{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T04:41:58Z","timestamp":1769920918000,"version":"3.49.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T00:00:00Z","timestamp":1766880000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T00:00:00Z","timestamp":1766880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100020716","name":"Wenzhou-Kean University","doi-asserted-by":"publisher","award":["KY20231019000165"],"award-info":[{"award-number":["KY20231019000165"]}],"id":[{"id":"10.13039\/100020716","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10207-025-01183-0","type":"journal-article","created":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T09:53:33Z","timestamp":1766915613000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Advanced intrusion detection for IoT devices using federated deep learning"],"prefix":"10.1007","volume":"25","author":[{"given":"Tianhao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Omar","family":"Dib","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,28]]},"reference":[{"key":"1183_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2025.101984","volume":"96","author":"MS Ahsan","year":"2025","unstructured":"Ahsan, M.S., Islam, S., Shatabda, S.: A systematic review of metaheuristics-based and machine learning-driven intrusion detection systems in iot. Swarm Evol. Comput. 96, 101984 (2025). https:\/\/doi.org\/10.1016\/j.swevo.2025.101984","journal-title":"Swarm Evol. Comput."},{"issue":"1","key":"1183_CR2","doi-asserted-by":"publisher","first-page":"5579851","DOI":"10.1155\/2021\/5579851","volume":"2021","author":"H Alkahtani","year":"2021","unstructured":"Alkahtani, H., Aldhyani, T.H.H.: Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complexity 2021(1), 5579851 (2021). https:\/\/doi.org\/10.1155\/2021\/5579851","journal-title":"Complexity"},{"issue":"18","key":"1183_CR3","doi-asserted-by":"publisher","first-page":"15175","DOI":"10.1007\/s00521-021-06826-6","volume":"34","author":"A Basati","year":"2022","unstructured":"Basati, A., Faghih, M.M.: DFE: efficient IoT network intrusion detection using deep feature extraction. Neural Comput. Appl. 34(18), 15175\u201315195 (2022). https:\/\/doi.org\/10.1007\/s00521-021-06826-6","journal-title":"Neural Comput. Appl."},{"key":"1183_CR4","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.ins.2017.04.044","volume":"433\u2013434","author":"Z Chen","year":"2018","unstructured":"Chen, Z., Yan, Q., Han, H., Wang, S., Peng, L., Wang, L., Yang, B.: Machine learning based mobile malware detection using highly imbalanced network traffic. Information Sciences 433\u2013434, 346\u2013364 (2018). https:\/\/doi.org\/10.1016\/j.ins.2017.04.044","journal-title":"Information Sciences"},{"key":"1183_CR5","doi-asserted-by":"publisher","first-page":"217463","DOI":"10.1109\/ACCESS.2020.3041793","volume":"8","author":"Z Chen","year":"2020","unstructured":"Chen, Z., Lv, N., Liu, P., Fang, Y., Chen, K., Pan, W.: Intrusion detection for wireless edge networks based on federated learning. IEEE Access 8, 217463\u2013217472 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3041793","journal-title":"IEEE Access"},{"key":"1183_CR6","doi-asserted-by":"publisher","unstructured":"Dib, O.: A decentralized privacy-preserving framework for diabetic retinopathy detection using federated learning and blockchain. Results in Engineering p. 105456 (2025). https:\/\/doi.org\/10.1016\/j.rineng.2025.105456","DOI":"10.1016\/j.rineng.2025.105456"},{"key":"1183_CR7","doi-asserted-by":"publisher","unstructured":"Dib, O.: Secure and incentivized federated learning for resilient telemedicine diagnostics. Knowledge-Based Systems p. 114622 (2025). https:\/\/doi.org\/10.1016\/j.knosys.2025.114622","DOI":"10.1016\/j.knosys.2025.114622"},{"key":"1183_CR8","doi-asserted-by":"publisher","unstructured":"Dib, O., Li, S., Li, Z., Abdallah, R., Diallo, E.h.: Fl-smpc++: A robust framework for privacy-preserving federated learning. Results in Engineering p. 107380 (2025). https:\/\/doi.org\/10.1016\/j.rineng.2025.107380","DOI":"10.1016\/j.rineng.2025.107380"},{"key":"1183_CR9","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag, M.A., Friha, O., Hamouda, D., Maglaras, L., Janicke, H.: Edge-iiotset: A new comprehensive realistic cyber security dataset of iot and iiot applications for centralized and federated learning. IEEE Access 10, 40281\u201340306 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3165809","journal-title":"IEEE