{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:03:13Z","timestamp":1775242993599,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T00:00:00Z","timestamp":1766966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T00:00:00Z","timestamp":1766966400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10586-025-05693-3","type":"journal-article","created":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T13:24:10Z","timestamp":1767014650000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Improving prediction accuracy in serverless edge computing using a federated learning"],"prefix":"10.1007","volume":"29","author":[{"given":"Nasrin","family":"Kasiri","sequence":"first","affiliation":[]},{"given":"Mohammadreza","family":"Mollahoseini-Ardakani","sequence":"additional","affiliation":[]},{"given":"Mostafa","family":"Ghobaei-Arani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,29]]},"reference":[{"issue":"9","key":"5693_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3555802","volume":"55","author":"H Hua","year":"2023","unstructured":"Hua, H., Li, Y., Wang, T., Dong, N., Li, W., Cao, J.: Edge computing with artificial intelligence: A machine learning perspective. ACM Comput. Surveys. 55(9), 1\u201335 (2023)","journal-title":"ACM Comput. Surveys"},{"key":"5693_CR2","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.future.2019.02.050","volume":"97","author":"WZ Khan","year":"2019","unstructured":"Khan, W.Z., Ahmed, E., Hakak, S., Yaqoob, I., Ahmed, A.: Edge computing: A survey. Future Generation Comput. Syst. 97, 219\u2013235 (2019)","journal-title":"Future Generation Comput. Syst."},{"key":"5693_CR3","doi-asserted-by":"crossref","unstructured":"Aslanpour, M.S., Toosi, A.N., Cicconetti, C., Javadi, B., Sbarski, P., Taibi, D., Dustdar, S.: Serverless edge computing: vision and challenges. In Proceedings of the 2021 Australasian computer science week multiconference (pp. 1\u201310). (2021)","DOI":"10.1145\/3437378.3444367"},{"issue":"5","key":"5693_CR4","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/MWC.001.2000466","volume":"28","author":"R Xie","year":"2021","unstructured":"Xie, R., Tang, Q., Qiao, S., Zhu, H., Yu, F.R., Huang, T.: When serverless computing Meets edge computing: Architecture, challenges, and open issues. IEEE Wirel. Commun. 28(5), 126\u2013133 (2021)","journal-title":"IEEE Wirel. Commun."},{"key":"5693_CR5","unstructured":"Batool, I., Kanwal, S.: Serverless Edge Computing: A Taxonomy, Systematic Literature Review, Current Trends and Research Challenges. arXiv preprint arXiv:2502.15775. (2025)"},{"issue":"2","key":"5693_CR6","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1007\/s11277-023-10669-w","volume":"132","author":"NM Quy","year":"2023","unstructured":"Quy, N.M., Ngoc, L.A., Ban, N.T., Hau, N.V., Quy, V.K.: Edge computing for real-time internet of things applications: Future internet revolution. Wireless Pers. Commun. 132(2), 1423\u20131452 (2023)","journal-title":"Wireless Pers. Commun."},{"issue":"07","key":"5693_CR7","doi-asserted-by":"publisher","first-page":"25763","DOI":"10.18535\/ijecs\/v12i07.4744","volume":"12","author":"M Farooq","year":"2023","unstructured":"Farooq, M., Khan, M.H.: Artificial intelligence-based approach on cybersecurity challenges and opportunities in the internet of things & edge computing devices. Int. J. Eng. Comput. Sci. 12(07), 25763\u201325768 (2023)","journal-title":"Int. J. Eng. Comput. Sci."