detection with generative adversarial networks","volume":"14","author":"Iliyasu","year":"2022","journal-title":"Int. J. Inform. Technol."},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103310","article-title":"Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems","volume":"132","author":"Huang","year":"2023, Art. no. 103310","journal-title":"Comput. Secur."},{"key":"ref22","first-page":"89","article-title":"Machine learning techniques for intrusion detection systems in SDN-recent advances, challenges and future directions","volume":"134","author":"Kumar","year":"2023","journal-title":"Comput. Model. Eng. Sci."},{"key":"ref23","series-title":"2022 IEEE 19th Int. Conf. Mobile Ad Hoc Smart Syst. (MASS)","first-page":"787","article-title":"Towards analysis of the performance of IDSs in software-defined networks","author":"Niknami","year":"2022"},{"key":"ref24","series-title":"2017 Seventh Int. Conf. Emerg. Secur. Technol. (EST)","first-page":"138","article-title":"Machine learning based intrusion detection system for software defined networks","author":"Abubakar","year":"2017"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.icte.2018.04.003","article-title":"Intelligent intrusion detection systems using artificial neural networks","volume":"4","author":"Shenfield","year":"2018","journal-title":"ICT Express"},{"key":"ref26","series-title":"Int. Conf. Comput. Sci., Commun. Secur.","first-page":"121","article-title":"Cyber intrusion detection using machine learning classification techniques","author":"Alqahtani","year":"2020"},{"key":"ref27","series-title":"Pacific-Asia Conf. Knowl. Discov. Data Min.","first-page":"149","article-title":"An anomaly intrusion detection system using C5 decision tree classifier","author":"Khraisat","year":"2018"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10922-021-09589-6","article-title":"AS-IDS: Anomaly and signature based ids for the internet of things","volume":"29","author":"Otoum","year":"2021","journal-title":"J. Netw. Syst. Manage."},{"key":"ref29","doi-asserted-by":"crossref","first-page":"146","DOI":"10.26599\/TST.2019.9010051","article-title":"A hybrid unsupervised clustering-based anomaly detection method","volume":"26","author":"Pu","year":"2020","journal-title":"Tsinghua Sci. Technol."},{"key":"ref30","doi-asserted-by":"crossref","first-page":"137","DOI":"10.3103\/S0146411621020085","article-title":"Design of anomaly-based intrusion detection system using fog computing for IoT network","volume":"55","author":"Kumar","year":"2021","journal-title":"Automa. Control Comput. Sci."},{"key":"ref31","article-title":"Attack-aware IoT network traffic routing leveraging ensemble learning","volume":"22","author":"Al-Haija","year":"2021, Art. no. 241","journal-title":"Sensors"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.3390\/s22166164","article-title":"Examining the suitability of NetFlow features in detecting IoT network intrusions","volume":"22","author":"Awad","year":"2022, Art. no. 6164","journal-title":"Sensors"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"67910","DOI":"10.1109\/ACCESS.2022.3186026","article-title":"Design and testing novel one-class classifier based on polynomial interpolation with application to networking security","volume":"10","author":"Dini","year":"2022","journal-title":"IEEE Access"},{"key":"ref34","doi-asserted-by":"crossref","unstructured":"M. Sarhan, G. Kulatilleke, W. W. Lo, S. Layeghy, and M. Portmann, \u201cDOC-NAD: A hybrid deep one-class classifier for network anomaly detection,\u201d 2022, arXiv:2212.07558.","DOI":"10.1109\/CCGridW59191.2023.00016"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"4553502","DOI":"10.1155\/2022\/4553502","article-title":"A hybrid model for intrusion detection in IoT applications","volume":"2022","author":"Alghamdi","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/6639714","article-title":"The anomaly-and signature-based IDS for network security using hybrid inference systems","volume":"2021","author":"Einy","year":"2021","journal-title":"Math. Probl. Eng."},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.3390\/electronics8111210","article-title":"A novel ensemble of hybrid intrusion detection system for detecting Internet of Things attacks","volume":"8","author":"Khraisat","year":"2019, Art. no. 1210","journal-title":"Electronics"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.3390\/electronics9040577","article-title":"A novel hybrid IDS based on modified NSGAII-ANN and random forest","volume":"9","author":"Golrang","year":"2020, Art. no. 577","journal-title":"Electronics"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.cose.2014.05.011","article-title":"An empirical comparison of botnet detection methods","volume":"45","author":"Garcia","year":"2014","journal-title":"Comput. Secur. J."