{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T11:39:00Z","timestamp":1772192340693,"version":"3.50.1"},"reference-count":35,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065031","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T03:15:10Z","timestamp":1749438910000},"page":"2391-2410","source":"Crossref","is-referenced-by-count":1,"title":["Addressing Modern Cybersecurity Challenges: A Hybrid Machine Learning and Deep Learning Approach for Network Intrusion Detection"],"prefix":"10.32604","volume":"84","author":[{"given":"Khadija","family":"Bouzaachane","sequence":"first","affiliation":[]},{"given":"El Mahdi El","family":"Guarmah","sequence":"additional","affiliation":[]},{"given":"Abdullah M.","family":"Alnajim","sequence":"additional","affiliation":[]},{"given":"Sheroz","family":"Khan","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"5305","DOI":"10.3390\/s20185305","volume":"20","author":"Radoglou Grammatikis","year":"2020","journal-title":"Sensors"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/SURV.2012.010912.00035","article-title":"A survey on cyber security for smart grid communications","volume":"14","author":"Yan","year":"2012","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"7464","DOI":"10.3390\/s23177464","article-title":"Ensemble model based on hybrid deep learning for intrusion detection in smart grid networks","volume":"23","author":"AlHaddad","year":"2023","journal-title":"Sensors"},{"key":"ref4","series-title":"2019 IEEE Pune Section International Conference (PuneCon)","first-page":"1","article-title":"Internet of things (IoT): a survey","author":"Kavre","year":"2019 Dec 18\u201320"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"2224","DOI":"10.1109\/COMST.2019.2904897","article-title":"Deep learning in mobile and wireless networking: a survey","volume":"21","author":"Zhang","year":"2019","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"198","DOI":"10.3390\/electronics11020198","article-title":"Detecting cybersecurity attacks in Internet of Things using artificial intelligence methods: a systematic literature review","volume":"11","author":"Abdullahi","year":"2022","journal-title":"Electronics"},{"key":"ref7","series-title":"Proceedings of Sixth International Congress on Information and Communication Technology","first-page":"815","article-title":"Cross-datasets evaluation of machine learning models for intrusion detection systems","author":"Al-Riyami","year":"2021"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"5152","DOI":"10.1109\/TNSM.2022.3157344","article-title":"The cross-evaluation of machine learning-based network intrusion detection systems","volume":"19","author":"Apruzzese","year":"2022","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"972","DOI":"10.3390\/jcp4040045","article-title":"Applications of machine learning in cyber security: a review","volume":"4","author":"Vourganas","year":"2024","journal-title":"J Cybersecur Priv"},{"key":"ref10","unstructured":"Luay M, Layeghy S, Hosseininoorbin S, Sarhan M, Moustafa N, Portmann M. Temporal analysis of NetFlow datasets for network intrusion detection systems. arXiv:2503.04404. 2025."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.1016\/j.procs.2020.04.133","article-title":"Performance analysis of machine learning algorithms in intrusion detection system: a review","volume":"171","author":"Saranya","year":"2020","journal-title":"Procedia Comput Sci"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"22351","DOI":"10.1109\/ACCESS.2021.3056614","article-title":"Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset","volume":"9","author":"Maseer","year":"2021","journal-title":"IEEE Access"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"243","DOI":"10.3390\/fi15070243","article-title":"Machine learning for network intrusion detection\u2014a comparative study","volume":"15","author":"Al Lail","year":"2023","journal-title":"Future Internet"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"132911","DOI":"10.1109\/ACCESS.2020.3009843","article-title":"CICIDS-2017 dataset feature analysis with information gain for anomaly detection","volume":"8","author":"Kurniabudi","year":"2020","journal-title":"IEEE Access"},{"key":"ref15","series-title":"2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","first-page":"1","article-title":"Evaluation of machine learning algorithms for anomaly detection","author":"Elmrabit","year":"2020 Jun 15\u201319"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"107840","DOI":"10.1016\/j.comnet.2021.107840","article-title":"Machine learning methods for cyber security intrusion detection: datasets and comparative study","volume":"188","author":"Kilincer","year":"2021","journal-title":"Comput Netw"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"e820","DOI":"10.7717\/peerj-cs.820","article-title":"Network