{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:38:52Z","timestamp":1778168332615,"version":"3.51.4"},"reference-count":46,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Internet of Things"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1016\/j.iot.2023.100818","type":"journal-article","created":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T21:24:26Z","timestamp":1684963466000},"page":"100818","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":49,"special_numbering":"C","title":["A new concatenated Multigraph Neural Network for IoT intrusion detection"],"prefix":"10.1016","volume":"22","author":[{"given":"Tanzeela","family":"Altaf","sequence":"first","affiliation":[]},{"given":"Xu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Guangsheng","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Ren Ping","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Robin","family":"Braun","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.iot.2023.100818_b1","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2022.100641","article-title":"Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview","volume":"21","author":"Nayak","year":"2023","journal-title":"Internet of Things"},{"key":"10.1016\/j.iot.2023.100818_b2","series-title":"MORE alarming cybersecurity stats for 2021!","author":"Brooks","year":"2021"},{"key":"10.1016\/j.iot.2023.100818_b3","series-title":"2016 IEEE International Conference on Communications","first-page":"1","article-title":"Detection of command and control in advanced persistent threat based on independent access","author":"Wang","year":"2016"},{"key":"10.1016\/j.iot.2023.100818_b4","series-title":"Security and Communication Networks","first-page":"14","article-title":"Computing adaptive feature weights with PSO to improve android malware detection","author":"Wu","year":"2017"},{"key":"10.1016\/j.iot.2023.100818_b5","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.100699","article-title":"A deep learning approach for intrusion detection in Internet of Things using focal loss function","volume":"22","author":"Dina","year":"2023","journal-title":"Internet of Things"},{"key":"10.1016\/j.iot.2023.100818_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2022.100557","article-title":"A two-layer fog-cloud intrusion detection model for IoT networks","volume":"19","author":"Roy","year":"2022","journal-title":"Internet of Things"},{"key":"10.1016\/j.iot.2023.100818_b7","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1016\/j.comcom.2020.01.016","article-title":"Deep learning and big data technologies for IoT security","volume":"151","author":"Amanullah","year":"2020","journal-title":"Comput. Commun."},{"issue":"1","key":"10.1016\/j.iot.2023.100818_b8","article-title":"WORM-HUNTER: A worm guard system using software-defined networking","volume":"11","author":"Yixun","year":"2016","journal-title":"KSII Trans. Int. Inf. Syst."},{"key":"10.1016\/j.iot.2023.100818_b9","series-title":"BEIAC 2013 - 2013 IEEE Business Engineering and Industrial Applications Colloquium","first-page":"140","article-title":"Network Intrusion Detection and its strategic importance","author":"Asif","year":"2013"},{"key":"10.1016\/j.iot.2023.100818_b10","series-title":"IEEE Symposium on Security and Privacy","first-page":"118","article-title":"An intrusion-detection model","author":"Denning","year":"1986"},{"key":"10.1016\/j.iot.2023.100818_b11","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2022.100615","article-title":"A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions","volume":"20","author":"Ahmetoglu","year":"2022","journal-title":"Internet of Things"},{"issue":"19","key":"10.1016\/j.iot.2023.100818_b12","doi-asserted-by":"crossref","DOI":"10.3390\/s22197433","article-title":"Internet of things: Security and solutions survey","volume":"22","author":"Sadhu","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.iot.2023.100818_b13","series-title":"A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges","first-page":"3211","author":"Thakkar","year":"2021"},{"key":"10.1016\/j.iot.2023.100818_b14","series-title":"2022 5th Conference on Cloud and Internet of Things (CIoT)","first-page":"129","article-title":"A roadmap to smart homes security aided SDN and