Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1038/s41598-025-99452-4
Cybersecurity has been defined as a vital part of the developments, which is mainly related to technology. Enlarged cybersecurity safeguards that the data remains safe. Cyberattacks like computer malware, denial-of-service (DoS) attacks, or unauthorized access led to severe damage and economic losses in large-scale systems. Cybersecurity includes decreasing the risk of mischievous computer, software, and network attacks. Novel techniques have been combined into emerging artificial intelligence (AI) that attains cybersecurity. ML is usually reflected as a sub-branch of AI, which is closely linked to data mining, computational statistics, and data science (DS) and mainly concentrates on generating computers to acquire data. Federated learning (FL) is one of the ML models that permits tackling cyberattack issues like security, data privacy, and access rights. This study proposes a Self-Attention Mechanism-Driven Federated Learning for Secure Cyberattack Detection with Crocodile Optimization Algorithm (SAMFL-SCDCOA) methodology. The main objective of the SAMFL-SCDCOA methodology is to provide an effective method for preventing cyberattacks in real time using FL and advanced optimization algorithms. Initially, the Z-score normalization is utilized to scale and standardize data to improve analysis consistency and accuracy. Furthermore, the feature selection (FS) process uses the crocodile optimization algorithm (COA) model. The proposed SAMFL-SCDCOA approach employs the gated recurrent unit with a self-attention (GRU-SA) model for the cybersecurity classification. Finally, the improved pelican optimization algorithm (IPOA) optimally adjusts the hyperparameter values of the GRU-SA model, leading to enhanced classification performance. A wide range of experiments has been accomplished to validate the performance of the SAMFL-SCDCOA technique under the CICIDS-2017 dataset. The comparison study of the SAMFL-SCDCOA technique emphasized a superior output of 99.04% over existing models.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1038/s41598-025-99452-4
- https://www.nature.com/articles/s41598-025-99452-4.pdf
- OA Status
- gold
- References
- 33
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4411983760
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4411983760Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1038/s41598-025-99452-4Digital Object Identifier
- Title
-
Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning frameworkWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-07-03Full publication date if available
- Authors
-
Manal Abdullah Alohali, Hatim Dafaalla, Mohammed Baihan, Sultan Alahmari, Achraf Ben Miled, Othman Alrusaini, Ali Alqazzaz, Hanadi AlkhudhayrList of authors in order
- Landing page
-
https://doi.org/10.1038/s41598-025-99452-4Publisher landing page
- PDF URL
-
https://www.nature.com/articles/s41598-025-99452-4.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://www.nature.com/articles/s41598-025-99452-4.pdfDirect OA link when available
- Concepts
-
Computer science, Crocodile, Unit (ring theory), Artificial intelligence, Data mining, Biology, Mathematics, Ecology, Mathematics educationTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
33Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4411983760 |
|---|---|
| doi | https://doi.org/10.1038/s41598-025-99452-4 |
| ids.doi | https://doi.org/10.1038/s41598-025-99452-4 |
| ids.pmid | https://pubmed.ncbi.nlm.nih.gov/40610575 |
| ids.openalex | https://openalex.org/W4411983760 |
| fwci | 0.0 |
| type | article |
| title | Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework |
| biblio.issue | 1 |
| biblio.volume | 15 |
| biblio.last_page | 23805 |
| biblio.first_page | 23805 |
| topics[0].id | https://openalex.org/T10400 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998999834060669 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Network Security and Intrusion Detection |
| topics[1].id | https://openalex.org/T11241 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9990000128746033 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1711 |
| topics[1].subfield.display_name | Signal Processing |
| topics[1].display_name | Advanced Malware Detection Techniques |
| topics[2].id | https://openalex.org/T11598 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9987000226974487 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Internet Traffic Analysis and Secure E-voting |