Access"},{"key":"1183_CR10","doi-asserted-by":"publisher","first-page":"138509","DOI":"10.1109\/ACCESS.2021.3118642","volume":"9","author":"MA Ferrag","year":"2021","unstructured":"Ferrag, M.A., Friha, O., Maglaras, L., Janicke, H., Shu, L.: Federated deep learning for cyber security in the internet of things: Concepts, applications, and experimental analysis. IEEE Access 9, 138509\u2013138542 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3118642","journal-title":"IEEE Access"},{"key":"1183_CR11","doi-asserted-by":"publisher","first-page":"138509","DOI":"10.1109\/ACCESS.2021.3118642","volume":"9","author":"MA Ferrag","year":"2021","unstructured":"Ferrag, M.A., Friha, O., Maglaras, L., Janicke, H., Shu, L.: Federated deep learning for cyber security in the internet of things: Concepts, applications, and experimental analysis. IEEE Access 9, 138509\u2013138542 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3118642","journal-title":"IEEE Access"},{"key":"1183_CR12","doi-asserted-by":"publisher","first-page":"82512","DOI":"10.1109\/ACCESS.2019.2923640","volume":"7","author":"X Gao","year":"2019","unstructured":"Gao, X., Shan, C., Hu, C., Niu, Z., Liu, Z.: An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7, 82512\u201382521 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2923640","journal-title":"IEEE Access"},{"issue":"6","key":"1183_CR13","doi-asserted-by":"publisher","first-page":"1937","DOI":"10.1007\/s10207-023-00727-6","volume":"22","author":"N Hamdi","year":"2023","unstructured":"Hamdi, N.: Federated learning-based intrusion detection system for internet of things. Int. J. Inf. Secur. 22(6), 1937\u20131948 (2023). https:\/\/doi.org\/10.1007\/s10207-023-00727-6","journal-title":"Int. J. Inf. Secur."},{"key":"1183_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102033","volume":"99","author":"X Hei","year":"2020","unstructured":"Hei, X., Yin, X., Wang, Y., Ren, J., Zhu, L.: A trusted feature aggregator federated learning for distributed malicious attack detection. Computers & Security 99, 102033 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.102033","journal-title":"Computers & Security"},{"issue":"2","key":"1183_CR15","doi-asserted-by":"publisher","first-page":"1803","DOI":"10.1109\/TNSM.2020.3014929","volume":"18","author":"M Injadat","year":"2020","unstructured":"Injadat, M., Moubayed, A., Nassif, A.B., Shami, A.: Multi-stage optimized machine learning framework for network intrusion detection. IEEE Trans. Netw. Serv. Manage. 18(2), 1803\u20131816 (2020). https:\/\/doi.org\/10.1109\/TNSM.2020.3014929","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"1183_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103540","volume":"162","author":"D Javeed","year":"2024","unstructured":"Javeed, D., Saeed, M.S., Adil, M., Kumar, P., Jolfaei, A.: A federated learning-based zero trust intrusion detection system for internet of things. Ad Hoc Networks 162, 103540 (2024). https:\/\/doi.org\/10.1016\/j.adhoc.2024.103540","journal-title":"Ad Hoc Networks"},{"key":"1183_CR17","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems 100, 779\u2013796 (2019). https:\/\/doi.org\/10.1016\/j.future.2019.05.041","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"1183_CR18","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCE.2023.3296222","volume":"13","author":"P Kumar","year":"2024","unstructured":"Kumar, P., Kumar, R., Aloqaily, M., Islam, A.K.M.N.: Explainable ai and blockchain for metaverse: A security and privacy perspective. IEEE Consumer Electronics Magazine 13(3), 90\u201397 (2024). https:\/\/doi.org\/10.1109\/MCE.2023.3296222","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"1183_CR19","doi-asserted-by":"publisher","unstructured":"Kumar, P., Kumar, R., Garg, S., Kaur, K., Zhang, Y., Guizani, M.: A secure data dissemination scheme for iot-based e-health systems using ai and blockchain. In: GLOBECOM 2022 - 2022 IEEE Global Communications Conference. pp. 1397\u20131403 (2022). https:\/\/doi.org\/10.1109\/GLOBECOM48099.2022.10000801","DOI":"10.1109\/GLOBECOM48099.2022.10000801"},{"issue":"1","key":"1183_CR20","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1109\/TCE.2023.3320157","volume":"70","author":"R Kumar","year":"2024","unstructured":"Kumar, R., Javeed, D., Aljuhani, A., Jolfaei, A., Kumar, P., Islam, A.K.M.N.: Blockchain-based authentication and explainable ai for securing consumer iot applications. IEEE Trans. Consum. Electron. 