{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T07:42:30Z","timestamp":1774942950825,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:00:00Z","timestamp":1730246400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:00:00Z","timestamp":1730246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101020259"],"award-info":[{"award-number":["101020259"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101020259"],"award-info":[{"award-number":["101020259"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101020259"],"award-info":[{"award-number":["101020259"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101020259"],"award-info":[{"award-number":["101020259"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"name":"FCT - Foundation for Science and Technology, I.P","award":["CISUC - UID\/CEC\/00326\/2020"],"award-info":[{"award-number":["CISUC - UID\/CEC\/00326\/2020"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00926-9","type":"journal-article","created":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:42:30Z","timestamp":1730302950000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Autonomous intrusion detection for IoT: a decentralized and privacy preserving approach"],"prefix":"10.1007","volume":"24","author":[{"given":"Vitalina","family":"Holubenko","sequence":"first","affiliation":[]},{"given":"Diogo","family":"Gaspar","sequence":"additional","affiliation":[]},{"given":"R\u00faben","family":"Leal","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Silva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,30]]},"reference":[{"key":"926_CR1","unstructured":"Exploding Topics. \u201cNumber of IoT Devices (2024).\u201d The latest data and statistics relating to the number of internet of things (IoT) devices worldwide. Available at: https:\/\/explodingtopics.com\/blog\/number-of-iot-devices. Accessed March 4, 2024. (2023, February 22)"},{"key":"926_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100467","volume":"44","author":"E Schiller","year":"2022","unstructured":"Schiller, E., Aidoo, A., Fuhrer, J., Stahl, J., Zi\u00f6rjen, M., Stiller, B.: Landscape of IoT security\u2019. Comput. Sci. Rev. 44, 100467 (2022). https:\/\/doi.org\/10.1016\/j.cosrev.2022.100467","journal-title":"Comput. Sci. Rev."},{"key":"926_CR3","doi-asserted-by":"publisher","first-page":"153826","DOI":"10.1109\/ACCESS.2020.3018170","volume":"8","author":"W Hui","year":"2020","unstructured":"Hui, W., Han, H., Wang, X., Sun, S.: Research on Artificial Intelligence Enhancing Internet of Things Security: A Survey. IEEE Access 8, 153826\u2013153848 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3018170","journal-title":"IEEE Access"},{"key":"926_CR4","doi-asserted-by":"publisher","unstructured":"Ribeiro, M. T., Singh, S., Guestrin, C.: \"Why Should I Trust You?\": Explaining the Predictions of Any Classifier. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD \u201916). Association for Computing Machinery, New York, NY, USA, 1135-1144. (2016). https:\/\/doi.org\/10.1145\/2939672.2939778","DOI":"10.1145\/2939672.2939778"},{"key":"926_CR5","doi-asserted-by":"publisher","unstructured":"Lundberg, S. M., Lee, S.: A unified approach to interpreting model predictions. In Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS\u201917). Curran Associates Inc., Red Hook, NY, USA, 4768-4777. (2017) https:\/\/doi.org\/10.5555\/3295222.3295230","DOI":"10.5555\/3295222.3295230"},{"key":"926_CR6","doi-asserted-by":"publisher","unstructured":"Zarpel\u00e3o, B.B., Miani, R.S., Kawakani, C.T., de Alvarenga, S.C.: A survey of intrusion detection in internet of things (2017). https:\/\/doi.org\/10.1016\/j.jnca.2017.02.009","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"926_CR7","doi-asserted-by":"publisher","unstructured":"Forrest, S., Hofmeyr, S. A., Somayaji, A., Longstaff, T. A.: A sense of self for unix processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, (1996). https:\/\/doi.org\/10.1109\/SECPRI.1996.502675","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"926_CR8","doi-asserted-by":"publisher","unstructured":"Lee, W., Stolfo, S.: Data mining approaches for intrusion detection. In Proceedings of the 7th USENIX Security Symposium, (1998). https:\/\/doi.org\/10.7916\/D86D60P8","DOI":"10.7916\/D86D60P8"},{"key":"926_CR9","unstructured":"Liao, Y., Vemuri, R.: Using text categorization techniques for intrusion detection, (2002)"},{"key":"926_CR10","doi-asserted-by":"publisher","unstructured":"Sworna, Z. T., Mousavi, Z., Babar, M. A.: \u201cNLP Methods in Host-based Intrusion Detection Systems: A Systematic Review and Future Directions\u201d, (2022) https:\/\/doi.org\/10.48550\/arXiv.2201.08066","DOI":"10.48550\/arXiv.2201.08066"},{"key":"926_CR11","doi-asserted-by":"publisher","unstructured":"Holubenko, V., Silva, P.: \u201cAn Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices,\u201d ,: IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). Boston, MA, USA 2023, 470\u2013479 (2023). https:\/\/doi.org\/10.1109\/WoWMoM57956.2023.00082","DOI":"10.1109\/WoWMoM57956.2023.00082"},{"key":"926_CR12","doi-asserted-by":"publisher","unstructured":"Jakub K., Brendan McMahan H., Ramage D., Richt\u00e1rik P.: Federated optimization: distributed machine learning for on-device intelligence, 2016. https:\/\/doi.org\/10.48550\/arXiv.1610.02527","DOI":"10.48550\/arXiv.1610.02527"},{"issue":"3","key":"926_CR13","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/COMST.2021.3075439","volume":"23","author":"DC Nguyen","year":"2021","unstructured":"Nguyen, D.C., Ding, M., Pathirana, P.N., Seneviratne, A., Li, J., Vincent Poor, H.: Federated learning for internet of things: a comprehensive survey. IEEE Commun. Surv. Tutor. 23(3), 1622\u20131658 (2021). https:\/\/doi.org\/10.1109\/COMST.2021.3075439","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"926_CR14","doi-asserted-by":"publisher","first-page":"30164","DOI":"10.1109\/ACCESS.2024.3368377","volume":"12","author":"D Gaspar","year":"2024","unstructured":"Gaspar, D., Silva, P., Silva, C.: Explainable AI for intrusion detection systems: LIME and SHAP applicability on multi-layer perceptron. IEEE Access 12, 30164\u201330175 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3368377","journal-title":"IEEE Access"},{"key":"926_CR15","doi-asserted-by":"publisher","unstructured":"Creech, G., Hu, J.: \u201cGeneration of a new IDS test dataset: Time to retire the KDD collection,\u201d: IEEE Wireless Communications and Networking Conference (WCNC). Shanghai, China 2013, 4487\u20134492 (2013). https:\/\/doi.org\/10.1109\/WCNC.2013.6555301","DOI":"10.1109\/WCNC.2013.6555301"},{"key":"926_CR16","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s13042-010-0001-0","volume":"1","author":"Y Zhang","year":"2010","unstructured":"Zhang, Y., Jin, R., Zhou, Z.H.: Understanding bag-of-words model: a statistical framework. Int. J. Mach. Learn. Cyber. 1, 43\u201352 (2010). https:\/\/doi.org\/10.1007\/s13042-010-0001-0","journal-title":"Int. J. Mach. Learn. Cyber."},{"key":"926_CR17","doi-asserted-by":"publisher","unstructured":"Amit, S., Marcin, K.: A case study in web search using TREC algorithms. In Proceedings of the 10th international conference on World Wide Web (WWW \u201901). Association for Computing Machinery, New York, NY, USA, 708\u2013716. (2001). https:\/\/doi.org\/10.1145\/371920.372186","DOI":"10.1145\/371920.372186"},{"key":"926_CR18","unstructured":"Bengio, Y., Ducharme, R., Vincent, P., Janvin, C.: A neural probabilistic language model. J. Mach. Learn. Res. 3, 1137\u20131155 (2003)"},{"key":"926_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-1904-8","author":"I Jolliffe","year":"1986","unstructured":"Jolliffe, I.: Principal component analysis. Springer Series in Statistics (1986). https:\/\/doi.org\/10.1007\/978-1-4757-1904-8","journal-title":"Springer Series in Statistics"},{"key":"926_CR20","doi-asserted-by":"publisher","unstructured":"Brendan McMahan, H., Moore, E., Ramage, D., Hampson, S., Ag\u00fcera y Arcas B. (2023) \u201cCommunication-Efficient Learning of Deep Networks from Decentralized Data.\u201d arXiv:1602.05629 [cs]. https:\/\/doi.org\/10.48550\/arXiv.1602.05629","DOI":"10.48550\/arXiv.1602.05629"},{"key":"926_CR21","unstructured":"Perf Wiki. Retrieved March 6, 2024, from https:\/\/perf.wiki.kernel.org\/index.php\/Main_Page"},{"key":"926_CR22","unstructured":"Strace. Retrieved March 6, 2024, from https:\/\/strace.io\/"},{"key":"926_CR23","unstructured":"ARCADIAN-IoT, available at: https:\/\/www.arcadian-iot.eu\/, accessed June 18, 2024, published May 21, (2021)"},{"key":"926_CR24","unstructured":"Device Behaviour Monitoring https:\/\/gitlab.com\/arcadian_iot\/device_behaviour_monitoring"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00926-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00926-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00926-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:16:00Z","timestamp":1739337360000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00926-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,30]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["926"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00926-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,30]]},"assertion":[{"value":"30 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This work does not involve humans or animals. The authors declare full compliance with the Ethical Standards.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"7"}}