| is_xpac | False |
| apc_list.value | 1890 |
| apc_list.currency | EUR |
| apc_list.value_usd | 2190 |
| apc_paid.value | 1890 |
| apc_paid.currency | EUR |
| apc_paid.value_usd | 2190 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8033968210220337 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C2778615784 |
| concepts[1].level | 2 |
| concepts[1].score | 0.689537763595581 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q2535664 |
| concepts[1].display_name | Crocodile |
| concepts[2].id | https://openalex.org/C122637931 |
| concepts[2].level | 2 |
| concepts[2].score | 0.450729101896286 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q118084 |
| concepts[2].display_name | Unit (ring theory) |
| concepts[3].id | https://openalex.org/C154945302 |
| concepts[3].level | 1 |
| concepts[3].score | 0.401661217212677 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[3].display_name | Artificial intelligence |
| concepts[4].id | https://openalex.org/C124101348 |
| concepts[4].level | 1 |
| concepts[4].score | 0.3783251941204071 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[4].display_name | Data mining |
| concepts[5].id | https://openalex.org/C86803240 |
| concepts[5].level | 0 |
| concepts[5].score | 0.10475665330886841 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q420 |
| concepts[5].display_name | Biology |
| concepts[6].id | https://openalex.org/C33923547 |
| concepts[6].level | 0 |
| concepts[6].score | 0.07978534698486328 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[6].display_name | Mathematics |
| concepts[7].id | https://openalex.org/C18903297 |
| concepts[7].level | 1 |
| concepts[7].score | 0.0 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q7150 |
| concepts[7].display_name | Ecology |
| concepts[8].id | https://openalex.org/C145420912 |
| concepts[8].level | 1 |
| concepts[8].score | 0.0 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q853077 |
| concepts[8].display_name | Mathematics education |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8033968210220337 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/crocodile |
| keywords[1].score | 0.689537763595581 |
| keywords[1].display_name | Crocodile |
| keywords[2].id | https://openalex.org/keywords/unit |
| keywords[2].score | 0.450729101896286 |
| keywords[2].display_name | Unit (ring theory) |
| keywords[3].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[3].score | 0.401661217212677 |
| keywords[3].display_name | Artificial intelligence |
| keywords[4].id | https://openalex.org/keywords/data-mining |
| keywords[4].score | 0.3783251941204071 |
| keywords[4].display_name | Data mining |
| keywords[5].id | https://openalex.org/keywords/biology |
| keywords[5].score | 0.10475665330886841 |
| keywords[5].display_name | Biology |
| keywords[6].id | https://openalex.org/keywords/mathematics |
| keywords[6].score | 0.07978534698486328 |
| keywords[6].display_name | Mathematics |
| language | en |
| locations[0].id | doi:10.1038/s41598-025-99452-4 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S196734849 |
| locations[0].source.issn | 2045-2322 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2045-2322 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Scientific Reports |
| locations[0].source.host_organization | https://openalex.org/P4310319908 |
| locations[0].source.host_organization_name | Nature Portfolio |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319908, https://openalex.org/P4310319965 |
| locations[0].source.host_organization_lineage_names | Nature Portfolio, Springer Nature |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | https://www.nature.com/articles/s41598-025-99452-4.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Scientific Reports |
| locations[0].landing_page_url | https://doi.org/10.1038/s41598-025-99452-4 |
| locations[1].id | pmid:40610575 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306525036 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | PubMed |
| locations[1].source.host_organization | https://openalex.org/I1299303238 |
| locations[1].source.host_organization_name | National Institutes of Health |
| locations[1].source.host_organization_lineage | https://openalex.org/I1299303238 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | publishedVersion |
| locations[1].raw_type | |
| locations[1].license_id | |
| locations[1].is_accepted | True |
| locations[1].is_published | True |
| locations[1].raw_source_name | Scientific reports |