70(1), 1145\u20131154 (2024). https:\/\/doi.org\/10.1109\/TCE.2023.3320157","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"8","key":"1183_CR21","doi-asserted-by":"publisher","first-page":"5615","DOI":"10.1109\/TII.2020.3023430","volume":"17","author":"B Li","year":"2021","unstructured":"Li, B., Wu, Y., Song, J., Lu, R., Li, T., Zhao, L.: Deepfed: Federated deep learning for intrusion detection in industrial cyber-physical systems. IEEE Trans. Industr. Inf. 17(8), 5615\u20135624 (2021). https:\/\/doi.org\/10.1109\/TII.2020.3023430","journal-title":"IEEE Trans. Industr. Inf."},{"key":"1183_CR22","doi-asserted-by":"publisher","unstructured":"Liu, J., Xue, H., Wang, J., Hong, S., Fu, H., Dib, O.: A systematic comparison on prevailing intrusion detection models. In: International Conference on Parallel and Distributed Computing: Applications and Technologies. pp. 213\u2013224. Springer Nature Switzerland Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-29927-8_17","DOI":"10.1007\/978-3-031-29927-8_17"},{"key":"1183_CR23","doi-asserted-by":"publisher","first-page":"7550","DOI":"10.1109\/ACCESS.2020.3048198","volume":"9","author":"L Liu","year":"2021","unstructured":"Liu, L., Wang, P., Lin, J., Liu, L.: Intrusion detection of imbalanced network traffic based on machine learning and deep learning. IEEE Access 9, 7550\u20137563 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2020.3048198","journal-title":"IEEE Access"},{"key":"1183_CR24","doi-asserted-by":"publisher","unstructured":"Liu, T., Fan, W., Wang, G., Tang, W., Li, D., Chen, M., Dib, O.: A hybrid supervised learning approach for intrusion detection systems. In: International Symposium on Knowledge and Systems Sciences. pp. 3\u201317. Springer Nature Singapore, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8318-6_1","DOI":"10.1007\/978-981-99-8318-6_1"},{"key":"1183_CR25","doi-asserted-by":"publisher","unstructured":"Mazid, A., Kirmani, S., Abid, M.: Enhanced intrusion detection framework for securing iot network using principal component analysis and cnn. Information Security Journal: A Global Perspective , 1\u201321 (2024). https:\/\/doi.org\/10.1080\/19393555.2024.2408256","DOI":"10.1080\/19393555.2024.2408256"},{"issue":"4","key":"1183_CR26","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s10586-024-04896-4","volume":"28","author":"A Mazid","year":"2025","unstructured":"Mazid, A., Kirmani, S., Abid, M., Pawar, V.: A secure and efficient framework for internet of medical things through blockchain driven customized federated learning. Clust. Comput. 28(4), 225 (2025). https:\/\/doi.org\/10.1007\/s10586-024-04896-4","journal-title":"Clust. Comput."},{"key":"1183_CR27","doi-asserted-by":"publisher","unstructured":"Mazid, A., Kirmani, S., Manaullah, Yadav, M.: Fl-idpp: A federated learning based intrusion detection approach with privacy preservation. Transactions on Emerging Telecommunications Technologies 36(1), e70039 (2025). https:\/\/doi.org\/10.1002\/ett.70039","DOI":"10.1002\/ett.70039"},{"key":"1183_CR28","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.y.: Communication-Efficient Learning of Deep Networks from Decentralized Data. In: Singh, A., Zhu, J. (eds.) Proceedings of the 20th International Conference on Artificial Intelligence and Statistics. Proceedings of Machine Learning Research, vol.\u00a054, pp. 1273\u20131282. PMLR (20\u201322 Apr 2017), https:\/\/proceedings.mlr.press\/v54\/mcmahan17a.html"},{"issue":"2","key":"1183_CR29","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MCOM.2018.1700298","volume":"56","author":"M Mohammadi","year":"2018","unstructured":"Mohammadi, M., Al-Fuqaha, A.: Enabling cognitive smart cities using big data and machine learning: Approaches and challenges. IEEE Commun. Mag. 56(2), 94\u2013101 (2018). https:\/\/doi.org\/10.1109\/MCOM.2018.1700298","journal-title":"IEEE Commun. Mag."