ML","author":"Altaf","year":"2022"},{"key":"10.1016\/j.iot.2023.100818_b15","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2020.100227","article-title":"Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology","volume":"11","author":"Mohanta","year":"2020","journal-title":"Internet of Things"},{"key":"10.1016\/j.iot.2023.100818_b16","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.aiopen.2021.01.001","article-title":"Graph neural networks: A review of methods and applications","volume":"1","author":"Zhou","year":"2020","journal-title":"AI Open"},{"key":"10.1016\/j.iot.2023.100818_b17","series-title":"WWW","article-title":"MAGNN: Metapath aggregated graph neural network for heterogeneous graph embedding","author":"Fu","year":"2020"},{"key":"10.1016\/j.iot.2023.100818_b18","series-title":"NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","first-page":"1","article-title":"E-GraphSAGE: A graph neural network based intrusion detection system for IoT","author":"Lo","year":"2022"},{"key":"10.1016\/j.iot.2023.100818_b19","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2022.110030","article-title":"Anomal-E: A self-supervised network intrusion detection system based on graph neural networks","volume":"258","author":"Caville","year":"2022","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.iot.2023.100818_b20","series-title":"Graph-based solutions with residuals for intrusion detection: the modified E-GraphSAGE and E-ResGAT algorithms","author":"Chang","year":"2021"},{"key":"10.1016\/j.iot.2023.100818_b21","series-title":"IJCAI International Joint Conference on Artificial Intelligence","first-page":"1237","article-title":"Motif-preserving temporal network embedding","volume":"2021-Janua","author":"Huang","year":"2020"},{"key":"10.1016\/j.iot.2023.100818_b22","doi-asserted-by":"crossref","unstructured":"T.D. Nguyen, S. Marchal, M. Miettinen, H. Fereidooni, N. Asokan, A.-R. Sadeghi, D\u00efoT: A Federated Self-learning Anomaly Detection System for IoT, in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), 2018, pp. 756\u2013767.","DOI":"10.1109\/ICDCS.2019.00080"},{"issue":"February","key":"10.1016\/j.iot.2023.100818_b23","article-title":"Machine learning based solutions for security of Internet of Things (IoT): A survey","volume":"161","author":"Tahsien","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.iot.2023.100818_b24","series-title":"2018 IEEE Security and Privacy Workshops","first-page":"29","article-title":"Machine learning ddos detection for consumer internet of things devices","author":"Doshi","year":"2018"},{"key":"10.1016\/j.iot.2023.100818_b25","series-title":"The computational limits of deep learning","author":"Thompson","year":"2020"},{"issue":"2","key":"10.1016\/j.iot.2023.100818_b26","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.acha.2010.04.005","article-title":"Wavelets on graphs via spectral graph theory","volume":"30","author":"Hammond","year":"2011","journal-title":"Appl. Comput. Harmon. Anal."},{"key":"10.1016\/j.iot.2023.100818_b27","series-title":"Proceedings of the 30th International Conference on Neural Information Processing Systems","first-page":"3844","article-title":"Convolutional neural networks on graphs with fast localized spectral filtering","author":"Defferrard","year":"2016"},{"key":"10.1016\/j.iot.2023.100818_b28","series-title":"Neural Information Processing Systems","article-title":"Inductive representation learning on large graphs","author":"Hamilton","year":"2017"},{"issue":"4","key":"10.1016\/j.iot.2023.100818_b29","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1145\/3543146.3543171","article-title":"Unveiling the potential of graph neural networks for robust intrusion detection","volume":"49","author":"Pujol-Perich","year":"2022","journal-title":"SIGMETRICS Perform. Eval. Rev."},{"key":"10.1016\/j.iot.2023.100818_b30","unstructured":"T.N. Kipf, M. Welling, Semi-Supervised Classification with Graph Convolutional Networks, in: International Conference on Learning Representations, ICLR, 2017."},{"key":"10.1016\/j.iot.2023.100818_b31","unstructured":"J. Zhou, Z. Xu, A.M. Rush, M. Yu, Automating Botnet Detection with Graph Neural Networks, in: AutoML for Networking and Systems Workshop of MLSys 2020 Conference, 2020."