| locations[1].landing_page_url | https://pubmed.ncbi.nlm.nih.gov/40610575 |
| locations[2].id | pmh:oai:doaj.org/article:a9b11c0293cd43199cbf72a4c2d6e591 |
| locations[2].is_oa | False |
| locations[2].source.id | https://openalex.org/S4306401280 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | False |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[2].source.host_organization | |
| locations[2].source.host_organization_name | |
| locations[2].license | |
| locations[2].pdf_url | |
| locations[2].version | submittedVersion |
| locations[2].raw_type | article |
| locations[2].license_id | |
| locations[2].is_accepted | False |
| locations[2].is_published | False |
| locations[2].raw_source_name | Scientific Reports, Vol 15, Iss 1, Pp 1-23 (2025) |
| locations[2].landing_page_url | https://doaj.org/article/a9b11c0293cd43199cbf72a4c2d6e591 |
| locations[3].id | pmh:oai:europepmc.org:11038155 |
| locations[3].is_oa | True |
| locations[3].source.id | https://openalex.org/S4306400806 |
| locations[3].source.issn | |
| locations[3].source.type | repository |
| locations[3].source.is_oa | False |
| locations[3].source.issn_l | |
| locations[3].source.is_core | False |
| locations[3].source.is_in_doaj | False |
| locations[3].source.display_name | Europe PMC (PubMed Central) |
| locations[3].source.host_organization | https://openalex.org/I1303153112 |
| locations[3].source.host_organization_name | European Bioinformatics Institute |
| locations[3].source.host_organization_lineage | https://openalex.org/I1303153112 |
| locations[3].license | other-oa |
| locations[3].pdf_url | |
| locations[3].version | submittedVersion |
| locations[3].raw_type | Text |
| locations[3].license_id | https://openalex.org/licenses/other-oa |
| locations[3].is_accepted | False |
| locations[3].is_published | False |
| locations[3].raw_source_name | |
| locations[3].landing_page_url | https://www.ncbi.nlm.nih.gov/pmc/articles/12229709 |
| indexed_in | crossref, doaj, pubmed |
| authorships[0].author.id | https://openalex.org/A5018019909 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-1975-5345 |
| authorships[0].author.display_name | Manal Abdullah Alohali |
| authorships[0].countries | SA |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I106778892 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia. |
| authorships[0].institutions[0].id | https://openalex.org/I106778892 |
| authorships[0].institutions[0].ror | https://ror.org/05b0cyh02 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I106778892 |
| authorships[0].institutions[0].country_code | SA |
| authorships[0].institutions[0].display_name | Princess Nourah bint Abdulrahman University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Manal Abdullah Alohali |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, 11671, Riyadh, Saudi Arabia. |
| authorships[1].author.id | https://openalex.org/A5069049709 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-2166-1823 |
| authorships[1].author.display_name | Hatim Dafaalla |
| authorships[1].countries | SA |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I82952536 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Computer Science, Applied College at Mahayil, King Khalid University, Abha, Saudi Arabia. |
| authorships[1].institutions[0].id | https://openalex.org/I82952536 |
| authorships[1].institutions[0].ror | https://ror.org/052kwzs30 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I82952536 |
| authorships[1].institutions[0].country_code | SA |
| authorships[1].institutions[0].display_name | King Khalid University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Hatim Dafaalla |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Computer Science, Applied College at Mahayil, King Khalid University, Abha, Saudi Arabia. |
| authorships[2].author.id | https://openalex.org/A5118803734 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Mohammed Baihan |
| authorships[2].countries | SA |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I28022161 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Computer Science, Community College, King Saud University, P.O. Box 11451, Riyadh, Saudi Arabia. |
| authorships[2].institutions[0].id | https://openalex.org/I28022161 |
| authorships[2].institutions[0].ror | https://ror.org/02f81g417 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I28022161 |
| authorships[2].institutions[0].country_code | SA |
