{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T07:01:16Z","timestamp":1764831676335,"version":"3.46.0"},"reference-count":20,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065885","type":"journal-article","created":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T07:59:53Z","timestamp":1757318393000},"page":"2985-2997","source":"Crossref","is-referenced-by-count":0,"title":["Optimizing Network Intrusion Detection Performance with GNN-Based Feature Selection"],"prefix":"10.32604","volume":"85","author":[{"given":"Hoon","family":"Ko","sequence":"first","affiliation":[]},{"given":"Marek R.","family":"Ogiela","sequence":"additional","affiliation":[]},{"given":"Libor","family":"Mesicek","sequence":"additional","affiliation":[]},{"given":"Sangheon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TKDE.2023.3282898","article-title":"A survey of graph-based deep learning for anomaly detection in distributed systems","volume":"36","author":"Pazho","year":"2023","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MSP.2017.2693418","article-title":"Geometric deep learning: going beyond Euclidean data","volume":"34","author":"Bronstein","year":"2017","journal-title":"IEEE Signal Process Mag"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"2404","DOI":"10.3390\/electronics13122404","article-title":"Enhancing multi-class attack detection in graph neural network through feature rearrangement","volume":"13","author":"Le","year":"2024","journal-title":"Electronics"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"3972","DOI":"10.1109\/TIFS.2022.3208815","article-title":"Threatrace: detecting and tracing host-based threats in node level through provenance graph learning","volume":"17","author":"Wang","year":"2022","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"ref5","series-title":"2009 International Joint Conference on Neural Networks; 2009 Jun 14\u201319","first-page":"1827","article-title":"Neural network based intrusion detection system for critical infrastructures","author":"Linda","year":"2009"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"101574","DOI":"10.1109\/ACCESS.2021.3097247","article-title":"Deep learning-based intrusion detection systems: a systematic review","volume":"9","author":"Lansky","year":"2021","journal-title":"IEEE Access"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"2004","DOI":"10.1109\/TCE.2023.3331907","article-title":"Incremental update intrusion detection for industry 5.0 security: a graph attention network-enabled approach","volume":"70","author":"Wu","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"49114","DOI":"10.1109\/ACCESS.2023.3275789","article-title":"Graph neural networks for intrusion detection: a survey","volume":"11","author":"Bilot","year":"2023","journal-title":"IEEE Access"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","article-title":"A comprehensive survey on graph neural networks","volume":"32","author":"Wu","year":"2021","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"12012","DOI":"10.1109\/TKDE.2021.3118815","article-title":"A comprehensive survey on graph anomaly detection with deep learning","volume":"35","author":"Ma","year":"2023","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"110030","DOI":"10.1016\/j.knosys.2022.110030","article-title":"Anomal-E: a self-supervised network intrusion detection system based on graph neural networks","volume":"258","author":"Caville","year":"2022","journal-title":"Knowl-Based Syst"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"9812","DOI":"10.1007\/s11227-023-05739-6","article-title":"Correlation-based advanced feature analysis for wireless sensor networks","volume":"80","author":"Kim","year":"2024","journal-title":"J Supercomput"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1186\/s40537-020-00379-6","article-title":"Performance analysis of intrusion detection systems using a feature-selection method on the UNSW-NB15 dataset","volume":"7","author":"Kasongo","year":"2020","journal-title":"J Big Data"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s12046-020-1308-5","article-title":"Particle swarm optimization and feature selection for intrusion detection system","volume":"45","author":"Kunhare","year":"2020","journal-title":"S\u0101dhan\u0101"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1186\/s40537-024-00892-y","article-title":"Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning","volume":"11","author":"Li","year":"2024","journal-title":"J Big Data"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/978-3-031-08147-7_7","author":"Avila","year":"2022","journal-title":"Foundations and practice of security"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"115939","DOI":"10.1016\/j.chaos.2024.115939","article-title":"CPS-IoT-PPDNN: a new explainable privacy preserving DNN for resilient anomaly detection in Cyber-Physical Systems-enabled IoT networks","volume":"191","author":"Saheed","year":"2025","journal-title":"Chaos Solit Fract"},{"key":"ref18","first-page":"103171","article-title":"Xaiensembletl-iov: a new explainable artificial intelligence ensemble transfer learning for zero-day botnet attack detection in the internet of vehicles","volume":"24","author":"Saheed","year":"2024","journal-title":"Res Eng"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"25487","DOI":"10.1007\/s11042-023-15635-z","article-title":"Anomaly detection analysis based on correlation of features in graph neural network","volume":"83","author":"Ko","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref20","series-title":"2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing; 2015 Jul 8\u201310","first-page":"179","article-title":"Biometric methods for advanced strategic data sharing protocols","author":"Ogiela","year":"2015"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-2\/TSP_CMC_65885\/TSP_CMC_65885.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T05:35:40Z","timestamp":1764826540000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n2\/63790"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":20,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065885","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}