},{"key":"5693_CR8","doi-asserted-by":"crossref","unstructured":"Ahmadi, S.: Security Implications of Edge Computing in Cloud Networks. Ahmadi, S. Security Implications of Edge Computing in Cloud Networks. Journal of Computer and Communications, 12, 26\u201346. (2024)","DOI":"10.4236\/jcc.2024.122003"},{"key":"5693_CR9","doi-asserted-by":"publisher","first-page":"102597","DOI":"10.1016\/j.mex.2024.102597","volume":"12","author":"P Mahadevappa","year":"2024","unstructured":"Mahadevappa, P., Murugesan, R.K., Al-Amri, R., Thabit, R., Al-Ghushami, A.H., Alkawsi, G.: A secure edge computing model using machine learning and IDS to detect and isolate intruders. MethodsX. 12, 102597 (2024)","journal-title":"MethodsX"},{"key":"5693_CR10","doi-asserted-by":"publisher","first-page":"e700","DOI":"10.7717\/peerj-cs.700","volume":"7","author":"MB Mansour","year":"2021","unstructured":"Mansour, M.B., Abdelkader, T., Hashem, M., El-Horbaty, E.S.M.: An integrated three-tier trust management framework in mobile edge computing using fuzzy logic. PeerJ Comput. Sci. 7, e700 (2021)","journal-title":"PeerJ Comput. Sci."},{"issue":"2","key":"5693_CR11","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/TNSE.2021.3130602","volume":"9","author":"L Xu","year":"2021","unstructured":"Xu, L., Wang, B., Wu, X., Zhao, D., Zhang, L., Wang, Z.: Detecting semantic attack in SCADA system: A behavioral model based-on secondary labeling of states-duration evolution graph. IEEE Trans. Netw. Sci. Eng. 9(2), 703\u2013715 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"1","key":"5693_CR12","doi-asserted-by":"publisher","first-page":"25","DOI":"10.3390\/computers13010025","volume":"13","author":"O Adeniyi","year":"2024","unstructured":"Adeniyi, O., Sadiq, A.S., Pillai, P., Aljaidi, M., Kaiwartya, O.: Securing mobile edge computing using hybrid deep learning method. Computers. 13(1), 25 (2024)","journal-title":"Computers"},{"issue":"3","key":"5693_CR13","first-page":"1365","volume":"16","author":"A Kumar","year":"2024","unstructured":"Kumar, A., Singh, D.: Detection and prevention of DDoS attacks on edge computing of IoT devices through reinforcement learning. Int. J. Inform. Technol. 16(3), 1365\u20131376 (2024)","journal-title":"Int. J. Inform. Technol."},{"issue":"10","key":"5693_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3659205","volume":"56","author":"J Wu","year":"2024","unstructured":"Wu, J., Dong, F., Leung, H., Zhu, Z., Zhou, J., Drew, S.: Topology-aware federated learning in edge computing: A comprehensive survey. ACM Comput. Surveys. 56(10), 1\u201341 (2024)","journal-title":"ACM Comput. Surveys"},{"key":"5693_CR15","unstructured":"https:\/\/www.openml.org\/search?type=data&sort=runs&id=37&status=active."},{"key":"5693_CR16","doi-asserted-by":"publisher","first-page":"80716","DOI":"10.1109\/ACCESS.2020.2988796","volume":"8","author":"KP Sinaga","year":"2020","unstructured":"Sinaga, K.P., Yang, M.S.: Unsupervised K-means clustering algorithm. IEEE Access. 8, 80716\u201380727 (2020)","journal-title":"IEEE Access."},{"issue":"5","key":"5693_CR17","doi-asserted-by":"publisher","first-page":"JAMDSM0065","DOI":"10.1299\/jamdsm.2024jamdsm0065","volume":"18","author":"Y Chen","year":"2024","unstructured":"Chen, Y., Bai, B., Gan, Y., Wang, H., Lin, X., Chen, Y.: Ontology-based methodology for the intelligent detection of product manufacturing information semantic representation errors in the model-based definition. J. Adv. Mech. Des. Syst. Manuf. 18(5), JAMDSM0065\u2013JAMDSM0065 (2024)","journal-title":"J. Adv. Mech. Des. Syst. Manuf."