| authorships[2].institutions[0].display_name | King Saud University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Mohammed Baihan |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Computer Science, Community College, King Saud University, P.O. Box 11451, Riyadh, Saudi Arabia. |
| authorships[3].author.id | https://openalex.org/A5081865875 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-4962-2762 |
| authorships[3].author.display_name | Sultan Alahmari |
| authorships[3].countries | SA |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I1284598098 |
| authorships[3].affiliations[0].raw_affiliation_string | King Abdul Aziz City for Science and Technology (KACST), Cybersecurity Institute, Riyadh, Saudi Arabia. |
| authorships[3].institutions[0].id | https://openalex.org/I1284598098 |
| authorships[3].institutions[0].ror | https://ror.org/05tdz6m39 |
| authorships[3].institutions[0].type | facility |
| authorships[3].institutions[0].lineage | https://openalex.org/I1284598098 |
| authorships[3].institutions[0].country_code | SA |
| authorships[3].institutions[0].display_name | King Abdulaziz City for Science and Technology |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Sultan Alahmari |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | King Abdul Aziz City for Science and Technology (KACST), Cybersecurity Institute, Riyadh, Saudi Arabia. |
| authorships[4].author.id | https://openalex.org/A5010880350 |
| authorships[4].author.orcid | https://orcid.org/0000-0003-1256-2900 |
| authorships[4].author.display_name | Achraf Ben Miled |
| authorships[4].countries | SA |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I118590987 |
| authorships[4].affiliations[0].raw_affiliation_string | Department of Computer Science, College of Science, Northern Border University, 73213, Arar, Saudi Arabia. [email protected]. |
| authorships[4].institutions[0].id | https://openalex.org/I118590987 |
| authorships[4].institutions[0].ror | https://ror.org/03j9tzj20 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I118590987 |
| authorships[4].institutions[0].country_code | SA |
| authorships[4].institutions[0].display_name | Northern Border University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Achraf Ben Miled |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Department of Computer Science, College of Science, Northern Border University, 73213, Arar, Saudi Arabia. [email protected]. |
| authorships[5].author.id | https://openalex.org/A5043605373 |
| authorships[5].author.orcid | https://orcid.org/0000-0003-3797-6384 |
| authorships[5].author.display_name | Othman Alrusaini |
| authorships[5].countries | SA |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I199693650 |
| authorships[5].affiliations[0].raw_affiliation_string | Department of Engineering and Applied Sciences, Applied College, Umm Al-Qura University , Mecca, Saudi Arabia. |
| authorships[5].institutions[0].id | https://openalex.org/I199693650 |
| authorships[5].institutions[0].ror | https://ror.org/01xjqrm90 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I199693650 |
| authorships[5].institutions[0].country_code | SA |
| authorships[5].institutions[0].display_name | Umm al-Qura University |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Othman Alrusaini |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Department of Engineering and Applied Sciences, Applied College, Umm Al-Qura University , Mecca, Saudi Arabia. |
| authorships[6].author.id | https://openalex.org/A5059949408 |
| authorships[6].author.orcid | https://orcid.org/0000-0001-7721-0450 |
| authorships[6].author.display_name | Ali Alqazzaz |
| authorships[6].countries | SA |
| authorships[6].affiliations[0].institution_ids | https://openalex.org/I4210136004 |
| authorships[6].affiliations[0].raw_affiliation_string | Department of Computer Science and Artificial Intelligence, College of Computing and Information Technology, University of Bisha, 67714, Bisha, Saudi Arabia. |
| authorships[6].institutions[0].id | https://openalex.org/I4210136004 |
| authorships[6].institutions[0].ror | https://ror.org/040548g92 |
| authorships[6].institutions[0].type | education |
| authorships[6].institutions[0].lineage | https://openalex.org/I4210136004 |
| authorships[6].institutions[0].country_code | SA |
| authorships[6].institutions[0].display_name | University of Bisha |
| authorships[6].author_position | middle |
| authorships[6].raw_author_name | Ali Alqazzaz |
| authorships[6].is_corresponding | False |
