{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T13:45:10Z","timestamp":1773063910055,"version":"3.50.1"},"reference-count":35,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"vor","delay-in-days":144,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062094","type":"journal-article","created":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T08:46:29Z","timestamp":1746261989000},"page":"5129-5153","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":5,"title":["A Two-Layer Network Intrusion Detection Method Incorporating LSTM and Stacking Ensemble Learning"],"prefix":"10.32604","volume":"83","author":[{"given":"Jun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chaoren","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Yihong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Huimin","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Kerang","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Hoekyung","family":"Jung","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/s10489-022-03361-2","article-title":"A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data","volume":"53","author":"Cui","year":"2023","journal-title":"Appl Intell"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1016\/j.future.2022.01.026","article-title":"Imbalanced data classification: a KNN and generative adversarial networks-based hybrid approach for intrusion detection","volume":"131","author":"Ding","year":"2022","journal-title":"Future Gener Comput Syst"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1007\/s10489-020-01886-y","article-title":"I-SiamIDS: an improved Siam-IDS for handling class imbalance in network-based intrusion detection systems","volume":"51","author":"Bedi","year":"2021","journal-title":"Appl Intell"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.dcan.2023.03.008","article-title":"IDS-INT: intrusion detection system using transformer-based transfer learning for imbalanced network traffic","volume":"10","author":"Ullah","year":"2024","journal-title":"Digit Commun Netw"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1765","DOI":"10.1007\/s00500-023-09452-7","article-title":"ML-IDS: an efficient ML-enabled intrusion detection system for securing IoT networks and applications","volume":"28","author":"Al-Ambusaidi","year":"2024","journal-title":"Soft Comput"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"5152","DOI":"10.1109\/TNSM.2022.3157344","article-title":"The cross-evaluation of machine learning-based network intrusion detection systems","volume":"19","author":"Apruzzese","year":"2022","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1007\/s10207-023-00803-x","article-title":"A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things","volume":"23","author":"Saheed","year":"2024","journal-title":"Int J Inf Secur"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"7409","DOI":"10.3390\/s22197409","article-title":"BoostedEnML: efficient technique for detecting cyberattacks in IoT systems using boosted ensemble machine learning","volume":"22","author":"Okey","year":"2022","journal-title":"Sensors"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"100936","DOI":"10.1016\/j.iot.2023.100936","article-title":"Enhancing IoT network security through deep learning-powered intrusion detection system","volume":"24","author":"Bakhsh","year":"2023","journal-title":"Internet Things"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"121912","DOI":"10.1016\/j.eswa.2023.121912","article-title":"Deep residual convolutional neural network: an efficient technique for intrusion detection system","volume":"238","author":"Sai Chaitanya Kumar","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"107543","DOI":"10.1016\/j.future.2024.107543","article-title":"CyberAIBot: artificial intelligence in an intrusion detection system for CyberSecurity in the IoT","volume":"166","author":"Serrano","year":"2025","journal-title":"Future Gener Comput Syst"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"4376","DOI":"10.3390\/s23094376","article-title":"A multi-layer intrusion detection system for SOME\/IP-based in-vehicle network","volume":"23","author":"Luo","year":"2023","journal-title":"Sensors"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.aej.2023.07.063","article-title":"An effective technique for detecting minority attacks in NIDS using deep learning and sampling approach","volume":"78","author":"Harini","year":"2023","journal-title":"Alex Eng J"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"138432","DOI":"10.1109\/ACCESS.2021.3118573","article-title":"A double-layered hybrid approach for network intrusion detection system using combined naive Bayes and SVM","volume":"9","author":"Wisanwanichthan","year":"2021","journal-title":"IEEE Access"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1109\/TEVC.2021.3100056","article-title":"Evolutionary multitasking for feature selection in high-dimensional classification via particle swarm optimization","volume":"26","author":"Chen","year":"2022","journal-title":"IEEE Trans Evol