{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T02:14:37Z","timestamp":1772849677347,"version":"3.50.1"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10207-023-00805-9","type":"journal-article","created":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T20:01:53Z","timestamp":1704744113000},"page":"81-100","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Federated transfer learning for attack detection for Internet of Medical Things"],"prefix":"10.1007","volume":"23","author":[{"given":"Afnan A.","family":"Alharbi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,8]]},"reference":[{"issue":"1","key":"805_CR1","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/s11036-022-01937-3","volume":"28","author":"IH Sarker","year":"2023","unstructured":"Sarker, I.H., Khan, A.I., Abushark, Y.B., Alsolami, F.: Internet of Things (IoT) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mobile Netw. Appl. 28(1), 296\u2013312 (2023)","journal-title":"Mobile Netw. Appl."},{"issue":"6","key":"805_CR2","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/MWC.001.2100102","volume":"28","author":"DC Nguyen","year":"2021","unstructured":"Nguyen, D.C., Ding, M., Pathirana, P.N., Seneviratne, A., Li, J., Niyato, D., Vincent Poor, H.: Federated learning for industrial internet of things in future industries. IEEE Wirel. Commun. 28(6), 192\u2013199 (2021)","journal-title":"IEEE Wirel. Commun."},{"key":"805_CR3","doi-asserted-by":"crossref","unstructured":"Dasaradharami Reddy, K, Gadekallu, T.R., et al.: A comprehensive survey on federated learning techniques for healthcare informatics. Comput. Intell. Neurosci. 2023 (2023)","DOI":"10.1155\/2023\/8393990"},{"issue":"16","key":"805_CR4","doi-asserted-by":"publisher","first-page":"8148","DOI":"10.3390\/app12168148","volume":"12","author":"FA Alzahrani","year":"2022","unstructured":"Alzahrani, F.A., Ahmad, M., Ansari, M.T.J.: Towards design and development of security assessment framework for internet of medical things. Appl. Sci. 12(16), 8148 (2022)","journal-title":"Appl. Sci."},{"issue":"3","key":"805_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3453176","volume":"2","author":"AKM Iqtidar Newaz","year":"2021","unstructured":"Iqtidar Newaz, A.K.M., Sikder, A.K., Rahman, M.A., Selcuk Uluagac, A.: A survey on security and privacy issues in modern healthcare systems: attacks and defenses. ACM Trans. Comput. Healthc. 2(3), 1\u201344 (2021)","journal-title":"ACM Trans. Comput. Healthc."},{"key":"805_CR6","unstructured":"IoT Tech News. Kaspersky: attacks on IoT devices double in a year. https:\/\/iottechnews.com\/news\/2021\/sep\/07\/kaspersky-attacks-on-iot-devices-double-in-a-year\/, Sep 2021. Accessed on Feb. 23, 2022."},{"issue":"12","key":"805_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3571156","volume":"55","author":"AL Mart\u00ednez","year":"2023","unstructured":"Mart\u00ednez, A.L., P\u00e9rez, M.G., Ruiz-Mart\u00ednez, A.: A comprehensive review of the state-of-the-art on security and privacy issues in healthcare. ACM Comput. Surv. 55(12), 1\u201338 (2023)","journal-title":"ACM Comput. Surv."},{"key":"805_CR8","doi-asserted-by":"publisher","first-page":"108214","DOI":"10.1016\/j.compeleceng.2022.108214","volume":"102","author":"PLS Jayalaxmi","year":"2022","unstructured":"Jayalaxmi, P.L.S., Kumar, G., Saha, R., Conti, M., Kim, T.H., Thomas, R.: Debot: a deep learning-based model for bot detection in industrial internet-of-things. Comput. Electr. Eng. 102, 108214 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"805_CR9","volume-title":"Guide to Disaster-Resilient Communication Networks","author":"M Borhani","year":"2020","unstructured":"Borhani, M., Liyanage, M., Sodhro, A.H., Kumar, P., Jurcut, A.D., Gurtov, A.: Secure and resilient communications in the industrial internet. In: Rak, J., Hutchison, D. (eds.) Guide to Disaster-Resilient Communication Networks. Springer, Cham (2020)"},{"issue":"10","key":"805_CR10","doi-asserted-by":"publisher","first-page":"7110","DOI":"10.1109\/JIOT.2021.3074382","volume":"9","author":"X