intrusion detection using oversampling technique and machine learning algorithms","volume":"8","author":"Ahmed","year":"2022","journal-title":"PeerJ Comput Sci"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"241","DOI":"10.30630\/joiv.7.1.1041","article-title":"Impact of data balancing and feature selection on machine learning-based network intrusion detection","volume":"7","author":"Barkah","year":"2023","journal-title":"JOIV: Int J Inform Visualization"},{"key":"ref19","series-title":"2021 18th International Conference on Privacy, Security and Trust (PST)","first-page":"1","article-title":"An effective intrusion detection model for class-imbalanced learning based on SMOTE and attention mechanism","author":"Jiao","year":"2021 Dec 13\u201315"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1049\/cps2.12013","article-title":"Network intrusion detection using machine learning approaches: addressing data imbalance","volume":"7","author":"Ahsan","year":"2022","journal-title":"IET Cyber Phys Syst Theory Appl"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"32150","DOI":"10.1109\/ACCESS.2020.2973219","article-title":"Increasing the performance of machine learning-based IDSs on an imbalanced and up-to-date dataset","volume":"8","author":"Karatas","year":"2020","journal-title":"IEEE Access"},{"key":"ref22","first-page":"102419","article-title":"Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study","volume":"50","author":"Ferrag","year":"2020","journal-title":"J Inf Secur Appl"},{"key":"ref23","first-page":"507","article-title":"A method for network intrusion detection based on GAN-CNN-BiLSTM","volume":"14","author":"Li","year":"2023","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref24","first-page":"121","article-title":"Hybrid intrusion detection system based on data resampling and deep learning","volume":"15","author":"Chen","year":"2024","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"479","DOI":"10.3390\/app14020479","article-title":"Enhanced intrusion detection with LSTM-based model, feature selection, and SMOTE for imbalanced data","volume":"14","author":"Sayegh","year":"2024","journal-title":"Appl Sci"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"37131","DOI":"10.1109\/ACCESS.2023.3266979","article-title":"A novel two-stage deep learning model for network intrusion detection: lSTM-AE","volume":"11","author":"Hnamte","year":"2023","journal-title":"IEEE Access"},{"key":"ref27","first-page":"108379","article-title":"Towards a standard feature set for network intrusion detection system datasets","volume":"103","author":"Sarhan","year":"2022","journal-title":"Mob Netw Appl"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"25","DOI":"10.3390\/computers13010025","article-title":"Securing mobile edge computing using hybrid deep learning method","volume":"13","author":"Adeniyi","year":"2024","journal-title":"Computers"},{"key":"ref29","doi-asserted-by":"crossref","unstructured":"Gu Z, Lopez DT, Alrahis L, Sinanoglu O. Always be pre-training: representation learning for network intrusion detection with GNNs. arXiv:2402.18986v1. 2024.","DOI":"10.1109\/ISQED60706.2024.10528371"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/978-3-030-72802-1_9","author":"Sarhan","year":"2021","journal-title":"Big data technologies and applications"},{"key":"ref31","series-title":"2021 30th Conference of Open Innovations Association FRUCT","first-page":"171","article-title":"Dataset selection for attacker group identification methods","author":"Pavlov","year":"2021 Oct 27\u201329"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"e331","DOI":"10.1002\/spy2.331","article-title":"UNSW-NB15 computer security dataset: analysis through visualization","volume":"7","author":"Zoghi","year":"2024","journal-title":"Secur Priv"},{"key":"ref33","series-title":"2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","first-page":"153","article-title":"An analysis of cyber security attack taxonomies","author":"Derbyshire","year":"2018 Apr 23\u201327"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/978-3-030-68887-5_14","author":"Ben Fredj","year":"2021","journal-title":"Risks and security of internet and systems"},{"key":"ref35","first-page":"11","article-title":"Evaluation metrics for intrusion detection systems\u2014a study","volume":"2","author":"Gulshan","year":"2014","journal-title":"Int J Comput Sci Mobile Appl"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_65031\/TSP_CMC_65031.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:50:48Z","timestamp":1763344248000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62899"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":35,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065031","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}