{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T05:28:19Z","timestamp":1744954099286,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819981250"},{"type":"electronic","value":"9789819981267"}],"license":[{"start":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T00:00:00Z","timestamp":1699833600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T00:00:00Z","timestamp":1699833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8126-7_44","type":"book-chapter","created":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T08:01:53Z","timestamp":1700812913000},"page":"568-581","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Rapid APT Detection in\u00a0Resource-Constrained IoT Devices Using Global Vision Federated Learning (GV-FL)"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2035-0297","authenticated-orcid":false,"given":"Han","family":"Zhu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4617-1297","authenticated-orcid":false,"given":"Huibin","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8022-7744","authenticated-orcid":false,"given":"Chan-Tong","family":"Lam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4241-9964","authenticated-orcid":false,"given":"Liyazhou","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5901-5694","authenticated-orcid":false,"given":"Benjamin K.","family":"Ng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0419-1468","authenticated-orcid":false,"given":"Kai","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,13]]},"reference":[{"key":"44_CR1","doi-asserted-by":"publisher","first-page":"4267","DOI":"10.1007\/s11042-017-5522-z","volume":"78","author":"K Bhushan","year":"2019","unstructured":"Bhushan, K., Gupta, B.B.: Network flow analysis for detection and mitigation of fraudulent resource consumption (FRC) attacks in multimedia cloud computing. Multimedia Tools Appl. 78, 4267\u20134298 (2019). https:\/\/doi.org\/10.1007\/s11042-017-5522-z","journal-title":"Multimedia Tools Appl."},{"key":"44_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/11535218_16","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"D Boneh","year":"2005","unstructured":"Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258\u2013275. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11535218_16"},{"key":"44_CR3","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.comcom.2016.12.001","volume":"98","author":"H Bostani","year":"2017","unstructured":"Bostani, H., Sheikhan, M.: Hybrid of anomaly-based and specification-based IDS for internet of things using unsupervised OPF based on MapReduce approach. Comput. Commun. 98, 52\u201371 (2017). https:\/\/doi.org\/10.1016\/j.comcom.2016.12.001","journal-title":"Comput. Commun."},{"key":"44_CR4","doi-asserted-by":"publisher","unstructured":"Butun, I., Kantarci, B., Erol-Kantarci, M.: Anomaly detection and privacy preservation in cloud-centric internet of things. In: 2015 IEEE International Conference on Communication Workshop (ICCW), pp. 2610\u20132615. IEEE (2015). https:\/\/doi.org\/10.1109\/ICCW.2015.7247572","DOI":"10.1109\/ICCW.2015.7247572"},{"key":"44_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/8814068","volume":"2021","author":"X Cheng","year":"2021","unstructured":"Cheng, X., Luo, Q., Pan, Y., Li, Z., Zhang, J., Chen, B.: Predicting the apt for cyber situation comprehension in 5g-enabled IoT scenarios based on differentially private federated learning. Secur. Commun. Netw. 2021, 1\u201314 (2021). https:\/\/doi.org\/10.1155\/2021\/8814068","journal-title":"Secur. Commun. Netw."},{"key":"44_CR6","doi-asserted-by":"publisher","unstructured":"De Caro, A., Iovino, V.: JPBC: java pairing based cryptography. In: 2011 IEEE Symposium on Computers and Communications (ISCC), pp. 850\u2013855. IEEE (2011). https:\/\/doi.org\/10.1109\/ISCC.2011.5983948","DOI":"10.1109\/ISCC.2011.5983948"},{"issue":"3","key":"44_CR7","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC) 4(3), 224\u2013274 (2001). https:\/\/doi.org\/10.1145\/501978.501980","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"4","key":"44_CR8","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"T Grandison","year":"2000","unstructured":"Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Commun. Surv. Tutorials 3(4), 2\u201316 (2000). https:\/\/doi.org\/10.1109\/COMST.2000.5340804","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Gupta, B., Agrawal, D.P., Yamaguchi, S.: Handbook of research on modern cryptographic solutions for computer and cyber security. In: IGI global (2016)","DOI":"10.4018\/978-1-5225-0105-3"},{"issue":"4","key":"44_CR10","doi-asserted-by":"publisher","first-page":"4829","DOI":"10.1007\/s11042-016-3735-1","volume":"77","author":"S Gupta","year":"2018","unstructured":"Gupta, S., Gupta, B.B.: XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud. Multimedia Tools Appl. 77(4), 4829\u20134861 (2018). https:\/\/doi.org\/10.1007\/s11042-016-3735-1","journal-title":"Multimedia Tools Appl."