Wang","year":"2021","unstructured":"Wang, X., Garg, S., Lin, H., Jia, H., Georges Kaddoum, M., Piran, J., Shamim Hossain, M.: Toward accurate anomaly detection in industrial internet of things using hierarchical federated learning. IEEE Internet Things J. 9(10), 7110\u20137119 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"805_CR11","doi-asserted-by":"publisher","first-page":"4177","DOI":"10.1109\/TII.2019.2942190","volume":"16","author":"Lu Yunlong","year":"2020","unstructured":"Yunlong, Lu., Huang, X., Dai, Y., Maharjan, S., Zhang, Y.: Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans. Ind. Inf. 16(6), 4177\u20134186 (2020)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"805_CR12","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y Arcas, B.A.: Communication- efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics, pages 1273\u20131282. PMLR, (2017)"},{"key":"805_CR13","doi-asserted-by":"publisher","first-page":"109048","DOI":"10.1016\/j.comnet.2022.109048","volume":"212","author":"P Boopalan","year":"2022","unstructured":"Boopalan, P., Ramu, S.P., Pham, Q.-V., Dev, K., Maddikunta, P.K.R., Gadekallu, T.R., Huynh-The, T., et al.: Fusion of federated learning and industrial internet of things: a survey. Comput. Netw. 212, 109048 (2022)","journal-title":"Comput. Netw."},{"issue":"1","key":"805_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41746-020-00323-1","volume":"3","author":"N Rieke","year":"2020","unstructured":"Rieke, N., Hancox, J., Li, W., Milletari, F., Roth, H. R., Albarqouni, S., Bakas, S., Galtier, M.N., Landman, B.A., Maier-Hein, Klaus, et al.: The future of digital health with federated learning. NPJ Digit. Med. 3(1), 1\u20137 (2020)","journal-title":"NPJ Digit. Med."},{"key":"805_CR15","doi-asserted-by":"crossref","unstructured":"Venkatasubramanian, M., Lashkari, A.H., Hakak, S.: IoT malware analysis using federated learning: a comprehensive survey. IEEE Access, (2023)","DOI":"10.1109\/ACCESS.2023.3235389"},{"key":"805_CR16","doi-asserted-by":"crossref","unstructured":"Xu, A., Li, W., Guo, P., Yang, D., Roth, H.R., Hatamizadeh, A., Zhao, C., Xu, D., Huang, H., Xu, Z.: Closing the generalization gap of cross-silo federated medical image segmentation. In:Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 20866\u201320875 (2022)","DOI":"10.1109\/CVPR52688.2022.02020"},{"issue":"3","key":"805_CR17","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2020.2975749","volume":"37","author":"T Li","year":"2020","unstructured":"Li, T., Sahu, A.K., Talwalkar, A., Smith, V.: Federated learning: challenges, methods, and future directions. IEEE Signal Process. Mag. 37(3), 50\u201360 (2020)","journal-title":"IEEE Signal Process. Mag."},{"issue":"2","key":"805_CR18","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1007\/s10994-022-06292-8","volume":"112","author":"A Ahmad","year":"2023","unstructured":"Ahmad, A., Luo, W., Robles-Kelly, A.: Robust federated learning under statistical heterogeneity via hessian-weighted aggregation. Mach. Learn. 112(2), 633\u2013654 (2023)","journal-title":"Mach. Learn."},{"key":"805_CR19","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.comcom.2022.09.012","volume":"195","author":"S Agrawal","year":"2022","unstructured":"Agrawal, S., Sarkar, S., Aouedi, O., Yenduri, G., Piamrat, K., Alazab, M., Bhattacharya, S., Maddikunta, P.K.R., Gadekallu, T.R.: Federated learning for intrusion detection system: concepts, challenges and future directions. Comput. Commun. 195, 346 (2022)","journal-title":"Comput. Commun."},{"key":"805_CR20","first-page":"1","volume":"34","author":"AZ Tan","year":"2022","unstructured":"Tan, A.Z., Han, Y., Cui, L., Yang, Q.: Towards personalized federated learning. IEEE Trans. Neural Netw. Learn. Syst. 34, 1\u201317 (2022)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"805_CR21","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi, A., Moustafa, N., Tari, Z., Mahmood, A., Anwar, A.: Ton_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access 8, 165130\u2013165150 (2020)","journal-title":"IEEE Access"},{"issue":"5","key":"805_CR22","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2018.2825478","volume":"35","author":"L Xiao","year":"2018","unstructured":"Xiao, L., Wan, X., Xiaozhen, Lu., Zhang, Y., Di, Wu.: IoT security techniques based on machine learning: How do IoT devices use AI to enhance security? IEEE Signal Process. Mag. 35(5), 41\u201349 (2018)","journal-title":"IEEE Signal Process. Mag."