{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T15:14:10Z","timestamp":1773933250009,"version":"3.50.1"},"reference-count":45,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100012639","name":"Prince Sultan University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012639","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1016\/j.comnet.2025.111933","type":"journal-article","created":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T08:12:42Z","timestamp":1765440762000},"page":"111933","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["IDS\u2013GraphMamba: A Markov-enhanced graph Mamba framework for real-time intrusion detection in IoMT edge networks"],"prefix":"10.1016","volume":"275","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0796-3507","authenticated-orcid":false,"given":"Safa","family":"Ben Atitallah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8236-8746","authenticated-orcid":false,"given":"Maha","family":"Driss","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2133-0757","authenticated-orcid":false,"given":"Wadii","family":"Boulila","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2025.111933_bib0001","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1016\/j.comcom.2019.12.030","article-title":"Intelligence in the internet of medical things era: a systematic review of current and future trends","volume":"150","author":"Al-Turjman","year":"2020","journal-title":"Comput. Commun."},{"issue":"17","key":"10.1016\/j.comnet.2025.111933_bib0002","doi-asserted-by":"crossref","first-page":"7435","DOI":"10.3390\/s23177435","article-title":"Internet of medical things and healthcare 4.0: trends, requirements, challenges, and research directions","volume":"23","author":"Osama","year":"2023","journal-title":"Sensors"},{"issue":"11","key":"10.1016\/j.comnet.2025.111933_bib0003","doi-asserted-by":"crossref","first-page":"8707","DOI":"10.1109\/JIOT.2020.3045653","article-title":"Recent advances in the internet-of-medical-things (IoMT) systems security","volume":"8","author":"Ghubaish","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.comnet.2025.111933_bib0004","doi-asserted-by":"crossref","first-page":"3317","DOI":"10.3390\/su15043317","article-title":"Internet of medical things privacy and security: challenges, solutions, and future trends from a new perspective","volume":"15","author":"Kamalov","year":"2023","journal-title":"Sustainability"},{"key":"10.1016\/j.comnet.2025.111933_bib0005","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.100887","article-title":"Artificial intelligence for IoMT security: a review of intrusion detection systems, attacks, datasets and cloud-fog-edge architectures","volume":"23","author":"Hernandez-Jaimes","year":"2023","journal-title":"Internet Things"},{"key":"10.1016\/j.comnet.2025.111933_bib0006","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2024.103925","article-title":"Recent endeavors in machine learning-powered intrusion detection systems for the internet of things","volume":"229","author":"Manivannan","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.comnet.2025.111933_bib0007","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2022.103332","article-title":"Security and privacy of internet of medical things: a contemporary review in the age of surveillance, botnets, and adversarial ML","volume":"201","author":"Rasool","year":"2022","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.comnet.2025.111933_bib0008","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2023.102060","article-title":"Insights into internet of medical things (IoMT): data fusion, security issues and potential solutions","volume":"102","author":"Ahmed","year":"2024","journal-title":"Inform. Fusion"},{"key":"10.1016\/j.comnet.2025.111933_bib0009","doi-asserted-by":"crossref","first-page":"49114","DOI":"10.1109\/ACCESS.2023.3275789","article-title":"Graph neural networks for intrusion detection: a survey","volume":"11","author":"Bilot","year":"2023","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.comnet.2025.111933_bib0010","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/TAI.2021.3076021","article-title":"Graph learning: a survey","volume":"2","author":"Xia","year":"2021","journal-title":"IEEE Trans. Artif. Intell."},{"key":"10.1016\/j.comnet.2025.111933_bib0011","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103524","article-title":"A survey on cybersecurity knowledge graph construction","volume":"136","author":"Zhao","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2025.111933_bib0012","unstructured":"M. Heidari, S.G. Kolahi, S. Karimijafarbigloo, B. Azad, A. Bozorgpour, S. Hatami, R. Azad, A. Diba, U. Bagci, D. Merhof, et al., Computation-efficient era: a comprehensive survey of state space models in medical image analysis, arXiv: 2406.03430(2024)."},{"key":"10.1016\/j.comnet.2025.111933_bib0013","series-title":"Markov Chains","author":"Revuz","year":"2008"},{"key":"10.1016\/j.comnet.2025.111933_bib0014","unstructured":"W. Zhao, C. Wang, C. Han, T. Guo, Analysis of graph neural networks with theory of Markov chains, CoRR (2022)."