},{"key":"5693_CR18","doi-asserted-by":"publisher","unstructured":"Yang, X., Chen, H., Li, T., Feng, S., Wan, J., Yao, Y.: Adaptive feature selection with weighted fuzzy rough sets for noisy data. Fuzzy Sets Syst. (2025)\u200f. https:\/\/doi.org\/10.1016\/j.fss.2025.109499","DOI":"10.1016\/j.fss.2025.109499"},{"issue":"16","key":"5693_CR19","doi-asserted-by":"publisher","first-page":"e8091","DOI":"10.1002\/cpe.8091","volume":"36","author":"A Vakili","year":"2024","unstructured":"Vakili, A., Al-Khafaji, H.M.R., Darbandi, M., Heidari, A., Jafari Navimipour, N., Unal, M.: A new service composition method in the cloud\u2010based internet of things environment using a grey Wolf optimization algorithm and mapreduce framework. Concurrency Computation: Pract. Experience. 36(16), e8091 (2024)","journal-title":"Concurrency Computation: Pract. Experience"},{"issue":"11","key":"5693_CR20","doi-asserted-by":"publisher","first-page":"5757","DOI":"10.1007\/s00521-023-09366-3","volume":"36","author":"Z Amiri","year":"2024","unstructured":"Amiri, Z., Heidari, A., Navimipour, N.J., Esmaeilpour, M., Yazdani, Y.: The deep learning applications in IoT-based bio-and medical informatics: A systematic literature review. Neural Comput. Appl. 36(11), 5757\u20135797 (2024)","journal-title":"Neural Comput. Appl."},{"key":"5693_CR21","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.jpdc.2019.12.014","volume":"139","author":"SY Hsieh","year":"2020","unstructured":"Hsieh, S.Y., Liu, C.S., Buyya, R., Zomaya, A.Y.: Utilization-prediction-aware virtual machine consolidation approach for energy-efficient cloud data centers. J. Parallel Distrib. Comput. 139, 99\u2013109 (2020)","journal-title":"J. Parallel Distrib. Comput."},{"key":"5693_CR22","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.neucom.2020.02.014","volume":"397","author":"J Kumar","year":"2020","unstructured":"Kumar, J., Singh, A.K., Buyya, R.: Ensemble learning based predictive framework for virtual machine resource request prediction. Neurocomputing. 397, 20\u201330 (2020)","journal-title":"Neurocomputing"},{"issue":"6","key":"5693_CR23","doi-asserted-by":"publisher","first-page":"7521","DOI":"10.1007\/s10586-024-04351-4","volume":"27","author":"A Heidari","year":"2024","unstructured":"Heidari, A., Shishehlou, H., Darbandi, M., Navimipour, N.J., Yalcin, S.: A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree. Cluster Comput. 27(6), 7521\u20137539 (2024)","journal-title":"Cluster Comput."},{"key":"5693_CR24","doi-asserted-by":"crossref","unstructured":"Phung, H.D., Kim, Y.: A prediction based auto scaling in Serverless computing. In 2022 13th International Conference on Information and Communication Technology Convergence (ICTC) (pp. 763\u2013766). IEEE. (2022)","DOI":"10.1109\/ICTC55196.2022.9952609"},{"issue":"10","key":"5693_CR25","doi-asserted-by":"publisher","first-page":"8445","DOI":"10.1109\/JIOT.2023.3237661","volume":"10","author":"A Heidari","year":"2023","unstructured":"Heidari, A., Navimipour, N.J., Unal, M.: A secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones. IEEE Internet Things J. 10(10), 8445\u20138454 (2023)","journal-title":"IEEE Internet Things J."},{"key":"5693_CR26","unstructured":"Sreekanti, V., Subbaraj, H., Wu, C., Gonzalez, J.E., Hellerstein, J.M.: Optimizing prediction serving on low-latency Serverless dataflow. arXiv preprint arXiv:2007.05832. (2020)"},{"key":"5693_CR27","unstructured":"Sayyed, S.: Optimization of Resource Allocation and Prediction Analysis in Serverless Computing using Dynamic Resource Algorithm (Doctoral dissertation, Dublin, National College of Ireland). (2020)"},{"key":"5693_CR28","doi-asserted-by":"crossref","unstructured":"Heidari, A., Shishehlou, H., Darbandi, M., Navimipour, N. J., Yalcin, S.: A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree. Clust. Comput. 