},{"key":"805_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10462-023-10437-z","volume":"56","author":"R Ahmad","year":"2023","unstructured":"Ahmad, R., Alsmadi, I., Alhamdani, W., Tawalbeh, L.: Zero-day attack detection: a systematic literature review. Artif. Intell. Rev. 56, 1\u201379 (2023)","journal-title":"Artif. Intell. Rev."},{"key":"805_CR24","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D., Marchal, S., Miettinen, M., Fereidooni, H., Asokan, N., Sadeghi, A.-R.: D\u00efot: a federated self-learning anomaly detection system for IoT. In: 2019 IEEE 39th International conference on distributed computing systems (ICDCS), pages 756\u2013767. IEEE, (2019)","DOI":"10.1109\/ICDCS.2019.00080"},{"key":"805_CR25","doi-asserted-by":"publisher","first-page":"217463","DOI":"10.1109\/ACCESS.2020.3041793","volume":"8","author":"Z Chen","year":"2020","unstructured":"Chen, Z., Lv, Na., Pengfei Liu, Yu., Fang, K.C., Pan, Wu.: Intrusion detection for wireless edge networks based on federated learning. IEEE Access 8, 217463\u2013217472 (2020)","journal-title":"IEEE Access"},{"key":"805_CR26","doi-asserted-by":"crossref","unstructured":"Man, D., Zeng, F., Yang, W., Yu, M., Lv, J., Wang, Y.: Intelligent intrusion detection based on federated learning for edge-assisted internet of things. Secur. Commun. Netw. 2021 (2021)","DOI":"10.1155\/2021\/9361348"},{"key":"805_CR27","doi-asserted-by":"publisher","first-page":"108661","DOI":"10.1016\/j.comnet.2021.108661","volume":"203","author":"EM Campos","year":"2021","unstructured":"Campos, E.M., Saura, P.F., Gonz\u00e1lez-Vidal, A., Hern\u00e1ndez-Ramos, J.L., Bernabe, J.B., Baldini, G., Skarmeta, A.: Evaluating federated learning for intrusion detection in internet of things: review and challenges. Comput. Netw. 203, 108661 (2021)","journal-title":"Comput. Netw."},{"key":"805_CR28","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1109\/TII.2021.3126728","volume":"19","author":"P Ruzafa-Alcazar","year":"2021","unstructured":"Ruzafa-Alcazar, P., Fernandez-Saura, P., Marmol-Campos, E., Gonzalez-Vidal, A., Ramos, J.L.H., Bernal, J., Skarmeta, A.F.: Intrusion detection based on privacy-preserving federated learning for the industrial IoT. IEEE Trans. Industr. Inf. 19, 1145 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"8","key":"805_CR29","doi-asserted-by":"publisher","first-page":"5615","DOI":"10.1109\/TII.2020.3023430","volume":"17","author":"B Li","year":"2020","unstructured":"Li, B., Yuhao, Wu., Song, J., Rongxing, Lu., Li, T., Zhao, L.: Deepfed: federated deep learning for intrusion detection in industrial cyber\u2013physical systems. IEEE Trans. Industr. Inf. 17(8), 5615\u20135624 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"805_CR30","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/JIOT.2021.3077803","volume":"9","author":"V Mothukuri","year":"2021","unstructured":"Mothukuri, V., Khare, P., Parizi, R.M., Pouriyeh, S., Dehghantanha, A., Srivastava, G.: Federated learning-based anomaly detection for IoT security attacks. IEEE Internet Things J. 9, 2545 (2021)","journal-title":"IEEE Internet Things J."},{"key":"805_CR31","doi-asserted-by":"publisher","first-page":"4221","DOI":"10.1007\/s40747-022-00705-w","volume":"8","author":"M Driss","year":"2022","unstructured":"Driss, M., Almomani, I., Ahmad, J., et al.: A federated learning framework for cyberattack detection in vehicular sensor networks. Complex Intell. Syst. 8, 4221 (2022)","journal-title":"Complex Intell. Syst."