{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:29:28Z","timestamp":1750310968220,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_36","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"518-532","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Detecting Advanced Persistent Threat in\u00a0Edge\u00a0Computing\u00a0via\u00a0Federated\u00a0Learning"],"prefix":"10.1007","author":[{"given":"Zitong","family":"Li","sequence":"first","affiliation":[]},{"given":"Jiale","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jiale","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Milajerdi, S.M., Gjomemo, R., Eshete, B., et al.: Holmes: real-time apt detection through correlation of suspicious information flows. In: Proceedings of 2019 IEEE Symposium on Security and Privacy (SP), pp. 1137\u20131152 (2018)","DOI":"10.1109\/SP.2019.00026"},{"issue":"6","key":"36_CR2","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MWC.2017.1800112","volume":"25","author":"Y Qu","year":"2018","unstructured":"Qu, Y., Yu, S., Peng, S., Wang, G., Xiao, K.: Privacy of things: emerging challenges and opportunities in wireless Internet of Things. IEEE Wireless Commun. 25(6), 91\u201397 (2018)","journal-title":"IEEE Wireless Commun."},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Milajerdi, S.M., Eshete, B., Gjomemo, R., et al.: Poirot: aligning attack behavior with kernel audit records for cyber threat hunting. In Proceedings of 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS 2019), pp. 1795\u20131812 (2019)","DOI":"10.1145\/3319535.3363217"},{"issue":"1","key":"36_CR4","first-page":"99","volume":"18","author":"L Xiao","year":"2017","unstructured":"Xiao, L., Xu, D., Xie, C., Mandayam, N.B., Vincent, P.H.: Cloud storage defense against advanced persistent threats: a prospect theoretic study. IEEE J. Sel. Areas Commun. 18(1), 99\u2013109 (2017)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"18","key":"36_CR5","doi-asserted-by":"publisher","first-page":"4045","DOI":"10.3390\/s19184045","volume":"19","author":"X Cheng","year":"2019","unstructured":"Cheng, X., Zhang, J., Chen, B.: Cyber situation comprehension for IoT systems based on apt alerts and logs correlation. Sensors 19(18), 4045\u20134064 (2019)","journal-title":"Sensors"},{"issue":"2","key":"36_CR6","first-page":"1","volume":"89","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Ling, Y., Fu, X., et al.: Model of the intrusion detection system based on the integration of spatial-temporal features. Comput. Secur. 89(2), 1\u20139 (2020)","journal-title":"Comput. Secur."},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Manzoor, E., Milajerdi, S., Akoglu, L.: Fast memory-efficient anomaly detection in streaming heterogeneous graphs. In: Proceedings of 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 1035\u20131044 (2016)","DOI":"10.1145\/2939672.2939783"},{"issue":"12","key":"36_CR8","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.future.2018.06.055","volume":"89","author":"I Ghafir","year":"2018","unstructured":"Ghafir, I., Hammoudeh, M., Prenosil, V., et al.: Detection of advanced persistent threat using machine-learning correlation analysis. Future Gener. Comput. Syst. 89(12), 349\u2013359 (2018)","journal-title":"Future Gener. Comput. Syst."},{"issue":"11","key":"36_CR9","first-page":"58","volume":"6694","author":"S Roschke","year":"2017","unstructured":"Roschke, S., Cheng, F., Meinel, C.: A new alert correlation algorithm based on attack graph. CISIS 6694(11), 58\u201367 (2017)","journal-title":"CISIS"},{"issue":"3","key":"36_CR10","doi-asserted-by":"publisher","first-page":"1628","DOI":"10.1109\/COMST.2017.2682318","volume":"19","author":"P Mach","year":"2017","unstructured":"Mach, P., Becvar, Z.: Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 19(3), 1628\u20131656 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"36_CR11","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1109\/ACCESS.2016.2577036","volume":"4","author":"S Yu","year":"2016","unstructured":"Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751\u20132763 (2016)","journal-title":"IEEE Access"},{"key":"36_CR12","doi-asserted-by":"publisher","unstructured":"Zhang, J., Zhao, Y., Wang, J., Chen, B.: FedMEC: improving efficiency of differentially private federated learning via mobile edge computing. Mob. Netw. Appl. 1\u201313 (2020). https:\/\/doi.org\/10.1007\/s11036-020-01586-4","DOI":"10.1007\/s11036-020-01586-4"},{"key":"36_CR13","unstructured":"Smith, V., Chiang, C.