{"id":"https://openalex.org/W4415790696","doi":"https://doi.org/10.1186/s40537-025-01289-1","title":"Enhanced ransomware attacks detection using feature selection, sensitivity analysis, and optimized hybrid model","display_name":"Enhanced ransomware attacks detection using feature selection, sensitivity analysis, and optimized hybrid model","publication_year":2025,"publication_date":"2025-11-03","ids":{"openalex":"https://openalex.org/W4415790696","doi":"https://doi.org/10.1186/s40537-025-01289-1"},"language":"en","primary_location":{"id":"doi:10.1186/s40537-025-01289-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s40537-025-01289-1","pdf_url":"https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-025-01289-1","source":{"id":"https://openalex.org/S2737955091","display_name":"Journal Of Big Data","issn_l":"2196-1115","issn":["2196-1115"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Big Data","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-025-01289-1","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067420608","display_name":"Kun Zhang","orcid":"https://orcid.org/0000-0001-9195-8000"},"institutions":[{"id":"https://openalex.org/I152033890","display_name":"Hainan Normal University","ror":"https://ror.org/031dhcv14","country_code":"CN","type":"education","lineage":["https://openalex.org/I152033890"]},{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kun Zhang","raw_affiliation_strings":["Hainan Engineering Research Center for Smart Education Technology, Hainan Normal University, Haikou, Hainan, 571158, China","School of Information Science and Technology, Hainan Normal University, Haikou, Hainan, 571158, China","School of Information and Communication Engineering, Hainan University, Haikou, Hainan, 570028, China"],"affiliations":[{"raw_affiliation_string":"Hainan Engineering Research Center for Smart Education Technology, Hainan Normal University, Haikou, Hainan, 571158, China","institution_ids":["https://openalex.org/I152033890"]},{"raw_affiliation_string":"School of Information Science and Technology, Hainan Normal University, Haikou, Hainan, 571158, China","institution_ids":["https://openalex.org/I152033890"]},{"raw_affiliation_string":"School of Information and Communication Engineering, Hainan University, Haikou, Hainan, 570028, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029847634","display_name":"Yetong Wang","orcid":"https://orcid.org/0000-0002-9986-3169"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]},{"id":"https://openalex.org/I4210145393","display_name":"Hainan Agricultural School","ror":"https://ror.org/04p8ncq94","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210145393"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yetong Wang","raw_affiliation_strings":["Hainan Engineering Research Center for Virtual Reality Technology and Systems, Hainan Vocational University of Science and Technology, Haikou, Hainan, 571126, China"],"affiliations":[{"raw_affiliation_string":"Hainan Engineering Research Center for Virtual Reality Technology and Systems, Hainan Vocational University of Science and Technology, Haikou, Hainan, 571126, China","institution_ids":["https://openalex.org/I20942203","https://openalex.org/I4210145393"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061187994","display_name":"Uzair Aslam Bhatti","orcid":"https://orcid.org/0000-0002-8743-2783"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Uzair Aslam Bhatti","raw_affiliation_strings":["School of Information and Communication Engineering, Hainan University, Haikou, Hainan, 570028, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Hainan University, Haikou, Hainan, 570028, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108439158","display_name":"Yu Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I152033890","display_name":"Hainan Normal University","ror":"https://ror.org/031dhcv14","country_code":"CN","type":"education","lineage":["https://openalex.org/I152033890"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Zhou","raw_affiliation_strings":["Hainan Engineering Research Center for Smart Education Technology, Hainan Normal University, Haikou, Hainan, 571158, China","School of Information Science and Technology, Hainan Normal University, Haikou, Hainan, 571158, China"],"affiliations":[{"raw_affiliation_string":"Hainan Engineering Research Center for Smart Education Technology, Hainan Normal University, Haikou, Hainan, 571158, China","institution_ids":["https://openalex.org/I152033890"]},{"raw_affiliation_string":"School of Information Science and Technology, Hainan Normal University, Haikou, Hainan, 571158, China","institution_ids":["https://openalex.org/I152033890"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101484128","display_name":"Ming Jin","orcid":"https://orcid.org/0000-0001-7687-9953"},"institutions":[{"id":"https://openalex.org/I152033890","display_name":"Hainan Normal University","ror":"https://ror.org/031dhcv14","country_code":"CN","type":"education","lineage":["https://openalex.org/I152033890"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Jin","raw_affiliation_strings":["School of Foreign Languages, Hainan Normal University, Haikou, Hainan, 571158, China"],"affiliations":[{"raw_affiliation_string":"School of Foreign Languages, Hainan Normal University, Haikou, Hainan, 