{"id":"https://openalex.org/W7128920665","doi":"https://doi.org/10.1016/j.array.2026.100707","title":"AI-driven meta-model for cybersecurity in next-generation networks using multilayer Extreme Learning Machine","display_name":"AI-driven meta-model for cybersecurity in next-generation networks using multilayer Extreme Learning Machine","publication_year":2026,"publication_date":"2026-02-14","ids":{"openalex":"https://openalex.org/W7128920665","doi":"https://doi.org/10.1016/j.array.2026.100707"},"language":"en","primary_location":{"id":"doi:10.1016/j.array.2026.100707","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.array.2026.100707","pdf_url":null,"source":{"id":"https://openalex.org/S4210194039","display_name":"Array","issn_l":"2590-0056","issn":["2590-0056"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Array","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.array.2026.100707","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126021711","display_name":"Jes\u00fas Calle-Cancho","orcid":null},"institutions":[{"id":"https://openalex.org/I80606768","display_name":"Universidad de Extremadura","ror":"https://ror.org/0174shg90","country_code":"ES","type":"education","lineage":["https://openalex.org/I80606768"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Jes\u00fas Calle-Cancho","raw_affiliation_strings":["Dpto. de Ingenier\u00eda de Sistemas Inform\u00e1ticos y Telem\u00e1ticos, Universidad de Extremadura, Escuela Polit\u00e9cnica, C\u00e1ceres, 10003, Spain"],"raw_orcid":"https://orcid.org/0000-0003-1432-9002","affiliations":[{"raw_affiliation_string":"Dpto. de Ingenier\u00eda de Sistemas Inform\u00e1ticos y Telem\u00e1ticos, Universidad de Extremadura, Escuela Polit\u00e9cnica, C\u00e1ceres, 10003, Spain","institution_ids":["https://openalex.org/I80606768"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064792977","display_name":"Jes\u00fas Galeano-Brajones","orcid":null},"institutions":[{"id":"https://openalex.org/I80606768","display_name":"Universidad de Extremadura","ror":"https://ror.org/0174shg90","country_code":"ES","type":"education","lineage":["https://openalex.org/I80606768"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Jes\u00fas Galeano-Brajones","raw_affiliation_strings":["Dpto. de Ingenier\u00eda de Sistemas Inform\u00e1ticos y Telem\u00e1ticos, Universidad de Extremadura, Escuela Polit\u00e9cnica, C\u00e1ceres, 10003, Spain"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Dpto. de Ingenier\u00eda de Sistemas Inform\u00e1ticos y Telem\u00e1ticos, Universidad de Extremadura, Escuela Polit\u00e9cnica, C\u00e1ceres, 10003, Spain","institution_ids":["https://openalex.org/I80606768"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122975457","display_name":"David Cort\u00e9s-Polo","orcid":null},"institutions":[{"id":"https://openalex.org/I80606768","display_name":"Universidad de Extremadura","ror":"https://ror.org/0174shg90","country_code":"ES","type":"education","lineage":["https://openalex.org/I80606768"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"David Cort\u00e9s-Polo","raw_affiliation_strings":["Dpto. de Ingenier\u00eda de Sistemas Inform\u00e1ticos y Telem\u00e1ticos, Universidad de Extremadura, Escuela Polit\u00e9cnica, C\u00e1ceres, 10003, Spain"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Dpto. de Ingenier\u00eda de Sistemas Inform\u00e1ticos y Telem\u00e1ticos, Universidad de Extremadura, Escuela Polit\u00e9cnica, C\u00e1ceres, 10003, Spain","institution_ids":["https://openalex.org/I80606768"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046123228","display_name":"Mercedes E. Paoletti","orcid":"https://orcid.org/0000-0003-1030-3729"},"institutions":[{"id":"https://openalex.org/I80606768","display_name":"Universidad de Extremadura","ror":"https://ror.org/0174shg90","country_code":"ES","type":"education","lineage":["https://openalex.org/I80606768"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Mercedes E. Paoletti","raw_affiliation_strings":["Departamento de Tecnolog\u00eda de Computadores y Comunicaciones, Universidad de Extremadura, Escuela Polit\u00e9cnica, C\u00e1ceres, 10003, Spain"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Departamento de Tecnolog\u00eda de Computadores y Comunicaciones, Universidad de Extremadura, Escuela Polit\u00e9cnica, C\u00e1ceres, 10003, Spain","institution_ids":["https://openalex.org/I80606768"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039673511","display_name":"Juan