Comput"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"125084","DOI":"10.1016\/j.eswa.2024.125084","article-title":"An adaptive pyramid PSO for high-dimensional feature selection","volume":"257","author":"Jin","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"109464","DOI":"10.1016\/j.asoc.2022.109464","article-title":"An adaptive and altruistic PSO-based deep feature selection method for Pneumonia detection from chest X-rays","volume":"128","author":"Pramanik","year":"2022","journal-title":"Appl Soft Comput"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"107804","DOI":"10.1016\/j.patcog.2020.107804","article-title":"Feature selection using bare-bones particle swarm optimization with mutual information","volume":"112","author":"Song","year":"2021","journal-title":"Pattern Recognit"},{"key":"ref19","series-title":"Proceedings of the 4th International Conference on Information Systems Security and Privacy","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","author":"Sharafaldin","year":"2018 Jan 22\u201324"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"81","DOI":"10.15514\/ISPRAS-2020-32(5)-6","article-title":"Synthesis of a machine learning model for detecting computer attacks based on the CICIDS2017 dataset","volume":"32","author":"Goryunov","year":"2020","journal-title":"Proc ISP RAS"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"132911","DOI":"10.1109\/ACCESS.2020.3009843","article-title":"CICIDS-2017 dataset feature analysis with information gain for anomaly detection","volume":"8","author":"Kurniabudi","year":"2020","journal-title":"IEEE Access"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"56046","DOI":"10.1109\/ACCESS.2018.2872784","article-title":"Data mining techniques in intrusion detection systems: a systematic literature review","volume":"6","author":"Salo","year":"2018","journal-title":"IEEE Access"},{"key":"ref23","author":"Morris","year":"2014","journal-title":"Critical infrastructure protection VIII"},{"key":"ref24","series-title":"International Conference on Science of Cyber Security","article-title":"An intrusion detection system based on deep belief networks","author":"Belarbi","year":"2022"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"102834","DOI":"10.1016\/j.cose.2022.102834","volume":"121","author":"Yun","year":"2022","journal-title":"Comput Secur"},{"key":"ref26","first-page":"4297","article-title":"A new industrial intrusion detection method based on CNN-BiLSTM","volume":"79","author":"Wang","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"3915","DOI":"10.1109\/TNSM.2023.3259474","article-title":"A novel multi-stage approach for hierarchical intrusion detection","volume":"20","author":"Verkerken","year":"2023","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1942847","DOI":"10.1155\/2022\/1942847","article-title":"Network intrusion detection technology based on convolutional neural network and BiGRU","volume":"2022","author":"Cao","year":"2022","journal-title":"Comput Intell Neurosci"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"108455","DOI":"10.1016\/j.compeleceng.2022.108455","article-title":"The sound of intrusion: a novel network intrusion detection system","volume":"104","author":"Aldarwbi","year":"2022","journal-title":"Comput Electr Eng"},{"key":"ref30","first-page":"4025","article-title":"Intrusion detection system with customized machine learning techniques for NSL-KDD dataset","volume":"77","author":"Zakariah","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"104146","DOI":"10.1016\/j.cose.2024.104146","article-title":"A hybrid CNN-LSTM approach for intelligent cyber intrusion detection system","volume":"148","author":"Bamber","year":"2025","journal-title":"Comput Secur"},{"key":"ref32","series-title":"ICC 2021\u2014IEEE International Conference on Communications","article-title":"FS-IDS: a novel few-shot learning based intrusion detection system for SCADA networks","author":"Ouyang","year":"2021 June 14\u201323"},{"key":"ref33","series-title":"2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","first-page":"1","article-title":"Anomaly-based intrusion detection in industrial data with SVM and random forests","author":"Anton","year":"2019 Sep 19\u201321"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.procs.2020.03.007","article-title":"On using physical based intrusion detection in SCADA systems","volume":"170","author":"Al-Asiri","year":"2020","journal-title":"Procedia Comput Sci"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"4184","DOI":"10.3390\/app12094184","article-title":"Network intrusion detection model based on CNN and GRU","volume":"12","author":"Cao","year":"2022","journal-title":"Appl Sci"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_62094\/TSP_CMC_62094.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:29:16Z","timestamp":1763342956000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":35,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062094","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-12-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-10","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}