571158, China","institution_ids":["https://openalex.org/I152033890"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5067420608"],"corresponding_institution_ids":["https://openalex.org/I152033890","https://openalex.org/I20942203"],"apc_list":{"value":1060,"currency":"GBP","value_usd":1300},"apc_paid":{"value":1060,"currency":"GBP","value_usd":1300},"fwci":16.3408,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.99354806,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"12","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9362000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9362000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.009399999864399433,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.0071000000461936,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.913100004196167},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.6815999746322632},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.671500027179718},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.666100025177002},{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.5171999931335449},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5145000219345093},{"id":"https://openalex.org/keywords/wilcoxon-signed-rank-test","display_name":"Wilcoxon signed-rank test","score":0.4650000035762787},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.39500001072883606},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.34549999237060547},{"id":"https://openalex.org/keywords/computational-intelligence","display_name":"Computational intelligence","score":0.3425999879837036}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.913100004196167},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8500999808311462},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.6815999746322632},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.671500027179718},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.666100025177002},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5837000012397766},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5640000104904175},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5321000218391418},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.5171999931335449},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5145000219345093},{"id":"https://openalex.org/C206041023","wikidata":"https://www.wikidata.org/wiki/Q1751970","display_name":"Wilcoxon signed-rank test","level":3,"score":0.4650000035762787},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.39500001072883606},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.34549999237060547},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.3425999879837036},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.33649998903274536},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3310999870300293},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.32589998841285706},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.325300008058548},{"id":"https://openalex.org/C70153297","wikidata":"https://www.wikidata.org/wiki/Q5591907","display_name":"Gradient boosting","level":3,"score":0.32280001044273376},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.3188999891281128},{"id":"https://openalex.org/C189430467","wikidata":"https://www.wikidata.org/wiki/Q7293293","display_name":"Ranking (information retrieval)","level":2,"score":0.3172999918460846},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.31700000166893005},{"id":"https://openalex.org/C68597687","wikidata":"https://www.wikidata.org/wiki/Q362601","display_name":"Computational Science and Engineering","level":2,"score":0.3109000027179718},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.30820000171661377},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2953999936580658},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.29350000619888306},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.27320000529289246},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2669000029563904},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.26489999890327454},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.26440000534057617},{"id":"https://openalex.org/C27158222","wikidata":"https://www.wikidata.org/wiki/Q5532422","display_name":"Generalizability theory","level":2,"score":0.2558000087738037},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2556999921798706},{"id":"https://openalex.org/C69738355","wikidata":"https://www.wikidata.org/wiki/Q1228929","display_name":"Linear discriminant analysis","level":2,"score":0.25279998779296875}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s40537-025-01289-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s40537-025-01289-1","pdf_url":"https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-025-01289-1","source":{"id":"https://openalex.org/S2737955091","display_name":"Journal Of Big Data","issn_l":"2196-1115","issn":["2196-1115"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Big Data","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e3aeb3d8f3344d5480f6084a22953834","is_oa":true,"landing_page_url":"https://doaj.org/article/e3aeb3d8f3344d5480f6084a22953834","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Big Data, Vol 12, Iss 1, Pp 1-35 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s40537-025-01289-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s40537-025-01289-1","pdf_url":"https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-025-01289-1","source":{"id":"https://openalex.org/S2737955091","display_name":"Journal Of Big Data","issn_l":"2196-1115","issn":["2196-1115"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Big