M. Haut","orcid":"https://orcid.org/0000-0001-6701-961X"},"institutions":[{"id":"https://openalex.org/I80606768","display_name":"Universidad de Extremadura","ror":"https://ror.org/0174shg90","country_code":"ES","type":"education","lineage":["https://openalex.org/I80606768"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Juan M. Haut","raw_affiliation_strings":["Departamento de Tecnolog\u00eda de Computadores y Comunicaciones, Universidad de Extremadura, Escuela Polit\u00e9cnica, C\u00e1ceres, 10003, Spain"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Departamento de Tecnolog\u00eda de Computadores y Comunicaciones, Universidad de Extremadura, Escuela Polit\u00e9cnica, C\u00e1ceres, 10003, Spain","institution_ids":["https://openalex.org/I80606768"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5126021711"],"corresponding_institution_ids":["https://openalex.org/I80606768"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28250318,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"29","issue":null,"first_page":"100707","last_page":"100707"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.691100001335144,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.691100001335144,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12676","display_name":"Machine Learning and ELM","score":0.1972000002861023,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.012500000186264515,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.8181999921798706},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6603000164031982},{"id":"https://openalex.org/keywords/extreme-learning-machine","display_name":"Extreme learning machine","score":0.6331999897956848},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6266999840736389},{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.611299991607666},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5620999932289124},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5457000136375427}],"concepts":[{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.8181999921798706},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7386000156402588},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6603000164031982},{"id":"https://openalex.org/C2780150128","wikidata":"https://www.wikidata.org/wiki/Q21948731","display_name":"Extreme learning machine","level":3,"score":0.6331999897956848},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6266999840736389},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.611299991607666},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5620999932289124},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5457000136375427},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4611999988555908},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45890000462532043},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.39089998602867126},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3817000091075897},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36739999055862427},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3644999861717224},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3528999984264374},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.3479999899864197},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.30880001187324524},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2777000069618225},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.27469998598098755},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.25589999556541443}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1016/j.array.2026.100707","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.array.2026.100707","pdf_url":null,"source":{"id":"https://openalex.org/S4210194039","display_name":"Array","issn_l":"2590-0056","issn":["2590-0056"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Array","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:df714fb71e174e22af4a2c1cefb98968","is_oa":true,"landing_page_url":"https://doaj.org/article/df714fb71e174e22af4a2c1cefb98968","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Array, Vol 29, Iss , Pp 100707- (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1016/j.array.2026.100707","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.array.2026.100707","pdf_url":null,"source":{"id":"https://openalex.org/S4210194039","display_name":"Array","issn_l":"2590-0056","issn":["2590-0056"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Array","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4513983536","display_name":null,"funder_award_id":"IB24108","funder_id":"https://openalex.org/F4320328352","funder_display_name":"Junta