},{"key":"10.1016\/j.iot.2023.100818_b32","first-page":"1","article-title":"Detecting and mitigating DDoS attacks in SDN using spatial-temporal graph convolutional network","author":"Cao","year":"2021","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.iot.2023.100818_b33","series-title":"2022 9th International Conference on Electrical and Electronics Engineering","first-page":"217","article-title":"Cyberattack detection in large-scale smart grids using Chebyshev graph convolutional networks","author":"Boyaci","year":"2022"},{"key":"10.1016\/j.iot.2023.100818_b34","series-title":"2020 IEEE 39th International Performance Computing and Communications Conference, IPCCC 2020","article-title":"An encrypted traffic classification method combining graph convolutional network and autoencoder","author":"Sun","year":"2020"},{"key":"10.1016\/j.iot.2023.100818_b35","series-title":"Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering, TrustCom\/BigDataSE 2019","first-page":"120","article-title":"STDeepGraph: Spatial-temporal deep learning on communication graphs for long-term network attack detection","author":"Yao","year":"2019"},{"key":"10.1016\/j.iot.2023.100818_b36","unstructured":"P. Veli\u010dkovi\u0107, G. Cucurull, A. Casanova, A. Romero, P. Li\u00f2, Y. Bengio, Graph Attention Networks, in: International Conference on Learning Representations, 2018."},{"key":"10.1016\/j.iot.2023.100818_b37","unstructured":"W. Shang, K. Sohn, D. Almeida, H. Lee, Understanding and improving convolutional neural networks via concatenated rectified linear units, in: 33rd International Conference on Machine Learning, ICML 2016, Vol. 5, ISBN: 9781510829008, 2016, pp. 3276\u20133284."},{"key":"10.1016\/j.iot.2023.100818_b38","unstructured":"A.L. Maas, Rectifier Nonlinearities Improve Neural Network Acoustic Models, in: Proceedings of the 30th International Conference on Machine Learning, 2013."},{"key":"10.1016\/j.iot.2023.100818_b39","series-title":"Links between Perceptrons, MLPs and SVMs","first-page":"23","author":"Collobert","year":"2004"},{"key":"10.1016\/j.iot.2023.100818_b40","series-title":"Knowledge Discovery in Databases: PKDD 2007","first-page":"42","article-title":"Efficient AUC optimization for classification","author":"Calders","year":"2007"},{"key":"10.1016\/j.iot.2023.100818_b41","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2021.102994","article-title":"A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets","volume":"72","author":"Moustafa","year":"2021","journal-title":"Sustainable Cities Soc."},{"key":"10.1016\/j.iot.2023.100818_b42","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.iot.2023.100818_b43","series-title":"Big Data Technologies and Applications","first-page":"117","article-title":"NetFlow datasets for machine learning-based network intrusion detection systems","author":"Sarhan","year":"2021"},{"key":"10.1016\/j.iot.2023.100818_b44","unstructured":"S.J. Reddi, S. Kale, S. Kumar, On the Convergence of Adam and Beyond, in: International Conference on Learning Representations, 2018."},{"issue":"2","key":"10.1016\/j.iot.2023.100818_b45","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1111\/j.2517-6161.1958.tb00292.x","article-title":"The regression analysis of binary sequences","volume":"20","author":"Cox","year":"1958","journal-title":"J. R. Stat. Soc. Ser. B Stat. Methodol."},{"key":"10.1016\/j.iot.2023.100818_b46","series-title":"2015 Military Communications and Information Systems Conference, MilCIS 2015 - Proceedings","article-title":"UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)","author":"Moustafa","year":"2015"}],"container-title":["Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2542660523001415?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2542660523001415?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:01:37Z","timestamp":1762873297000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2542660523001415"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":46,"alternative-id":["S2542660523001415"],"URL":"https:\/\/doi.org\/10.1016\/j.iot.2023.100818","relation":{},"ISSN":["2542-6605"],"issn-type":[{"value":"2542-6605","type":"print"}],"subject":[],"published":{"date-parts":[[2023,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A new concatenated Multigraph Neural Network for IoT intrusion detection","name":"articletitle","label":"Article Title"},{"value":"Internet of Things","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.iot.2023.100818","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"100818"}}