{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T20:02:41Z","timestamp":1771272161044,"version":"3.50.1"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10586-025-05905-w","type":"journal-article","created":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T18:03:13Z","timestamp":1771264993000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fair client selection and encrypted aggregation: a federated learning framework for intrusion detection in resource-constrained networks"],"prefix":"10.1007","volume":"29","author":[{"given":"Rokaya","family":"Akter","sequence":"first","affiliation":[]},{"given":"Bian","family":"Naizheng","sequence":"additional","affiliation":[]},{"given":"Irshad","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Sudhanshu","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Abhishank","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Mussawer","family":"Iqbal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,16]]},"reference":[{"key":"5905_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e21639","author":"MA Mohammed","year":"2023","unstructured":"Mohammed, M.A., Lakhan, A., Abdulkareem, K.H., Abd Ghani, M.K., Marhoon, H.A., Nedoma, J., Martinek, R.: Multi-objectives reinforcement federated learning blockchain enabled Internet of things and Fog-Cloud infrastructure for transport data. Heliyon (2023). https:\/\/doi.org\/10.1016\/j.heliyon.2023.e21639","journal-title":"Heliyon"},{"issue":"3","key":"5905_CR2","doi-asserted-by":"publisher","first-page":"1775","DOI":"10.1109\/COMST.2023.3280465","volume":"25","author":"N Moustafa","year":"2023","unstructured":"Moustafa, N., Koroniotis, N., Keshk, M., Zomaya, A.Y., Tari, Z.: Explainable intrusion detection for cyber defenses in the internet of things: Opportunities and solutions. IEEE Communications Surveys & Tutorials 25(3), 1775\u20131807 (2023)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"5905_CR3","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.future.2022.08.004","volume":"138","author":"A Rahman","year":"2023","unstructured":"Rahman, A., Hasan, K., Kundu, D., Islam, M.J., Debnath, T., Band, S.S., Kumar, N.: On the ICN-IoT with federated learning integration of communication: Concepts, security-privacy issues, applications, and future perspectives. Futur. Gener. Comput. Syst. 138, 61\u201388 (2023)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5905_CR4","first-page":"1133","volume":"28","author":"I Ullah","year":"2024","unstructured":"Ullah, I., Deng, X., Pei, X., Mushtaq, H., Khan, Z.: Securing internet of vehicles: A blockchain-based federated learning approach for enhanced intrusion detection. Clust. Comput. 28, 1133 (2024)","journal-title":"Clust. Comput."},{"issue":"4","key":"5905_CR5","volume":"28","author":"A Rokaya","year":"2024","unstructured":"Rokaya, A., Islam, S.M.T., Mostafa, K.: Enhancing surgical precision: Deep learning-based depth estimation in minimally invasive surgery with the MiDaS model. Robot Intelligence Technology and Applications 28(4), 256 (2024)","journal-title":"Robot Intelligence Technology and Applications"},{"issue":"3","key":"5905_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3603257","volume":"4","author":"H Wang","year":"2023","unstructured":"Wang, H., Eklund, D., Oprea, A., Raza, S.: FL4IoT: IoT device fingerprinting and identification using federated learning. ACM Transactions on Internet of Things 4(3), 1\u201324 (2023)","journal-title":"ACM Transactions on Internet of Things"},{"issue":"10","key":"5905_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3659205","volume":"56","author":"J Wu","year":"2024","unstructured":"Wu, J., Dong, F., Leung, H., Zhu, Z., Zhou, J., Drew, S.: Topology-aware federated learning in edge computing: A comprehensive survey. ACM Computing Surveys 56(10), 1\u201341 (2024)","journal-title":"ACM Computing Surveys"},{"key":"5905_CR8","doi-asserted-by":"crossref","unstructured":"Feng, Y., Qi, Y., Li, H., Wang, X., Tian, J.: Leveraging federated learning and edge computing for recommendation systems within cloud computing networks. In Third International