| authorships[6].raw_affiliation_strings | Department of Computer Science and Artificial Intelligence, College of Computing and Information Technology, University of Bisha, 67714, Bisha, Saudi Arabia. |
| authorships[7].author.id | https://openalex.org/A5106870960 |
| authorships[7].author.orcid | |
| authorships[7].author.display_name | Hanadi Alkhudhayr |
| authorships[7].countries | SA |
| authorships[7].affiliations[0].institution_ids | https://openalex.org/I185163786 |
| authorships[7].affiliations[0].raw_affiliation_string | Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, 25732, Rabigh, Saudi Arabia. |
| authorships[7].institutions[0].id | https://openalex.org/I185163786 |
| authorships[7].institutions[0].ror | https://ror.org/02ma4wv74 |
| authorships[7].institutions[0].type | education |
| authorships[7].institutions[0].lineage | https://openalex.org/I185163786 |
| authorships[7].institutions[0].country_code | SA |
| authorships[7].institutions[0].display_name | King Abdulaziz University |
| authorships[7].author_position | last |
| authorships[7].raw_author_name | Hanadi Alkhudhayr |
| authorships[7].is_corresponding | False |
| authorships[7].raw_affiliation_strings | Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, 25732, Rabigh, Saudi Arabia. |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.nature.com/articles/s41598-025-99452-4.pdf |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Leveraging self attention driven gated recurrent unit with crocodile optimization algorithm for cyberattack detection using federated learning framework |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10400 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998999834060669 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Network Security and Intrusion Detection |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W577093138, https://openalex.org/W3012521148, https://openalex.org/W2122648375, https://openalex.org/W2029573361, https://openalex.org/W2262394388, https://openalex.org/W2418243106, https://openalex.org/W2113206733 |
| cited_by_count | 0 |
| locations_count | 4 |
| best_oa_location.id | doi:10.1038/s41598-025-99452-4 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S196734849 |
| best_oa_location.source.issn | 2045-2322 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2045-2322 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Scientific Reports |
| best_oa_location.source.host_organization | https://openalex.org/P4310319908 |
| best_oa_location.source.host_organization_name | Nature Portfolio |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319908, https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_lineage_names | Nature Portfolio, Springer Nature |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | https://www.nature.com/articles/s41598-025-99452-4.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Scientific Reports |
| best_oa_location.landing_page_url | https://doi.org/10.1038/s41598-025-99452-4 |
| primary_location.id | doi:10.1038/s41598-025-99452-4 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S196734849 |
| primary_location.source.issn | 2045-2322 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2045-2322 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Scientific Reports |
| primary_location.source.host_organization | https://openalex.org/P4310319908 |
| primary_location.source.host_organization_name | Nature Portfolio |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319908, https://openalex.org/P4310319965 |
| primary_location.source.host_organization_lineage_names | Nature Portfolio, Springer Nature |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | https://www.nature.com/articles/s41598-025-99452-4.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Scientific Reports |
| primary_location.landing_page_url | https://doi.org/10.1038/s41598-025-99452-4 |
| publication_date | 2025-07-03 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W4210960727, https://openalex.org/W3206162503, https://openalex.org/W4226319939, https://openalex.org/W3129207156, https://openalex.org/W3171802458, https://openalex.org/W3212135426, https://openalex.org/W3133856821, https://openalex.org/W3191470662, https://openalex.org/W4300686971, https://openalex.org/W4405044757, https://openalex.org/W4394825328, https://openalex.org/W4405968164, https://openalex.org/W4399768575, https://openalex.org/W4404978411, https://openalex.org/W4387745904, https://openalex.org/W4406321599, https://openalex.org/W4388765979, https://openalex.org/W4408078647, https://openalex.org/W4402307552, https://openalex.org/W4408224516, https://openalex.org/W4401794859, https://openalex.org/W4408285853, https://openalex.org/W4390547141, https://openalex.org/W4407946283, https://openalex.org/W4297830846, https://openalex.org/W4408712429, https://openalex.org/W2936809465, https://openalex.org/W4406776041, https://openalex.org/W4406710844, https://openalex.org/W4406472367, https://openalex.org/W4401935085, https://openalex.org/W4392908661, https://openalex.org/W4312401446 |