de Extremadura"},{"id":"https://openalex.org/G8418533662","display_name":null,"funder_award_id":"PID2023-151462OB-I00","funder_id":"https://openalex.org/F4320315062","funder_display_name":"Ministerio de Ciencia, Innovaci\u00f3n y Universidades"}],"funders":[{"id":"https://openalex.org/F4320315062","display_name":"Ministerio de Ciencia, Innovaci\u00f3n y Universidades","ror":null},{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320322930","display_name":"Ministerio de Ciencia e Innovaci\u00f3n","ror":"https://ror.org/034900433"},{"id":"https://openalex.org/F4320323084","display_name":"Ministry of Finance","ror":"https://ror.org/02jnxpg76"},{"id":"https://openalex.org/F4320328352","display_name":"Junta de Extremadura","ror":"https://ror.org/01df4mv68"},{"id":"https://openalex.org/F4320335322","display_name":"European Regional Development Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1481794564","https://openalex.org/W1522547150","https://openalex.org/W2015757061","https://openalex.org/W2026131661","https://openalex.org/W2047431064","https://openalex.org/W2051669046","https://openalex.org/W2052912973","https://openalex.org/W2096553553","https://openalex.org/W2101674911","https://openalex.org/W2111072639","https://openalex.org/W2141695047","https://openalex.org/W2301541953","https://openalex.org/W2408701322","https://openalex.org/W2807621615","https://openalex.org/W2951694401","https://openalex.org/W2964005248","https://openalex.org/W3124340574","https://openalex.org/W3196711841","https://openalex.org/W4206281848","https://openalex.org/W4224284455","https://openalex.org/W4285307762","https://openalex.org/W4318977630","https://openalex.org/W4381053814","https://openalex.org/W4386869719","https://openalex.org/W4387010442","https://openalex.org/W4393987873","https://openalex.org/W4401872038","https://openalex.org/W4403512409","https://openalex.org/W4407351697"],"related_works":[],"abstract_inverted_index":{"Ensuring":[0],"robust":[1,136],"cybersecurity":[2],"in":[3,64],"next-generation":[4],"networks":[5],"has":[6],"become":[7],"a":[8,78,149,163],"critical":[9],"challenge":[10],"due":[11],"to":[12,35,58,89,107],"the":[13,82,140],"increasing":[14],"sophistication":[15],"of":[16,85,139],"cyber":[17],"threats,":[18],"particularly":[19],"Distributed":[20],"Denial-of-Service":[21],"(DDoS)":[22],"attacks.":[23],"Traditional":[24],"detection":[25,61],"approaches":[26],"often":[27],"suffer":[28],"from":[29],"high":[30],"computational":[31],"costs,":[32],"poor":[33],"adaptability":[34],"evolving":[36],"attack":[37,102,120,141],"patterns,":[38],"and":[39,62,92,157,166],"limited":[40],"interpretability.":[41],"In":[42],"this":[43],"work,":[44],"we":[45],"propose":[46],"an":[47],"AI-driven":[48],"meta-model,":[49],"called":[50],"Meta-Model":[51],"Multilayer":[52,71],"Extreme":[53,72],"Learning":[54,73],"Machines":[55],"(MM-MELM),":[56],"designed":[57],"enhance":[59],"anomaly":[60],"classification":[63],"NGNs.":[65],"The":[66,94,143],"proposed":[67,95],"framework":[68],"integrates":[69],"multiple":[70,100],"Machine":[74],"(MELM)":[75],"models":[76],"into":[77],"meta-learning":[79],"structure,":[80],"leveraging":[81],"diverse":[83,110],"outputs":[84],"independently":[86],"trained":[87],"MELMs":[88],"improve":[90],"robustness":[91],"generalization.":[93],"methodology":[96],"is":[97],"evaluated":[98],"across":[99,109,131],"DDoS":[101],"scenarios,":[103],"demonstrating":[104],"its":[105],"capability":[106],"generalize":[108],"threat":[111],"types.":[112],"Performance":[113],"analysis":[114],"reveals":[115],"that":[116,146],"MM-MELM":[117,127,147],"achieves":[118],"state-of-the-art":[119],"detection,":[121],"consistently":[122],"outperforming":[123],"baseline":[124],"models.":[125],"Moreover,":[126],"exhibits":[128],"lower":[129],"variability":[130],"all":[132],"evaluation":[133],"metrics,":[134],"ensuring":[135],"performance":[137],"regardless":[138],"complexity.":[142],"results":[144],"highlight":[145],"provides":[148],"trade-off":[150],"solution":[151,168],"among":[152],"balanced":[153],"accuracy,":[154],"precision,":[155],"recall,":[156],"F":[158],"1":[159],"-score,":[160],"making":[161],"it":[162],"highly":[164],"scalable":[165],"adaptive":[167],"for":[169],"real-time":[170],"network":[171],"security.":[172]},"counts_by_year":[],"updated_date":"2026-02-18T06:20:13.636215","created_date":"2026-02-15T00:00:00"}