Symposium on Computer Applications and Information Systems (ISCAIS 2024), pp. 279-287, SPIE (2024)","DOI":"10.1117\/12.3034773"},{"issue":"2","key":"5905_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3532090","volume":"19","author":"JMT Wu","year":"2023","unstructured":"Wu, J.M.T., Teng, Q., Huda, S., Chen, Y.C., Chen, C.M.: A privacy frequent itemsets mining framework for collaboration in IoT using federated learning. ACM Transactions on Sensor Networks 19(2), 1\u201315 (2023)","journal-title":"ACM Transactions on Sensor Networks"},{"issue":"1","key":"5905_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3687124","volume":"57","author":"A Khraisat","year":"2024","unstructured":"Khraisat, A., Alazab, A., Singh, S., Jan, T., Gomez, A., Jr.: Survey on federated learning for intrusion detection system: Concept, architectures, aggregation strategies, challenges, and future directions. ACM Comput. Surv. 57(1), 1\u201338 (2024)","journal-title":"ACM Comput. Surv."},{"issue":"8","key":"5905_CR11","doi-asserted-by":"publisher","first-page":"13340","DOI":"10.1109\/JIOT.2023.3337755","volume":"11","author":"W Han","year":"2023","unstructured":"Han, W., Peng, J., Yu, J., Kang, J., Lu, J., Niyato, D.: Heterogeneous data-aware federated learning for intrusion detection systems via meta-sampling in artificial intelligence of things. IEEE Internet Things J. 11(8), 13340\u201313354 (2023)","journal-title":"IEEE Internet Things J."},{"key":"5905_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, H., Ye, J., Huang, W., Liu, X., Gu, J.: Survey of federated learning in intrusion detection. Journal of Parallel and Distributed Computing, 104976 (2024)","DOI":"10.1016\/j.jpdc.2024.104976"},{"issue":"1","key":"5905_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-024-01821-9","volume":"18","author":"I Ullah","year":"2025","unstructured":"Ullah, I., Deng, X., Pei, X., Mushtaq, H., Uzair, M.: IoV-SFL: A blockchain-based federated learning framework for secure and efficient data sharing in the internet of vehicles. Peer-to-Peer Networking and Applications 18(1), 1\u201320 (2025)","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"5905_CR14","doi-asserted-by":"crossref","unstructured":"Ennaji, S., De Gaspari, F., Hitaj, D., Kbidi, A., Mancini, L.V.: Adversarial challenges in network intrusion detection systems: Research insights and future prospects. (2024) arXiv preprint arXiv:2409.18736","DOI":"10.1109\/ACCESS.2025.3600984"},{"issue":"6","key":"5905_CR15","doi-asserted-by":"publisher","first-page":"3329","DOI":"10.1109\/JBHI.2024.3350232","volume":"28","author":"EA Mantey","year":"2024","unstructured":"Mantey, E.A., Zhou, C., Anajemba, J.H., Arthur, J.K., Hamid, Y., Chowhan, A., Otuu, O.O.: Federated learning approach for secured medical recommendation in internet of medical things using homomorphic encryption. IEEE J. Biomed. Health Inform. 28(6), 3329\u20133340 (2024)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"5905_CR16","doi-asserted-by":"crossref","unstructured":"Pillai, S. E. V. S., Polimetla, K.: Privacy-preserving network traffic analysis using homomorphic encryption. In 2024 International Conference on Integrated Circuits and Communication Systems (ICICACS),\u00a0pp. 1\u20136. IEEE (2024)","DOI":"10.1109\/ICICACS60521.2024.10498523"},{"issue":"4","key":"5905_CR17","doi-asserted-by":"publisher","first-page":"48","DOI":"10.3390\/cryptography7040048","volume":"7","author":"I Walskaar","year":"2023","unstructured":"Walskaar, I., Tran, M.C., Catak, F.O.: A practical implementation of medical privacy-preserving federated learning using multi-key homomorphic encryption and flower framework. Cryptography 7(4), 48 (2023)","journal-title":"Cryptography"},{"key":"5905_CR18","doi-asserted-by":"crossref","unstructured":"Tayal, P., Kumar, R., Hemlata. A comparative evaluation of machine learning techniques for detecting malicious network traffic. In International Conference on Computation of Artificial Intelligence & Machine Learning,\u00a0pp. 184\u2013204,\u00a0Springer Nature Switzerland (2024)","DOI":"10.1007\/978-3-031-71481-8_15"},{"key":"5905_CR19","volume":"6","author":"Y