[1] A. Abusitta, G. H. S. de Carvalho, O. A. Wahab, T. Halabi, B. C. M. Fung, S. Al Mamoori, Deep learning-enabled
anomaly detection for IoT systems, Internet of Things, 21 (2023), 100656. https://doi.org/10.1016/j.iot.
2022.100656
[2] R. Alghamdi, M. Bellaiche, A cascaded federated deep learning based framework for detecting wormhole attacks in
IoT networks, Computers and Security, 125 (2023), 103014.
https://doi.org/10.1016/j.cose.2022.103014
[3] Z. Alwaisi, T. Kumar, E. Harjula, S. Soderi, Securing constrained IoT systems: A lightweight machine learning
approach for anomaly detection and prevention, Internet of Things, 28 (2024), 101398. https://doi.org/10.
1016/j.iot.2024.101398
[4] H. Asgharzadeh, A. Ghaffari, M. Masdari, F. S. Gharehchopogh, Anomaly-based intrusion detection system in the
Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm,
Journal of Parallel and Distributed Computing, 175 (2023), 1-21.
https://doi.org/10.1016/j.jpdc.2022.12.009
[5] T. Assy, Y. Mostafa, A. Abd El-khaleq, M. Mashaly, Anomaly-based intrusion detection system using onedimensional
convolutional neural network, Procedia Computer Science, 220 (2023), 78-85. https://doi.org/10.
1016/j.procs.2023.03.013
[6] S. Bacha, A. Aljuhani, K. B. Abdellafou, O. Taouali, N. Liouane, M. Alazab, Anomaly-based intrusion detection
system in IoT using kernel extreme learning machine, Journal of Ambient Intelligence and Humanized Computing,
15(1) (2024), 231-242.
https://doi.org/10.1007/s12652-022-03887-w
[7] M. P. S. Bhatia, S. R. Sangwan, Soft computing for anomaly detection and prediction to mitigate IoTbased
real-time abuse, Personal and Ubiquitous Computing, 28(1) (2024), 123-133. https://doi.org/10.1007/
s00779-021-01567-8
[9] I. D. Borlea, R. E. Precup, F. Dragan, A. B. Borlea, Centroid update approach to K-means clustering, Advances in
Electrical and Computer Engineering, 17(4) (2017).
https://doi.org/10.4316/AECE.2017.04001
[11] A. Govindaram, Flbc-ids: A federated learning and blockchain-based intrusion detection system for secure iot
environments, Multimedia Tools and Applications, 84(17) (2025), 17229-17251. https://doi.org/10.1007/
s11042-024-19777-6
[13] M. J. Idrissi, H. Alami, A. El Mahdaouy, A. El Mekki, S. Oualil, Z. Yartaoui, I. Berrada, Fed-anids: Federated
learning for anomaly-based network intrusion detection systems, Expert Systems with Applications, 234 (2023),
121000.
https://doi.org/10.1016/j.eswa.2023.121000
[14] Z. Li, P. Wang, Z. Wang, D. C. Zhan, Flowgananomaly: Flow-based anomaly network intrusion detection with
adversarial learning, Chinese Journal of Electronics, 33(1) (2024), 58-71. https://doi.org/10.23919/cje.2022.
00.173
[15] M. H. L. Louk, B. A. Tama, Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly
intrusion detection system, Expert Systems with Applications, 213 (2023), 119030. https://doi.org/10.1016/j.
eswa.2022.119030
[16] L. Narengbam, S. Dey, Harris hawk optimization trained artificial neural network for anomaly based intrusion
detection system, Concurrency and Computation: Practice and Experience, 35(23) (2023), e7771. https://doi.
org/10.1002/cpe.7771
[17] T. Saba, A. Rehman, T. Sadad, H. Kolivand, S. A. Bahaj, Anomaly-based intrusion detection system for IoT
networks through deep learning model, Computers and Electrical Engineering, 99 (2022), 107810. https://doi.
org/10.1016/j.compeleceng.2022.107810
[18] L. Sharma, C. Sharma, S. Lal Roy, Anomaly based network intrusion detection for IoT attacks using deep learning
technique, Computers and Electrical Engineering, 107 (2023), 108626. https://doi.org/10.1016/j.compeleceng.
2023.108626
[19] M. Soltani, B. Ousat, M. J. Siavoshani, A. H. Jahangir, An adaptable deep learning-based intrusion detection system
to zero-day attacks, Journal of Information Security and Applications, 76 (2023), 103516. https://doi.org/10.
1016/j.jisa.2023.103516
[20] M. Vishwakarma, N. Kesswani, A new two-phase intrusion detection system with Na¨ıve Bayes machine learning for
data classification and elliptic envelop method for anomaly detection, Decision Analytics Journal, 7 (2023), 100233.
https://doi.org/10.1016/j.dajour.2023.100233
[21] J. Xiao, L. Yang, F. Zhong, H. Chen, X. Li, Robust anomaly-based intrusion detection system for in-vehicle
network by graph neural network framework, Applied Intelligence, 53(3) (2023), 3183-3206. https://doi.org/10.
1007/s10489-022-03412-8
[22] H. Xu, Z. Sun, Y. Cao, H. Bilal, A data-driven approach for intrusion and anomaly detection using automated
machine learning for the internet of things, Soft Computing, 27(19) (2023), 14469-14481. https://doi.org/10.
1007/s00500-023-09037-4