| referenced_works_count | 33 |
| abstract_inverted_index.A | 234 |
| abstract_inverted_index.a | 5, 75, 125, 205, 262 |
| abstract_inverted_index.FL | 160 |
| abstract_inverted_index.ML | 70, 108 |
| abstract_inverted_index.an | 150 |
| abstract_inverted_index.as | 4, 74 |
| abstract_inverted_index.in | 42, 156 |
| abstract_inverted_index.is | 12, 71, 80, 104, 147, 169 |
| abstract_inverted_index.of | 8, 50, 77, 106, 143, 225, 237, 246, 257, 265 |
| abstract_inverted_index.on | 95 |
| abstract_inverted_index.or | 32 |
| abstract_inverted_index.to | 15, 36, 83, 98, 148, 171, 176, 230, 242 |
| abstract_inverted_index.AI, | 78 |
| abstract_inverted_index.The | 140, 195, 254 |
| abstract_inverted_index.and | 39, 54, 88, 92, 119, 161, 173, 180 |
| abstract_inverted_index.for | 130, 153, 209 |
| abstract_inverted_index.has | 1, 239 |
| abstract_inverted_index.led | 35 |
| abstract_inverted_index.one | 105 |
| abstract_inverted_index.the | 9, 21, 48, 107, 144, 166, 183, 189, 200, 210, 214, 222, 226, 244, 247, 251, 258 |
| abstract_inverted_index.(AI) | 66 |
| abstract_inverted_index.(DS) | 91 |
| abstract_inverted_index.(FL) | 103 |
| abstract_inverted_index.(FS) | 186 |
| abstract_inverted_index.This | 122 |
| abstract_inverted_index.been | 2, 60, 240 |
| abstract_inverted_index.data | 22, 84, 89, 117, 175 |
| abstract_inverted_index.have | 59 |
| abstract_inverted_index.into | 62 |
| abstract_inverted_index.like | 26, 115 |
| abstract_inverted_index.main | 141 |
| abstract_inverted_index.over | 267 |
| abstract_inverted_index.part | 7 |
| abstract_inverted_index.real | 157 |
| abstract_inverted_index.risk | 49 |
| abstract_inverted_index.that | 20, 67, 110 |
| abstract_inverted_index.time | 158 |
| abstract_inverted_index.unit | 203 |
| abstract_inverted_index.uses | 188 |
| abstract_inverted_index.wide | 235 |
| abstract_inverted_index.with | 134, 204 |
| abstract_inverted_index.(COA) | 193 |
| abstract_inverted_index.(DoS) | 30 |
| abstract_inverted_index.Novel | 57 |
| abstract_inverted_index.data. | 100 |
| abstract_inverted_index.gated | 201 |
| abstract_inverted_index.model | 208 |
| abstract_inverted_index.range | 236 |
| abstract_inverted_index.safe. | 24 |
| abstract_inverted_index.scale | 172 |
| abstract_inverted_index.study | 123, 256 |
| abstract_inverted_index.under | 250 |
| abstract_inverted_index.using | 159 |
| abstract_inverted_index.vital | 6 |
| abstract_inverted_index.which | 11, 79 |
| abstract_inverted_index.(IPOA) | 219 |
| abstract_inverted_index.99.04% | 266 |
| abstract_inverted_index.GRU-SA | 227 |
| abstract_inverted_index.Secure | 131 |
| abstract_inverted_index.access | 34, 120 |
| abstract_inverted_index.damage | 38 |
| abstract_inverted_index.issues | 114 |
| abstract_inverted_index.linked | 82 |
| abstract_inverted_index.losses | 41 |
| abstract_inverted_index.mainly | 13, 93 |
| abstract_inverted_index.method | 152 |
| abstract_inverted_index.model, | 228 |
| abstract_inverted_index.model. | 194 |
| abstract_inverted_index.models | 109 |
| abstract_inverted_index.output | 264 |
| abstract_inverted_index.severe | 37 |
| abstract_inverted_index.values | 224 |
| abstract_inverted_index.Z-score | 167 |
| abstract_inverted_index.acquire | 99 |
| abstract_inverted_index.adjusts | 221 |
| abstract_inverted_index.attains | 68 |
| abstract_inverted_index.closely | 81 |
| abstract_inverted_index.defined | 3 |
| abstract_inverted_index.employs | 199 |
| abstract_inverted_index.feature | 184 |
| abstract_inverted_index.improve | 177 |
| abstract_inverted_index.leading | 229 |
| abstract_inverted_index.mining, | 85 |
| abstract_inverted_index.models. | 269 |
| abstract_inverted_index.network | 55 |
| abstract_inverted_index.pelican | 216 |
| abstract_inverted_index.permits | 111 |
| abstract_inverted_index.process | 187 |
| abstract_inverted_index.provide | 149 |
| abstract_inverted_index.related | 14 |
| abstract_inverted_index.remains | 23 |
| abstract_inverted_index.rights. | 121 |
| abstract_inverted_index.science | 90 |