Chachoui","year":"2024","unstructured":"Chachoui, Y., Azizi, N., Hotte, R., Bensebaa, T.: Enhancing algorithmic assessment in education: Equi-fused-data-based SMOTE for balanced learning. Computers and Education: Artificial Intelligence 6, 100222 (2024)","journal-title":"Computers and Education: Artificial Intelligence"},{"issue":"3","key":"5905_CR20","volume":"5","author":"G Luo","year":"2023","unstructured":"Luo, G., Liu, T., Lu, J., Chen, X., Yu, L., Wu, J., Cai, W.: Influence of data distribution on federated learning performance in tumor segmentation. Radiology: Artificial Intelligence 5(3), 220082 (2023)","journal-title":"Radiology: Artificial Intelligence"},{"key":"5905_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124317","volume":"253","author":"QA Al-Haija","year":"2024","unstructured":"Al-Haija, Q.A., Altamimi, S., AlWadi, M.: Analysis of extreme learning machines (ELMs) for intelligent intrusion detection systems: A survey. Expert Systems with Applications 253, 124317 (2024)","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"5905_CR22","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s43926-024-00060-x","volume":"4","author":"S Altamimi","year":"2024","unstructured":"Altamimi, S., Abu Al-Haija, Q.: Maximizing intrusion detection efficiency for IoT networks using extreme learning machine. Discover Internet of Things 4(1), 5 (2024)","journal-title":"Discover Internet of Things"},{"issue":"1","key":"5905_CR23","doi-asserted-by":"publisher","DOI":"10.3390\/su17010008","volume":"17","author":"MS Amin","year":"2024","unstructured":"Amin, M.S., Kim, S., Rishat, M.A.S.A., Tang, Z., Ahn, H.: A systematic literature review of privacy information disclosure in AI-integrated Internet of Things (IoT) technologies. Sustainability 17(1), 8 (2024)","journal-title":"Sustainability"},{"key":"5905_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103597","volume":"137","author":"R Doriguzzi-Corin","year":"2024","unstructured":"Doriguzzi-Corin, R., Siracusa, D.: FLAD: Adaptive federated learning for DDoS attack detection. Computers & Security 137, 103597 (2024)","journal-title":"Computers & Security"},{"issue":"3","key":"5905_CR25","doi-asserted-by":"publisher","first-page":"12","DOI":"10.5815\/ijieeb.2023.03.02","volume":"15","author":"O Chowdhury","year":"2023","unstructured":"Chowdhury, O., Rishat, M.A.S.A., Al-Amin, M., Azam, M.H.B.: The decentralized shariah-based banking system in Bangladesh using blockchain technology. International Journal of Information Engineering and Electronic Business 15(3), 12\u201328 (2023)","journal-title":"International Journal of Information Engineering and Electronic Business"},{"key":"5905_CR26","doi-asserted-by":"crossref","unstructured":"Chowdhury, O., Rishat, M. A. S. A., Azam, M. H. B., Amin, M.A.: The rise of blockchain technology in Shariah-based banking system. In Proceedings of the 2nd International Conference on Computing Advancements,\u00a0pp. 349\u2013358 (2022)","DOI":"10.1145\/3542954.3543005"},{"key":"5905_CR27","doi-asserted-by":"crossref","unstructured":"Rokaya, A., Islam, S. M. T., Zhang, H., Sun, L., Zhu, M., Zhao, L.: Acceptance of chatbot based on emotional intelligence through machine learning algorithm. In 2022 2nd International Conference on Frontiers of Electronics, Information and Computation Technologies (ICFEICT), pp. 610\u2013616) (2022)","DOI":"10.1109\/ICFEICT57213.2022.00111"},{"key":"5905_CR28","doi-asserted-by":"crossref","unstructured":"Hu, C., Li, B.: MASKCRYPT: Federated learning with selective homomorphic encryption. IEEE Transactions on Dependable and Secure Computing (2024)","DOI":"10.1109\/TDSC.2024.3392424"},{"issue":"7","key":"5905_CR29","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1049\/cmu2.12744","volume":"18","author":"Y Jia","year":"2024","unstructured":"Jia, Y., Lin, F., Sun, Y.: A novel federated learning aggregation algorithm for AIoT intrusion detection. IET Communications 18(7), 429\u2013436 (2024)","journal-title":"IET Communications"},{"issue":"16","key":"5905_CR30","doi-asserted-by":"publisher","first-page":"3382","DOI":"10.3390\/electronics12163382","volume":"12","author":"A