},{"key":"ref40","doi-asserted-by":"crossref","first-page":"636","DOI":"10.1016\/j.procs.2020.03.330","article-title":"A review of the advancement in intrusion detection datasets","volume":"167","author":"Thakkar","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"ref41","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/846183.846194","article-title":"KDD-99: The fifth ACM SIGKDD international conference on knowledge discovery and data mining","volume":"1","author":"Chaudhuri","year":"2000","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"ref42","series-title":"Big Data Technologies and Applications","first-page":"117","article-title":"Netflow datasets for machine learning-based network intrusion detection systems","volume":"371","author":"Sarhan","year":"2021"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.3390\/app132212492","article-title":"An effective method for detecting unknown types of attacks based on log-cosh variational autoencoder","volume":"13","author":"Yu","year":"2023, Art. no. 12492","journal-title":"Appl. Sci."},{"key":"ref44","first-page":"1","article-title":"Evaluating intrusion detection systems without attacking your friends: The 1998 DARPA intrusion detection evaluation","volume":"99","author":"Cunningham","year":"1999","journal-title":"Proc. ID"},{"key":"ref45","series-title":"2018 Fifth HCT Inform. Technol. Trends (ITT)","first-page":"286","article-title":"A survey of intrusion detection models based on NSL-KDD data set","author":"Thomas","year":"2018"},{"key":"ref46","series-title":"2013 IEEE Wireless Commun. Netw. Conf. (WCNC)","first-page":"4487","article-title":"Generation of a new IDS test dataset: Time to retire the KDD collection","author":"Creech","year":"2013"},{"key":"ref47","series-title":"2015 Mil. Communi. Inform. Syst. Conf. (MilCIS)","first-page":"1","article-title":"UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)","author":"Moustafa","year":"2015"},{"key":"ref48","series-title":"2021 6th Int. Conf. Commun. Electron. Syst. (ICCES)","first-page":"1","article-title":"Generative adversarial network (GAN): A general review on different variants of GAN and applications","author":"Durgadevi","year":"2021"},{"key":"ref49","doi-asserted-by":"crossref","DOI":"10.1186\/s40537-022-00648-6","article-title":"The use of generative adversarial networks to alleviate class imbalance in tabular data: A survey","volume":"9","author":"Sauber-Cole","year":"2022","journal-title":"J. Big Data"},{"key":"ref50","author":"Kalin","year":"2018","journal-title":"Generative Adversarial Networks Cookbook: Over 100 Recipes to Build Generative Models Using Python, TensorFlow, and Keras"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1007\/s11831-019-09388-y","article-title":"Applications of generative adversarial networks (GANs): An updated review","volume":"28","author":"Alqahtani","year":"2021","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref52","doi-asserted-by":"crossref","first-page":"2665","DOI":"10.1007\/s11263-020-01348-5","article-title":"RoCGAN: Robust conditional GAN","volume":"128","author":"Chrysos","year":"2020","journal-title":"Int. J. Comput. Vis."},{"key":"ref53","unstructured":"M. Mirza and S. Osindero, \u201cConditional generative adversarial nets,\u201d  2014, arXiv:1411.1784."},{"key":"ref54","series-title":"Proc. IEEE Int. Conf. Comput. Vis.","first-page":"2223","article-title":"Unpaired image-to-image translation using cycle-consistent adversarial networks","author":"Zhu","year":"2017"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-021-00414-0","article-title":"A survey on generative adversarial networks for imbalance problems in computer vision tasks","volume":"8","author":"Sampath","year":"2021","journal-title":"J. Big Data"},{"key":"ref56","unstructured":"A. Radford, L. Metz, and S. Chintala, \u201cUnsupervised representation learning with deep convolutional generative adversarial networks,\u201d 2015, arXiv:1511.06434."},{"key":"ref57","unstructured":"T. Karras, T. Aila, S. Laine, and J. Lehtinen, \u201cProgressive growing of gans for improved quality, stability, and variation,\u201d 2017, arXiv:1710.10196."