},{"key":"805_CR32","doi-asserted-by":"publisher","first-page":"117734","DOI":"10.1109\/ACCESS.2021.3107337","volume":"9","author":"DC Attota","year":"2021","unstructured":"Attota, D.C., Mothukuri, V., Parizi, R.M., Pouriyeh, S.: An ensemble multi-view federated learning intrusion detection for IoT. IEEE Access 9, 117734\u2013117745 (2021)","journal-title":"IEEE Access"},{"key":"805_CR33","doi-asserted-by":"publisher","first-page":"3930","DOI":"10.1109\/JIOT.2021.3100755","volume":"9","author":"SI Popoola","year":"2021","unstructured":"Popoola, S.I., Ande, R., Adebisi, B., Gui, G., Hammoudeh, M., Jogunola, O.: Federated deep learning for zero-day botnet attack detection in IoT edge devices. IEEE Internet Things J. 9, 3930 (2021)","journal-title":"IEEE Internet Things J."},{"key":"805_CR34","doi-asserted-by":"publisher","first-page":"108379","DOI":"10.1016\/j.compeleceng.2022.108379","volume":"103","author":"M Sarhan","year":"2022","unstructured":"Sarhan, M., Lo, W.W., Layeghy, S., Portmann, M.: Hbfl: a hierarchical blockchain-based federated learning framework for collaborative IoT intrusion detection. Comput. Electr. Eng. 103, 108379 (2022)","journal-title":"Comput. Electr. Eng."},{"issue":"5","key":"805_CR35","doi-asserted-by":"publisher","first-page":"3492","DOI":"10.1109\/TII.2021.3107783","volume":"18","author":"L Cui","year":"2022","unstructured":"Cui, L., Youyang, Qu., Xie, G., Zeng, D., Li, R., Shen, S., Shui, Yu.: Security and privacy- enhanced federated learning for anomaly detection in IoT infrastructures. IEEE Trans. Ind. Inf. 18(5), 3492\u20133500 (2022)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"6","key":"805_CR36","doi-asserted-by":"publisher","first-page":"6073","DOI":"10.1109\/TVT.2021.3076780","volume":"70","author":"H Liu","year":"2021","unstructured":"Liu, H., Zhang, S., Zhang, P., Zhou, X., Shao, X., Geguang, Pu., Zhang, Y.: Blockchain and federated learning for collaborative intrusion detection in vehicular edge computing. IEEE Trans. Veh. Technol. 70(6), 6073\u20136084 (2021)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"6","key":"805_CR37","doi-asserted-by":"publisher","first-page":"2011","DOI":"10.3390\/app10062011","volume":"10","author":"MU Javed","year":"2020","unstructured":"Javed, M.U., Rehman, M., Javaid, N., Aldegheishem, A., Alrajeh, N., Tahir, M.: Blockchain-based secure data storage for distributed vehicular networks. Appl. Sci. 10(6), 2011 (2020)","journal-title":"Appl. Sci."},{"issue":"4","key":"805_CR38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3505243","volume":"55","author":"Qu Youyang","year":"2022","unstructured":"Youyang, Qu., Uddin, M.P., Gan, C., Xiang, Y., Gao, L., Yearwood, J.: Blockchain- enabled federated learning: a survey. ACM Comput. Surv. 55(4), 1\u201335 (2022)","journal-title":"ACM Comput. Surv."},{"key":"805_CR39","doi-asserted-by":"publisher","first-page":"103097","DOI":"10.1016\/j.cose.2023.103097","volume":"127","author":"O Friha","year":"2023","unstructured":"Friha, O., Ferrag, M.A., Benbouzid, M., Berghout, T., Kantarci, B., Choo, K.-K.: 2df-ids: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT. Comput. Secur. 127, 103097 (2023)","journal-title":"Comput. Secur."},{"key":"805_CR40","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.1109\/TNSE.2023.3237367","volume":"10","author":"ZAE Houda","year":"2023","unstructured":"Houda, Z.A.E., Hafid, A.S., Khoukhi, L.: Mitfed: a privacy preserving collaborative network attack mitigation framework based on federated learning using SDN and blockchain. IEEE Transactions on Network Science and Engineering 10, 1985 (2023)","journal-title":"IEEE Transactions on Network Science and Engineering"},{"issue":"6","key":"805_CR41","doi-asserted-by":"publisher","first-page":"4059","DOI":"10.1109\/TII.2021.3088938","volume":"18","author":"J Li","year":"2021","unstructured":"Li, J., Lyu, L., Liu, X., Zhang, X., Lyu, X.: Fleam: a federated learning empowered architecture to mitigate DDoS in industrial IoT. IEEE Trans. Ind. Inf. 18(6), 4059\u20134068 (2021)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"805_CR42","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag, M.A., Friha, O., Hamouda, D., Maglaras, L., Janicke, H.: Edge-iiotset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 10, 40281\u201340306 (2022)","journal-title":"IEEE Access"},{"key":"805_CR43","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.jpdc.2022.03.003","volume":"165","author":"O Friha","year":"2022","unstructured":"Friha, O., Ferrag, M.A., Shu, L., Maglaras, L., Choo, K.