},{"issue":"162","key":"44_CR11","first-page":"1","volume":"800","author":"VC Hu","year":"2013","unstructured":"Hu, V.C., et al.: Guide to attribute based access control (ABAC) definition and considerations (draft). NIST Spec. Publ. 800(162), 1\u201354 (2013)","journal-title":"NIST Spec. Publ."},{"key":"44_CR12","unstructured":"J\u00f8sang, A.: Artificial reasoning with subjective logic. In: Proceedings of the Second Australian Workshop on Commonsense Reasoning, vol. 48, p. 34. Citeseer (1997)"},{"key":"44_CR13","doi-asserted-by":"publisher","unstructured":"Jouini, M., Rabai, L.B.A.: A security framework for secure cloud computing environments. In: Cloud security: Concepts, Methodologies, Tools, and Applications, pp. 249\u2013263. IGI Global (2019). https:\/\/doi.org\/10.4018\/IJCAC.2016070103","DOI":"10.4018\/IJCAC.2016070103"},{"key":"44_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3124599","author":"Q Li","year":"2021","unstructured":"Li, Q., et al.: A survey on federated learning systems: vision, hype and reality for data privacy and protection. IEEE Trans. Knowl. Data Eng. (2021). https:\/\/doi.org\/10.1109\/TKDE.2021.3124599","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"44_CR15","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., et al.: N-baiot-network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12\u201322 (2018). https:\/\/doi.org\/10.1109\/MPRV.2018.03367731","journal-title":"IEEE Pervasive Comput."},{"key":"44_CR16","doi-asserted-by":"publisher","unstructured":"Midi, D., Rullo, A., Mudgerikar, A., Bertino, E.: Kalis-a system for knowledge-driven adaptable intrusion detection for the internet of things. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 656\u2013666. IEEE (2017). https:\/\/doi.org\/10.1109\/ICDCS.2017.104","DOI":"10.1109\/ICDCS.2017.104"},{"issue":"3","key":"44_CR17","doi-asserted-by":"publisher","first-page":"522","DOI":"10.2197\/ipsjjip.24.522","volume":"24","author":"YMP Pa","year":"2016","unstructured":"Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IoTPOT: a novel honeypot for revealing current IoT threats. J. Inf. Process. 24(3), 522\u2013533 (2016). https:\/\/doi.org\/10.2197\/ipsjjip.24.522","journal-title":"J. Inf. Process."},{"issue":"8","key":"44_CR18","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza, S., Wallgren, L., Voigt, T.: Svelte: real-time intrusion detection in the internet of things. Ad Hoc Netw. 11(8), 2661\u20132674 (2013). https:\/\/doi.org\/10.1016\/j.adhoc.2013.04.014","journal-title":"Ad Hoc Netw."},{"key":"44_CR19","doi-asserted-by":"publisher","first-page":"102633","DOI":"10.1016\/j.jnca.2020.102633","volume":"160","author":"K Riad","year":"2020","unstructured":"Riad, K., Huang, T., Ke, L.: A dynamic and hierarchical access control for IoT in multi-authority cloud storage. J. Netw. Comput. Appl. 160, 102633 (2020). https:\/\/doi.org\/10.1016\/j.jnca.2020.102633","journal-title":"J. Netw. Comput. Appl."},{"key":"44_CR20","doi-asserted-by":"publisher","unstructured":"Summerville, D.H., Zach, K.M., Chen, Y.: Ultra-lightweight deep packet anomaly detection for internet of things devices. In: 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), pp. 1\u20138. IEEE (2015). https:\/\/doi.org\/10.1109\/PCCC.2015.7410342","DOI":"10.1109\/PCCC.2015.7410342"},{"key":"44_CR21","doi-asserted-by":"publisher","unstructured":"Thi, H.T., Son, N.D.H., Duv, P.T., Pham, V.H.: Federated learning-based cyber threat hunting for apt attack detection in SDN-enabled networks. In: 2022 21st International Symposium on Communications and Information Technologies (ISCIT), pp. 1\u20136. IEEE (2022). https:\/\/doi.org\/10.1109\/ISCIT55906.2022.9931222","DOI":"10.1109\/ISCIT55906.2022.9931222"},{"key":"44_CR22","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"Zarpel\u00e3o, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in internet of things. J. Netw. Comput. Appl. 84, 25\u201337 (2017). https:\/\/doi.org\/10.1016\/j.jnca.2017.02.009","journal-title":"J. Netw. Comput. Appl."}],"container-title":["Communications in Computer and Information Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8126-7_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T11:39:25Z","timestamp":1709811565000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8126-7_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,13]]},"ISBN":["9789819981250","9789819981267"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8126-7_44","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023,11,13]]},"assertion":[{"value":"13 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Changsha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iconip2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1274","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"650","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"51% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.14","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.46","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}