Data","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415790696.pdf","grobid_xml":"https://content.openalex.org/works/W4415790696.grobid-xml"},"referenced_works_count":56,"referenced_works":["https://openalex.org/W189544274","https://openalex.org/W2027053922","https://openalex.org/W2096166399","https://openalex.org/W2791257043","https://openalex.org/W2792599578","https://openalex.org/W2885747980","https://openalex.org/W2951701832","https://openalex.org/W2954539634","https://openalex.org/W3003446592","https://openalex.org/W3004344696","https://openalex.org/W3007907254","https://openalex.org/W3020646952","https://openalex.org/W3034750607","https://openalex.org/W3047892252","https://openalex.org/W3080839855","https://openalex.org/W3111126165","https://openalex.org/W3175671845","https://openalex.org/W3185076117","https://openalex.org/W3189973449","https://openalex.org/W3200413364","https://openalex.org/W4200267592","https://openalex.org/W4200569302","https://openalex.org/W4210605004","https://openalex.org/W4212915751","https://openalex.org/W4214744072","https://openalex.org/W4220666300","https://openalex.org/W4226277631","https://openalex.org/W4283311032","https://openalex.org/W4285186299","https://openalex.org/W4297094741","https://openalex.org/W4312333477","https://openalex.org/W4362513469","https://openalex.org/W4381594606","https://openalex.org/W4387412162","https://openalex.org/W4387745472","https://openalex.org/W4391715886","https://openalex.org/W4392005103","https://openalex.org/W4392011809","https://openalex.org/W4392120324","https://openalex.org/W4392404413","https://openalex.org/W4399121679","https://openalex.org/W4399381752","https://openalex.org/W4401272807","https://openalex.org/W4401314842","https://openalex.org/W4402741535","https://openalex.org/W4403238669","https://openalex.org/W4403469127","https://openalex.org/W4403541657","https://openalex.org/W4404544294","https://openalex.org/W4405734890","https://openalex.org/W4406159011","https://openalex.org/W4406614863","https://openalex.org/W4406735650","https://openalex.org/W4406832701","https://openalex.org/W4408380449","https://openalex.org/W4411358708"],"related_works":[],"abstract_inverted_index":{"Ransomware":[0],"attacks":[1,37],"pose":[2],"a":[3,23,50,66,217],"severe":[4],"threat":[5,281],"to":[6,15,32,113,142,146,164,207,228,252,267],"organizations":[7,227],"by":[8],"exploiting":[9],"security":[10],"weaknesses,":[11],"most":[12,149],"often":[13],"leading":[14],"colossal":[16],"economic":[17,198],"and":[18,28,34,53,73,122,127,167,190,199,219,234,260,277],"information":[19],"loss.":[20],"There":[21],"is":[22,49,60,82,84,111,139,155,264],"growing":[24],"need":[25],"for":[26,69,222],"efficient":[27],"accurate":[29,255],"predictive":[30],"models":[31,180,256],"detect":[33],"prevent":[35],"such":[36],"in":[38,62,186,283],"real-time":[39],"cybersecurity":[40,238,285],"applications.":[41],"This":[42,211],"paper":[43,64],"utilizes":[44],"the":[45,98,107,115,119,130,144,148,175,203,250],"UGRansome":[46],"dataset,":[47],"which":[48,81],"large-scale":[51],"ransomware":[52,209,223],"zero-day":[54,275],"attack":[55],"detector.":[56],"The":[57,76,178,192,240,262],"F-measure":[58],"method":[59,68,263],"employed":[61],"this":[63],"as":[65],"novel":[67],"enhancing":[70,271],"model":[71,221],"interpretability":[72,259],"preventing":[74],"redundancy.":[75],"Histogram":[77],"Gradient":[78],"Boosting":[79],"classifier,":[80],"optimized,":[83],"subsequently":[85],"enhanced":[86],"with":[87,246],"three":[88],"advanced":[89],"metaheuristic":[90],"optimizers.":[91],"Sensitivity":[92,153],"analysis":[93,154,195],"provides":[94],"transparent":[95,168],"insights":[96],"into":[97],"effects":[99],"of":[100,118,129,202,216,232,242],"individual":[101,171],"attributes":[102],"through":[103],"explainable":[104,166],"AI.":[105],"Finally,":[106],"Wilcoxon":[108],"ranking":[109],"test":[110],"applied":[112,141],"ensure":[114],"statistical":[116],"significance":[117],"performance":[120],"gain,":[121],"K-fold":[123],"cross-validation":[124],"ensures":[125],"robustness":[126],"generalizability":[128],"reported":[131],"models.":[132],"In":[133],"addition,":[134],"Recursive":[135],"Feature":[136],"Elimination":[137],"(RFE)":[138],"also":[140,156],"rank":[143],"features":[145,201],"identify":[147],"important":[150],"predictors":[151],"methodically.":[152],"performed":[157],"utilizing":[158],"SHapley":[159],"Additive":[160],"exPlanations":[161],"(SHAP)":[162],"values":[163],"present":[165],"perspectives":[169],"on":[170,174],"feature":[172,193,244],"impacts":[173],"model\u2019s":[176],"output.":[177],"hybrid":[179],"proposed":[181],"here":[182],"exhibit":[183],"significant":[184],"gains":[185],"prediction":[187],"accuracy,":[188],"precision,":[189],"recall.":[191],"importance":[194],"indicates":[196],"that":[197,225],"behavioral":[200],"network":[204],"equally":[205],"contribute":[206],"correct":[208],"identification.":[210],"work":[212],"introduces":[213],"an":[214],"evaluation":[215],"strong":[218],"scalable":[220],"forecasting":[224],"enables":[226,249],"predict":[229],"threats":[230],"ahead":[231],"time":[233],"improve":[235],"their":[236],"general":[237],"capabilities.":[239],"integration":[241],"cutting-edge":[243],"selection":[245],"nature-inspired":[247],"optimization":[248],"framework":[251],"create":[253],"more":[254],"while":[257],"maintaining":[258],"efficiency.":[261],"directly":[265],"translatable":[266],"real-world":[268],"scenarios,":[269],"including":[270],"cloud":[272],"security,":[273],"detecting":[274],"attacks,":[276],"supporting":[278],"mass-scale":[279],"automated":[280],"scanning":[282],"fluctuating":[284],"environments.":[286]},"counts_by_year":[{"year":2026,"cited_by_count":12}],"updated_date":"2026-04-19T08:26:33.389920","created_date":"2025-11-03T00:00:00"}