-K., Nafaa, M.: Felids: Federated learning-based intrusion detection system for agricultural internet of things. J. Parallel Distrib. Comput. 165, 17\u201331 (2022)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"1","key":"805_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-022-09691-3","volume":"31","author":"M Sarhan","year":"2023","unstructured":"Sarhan, M., Layeghy, S., Moustafa, N., Portmann, M.: Cyber threat intelligence sharing scheme based on federated learning for network intrusion detection. J. Netw. Syst. Manage. 31(1), 1\u201323 (2023)","journal-title":"J. Netw. Syst. Manage."},{"key":"805_CR45","doi-asserted-by":"publisher","first-page":"108693","DOI":"10.1016\/j.comnet.2021.108693","volume":"204","author":"V Rey","year":"2022","unstructured":"Rey, V., S\u00e1nchez, P.M.S., Celdr\u00e1n, A.H., Bovet, G.: Federated learning for malware detection in iot devices. Comput. Netw. 204, 108693 (2022)","journal-title":"Comput. Netw."},{"issue":"1","key":"805_CR46","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1109\/TII.2022.3156642","volume":"19","author":"O Aouedi","year":"2023","unstructured":"Aouedi, O., Piamrat, K., Muller, G., Singh, K.: Federated semisupervised learning for attack detection in industrial internet of things. IEEE Trans. Industr. Inf. 19(1), 286\u2013295 (2023)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"805_CR47","doi-asserted-by":"crossref","unstructured":"Khoa, T.V., Hoang, D.T., Trung, N.L., Nguyen, C.T., Quynh, T.T.T., Nguyen, D.N., Ha, N.V. Dutkiewicz, E.: Deep transfer learning: A novel collaborative learning model for cyberattack detection systems in IoT networks. IEEE Internet of Things J. (2022)","DOI":"10.1109\/JIOT.2022.3202029"},{"key":"805_CR48","doi-asserted-by":"crossref","unstructured":"Otoum, Y., Wan, Y., Nayak, A.: Federated transfer learning-based ids for the Internet of Medical Things (IoMT). In: 2021 IEEE Globecom Workshops (GC Wkshps), pages 1\u20136, (2021)","DOI":"10.1109\/GCWkshps52748.2021.9682118"},{"issue":"3","key":"805_CR49","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1109\/LCOMM.2022.3140273","volume":"26","author":"Y Cheng","year":"2022","unstructured":"Cheng, Y., Jianyuan, Lu., Niyato, D., Lyu, B., Kang, J., Zhu, S.: Federated transfer learning with client selection for intrusion detection in mobile edge computing. IEEE Commun. Lett. 26(3), 552\u2013556 (2022)","journal-title":"IEEE Commun. Lett."},{"key":"805_CR50","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TII.2022.3157641","volume":"19","author":"J Zhang","year":"2022","unstructured":"Zhang, J., Luo, C., Carpenter, M., Min, G.: Federated learning for distributed iiot intrusion detection using transfer approaches. IEEE Trans. Ind. Inf. 19, 1\u201311 (2022)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"6","key":"805_CR51","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/MNET.011.2000286","volume":"34","author":"SA Rahman","year":"2020","unstructured":"Rahman, S.A., Tout, H., Talhi, C., Mourad, A.: Internet of things intrusion detection: centralized, on-device, or federated learning? IEEE Network 34(6), 310\u2013317 (2020)","journal-title":"IEEE Network"},{"key":"805_CR52","doi-asserted-by":"crossref","unstructured":"Khoa, T.V., Saputra, Y.M., Hoang, D.T., Trung, N.L., Nguyen, D., Ha, N.V. Dutkiewicz, E.: Collaborative learning model for cyberattack detection systems in IoT industry 4.0. In: 2020IEEE Wireless Communications and Networking Conference (WCNC), pp 1\u20136 (2020)","DOI":"10.1109\/WCNC45663.2020.9120761"},{"key":"805_CR53","doi-asserted-by":"crossref","unstructured":"Morris, T., Gao, W.: Industrial control system traffic data sets for intrusion detection research. In: International Conference on Critical Infrastructure Protection, pp 65\u201378. Springer (2014)","DOI":"10.1007\/978-3-662-45355-1_5"},{"key":"805_CR54","doi-asserted-by":"crossref","unstructured":"Fan, Y., Li, Y., Zhan, M., Cui, H., Zhang, Y.: Iotdefender: a federated transfer learning intrusion detection framework for 5g iot. In: 2020 IEEE 14th International Conference on Big Data Science and Engineering (BigDataSE), pp 88\u201395, (2020)","DOI":"10.1109\/BigDataSE50710.2020.00020"},{"key":"805_CR55","doi-asserted-by":"publisher","first-page":"29696","DOI":"10.1109\/ACCESS.2021.3058528","volume":"9","author":"TT Huong","year":"2021","unstructured":"Huong, T.T., Bac, T.P., Long, D.M., Thang, B.D., Binh, N.T., Luong, T.D., Phuc, T.K.: Lockedge: low-complexity cyberattack detection in IoT edge computing. IEEE Access 9, 29696\u201329710 (2021)","journal-title":"IEEE Access"},{"key":"805_CR56","unstructured":"Qin, Q., Poularakis, K., Leung, K.K., Tassiulas, L.: Line-speed and scalable intrusion detection at the network edge via federated learning. In: 2020 IFIP Networking Conference (Networking), pp 352\u2013360. IEEE (2020)"},{"issue":"1\u20132","key":"805_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000083","volume":"14","author":"H Peter Kairouz","year":"2021","unstructured":"Peter Kairouz, H., McMahan, B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A.N., Bonawitz, K., Charles, Z., Cormode, G., Cummings, R., et al.: Advances and open problems in federated learning. Found. Trends Mach. Learn. 14(1\u20132), 1\u2013210 (2021)","journal-title":"Found. Trends Mach. Learn."},{"key":"805_CR58","unstructured":"Zhao, Y., Li, M., Lai, L., Suda, N., Civin, D., Chandra, V.: Federated learning with non-iid data. arXiv preprint arXiv:1806.00582 (2018)"},{"issue":"5","key":"805_CR59","doi-asserted-by":"publisher","first-page":"3088","DOI":"10.1109\/JIOT.2020.3007662","volume":"8","author":"J Pang","year":"2020","unstructured":"Pang, J., Huang, Y., Xie, Z., Han, Q., Cai, Z.: Realizing the heterogeneity: a self-organized federated learning framework for IoT. IEEE Internet Things J. 8(5), 3088\u20133098 (2020)","journal-title":"IEEE Internet Things J."},{"key":"805_CR60","doi-asserted-by":"crossref","unstructured":"Sarhan, M., Layeghy, S., Moustafa, N., Portmann, M.: Netflow datasets for machine learning- based network intrusion detection systems. In: Big Data Technologies and Applications, pp 117\u2013135. Springer (2020)","DOI":"10.1007\/978-3-030-72802-1_9"},{"key":"805_CR61","doi-asserted-by":"crossref","unstructured":"Lashkari, A.H., Draper-Gil, G., Mamun, M.S.I., Ghorbani, A.A., et al.: Characterization of tor traffic using time based features. In: ICISSp, pp 253\u2013262 (2017)","DOI":"10.5220\/0005740704070414"},{"key":"805_CR62","unstructured":"Moustafa, N.: New generations of internet of things datasets for cybersecurity applications based machine learning: Ton_iot datasets. In: Proceedings of the eResearch Australasia Conference, Brisbane, Australia, pp 21\u201325, (2019)"},{"key":"805_CR63","unstructured":"Yuan, H., Morningstar, W., Ning, L., Singhal, K.: What do we mean by generalization in federated learning? arXiv preprint arXiv:2110.14216, (2021)"},{"key":"805_CR64","doi-asserted-by":"publisher","first-page":"100359","DOI":"10.1016\/j.bdr.2022.100359","volume":"30","author":"M Sarhan","year":"2022","unstructured":"Sarhan, M., Layeghy, S., Portmann, M.: Evaluating standard feature sets towards increased generalisability and explainability of ml-based network intrusion detection. Big Data Res. 30, 100359 (2022)","journal-title":"Big Data Res."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00805-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00805-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00805-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T18:09:58Z","timestamp":1731002998000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00805-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,8]]},"references-count":64,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["805"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00805-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,8]]},"assertion":[{"value":"17 December 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}