Alazab","year":"2023","unstructured":"Alazab, A., Khraisat, A., Singh, S., Jan, T.: Enhancing privacy-preserving intrusion detection through federated learning. Electronics 12(16), 3382 (2023)","journal-title":"Electronics"},{"key":"5905_CR31","doi-asserted-by":"publisher","first-page":"24879","DOI":"10.1109\/ACCESS.2024.3362347","volume":"12","author":"OK ChandraUmakantham","year":"2024","unstructured":"ChandraUmakantham, O.K., Gajendran, S., Marappan, S.: Enhancing intrusion detection through federated learning with enhanced ghost_binet and homomorphic encryption. IEEE Access 12, 24879\u201324893 (2024)","journal-title":"IEEE Access"},{"key":"5905_CR32","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s10796-023-10443-0","volume":"1","author":"M Arazzi","year":"2023","unstructured":"Arazzi, M., Nicolazzo, S., Nocera, A.: A fully privacy-preserving solution for anomaly detection in IoT using federated learning and homomorphic encryption. Inform. Sys. Frontiers 1, 24 (2023). https:\/\/doi.org\/10.1007\/s10796-023-10443-0","journal-title":"Inform. Sys. Frontiers"},{"key":"5905_CR33","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: Synthetic minority over-sampling technique. Journal of Artificial Intelligence Research 16, 321\u2013357 (2002)","journal-title":"Journal of Artificial Intelligence Research"},{"key":"5905_CR34","doi-asserted-by":"crossref","unstructured":"Du, W., Wang, H., Shen, J., Meng, G., Guo, Y., Zhou, W.: Secure privacy-preserving SMOTE for vertical federated learning. In: International Conference on Advanced Data M ining and Applications (pp. 301\u2013315). Springer Nature Singapore (2024)","DOI":"10.1007\/978-981-96-0814-0_20"},{"key":"5905_CR35","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1023\/A:1026543900054","volume":"40","author":"Y Rubner","year":"2000","unstructured":"Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover\u2019s distance as a metric for image retrieval. International Journal of Computer Vision 40, 99\u2013121 (2000)","journal-title":"International Journal of Computer Vision"},{"issue":"6","key":"5905_CR36","doi-asserted-by":"publisher","first-page":"10007","DOI":"10.1109\/JIOT.2023.3324302","volume":"11","author":"Y Shan","year":"2023","unstructured":"Shan, Y., Yao, Y., Zhou, X., Zhao, T., Hu, B., Wang, L.: CFL-IDS: An effective clustered federated learning framework for industrial internet of things intrusion detection. IEEE Internet Things J. 11(6), 10007\u201310019 (2023)","journal-title":"IEEE Internet Things J."},{"issue":"12","key":"5905_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3731596","volume":"57","author":"JL Hernandez-Ramos","year":"2025","unstructured":"Hernandez-Ramos, J.L., Karopoulos, G., Chatzoglou, E., Kouliaridis, V., Marmol, E., Gonzalez-Vidal, A., Kambourakis, G.: Intrusion detection based on federated learning: A systematic review. ACM Computing Surveys 57(12), 1\u201365 (2025)","journal-title":"ACM Computing Surveys"},{"issue":"1","key":"5905_CR38","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-70032-2","volume":"14","author":"W Jianping","year":"2024","unstructured":"Jianping, W., Guangqiu, Q., Chunming, W., Weiwei, J., Jiahe, J.: Federated learning for network attack detection using attention-based graph neural networks. Sci. Rep. 14(1), 19088 (2024)","journal-title":"Sci. Rep."},{"issue":"1","key":"5905_CR39","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-93501-8","volume":"15","author":"A Karunamurthy","year":"2025","unstructured":"Karunamurthy, A., Vijayan, K., Kshirsagar, P.R., Tan, K.T.: An optimal federated learning-based intrusion detection for IoT environment. Sci. Rep. 15(1), 8696 (2025)","journal-title":"Sci. Rep."