},{"key":"1183_CR30","unstructured":"Moustafa, N.: New generations of internet of things datasets for cybersecurity applications based machine learning: Ton_iot datasets. In: Proceedings of the eResearch Australasia Conference, Brisbane, Australia. pp. 21\u201325 (2019). https:\/\/conference.eresearch.edu.au\/wp-content\/uploads\/2019\/08\/2019_eResearch_59_New-Generations-of-Internet-of-Things-Datasets-for-Cybersecurity.pdf"},{"key":"1183_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123808","volume":"249","author":"H Nandanwar","year":"2024","unstructured":"Nandanwar, H., Katarya, R.: Deep learning enabled intrusion detection system for industrial iot environment. Expert Systems with Applications 249, 123808 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2024.123808","journal-title":"Expert Systems with Applications"},{"key":"1183_CR32","doi-asserted-by":"publisher","unstructured":"Nandanwar, H., Katarya, R.: A secure and privacy-preserving ids for iot networks using hybrid blockchain and federated learning. In: International Conference on Next-Generation Communication and Computing. pp. 207\u2013219. Springer (2024https:\/\/doi.org\/10.1007\/978-981-96-3725-6_18","DOI":"10.1007\/978-981-96-3725-6_18"},{"issue":"2","key":"1183_CR33","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1007\/s10207-023-00787-8","volume":"23","author":"H Nandanwar","year":"2024","unstructured":"Nandanwar, H., Katarya, R.: Tl-bilstm iot: transfer learning model for prediction of intrusion detection system in iot environment. Int. J. Inf. Secur. 23(2), 1251\u20131277 (2024). https:\/\/doi.org\/10.1007\/s10207-023-00787-8","journal-title":"Int. J. Inf. Secur."},{"key":"1183_CR34","doi-asserted-by":"publisher","unstructured":"Nandanwar, H., Katarya, R.: Optimized intrusion detection and secure data management in iot networks using gao-xgboost and ecc-integrated blockchain framework. Knowledge and Information Systems pp. 1\u201356 (2025). https:\/\/doi.org\/10.1007\/s10115-025-02513-3","DOI":"10.1007\/s10115-025-02513-3"},{"key":"1183_CR35","doi-asserted-by":"publisher","unstructured":"Nandanwar, H., Katarya, R.: Privacy-preserving data sharing in blockchain-enabled iot healthcare management system. The Computer Journal p. bxaf065 (05 2025). https:\/\/doi.org\/10.1093\/comjnl\/bxaf065","DOI":"10.1093\/comjnl\/bxaf065"},{"key":"1183_CR36","doi-asserted-by":"publisher","unstructured":"Nandanwar, H., Katarya, R.: Securing industry 5.0: An explainable deep learning model for intrusion detection in cyber-physical systems. Computers and Electrical Engineering 123, 110161 (2025). https:\/\/doi.org\/10.1016\/j.compeleceng.2025.110161","DOI":"10.1016\/j.compeleceng.2025.110161"},{"issue":"6","key":"1183_CR37","doi-asserted-by":"publisher","first-page":"8367","DOI":"10.1007\/s10586-024-04436-0","volume":"27","author":"A Nazir","year":"2024","unstructured":"Nazir, A., He, J., Zhu, N., Anwar, M.S., Pathan, M.S.: Enhancing iot security: a collaborative framework integrating federated learning, dense neural networks, and blockchain. Clust. Comput. 27(6), 8367\u20138392 (2024). https:\/\/doi.org\/10.1007\/s10586-024-04436-0","journal-title":"Clust. Comput."},{"issue":"10","key":"1183_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101820","volume":"35","author":"A Nazir","year":"2023","unstructured":"Nazir, A., He, J., Zhu, N., Wajahat, A., Ma, X., Ullah, F., Qureshi, S., Pathan, M.S.: Advancing iot security: A systematic review of machine learning approaches for the detection of iot botnets. Journal of King Saud University - Computer and Information Sciences 35(10), 101820 (2023). https:\/\/doi.org\/10.1016\/j.jksuci.2023.101820","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"issue":"2","key":"1183_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101939","volume":"36","author":"A Nazir","year":"2024","unstructured":"Nazir, A., He, J., Zhu, N., Wajahat, A., Ullah, F., Qureshi, S., Ma, X., Pathan, M.S.: Collaborative threat intelligence: Enhancing iot security through blockchain and machine learning integration. Journal of King Saud University - Computer and Information Sciences 36(2), 101939 (2024). https:\/\/doi.org\/10.1016\/j.jksuci.2024.101939","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"issue":"6","key":"1183_CR40","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/s11227-025-07255-1","volume":"81","author":"A Nazir","year":"2025","unstructured":"Nazir, A., He, J., Zhu, N., Wajahat, A., Ullah, F., Qureshi, S., Pathan, M.S.: Empirical evaluation of ensemble learning and hybrid cnn-lstm for iot threat detection on heterogeneous datasets. J. Supercomput. 81(6), 775 (2025). https:\/\/doi.org\/10.1007\/s11227-025-07255-1","journal-title":"J. Supercomput."