},{"key":"ref58","series-title":"Proc. IEEE\/CVF Winter Conf. Appl. Comput. Vis.","first-page":"3821","article-title":"GraN-GAN: Piecewise gradient normalization for generative adversarial networks","author":"Bhaskara","year":"2022"},{"key":"ref59","first-page":"27","article-title":"Generative adversarial nets","volume":"27","author":"Goodfellow","year":"2014","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref60","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2020.102177","article-title":"IGAN-IDS: An imbalanced generative adversarial network towards intrusion detection system in ad-hoc networks","volume":"105","author":"Huang","year":"2020, Art. no. 102177","journal-title":"Ad Hoc Netw."},{"key":"ref61","doi-asserted-by":"crossref","first-page":"2330","DOI":"10.1109\/JIOT.2022.3211346","article-title":"An enhanced AI-based network intrusion detection system using generative adversarial networks","volume":"10","author":"Park","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref62","doi-asserted-by":"crossref","DOI":"10.3390\/s23010550","article-title":"An imbalanced generative adversarial network-based approach for network intrusion detection in an imbalanced dataset","volume":"23","author":"Rao","year":"2023, Art. no. 550","journal-title":"Sensors"},{"key":"ref63","doi-asserted-by":"crossref","DOI":"10.3390\/app13042576","article-title":"MCGAN: Modified conditional generative adversarial network (MCGAN) for class imbalance problems in network intrusion detection system","volume":"13","author":"Babu","year":"2023, Art. no. 2576","journal-title":"Appl. Sci."},{"key":"ref64","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101212","article-title":"SYN-GAN: A robust intrusion detection system using GAN-based synthetic data for IoT security","volume":"26","author":"Rahman","year":"2024, Art. no. 101212","journal-title":"Internet of Things"},{"key":"ref65","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.117936","article-title":"Generating realistic cyber data for training and evaluating machine learning classifiers for network intrusion detection systems","volume":"207","author":"Chal\u00e9","year":"2022, Art. no. 117936","journal-title":"Expert. Syst. Appl."},{"key":"ref66","article-title":"Network intrusion detection: An optimized deep learning approach using big data analytics","volume":"251","author":"Mary","year":"2024, Art. no. 123919","journal-title":"Expert. Syst. Appl."},{"key":"ref67","doi-asserted-by":"crossref","DOI":"10.3390\/jsan12050068","article-title":"A multi-agent intrusion detection system optimized by a deep reinforcement learning approach with a dataset enlarged using a generative model to reduce the bias effect","volume":"12","author":"Mouyart","year":"2023","journal-title":"J. Sens. Actuator Netw."},{"key":"ref68","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.115782","article-title":"Adversarial machine learning in network intrusion detection systems","volume":"186","author":"Alhajjar","year":"2021, Art. no. 115782","journal-title":"Expert. Syst. Appl."},{"key":"ref69","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.procs.2021.04.118","article-title":"Attackgan: Adversarial attack against black-box ids using generative adversarial networks","volume":"187","author":"Zhao","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref70","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1109\/TCYB.2022.3163811","article-title":"Deep generative learning models for cloud intrusion detection systems","volume":"53","author":"Vu","year":"2022","journal-title":"IEEE Trans. Cybern."},{"key":"ref71","series-title":"2021 Int. Wireless Commun. Mobile Comput. (IWCMC)","first-page":"831","article-title":"Data augmentation for intrusion detection and classification in cloud networks","author":"Chkirbene","year":"2021"},{"key":"ref72","doi-asserted-by":"crossref","first-page":"55526","DOI":"10.1109\/ACCESS.2020.2981162","article-title":"Cyber intrusion prevention for large-scale semi-supervised deep learning based on local and non-local regularization","volume":"8","author":"Xian","year":"2020","journal-title":"IEEE Access"},{"key":"ref73","series-title":"Int. Conf. Natural Comput. Fuzzy Syst. Knowl. Discov.","first-page":"228","article-title":"Network traffic anomaly detection based on generative adversarial network and transformer","author":"Wang","year":"2022"},{"key":"ref74","series-title":"2020 IEEE Int. Conf. Big Data (Big Data)","first-page":"33","article-title":"Tadgan: Time series anomaly detection using generative adversarial networks","author":"Geiger","year":"2020"},{"key":"ref75","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2023.108626","article-title":"Anomaly based network intrusion detection for IoT attacks using deep learning technique","volume":"107","author":"Sharma","year":"2023, Art. no. 108626","journal-title":"Comput. Electr. Eng."