},{"key":"10.1016\/j.comnet.2025.111933_bib0015","series-title":"Companion Proceedings of the Web Conference 2022","first-page":"1019","article-title":"MarkovGNN: graph neural networks on Markov diffusion","author":"Rahman","year":"2022"},{"key":"10.1016\/j.comnet.2025.111933_bib0016","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2023.110227","article-title":"Survey of machine learning based intrusion detection methods for internet of medical things","volume":"140","author":"Si-Ahmed","year":"2023","journal-title":"Appl. Soft. Comput."},{"issue":"17","key":"10.1016\/j.comnet.2025.111933_bib0017","doi-asserted-by":"crossref","first-page":"4828","DOI":"10.3390\/s20174828","article-title":"Security in IoMT communications: a survey","volume":"20","author":"Koutras","year":"2020","journal-title":"Sensors"},{"key":"10.1016\/j.comnet.2025.111933_bib0018","series-title":"International Conference on Computational Collective Intelligence","first-page":"180","article-title":"An effective detection and classification approach for dos attacks in wireless sensor networks using deep transfer learning models and majority voting","author":"Ben Atitallah","year":"2022"},{"key":"10.1016\/j.comnet.2025.111933_bib0019","series-title":"International Conference on Computational Collective Intelligence","first-page":"83","article-title":"Strengthening network intrusion detection in IoT environments with self-supervised learning and few shot learning","author":"Ben Atitallah","year":"2024"},{"key":"10.1016\/j.comnet.2025.111933_bib0020","series-title":"International Conference on Cryptography, Codes and Cyber Security","first-page":"20","article-title":"An embedded AI-based smart intrusion detection system for edge-to-cloud systems","author":"Shrivastwa","year":"2022"},{"key":"10.1016\/j.comnet.2025.111933_bib0021","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2022.107901","article-title":"Lightweight intrusion detection for edge computing networks using deep forest and bio-inspired algorithms","volume":"100","author":"Bangui","year":"2022","journal-title":"Comput. Electr. Eng."},{"issue":"18","key":"10.1016\/j.comnet.2025.111933_bib0022","doi-asserted-by":"crossref","first-page":"13849","DOI":"10.1109\/JIOT.2021.3088875","article-title":"A survey of recent advances in edge-computing-powered artificial intelligence of things","volume":"8","author":"Chang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2025.111933_bib0023","doi-asserted-by":"crossref","first-page":"209","DOI":"10.12785\/ijcds\/110117","article-title":"A lightweight optimized deep learning-based host-intrusion detection system deployed on the edge for IoT","volume":"11","author":"Idrissi","year":"2021","journal-title":"Int. J. Comput. Digit. Syst."},{"key":"10.1016\/j.comnet.2025.111933_bib0024","article-title":"FedMicro-IDA: a federated learning and microservices-based framework for IoT data analytics","volume":"23","author":"Atitallah","year":"2023","journal-title":"Internet Things"},{"issue":"14","key":"10.1016\/j.comnet.2025.111933_bib0025","doi-asserted-by":"crossref","first-page":"4591","DOI":"10.3390\/s24144591","article-title":"BFLIDS: blockchain-driven federated learning for intrusion detection in IoMT networks","volume":"24","author":"Begum","year":"2024","journal-title":"Sensors"},{"issue":"5","key":"10.1016\/j.comnet.2025.111933_bib0026","first-page":"1133","article-title":"Smart intrusion detection in IoT edge computing using federated learning","volume":"37","author":"Fenanir","year":"2023","journal-title":"Revue d\u2019Intell. Artif."},{"issue":"3","key":"10.1016\/j.comnet.2025.111933_bib0027","article-title":"A lightweight intrusion detection system using convolutional neural network and long short-term memory in fog computing","volume":"80","author":"Alzahrani","year":"2024","journal-title":"Comput. Mater. Continua"},{"key":"10.1016\/j.comnet.2025.111933_bib0028","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10586-024-04404-8","article-title":"Graph-ensemble fusion for enhanced IoT intrusion detection: leveraging GCN and deep learning","volume":"27","author":"Mittal","year":"2024","journal-title":"Cluster Comput."},{"key":"10.1016\/j.comnet.2025.111933_bib0029","series-title":"NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","first-page":"1","article-title":"E-graphsage: a graph neural network based intrusion detection system for IoT","author":"Lo","year":"2022"},{"key":"10.1016\/j.comnet.2025.111933_bib0030","series-title":"2024 International Conference on Circuit, Systems and Communication (ICCSC)","first-page":"1","article-title":"Deep learning for enhanced IoMT security: a GNN-BiLSTM intrusion detection system","author":"Rbah","year":"2024"},{"key":"10.1016\/j.comnet.2025.111933_bib0031","doi-asserted-by":"crossref","first-page":"106576","DOI":"10.1109\/ACCESS.2020.3000421","article-title":"Intrusion detection system for healthcare systems using medical and network data: a comparison study","volume":"8","author":"Hady","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2025.111933_bib0032","unstructured":"M. Portmann, Network intrusion detection datasets, 2020, (https:\/\/staff.itee.uq.edu.au\/marius\/NIDS_datasets\/). Accessed: 13\/2\/2025."