27(6), 7521\u20137539 (2024)\u200f","DOI":"10.1007\/s10586-024-04351-4"},{"key":"5693_CR29","doi-asserted-by":"crossref","unstructured":"Amiri, Z., Heidari, A., Zavvar, M., Navimipour, N.J., Esmaeilpour, M.: The applications of nature-inspired algorithms in internet of Things\u2010based healthcare service: A systematic literature review. Trans. Emerg. Telecommunications Technol., 35(6), e4969. (2024)","DOI":"10.1002\/ett.4969"},{"key":"5693_CR30","doi-asserted-by":"publisher","first-page":"110515","DOI":"10.1016\/j.rser.2020.110515","volume":"138","author":"JM Gonz\u00e1lez-Sope\u00f1a","year":"2021","unstructured":"Gonz\u00e1lez-Sope\u00f1a, J.M., Pakrashi, V., Ghosh, B.: An overview of performance evaluation metrics for short-term statistical wind power forecasting. Renew. Sustain. Energy Rev. 138, 110515 (2021)","journal-title":"Renew. Sustain. Energy Rev."},{"key":"5693_CR31","doi-asserted-by":"crossref","unstructured":"Sarhan, M., Layeghy, S., & Portmann, M. Towards a standard feature set for network intrusion detection system datasets. Mob. Netw. Appl. 27(1), 357\u2013370 (2022)\u200f","DOI":"10.1007\/s11036-021-01843-0"},{"key":"5693_CR32","unstructured":"https:\/\/www.kaggle.com\/datasets\/devendra416\/ddos-datasets"},{"key":"5693_CR33","unstructured":"https:\/\/www.kaggle.com\/datasets\/mkashifn\/nbaiot-dataset"},{"key":"5693_CR34","unstructured":"https:\/\/www.kaggle.com\/datasets\/hassan06\/nslkdd"},{"key":"5693_CR35","unstructured":"https:\/\/www.kaggle.com\/datasets\/teamincribo\/cyber-security-attacks"},{"issue":"24","key":"5693_CR36","doi-asserted-by":"publisher","DOI":"10.3390\/app112411634","volume":"11","author":"D Alghazzawi","year":"2021","unstructured":"Alghazzawi, D., Bamasag, O., Ullah, H., Asghar, M.Z.: Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection. Applied Sciences 11(24), 11634 (2021)","journal-title":"Applied Sciences"},{"key":"5693_CR37","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comcom.2021.05.024","volume":"176","author":"AK Sahu","year":"2021","unstructured":"Sahu, A.K., Sharma, S., Tanveer, M., Raja, R.: Internet of things attack detection using hybrid deep learning model. Computer Communications 176, 146\u2013154 (2021)","journal-title":"Computer Communications"},{"key":"5693_CR38","doi-asserted-by":"crossref","unstructured":"Mhamdi, L., McLernon, D., El-Moussa, F., Zaidi, S.A.R., Ghogho, M., Tang, T.: A deep learning approach combining autoencoder with one-class SVM for DDoS attack detection in SDNs. In 2020 IEEE Eighth International Conference on Communications and Networking (ComNet) (pp. 1\u20136). IEEE. (2020)","DOI":"10.1109\/ComNet47917.2020.9306073"},{"issue":"2","key":"5693_CR39","doi-asserted-by":"publisher","first-page":"375","DOI":"10.52549\/ijeei.v10i2.3730","volume":"10","author":"AE Karrar","year":"2022","unstructured":"Karrar, A.E.: The effect of using data pre-processing by imputations in handling missing values. Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 10(2), 375\u2013384 (2022)","journal-title":"Indonesian Journal of Electrical Engineering and Informatics (IJEEI)"},{"issue":"1","key":"5693_CR40","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1186\/s40537-024-00973-y","volume":"11","author":"RK Halder","year":"2024","unstructured":"Halder, R.K., Uddin, M.N., Uddin, M.A., Aryal, S., Khraisat, A.: Enhancing K-nearest neighbor algorithm: A comprehensive review and performance analysis of modifications. J. Big Data. 11(1), 113 (2024)","journal-title":"J. Big Data"},{"key":"5693_CR41","doi-asserted-by":"crossref","unstructured":"Zanbouri, K., Darbandi, M., Nassr, M., Heidari, A., Navimipour, N.J., Yalc\u0131n, S.: A GSO-based multi\u2010objective technique for performance optimization of blockchain\u2010based industrial internet of things. Int. J. Commun Syst. 37(15), e5886. (2024)","DOI":"10.1002\/dac.5886"},{"key":"5693_CR42","doi-asserted-by":"crossref","unstructured":"Heidari, A., Navimipour, N.J., Zeadally, S., Chamola, V.: Everything you wanted to know about chatgpt: Components, capabilities, applications, and opportunities. Internet Technol. Lett. 7(6), e530. (2024)","DOI":"10.1002\/itl2.530"},{"key":"5693_CR43","doi-asserted-by":"crossref","unstructured":"Amiri, Z., Heidari, A., Navimipour, N.J.: Comprehensive survey of artificial intelligence techniques and strategies for climate change mitigation. Energy 308, 132827 (2024)\u200f","DOI":"10.1016\/j.energy.2024.132827"},{"issue":"11","key":"5693_CR44","doi-asserted-by":"publisher","DOI":"10.1002\/ett.5056","volume":"35","author":"M Asadi","year":"2024","unstructured":"Asadi, M., Jamali, M.A.J., Heidari, A., Navimipour, N.J.: Botnets unveiled: A comprehensive survey on evolving threats and defense strategies. Transactions on Emerging Telecommunications Technologies 35(11), e5056 (2024)","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"5693_CR45","doi-asserted-by":"crossref","unstructured":"Heidari, A., Jamali, M.A.J., Navimipour, N.J.: Fuzzy logic multicriteria decision-making for broadcast storm resolution in vehicular ad hoc networks. Int. J. Commun Syst, 38(5), e6034. (2025)","DOI":"10.1002\/dac.6034"},{"key":"5693_CR46","doi-asserted-by":"crossref","unstructured":"Heidari, A., Amiri, Z., Jamali, M.A.J., Navimipour, N.J.: Enhancing solar convection analysis with multi-core processors and GPUs. Eng. Rep., 7(1), e13050. (2025)","DOI":"10.1002\/eng2.13050"},{"key":"5693_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100666","volume":"54","author":"Z Amiri","year":"2024","unstructured":"Amiri, Z., Heidari, A., Jafari, N., Hosseinzadeh, M.: Deep study on autonomous learning techniques for complex pattern recognition in interconnected information systems. Computer Science Review 54, 100666 (2024)","journal-title":"Computer Science Review"},{"key":"5693_CR48","doi-asserted-by":"crossref","unstructured":"Heidari, A., Jamali, M.A.J., Navimipour, N.J.: An innovative performance assessment method for increasing the efficiency of AODV routing protocol in VANETs through colored timed petri Nets. Concurrency Computation: Pract. Experience, 37(3), e8349. (2025)","DOI":"10.1002\/cpe.8349"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05693-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05693-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05693-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:08:56Z","timestamp":1773925736000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05693-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,29]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["5693"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05693-3","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,29]]},"assertion":[{"value":"8 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 December 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"69"}}