},{"key":"ref76","doi-asserted-by":"crossref","first-page":"165907","DOI":"10.1109\/ACCESS.2021.3132127","article-title":"A framework for anomaly detection in IoT networks using conditional generative adversarial networks","volume":"9","author":"Ullah","year":"2021","journal-title":"IEEE Access"},{"key":"ref77","doi-asserted-by":"crossref","first-page":"177667","DOI":"10.1109\/ACCESS.2020.3025530","article-title":"Design and development of AD-CGAN: Conditional generative adversarial networks for anomaly detection","volume":"8","author":"Ezeme","year":"2020","journal-title":"IEEE Access"},{"key":"ref78","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2023.103622","article-title":"Scalable anomaly-based intrusion detection for secure Internet of Things using generative adversarial networks in fog environment","volume":"214","author":"Yao","year":"2023, Art. no. 103622","journal-title":"J. Netw. Comput. Appl."},{"key":"ref79","doi-asserted-by":"crossref","DOI":"10.3390\/s21196432","article-title":"IoT intrusion detection taxonomy, reference architecture, and analyses","volume":"21","author":"Albulayhi","year":"2021, Art. no. 6432","journal-title":"Sensors"},{"key":"ref80","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2022.105805","article-title":"GAN-AE: An unsupervised intrusion detection system for MQTT networks","volume":"119","author":"Boppana","year":"2023, Art. no. 105805","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref81","doi-asserted-by":"crossref","first-page":"1949","DOI":"10.1007\/s11276-022-03182-8","article-title":"Dynamic distributed generative adversarial network for intrusion detection system over internet of things","volume":"29","author":"Balaji","year":"2023","journal-title":"Wirel. Netw."},{"key":"ref82","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103910","article-title":"Automated federated learning for intrusion detection of industrial control systems based on evolutionary neural architecture search","volume":"143","author":"Shao","year":"2024, Art. no. 103910","journal-title":"Comput. Secur."},{"key":"ref83","doi-asserted-by":"crossref","DOI":"10.3390\/s23031315","article-title":"Development of a machine-learning intrusion detection system and testing of its performance using a generative adversarial network","volume":"23","author":"Mari","year":"2023, Art. no. 1315","journal-title":"Sensors"},{"key":"ref84","doi-asserted-by":"crossref","DOI":"10.3390\/s23187796","article-title":"SGAN-IDS: Self-attention-based generative adversarial network against intrusion detection systems","volume":"23","author":"Aldhaheri","year":"2023, Art. no. 7796","journal-title":"Sensors"},{"key":"ref85","doi-asserted-by":"crossref","DOI":"10.3390\/s24092746","article-title":"DRL-GAN: A hybrid approach for binary and multiclass network intrusion detection","volume":"24","author":"Strickland","year":"2024, Art. no. 2746","journal-title":"Sensors"},{"key":"ref86","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/978-3-030-38557-6_16","article-title":"A hybrid deep generative local metric learning method for intrusion detection","author":"Saharkhizan","year":"2020","journal-title":"Handbook of Big Data Privacy"},{"key":"ref87","first-page":"177","article-title":"Towards a reliable intrusion detection benchmark dataset","volume":"2018","author":"Sharafaldin","year":"2018","journal-title":"Softw. Netw."},{"key":"ref88","doi-asserted-by":"crossref","first-page":"3211","DOI":"10.1007\/s11831-020-09496-0","article-title":"A review on machine learning and deep learning perspectives of IDS for IoT: Recent updates, security issues, and challenges","volume":"28","author":"Thakkar","year":"2021","journal-title":"Arch. Comput. Methods Eng."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-2\/TSP_CMC_55891\/TSP_CMC_55891.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T04:13:01Z","timestamp":1741320781000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n2\/58647"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":88,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.055891","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-07-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-16","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-18","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}