},{"issue":"3","key":"1183_CR41","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/COMST.2021.3075439","volume":"23","author":"DC Nguyen","year":"2021","unstructured":"Nguyen, D.C., Ding, M., Pathirana, P.N., Seneviratne, A., Li, J., Vincent Poor, H.: Federated learning for internet of things: A comprehensive survey. IEEE Communications Surveys & Tutorials 23(3), 1622\u20131658 (2021). https:\/\/doi.org\/10.1109\/COMST.2021.3075439","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"1183_CR42","unstructured":"O\u2019Shea, K., Nash, R.: An introduction to convolutional neural networks. ArXiv abs\/1511.08458 (2015). https:\/\/api.semanticscholar.org\/CorpusID:9398408"},{"issue":"1","key":"1183_CR43","doi-asserted-by":"publisher","first-page":"158","DOI":"10.3390\/network3010008","volume":"3","author":"MM Rashid","year":"2023","unstructured":"Rashid, M.M., Khan, S.U., Eusufzai, F., Redwan, M.A., Sabuj, S.R., Elsharief, M.: A federated learning-based approach for improving intrusion detection in industrial internet of things networks. Network 3(1), 158\u2013179 (2023). https:\/\/doi.org\/10.3390\/network3010008","journal-title":"Network"},{"key":"1183_CR44","doi-asserted-by":"publisher","unstructured":"Talpini, J., Sartori, F., Savi, M.: A clustering strategy for enhanced fl-based intrusion detection in iot networks. In: Proceedings of the 15th International Conference on Agents and Artificial Intelligence. SCITEPRESS - Science and Technology Publications (2023). https:\/\/doi.org\/10.5220\/0011627500003393","DOI":"10.5220\/0011627500003393"},{"key":"1183_CR45","doi-asserted-by":"publisher","unstructured":"Tang, W., Li, D., Fan, W., Liu, T., Chen, M., Dib, O.: An intrusion detection system empowered by deep learning algorithms. In: 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech). pp. 1137\u20131142. IEEE (2023). https:\/\/doi.org\/10.1109\/DASC\/PiCom\/CBDCom\/Cy59711.2023.10361315","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy59711.2023.10361315"},{"issue":"22","key":"1183_CR46","doi-asserted-by":"publisher","first-page":"6578","DOI":"10.3390\/s20226578","volume":"20","author":"I Vaccari","year":"2020","unstructured":"Vaccari, I., Chiola, G., Aiello, M., Mongelli, M., Cambiaso, E.: Mqttset, a new dataset for machine learning techniques on mqtt. Sensors 20(22), 6578 (2020). https:\/\/doi.org\/10.3390\/s20226578","journal-title":"Sensors"},{"key":"1183_CR47","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A.N., Kaiser, L.u., Polosukhin, I.: Attention is all you need. In: Guyon, I., Luxburg, U.V., Bengio, S., Wallach, H., Fergus, R., Vishwanathan, S., Garnett, R. (eds.) Advances in Neural Information Processing Systems. vol.\u00a030. Curran Associates, Inc. (2017), https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2017\/file\/3f5ee243547dee91fbd053c1c4a845aa-Paper.pdf"},{"key":"1183_CR48","doi-asserted-by":"publisher","unstructured":"Yang, L., Shami, A.: A transfer learning and optimized cnn based intrusion detection system for internet of vehicles. In: ICC 2022 - IEEE International Conference on Communications. pp. 2774\u20132779 (2022). https:\/\/doi.org\/10.1109\/ICC45855.2022.9838780","DOI":"10.1109\/ICC45855.2022.9838780"},{"issue":"1","key":"1183_CR49","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/IOTM.004.2100182","volume":"5","author":"T Zhang","year":"2022","unstructured":"Zhang, T., Gao, L., He, C., Zhang, M., Krishnamachari, B., Avestimehr, A.S.: Federated learning for the internet of things: Applications, challenges, and opportunities. IEEE Internet of Things Magazine 5(1), 24\u201329 (2022). https:\/\/doi.org\/10.1109\/IOTM.004.2100182","journal-title":"IEEE Internet of Things Magazine"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01183-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01183-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01183-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T16:07:26Z","timestamp":1769875646000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01183-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,28]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1183"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01183-0","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,28]]},"assertion":[{"value":"15 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"During the preparation of this work, the authors used different AI tools to improve the language and readability. After using these tools\/services, the authors reviewed and edited the content as needed and took full responsibility for the content of the publication.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration of generative AI and AI-assisted technologies"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration of competing interest"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"19"}}