| abstract_inverted_index.usually | 72 |
| abstract_inverted_index.(GRU-SA) | 207 |
| abstract_inverted_index.Enlarged | 17 |
| abstract_inverted_index.Finally, | 213 |
| abstract_inverted_index.Learning | 129 |
| abstract_inverted_index.advanced | 162 |
| abstract_inverted_index.analysis | 178 |
| abstract_inverted_index.approach | 198 |
| abstract_inverted_index.attacks, | 31 |
| abstract_inverted_index.attacks. | 56 |
| abstract_inverted_index.combined | 61 |
| abstract_inverted_index.computer | 27 |
| abstract_inverted_index.dataset. | 253 |
| abstract_inverted_index.economic | 40 |
| abstract_inverted_index.emerging | 63 |
| abstract_inverted_index.enhanced | 231 |
| abstract_inverted_index.existing | 268 |
| abstract_inverted_index.improved | 215 |
| abstract_inverted_index.includes | 46 |
| abstract_inverted_index.learning | 102 |
| abstract_inverted_index.malware, | 28 |
| abstract_inverted_index.privacy, | 118 |
| abstract_inverted_index.proposed | 196 |
| abstract_inverted_index.proposes | 124 |
| abstract_inverted_index.superior | 263 |
| abstract_inverted_index.systems. | 44 |
| abstract_inverted_index.tackling | 112 |
| abstract_inverted_index.utilized | 170 |
| abstract_inverted_index.validate | 243 |
| abstract_inverted_index.Algorithm | 137 |
| abstract_inverted_index.Crocodile | 135 |
| abstract_inverted_index.Detection | 133 |
| abstract_inverted_index.Federated | 101, 128 |
| abstract_inverted_index.accuracy. | 181 |
| abstract_inverted_index.algorithm | 192, 218 |
| abstract_inverted_index.computer, | 52 |
| abstract_inverted_index.computers | 97 |
| abstract_inverted_index.crocodile | 190 |
| abstract_inverted_index.effective | 151 |
| abstract_inverted_index.objective | 142 |
| abstract_inverted_index.optimally | 220 |
| abstract_inverted_index.recurrent | 202 |
| abstract_inverted_index.reflected | 73 |
| abstract_inverted_index.security, | 116 |
| abstract_inverted_index.selection | 185 |
| abstract_inverted_index.software, | 53 |
| abstract_inverted_index.technique | 249, 260 |
| abstract_inverted_index.Initially, | 165 |
| abstract_inverted_index.artificial | 64 |
| abstract_inverted_index.comparison | 255 |
| abstract_inverted_index.decreasing | 47 |
| abstract_inverted_index.emphasized | 261 |
| abstract_inverted_index.generating | 96 |
| abstract_inverted_index.preventing | 154 |
| abstract_inverted_index.safeguards | 19 |
| abstract_inverted_index.sub-branch | 76 |
| abstract_inverted_index.techniques | 58 |
| abstract_inverted_index.CICIDS-2017 | 252 |
| abstract_inverted_index.Cyberattack | 132 |
| abstract_inverted_index.algorithms. | 164 |
| abstract_inverted_index.consistency | 179 |
| abstract_inverted_index.cyberattack | 113 |
| abstract_inverted_index.experiments | 238 |
| abstract_inverted_index.large-scale | 43 |
| abstract_inverted_index.methodology | 146 |
| abstract_inverted_index.mischievous | 51 |
| abstract_inverted_index.performance | 245 |
| abstract_inverted_index.standardize | 174 |
| abstract_inverted_index.statistics, | 87 |
| abstract_inverted_index.technology. | 16 |
| abstract_inverted_index.Cyberattacks | 25 |
| abstract_inverted_index.Furthermore, | 182 |
| abstract_inverted_index.Optimization | 136 |
| abstract_inverted_index.SAMFL-SCDCOA | 145, 197, 248, 259 |
| abstract_inverted_index.accomplished | 241 |
| abstract_inverted_index.concentrates | 94 |
| abstract_inverted_index.cyberattacks | 155 |
| abstract_inverted_index.intelligence | 65 |
| abstract_inverted_index.methodology. | 139 |
| abstract_inverted_index.optimization | 163, 191, 217 |
| abstract_inverted_index.performance. | 233 |
| abstract_inverted_index.unauthorized | 33 |
| abstract_inverted_index.Cybersecurity | 0, 45 |
| abstract_inverted_index.computational | 86 |
| abstract_inverted_index.cybersecurity | 18, 211 |
| abstract_inverted_index.developments, | 10 |
| abstract_inverted_index.normalization | 168 |
| abstract_inverted_index.(SAMFL-SCDCOA) | 138 |
| abstract_inverted_index.Self-Attention | 126 |
| abstract_inverted_index.classification | 232 |
| abstract_inverted_index.cybersecurity. | 69 |
| abstract_inverted_index.hyperparameter | 223 |
| abstract_inverted_index.self-attention | 206 |
| abstract_inverted_index.classification. | 212 |
| abstract_inverted_index.Mechanism-Driven | 127 |
| abstract_inverted_index.denial-of-service | 29 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 8 |
| citation_normalized_percentile.value | 0.30769671 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |