{"id":"https://openalex.org/W4415208316","doi":"https://doi.org/10.1007/s43926-025-00199-1","title":"Twined ensemble framework for network security: integrating Random Forest, AdaBoost, and Gradient Boosting for enhanced intrusion detection","display_name":"Twined ensemble framework for network security: integrating Random Forest, AdaBoost, and Gradient Boosting for enhanced intrusion detection","publication_year":2025,"publication_date":"2025-10-15","ids":{"openalex":"https://openalex.org/W4415208316","doi":"https://doi.org/10.1007/s43926-025-00199-1"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-025-00199-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00199-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00199-1.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00199-1.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085720726","display_name":"C. Kishor Kumar Reddy","orcid":"https://orcid.org/0000-0002-3762-0137"},"institutions":[{"id":"https://openalex.org/I25051037","display_name":"Stanley Medical College","ror":"https://ror.org/0567p6j84","country_code":"IN","type":"education","lineage":["https://openalex.org/I25051037"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"C. Kishor Kumar Reddy","raw_affiliation_strings":["Department of Computer Science and Engineering, Stanley College of Engineering and Technology for Women, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Stanley College of Engineering and Technology for Women, Hyderabad, India","institution_ids":["https://openalex.org/I25051037"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114193772","display_name":"Pulakurthi Anaghaa Reddy","orcid":null},"institutions":[{"id":"https://openalex.org/I1336731492","display_name":"Electronics Corporation of India","ror":"https://ror.org/00axkns98","country_code":"IN","type":"government","lineage":["https://openalex.org/I1336731492"]},{"id":"https://openalex.org/I25051037","display_name":"Stanley Medical College","ror":"https://ror.org/0567p6j84","country_code":"IN","type":"education","lineage":["https://openalex.org/I25051037"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pulakurthi Anaghaa Reddy","raw_affiliation_strings":["Department of Computer Science and Engineering, Stanley College of Engineering and Technology for Women, Hyderabad, India","Department of Electrical and Electronics Engineering, Matrusri Engineering College, Saidabad, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Stanley College of Engineering and Technology for Women, Hyderabad, India","institution_ids":["https://openalex.org/I25051037"]},{"raw_affiliation_string":"Department of Electrical and Electronics Engineering, Matrusri Engineering College, Saidabad, Hyderabad, India","institution_ids":["https://openalex.org/I1336731492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108150332","display_name":"Pulakurthi Satyanarayana Reddy","orcid":null},"institutions":[{"id":"https://openalex.org/I1336731492","display_name":"Electronics Corporation of India","ror":"https://ror.org/00axkns98","country_code":"IN","type":"government","lineage":["https://openalex.org/I1336731492"]},{"id":"https://openalex.org/I25051037","display_name":"Stanley Medical College","ror":"https://ror.org/0567p6j84","country_code":"IN","type":"education","lineage":["https://openalex.org/I25051037"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pulakurthi Satyanarayana Reddy","raw_affiliation_strings":["Department of Computer Science and Engineering, Stanley College of Engineering and Technology for Women, Hyderabad, India","Department of Electrical and Electronics Engineering, Matrusri Engineering College, Saidabad, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Stanley College of Engineering and Technology for Women, Hyderabad, India","institution_ids":["https://openalex.org/I25051037"]},{"raw_affiliation_string":"Department of Electrical and Electronics Engineering, Matrusri Engineering College, Saidabad, Hyderabad, India","institution_ids":["https://openalex.org/I1336731492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071211251","display_name":"Mohammed Shuaib","orcid":"https://orcid.org/0000-0001-6657-2587"},"institutions":[{"id":"https://openalex.org/I91450128","display_name":"Jazan University","ror":"https://ror.org/02bjnq803","country_code":"SA","type":"education","lineage":["https://openalex.org/I91450128"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammed Shuaib","raw_affiliation_strings":["Department of Computer Science, College of Engineering and Computer Science, Jazan University, 45142, Jazan, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Engineering and Computer Science, Jazan University, 45142, Jazan, Saudi Arabia","institution_ids":["https://openalex.org/I91450128"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074848011","display_name":"Shadab Alam","orcid":"https://orcid.org/0000-0003-0504-4515"},"institutions":[{"id":"https://openalex.org/I91450128","display_name":"Jazan University","ror":"https://ror.org/02bjnq803","country_code":"SA","type":"education","lineage":["https://openalex.org/I91450128"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Shadab Alam","raw_affiliation_strings":["Department of Computer Science, College of Engineering and Computer Science, Jazan University, 45142, Jazan, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Engineering and Computer Science, Jazan University, 45142, Jazan, Saudi Arabia","institution_ids":["https://openalex.org/I91450128"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029425694","display_name":"Sadaf Ahmad","orcid":"https://orcid.org/0000-0001-7647-1923"},"institutions":[{"id":"https://openalex.org/I171210897","display_name":"Aligarh Muslim University","ror":"https://ror.org/03kw9gc02","country_code":"IN","type":"education","lineage":["https://openalex.org/I171210897"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sadaf Ahmad","raw_affiliation_strings":["Department of Computer Science, Aligarh Muslim University, Aligarh, 202002, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Aligarh Muslim University, Aligarh, 202002, India","institution_ids":["https://openalex.org/I171210897"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033743753","display_name":"A. Rajaram","orcid":null},"institutions":[{"id":"https://openalex.org/I4210130415","display_name":"Open International University for Alternative Medicines","ror":"https://ror.org/03t25y916","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210130415"]},{"id":"https://openalex.org/I4387153026","display_name":"E.G.S. Pillay Engineering College","ror":"https://ror.org/03s9gtm48","country_code":null,"type":"education","lineage":["https://openalex.org/I4387153026"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"A. Rajaram","raw_affiliation_strings":["Department of Electronics and Communication Engineering, E.G.S Pillay Engineering College, Nagapattinam, Tamilnadu, 611002, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, E.G.S Pillay Engineering College, Nagapattinam, Tamilnadu, 611002, India","institution_ids":["https://openalex.org/I4210130415","https://openalex.org/I4387153026"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5085720726"],"corresponding_institution_ids":["https://openalex.org/I25051037"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":7.7871,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.97285093,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":"5","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6858000159263611},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.6187000274658203},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.6040999889373779},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.5968999862670898},{"id":"https://openalex.org/keywords/adaboost","display_name":"AdaBoost","score":0.45350000262260437},{"id":"https://openalex.org/keywords/gradient-boosting","display_name":"Gradient boosting","score":0.4097999930381775},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.4032999873161316},{"id":"https://openalex.org/keywords/gradient-descent","display_name":"Gradient descent","score":0.3880000114440918},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.37770000100135803}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.723800003528595},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6858000159263611},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.6187000274658203},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.6040999889373779},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.5968999862670898},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5371000170707703},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5167999863624573},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45980000495910645},{"id":"https://openalex.org/C141404830","wikidata":"https://www.wikidata.org/wiki/Q2823869","display_name":"AdaBoost","level":3,"score":0.45350000262260437},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4113999903202057},{"id":"https://openalex.org/C70153297","wikidata":"https://www.wikidata.org/wiki/Q5591907","display_name":"Gradient boosting","level":3,"score":0.4097999930381775},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.4032999873161316},{"id":"https://openalex.org/C153258448","wikidata":"https://www.wikidata.org/wiki/Q1199743","display_name":"Gradient descent","level":3,"score":0.3880000114440918},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.37770000100135803},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.323199987411499},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.3176000118255615},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.31029999256134033},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3084999918937683},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.30630001425743103},{"id":"https://openalex.org/C197323446","wikidata":"https://www.wikidata.org/wiki/Q331222","display_name":"Oversampling","level":3,"score":0.3059000074863434},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.2971999943256378},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.2962999939918518},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C35405484","wikidata":"https://www.wikidata.org/wiki/Q4967066","display_name":"Brier score","level":2,"score":0.2581999897956848},{"id":"https://openalex.org/C119898033","wikidata":"https://www.wikidata.org/wiki/Q3433888","display_name":"Ensemble forecasting","level":2,"score":0.2554999887943268},{"id":"https://openalex.org/C2780069185","wikidata":"https://www.wikidata.org/wiki/Q7977945","display_name":"Equivalence (formal languages)","level":2,"score":0.2540999948978424},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.25209999084472656}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-025-00199-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00199-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00199-1.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:199a1fe0a83944e89287ac2be233ad9d","is_oa":true,"landing_page_url":"https://doaj.org/article/199a1fe0a83944e89287ac2be233ad9d","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 5, Iss 1, Pp 1-32 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-025-00199-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00199-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00199-1.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415208316.pdf","grobid_xml":"https://content.openalex.org/works/W4415208316.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W2013389316","https://openalex.org/W2099940443","https://openalex.org/W2516066574","https://openalex.org/W2521944441","https://openalex.org/W2937483190","https://openalex.org/W2975846564","https://openalex.org/W2989230867","https://openalex.org/W3001683812","https://openalex.org/W3016974523","https://openalex.org/W3040411349","https://openalex.org/W3047793363","https://openalex.org/W3048377462","https://openalex.org/W3193759592","https://openalex.org/W4200031473","https://openalex.org/W4224330412","https://openalex.org/W4281733819","https://openalex.org/W4285235284","https://openalex.org/W4291278258","https://openalex.org/W4323041593","https://openalex.org/W4362497158","https://openalex.org/W4382046320","https://openalex.org/W4390299918","https://openalex.org/W4390747073","https://openalex.org/W4394565348","https://openalex.org/W4400737507","https://openalex.org/W4402156875"],"related_works":[],"abstract_inverted_index":{"An":[0],"Intrusion":[1],"Detection":[2],"System":[3],"(IDS)":[4],"is":[5,105,122],"crucial":[6],"for":[7,48,92,115,140,148,179,246,250],"safeguarding":[8],"networks":[9],"against":[10],"cyber":[11],"threats.":[12],"This":[13,162],"research":[14],"presents":[15],"a":[16,36,64,153,174],"novel":[17],"Twined":[18,119],"Ensemble":[19,67,120],"model,":[20],"specifically":[21],"designed":[22],"to":[23,74,107],"enhance":[24],"intrusion":[25,182],"detection":[26],"performance":[27,193],"using":[28,63,124],"the":[29,83,88,99,191,247],"NSL-KDD":[30,89],"dataset.":[31],"The":[32,118,135],"proposed":[33],"approach":[34],"leverages":[35],"combination":[37],"of":[38,157,194,199],"two":[39],"algorithms":[40],"from":[41],"AdaBoost,":[42],"Gradient":[43,207],"Boosting,":[44,208],"or":[45],"Random":[46,221],"Forest":[47,222],"each":[49,195],"attack":[50],"category":[51],"based":[52],"on":[53],"their":[54,71],"individual":[55],"performance.":[56],"These":[57,241],"selected":[58],"classifiers":[59],"are":[60],"then":[61],"combined":[62],"Soft":[65],"Voting":[66],"technique,":[68],"which":[69],"aggregates":[70],"probabilistic":[72],"outputs":[73],"yield":[75],"more":[76,210],"accurate":[77],"and":[78,97,132,143,146,176,204,220,230],"robust":[79],"predictions.":[80],"To":[81],"address":[82],"inherent":[84],"class":[85,170],"imbalance":[86],"in":[87,197,254],"dataset,":[90],"particularly":[91],"underrepresented":[93],"attacks":[94],"like":[95],"U2R":[96,149],"R2L,":[98,142],"Synthetic":[100],"Minority":[101],"Oversampling":[102],"Technique":[103],"(SMOTE)":[104],"employed":[106],"generate":[108],"synthetic":[109],"examples,":[110],"thereby":[111],"improving":[112],"model":[113,121,136],"generalization":[114],"rare":[116],"classes.":[117],"evaluated":[123],"metrics":[125],"such":[126],"as":[127],"Accuracy,":[128],"Precision,":[129],"Recall,":[130],"F1-Score,":[131],"Cohen\u2019s":[133,154],"Kappa.":[134],"achieves":[137],"99.68%":[138],"accuracy":[139],"DoS,":[141],"Probe":[144],"attacks,":[145,150],"99.83%":[147],"accompanied":[151],"by":[152],"Kappa":[155],"score":[156],"1.0,":[158],"indicating":[159],"near-perfect":[160],"classification.":[161],"architecture":[163],"effectively":[164],"integrates":[165],"adaptive":[166],"ensemble":[167],"learning":[168],"with":[169,234],"balancing":[171],"strategies,":[172],"offering":[173],"powerful":[175],"reliable":[177],"solution":[178],"modern":[180],"network":[181],"detection.":[183],"Beyond":[184],"classification":[185],"accuracy,":[186],"this":[187],"study":[188],"also":[189],"evaluates":[190],"computational":[192],"classifier":[196],"terms":[198],"training":[200,214,226],"time,":[201],"prediction":[202],"latency,":[203],"memory":[205,236],"consumption.":[206],"while":[209],"accurate,":[211],"exhibits":[212],"higher":[213],"overhead":[215],"(428.57":[216],"s),":[217],"whereas":[218],"AdaBoost":[219],"maintain":[223],"significantly":[224],"faster":[225],"times":[227],"(23.05":[228],"s":[229,232],"24.93":[231],"respectively)":[233],"minimal":[235],"usage":[237],"(<":[238],"0.04":[239],"MB).":[240],"findings":[242],"demonstrate":[243],"potential":[244],"scope":[245],"model\u2019s":[248],"feasibility":[249],"real-time":[251],"IDS":[252],"deployment":[253],"resource-constrained":[255],"environments.":[256]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-16T00:00:00"}