},{"key":"10.1016\/j.comnet.2025.111933_bib0033","unstructured":"PyTorch Foundation, ResNet-18 model \u2014 Torchvision 0.20 documentation, 2025a, (https:\/\/docs.pytorch.org\/vision\/main\/models\/generated\/torchvision.models.resnet18). Accessed: 2025-08-28."},{"key":"10.1016\/j.comnet.2025.111933_bib0034","unstructured":"PyTorch Foundation, VGG-16 model \u2014 Torchvision documentation, 2025b, (https:\/\/docs.pytorch.org\/vision\/main\/models\/generated\/torchvision.models.vgg16.html). Accessed: 2025-08-28."},{"key":"10.1016\/j.comnet.2025.111933_bib0035","unstructured":"MathWorks, Inc., Pretrained Deep Neural Networks, 2025, (https:\/\/www.mathworks.com\/help\/deeplearning\/ug\/pretrained-convolutional-neural-networks.html). Accessed: 2025-08-28."},{"key":"10.1016\/j.comnet.2025.111933_bib0036","series-title":"International Conference on Machine Learning","first-page":"5958","article-title":"Train big, then compress: rethinking model size for efficient training and inference of transformers","author":"Li","year":"2020"},{"issue":"7","key":"10.1016\/j.comnet.2025.111933_bib0037","doi-asserted-by":"crossref","first-page":"314","DOI":"10.3390\/info13070314","article-title":"An effective ensemble automatic feature selection method for network intrusion detection","volume":"13","author":"Zhang","year":"2022","journal-title":"Information"},{"issue":"7","key":"10.1016\/j.comnet.2025.111933_bib0038","doi-asserted-by":"crossref","first-page":"1461","DOI":"10.3390\/sym14071461","article-title":"Advanced feature-selection-based hybrid ensemble learning algorithms for network intrusion detection systems","volume":"14","author":"Mhawi","year":"2022","journal-title":"Symmetry"},{"issue":"10","key":"10.1016\/j.comnet.2025.111933_bib0039","doi-asserted-by":"crossref","first-page":"368","DOI":"10.3390\/fi16100368","article-title":"Towards ensemble feature selection for lightweight intrusion detection in resource-constrained IoT devices","volume":"16","author":"Fatima","year":"2024","journal-title":"Future Internet"},{"key":"10.1016\/j.comnet.2025.111933_bib0040","unstructured":"T.N. Kipf, M. Welling, Semi-supervised classification with graph convolutional networks, arXiv: 1609.02907(2016)."},{"issue":"01","key":"10.1016\/j.comnet.2025.111933_bib0041","doi-asserted-by":"crossref","first-page":"13","DOI":"10.56979\/401\/2022\/80","article-title":"Cyberattacks detection in iomt using machine learning techniques","volume":"4","author":"Tauqeer","year":"2022","journal-title":"J. Comput. Biomed. Inform."},{"issue":"2","key":"10.1016\/j.comnet.2025.111933_bib0042","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/IOTM.001.2300021","article-title":"Deep learning-based network intrusion detection system for internet of medical things","volume":"6","author":"Ravi","year":"2023","journal-title":"IEEE Internet Things Mag."},{"key":"10.1016\/j.comnet.2025.111933_bib0043","doi-asserted-by":"crossref","first-page":"25454","DOI":"10.1109\/JIOT.2023.3327024","article-title":"An intelligent and explainable SAAS-based intrusion detection system for resource-constrained ioMT","volume":"11","author":"Aljuhani","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"14","key":"10.1016\/j.comnet.2025.111933_bib0044","doi-asserted-by":"crossref","first-page":"3611","DOI":"10.3390\/rs15143611","article-title":"N-STGAT: spatio-temporal graph neural network based network intrusion detection for near-earth remote sensing","volume":"15","author":"Wang","year":"2023","journal-title":"Remote Sens."},{"issue":"1","key":"10.1016\/j.comnet.2025.111933_bib0045","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10922-022-09691-3","article-title":"Cyber threat intelligence sharing scheme based on federated learning for network intrusion detection","volume":"31","author":"Sarhan","year":"2023","journal-title":"J. Netw. Syst. Manage."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128625008989?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128625008989?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T12:49:27Z","timestamp":1773924567000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128625008989"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":45,"alternative-id":["S1389128625008989"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2025.111933","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2026,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"IDS\u2013GraphMamba: A Markov-enhanced graph Mamba framework for real-time intrusion detection in IoMT edge networks","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2025.111933","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111933"}}