-K., Sanjabi, M., Talwalkar, A.S.: Federated multi-task learning. In: Proceedings of 32nd Annual Conference on Neural Information Processing Systems (NIPS), pp. 4427\u20134437 (2017)"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, J., Zhao, Y., Wu, J., Chen, B.: LPDA-EC: a lightweight privacy-preserving data aggregation scheme for edge computing. In: Proceedings of 15th International Conference on Mobile Ad Hoc and Sensor Systems, pp. 98\u2013106 (2018)","DOI":"10.1109\/MASS.2018.00024"},{"issue":"2","key":"36_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. 10(2), 1\u201319 (2019)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, J., Chen, B., Yu, S., Deng, H.: PEFL: a privacy-enhanced federated learning scheme for big data analytics. In: Proceedings of 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136 (2019)","DOI":"10.1109\/GLOBECOM38437.2019.9014272"},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Berlin, K., Slater, D., Saxe, J.: Malicious behavior detection using windows audit logs. In: Proceedings of 8th ACM Workshop on Artificial Intelligence and Security, pp. 35\u201344 (2015)","DOI":"10.1145\/2808769.2808773"},{"issue":"2","key":"36_CR18","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1109\/COMST.2019.2891891","volume":"21","author":"A Alshamrani","year":"2019","unstructured":"Alshamrani, A., Myneni, S., Chowdhary, A., Huang, D.: A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Communi. Surv. Tutor. 21(2), 1851\u20131877 (2019)","journal-title":"IEEE Communi. Surv. Tutor."},{"key":"36_CR19","unstructured":"Zhao, Y., Li, M., Lai, L., Suda, N., Civin, D., Chandra, V.: Federated learning with non-IID data. https:\/\/arxiv.org\/abs\/1806.00582 (2018)"},{"issue":"5","key":"36_CR20","doi-asserted-by":"publisher","first-page":"4016","DOI":"10.1109\/JIOT.2020.2978286","volume":"7","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Zhao, Y., Wu, J., Chen, B.: LVPDA: a lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled IoT. IEEE Internet of Things J. 7(5), 4016\u20134027 (2020)","journal-title":"IEEE Internet of Things J."},{"key":"36_CR21","unstructured":"Bhowmick, A., Duchi, J., Freudiger, J., Kapoor, G., Rogers, R.: Protection against reconstruction and its applications in private federated learning. https:\/\/arxiv.org\/abs\/1812.00984v1 (2018)"},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Ahmed, A,T., Md, S.M., Anazida, Z., et al.: Feature selection using information gain for improved structural-based alert correlation. PLoS ONE. 11(12), e0166017 (2016)","DOI":"10.1371\/journal.pone.0166017"},{"issue":"11","key":"36_CR23","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y Lecun","year":"1998","unstructured":"Lecun, Y., Bottou, L.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"36_CR24","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1109\/ACCESS.2017.2780250","volume":"6","author":"W Wang","year":"2017","unstructured":"Wang, W., Sheng, Y., Wang, J., Zeng, X., Huang, Y., Zhu, M.: HAST-IDS: learning hierarchical spatial-temporal features using deep neural networks to improve intrusion detection. IEEE Access 6, 1792\u20131806 (2017)","journal-title":"IEEE Access"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:36:17Z","timestamp":1619318177000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_36","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}