},{"key":"5905_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.111023","author":"A Belenguer","year":"2025","unstructured":"Belenguer, A., Pascual, J.A., Navaridas, J.: A review of federated learning applications in intrusion detection systems. Computer Networks (2025). https:\/\/doi.org\/10.1016\/j.comnet.2024.111023","journal-title":"Computer Networks"},{"key":"5905_CR41","doi-asserted-by":"crossref","unstructured":"Anwar, R. W., Abrar, M., Ullah, M., Salam, A., Ullah, F.: Advanced intrusion detection in the industrial Internet of Things using federated learning and LSTM models. Available at SSRN 5137152 (2025)","DOI":"10.2139\/ssrn.5137152"},{"issue":"5","key":"5905_CR42","first-page":"1502","volume":"5","author":"RK Mahmood","year":"2024","unstructured":"Mahmood, R.K., Mahameed, A.I., Lateef, N.Q., Jasim, H.M., Radhi, A.D., Ahmed, S.R., Tupe-Waghmare, P.: Optimizing network security with machine learning and multi-factor authentication for enhanced intrusion detection. Journal of Robotics and Control (JRC) 5(5), 1502\u20131524 (2024)","journal-title":"Journal of Robotics and Control (JRC)"},{"issue":"1","key":"5905_CR43","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-88843-2","volume":"15","author":"M Ragab","year":"2025","unstructured":"Ragab, M., Ashary, E.B., Alghamdi, B.M., Aboalela, R., Alsaadi, N., Maghrabi, L.A., Allehaibi, K.H.: Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities. Sci. Rep. 15(1), 4470 (2025)","journal-title":"Sci. Rep."},{"key":"5905_CR44","doi-asserted-by":"crossref","unstructured":"Shen, H., Hai, J., Guo, J., Cao, Y., Yang, Y., Zhang, S.: An adaptive CGAN-enhanced federated learning model for intrusion detection in IoT. In Proceedings of the 2024 2nd International Conference on Artificial Intelligence, Systems and Network Security,\u00a0pp. 303\u2013308 (2024)","DOI":"10.1145\/3714334.3714385"},{"key":"5905_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100717","volume":"56","author":"I Makris","year":"2025","unstructured":"Makris, I., Karampasi, A., Radoglou-Grammatikis, P., Episkopos, N., Iturbe, E., Rios, E., Sarigiannidis, P.: A comprehensive survey of federated intrusion detection systems: Techniques, challenges, and solutions. Computer Science Review 56, 100717 (2025)","journal-title":"Computer Science Review"},{"issue":"1","key":"5905_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3696012","volume":"6","author":"QH Nguyen","year":"2025","unstructured":"Nguyen, Q.H., Hore, S., Shah, A., Le, T., Bastian, N.D.: FedNIDS: A federated learning framework for packet-based network intrusion detection system. Digital Threats: Research and Practice 6(1), 1\u201323 (2025)","journal-title":"Digital Threats: Research and Practice"},{"issue":"7","key":"5905_CR47","doi-asserted-by":"publisher","first-page":"1858","DOI":"10.1109\/TIT.2003.813506","volume":"49","author":"DM Endres","year":"2003","unstructured":"Endres, D.M., Schindelin, J.E.: A new metric for probability distributions. IEEE Transactions on Information Theory 49(7), 1858\u20131860 (2003)","journal-title":"IEEE Transactions on Information Theory"},{"key":"5905_CR48","doi-asserted-by":"crossref","unstructured":"Wu, P., Moustafa, N., Yang, S., Guo, H.: Densely connected residual network for attack recognition. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications,\u00a0pp. 233\u2013242 (2020)","DOI":"10.1109\/TrustCom50675.2020.00042"},{"issue":"1","key":"5905_CR49","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1186\/s40537-023-00694-8","volume":"10","author":"Y Yin","year":"2023","unstructured":"Yin, Y., Jang-Jaccard, J., Xu, W., Singh, A., Zhu, J., Sabrina, F., Kwak, J.: IGRF-RFE: A hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset. J Big Data 10(1), 15 (2023)","journal-title":"J Big Data"},{"issue":"5","key":"5905_CR50","first-page":"443","volume":"7","author":"V Kanimozhi","year":"2019","unstructured":"Kanimozhi, V., Jacob, P.: UNSW-NB15 dataset feature selection and network intrusion detection using deep learning. Inter J Recent Tech Eng 7(5), 443\u2013446 (2019)","journal-title":"Inter J Recent Tech Eng"},{"key":"5905_CR51","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zhao, R., Jiang, Z., Chen, H., Ding, Y., Ngai, E. C., Yang, S.H.: Continual learning with strategic selection and forgetting for network intrusion detection. In IEEE International Conference on Computer Communications (INFOCOM) (2025)","DOI":"10.1109\/INFOCOM55648.2025.11044615"},{"key":"5905_CR52","doi-asserted-by":"crossref","unstructured":"Jahin, M. A., Soudeep, S., Mridha, M. F., Kabir, R., Islam, M. R., Watanobe, Y.: CAGN-GAT Fusion: A hybrid contrastive attentive graph neural network for network intrusion detection. arXiv preprint arXiv:2503.00961 (2025)","DOI":"10.1007\/978-981-96-8892-0_35"},{"key":"5905_CR53","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3423780","author":"TA Nguyen","year":"2024","unstructured":"Nguyen, T.A., Le, L.T., Nguyen, T.D., Bao, W., Seneviratne, S., Hong, C.S., Tran, N.H.: Federated PCA on Grassmann manifold for IoT anomaly detection. IEEE\/ACM Transactions on Networking (2024). https:\/\/doi.org\/10.1109\/TNET.2024.3423780","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"5905_CR54","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zhao, R., Jiang, Z., Sun, Z., Ding, Y., Ngai, E. C., Yang, S.H.: AOC-IDS: Autonomous online framework with contrastive learning for intrusion detection. In IEEE INFOCOM 2024-IEEE Conference on Computer Communications, pp. 581\u2013590 (2024)","DOI":"10.1109\/INFOCOM52122.2024.10621346"},{"issue":"11","key":"5905_CR55","doi-asserted-by":"publisher","DOI":"10.3390\/app11115213","volume":"11","author":"CS Shieh","year":"2021","unstructured":"Shieh, C.S., Lin, W.W., Nguyen, T.T., Chen, C.H., Horng, M.F., Miu, D.: Detection of unknown DDoS attacks with deep learning and Gaussian mixture model. Applied Sciences 11(11), 5213 (2021)","journal-title":"Applied Sciences"},{"issue":"19","key":"5905_CR56","doi-asserted-by":"publisher","first-page":"26942","DOI":"10.1007\/s11227-024-06409-x","volume":"80","author":"AG Ayad","year":"2024","unstructured":"Ayad, A.G., Sakr, N.A., Hikal, N.A.: A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks. The Journal of Supercomputing 80(19), 26942\u201326984 (2024)","journal-title":"The Journal of Supercomputing"},{"key":"5905_CR57","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114520","volume":"169","author":"AE Cil","year":"2021","unstructured":"Cil, A.E., Yildiz, K., Buldu, A.: Detection of DDoS attacks with feed forward based deep neural network model. Expert Systems with Applications 169, 114520 (2021)","journal-title":"Expert Systems with Applications"},{"key":"5905_CR58","first-page":"1317","volume":"62","author":"J Cheng","year":"2020","unstructured":"Cheng, J., Liu, Y., Tang, X., Sheng, S.V., Li, M., Li, J.: DDoS attack detection via multi-scale convolutional neural network. Comput. Mater. Sci. 62, 1317\u20131333 (2020)","journal-title":"Comput. Mater. Sci."},{"key":"5905_CR59","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2025.3536562","author":"F Castro","year":"2025","unstructured":"Castro, F., Impedovo, D., Pirlo, G.: An efficient and privacy-preserving federated learning approach based on homomorphic encryption. IEEE Open Journal of the Computer Society (2025). https:\/\/doi.org\/10.1109\/OJCS.2025.3536562","journal-title":"IEEE Open Journal of the Computer Society"},{"key":"5905_CR60","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A. H., Hakak, S., Ghorbani, A.A.: Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: International Carnahan Conference on Security Technology (ICCST) (2019)","DOI":"10.1109\/CCST.2019.8888419"},{"issue":"2","key":"5905_CR61","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2021.100048","volume":"1","author":"O Thorat","year":"2021","unstructured":"Thorat, O., Parekh, N., Mangrulkar, R.: TaxoDaCML: Taxonomy-based divide and conquer using machine learning approach for DDoS attack classification. International Journal of Information Management Data Insights 1(2), 100048 (2021)","journal-title":"International Journal of Information Management Data Insights"},{"issue":"2","key":"5905_CR62","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101975","volume":"36","author":"O Thorat","year":"2024","unstructured":"Thorat, O., Parekh, N., Mangrulkar, R.: A novel method for effective intrusion detection based on convolutional speaking neural networks. Journal of King Saud University-Computer and Information Sciences 36(2), 101975 (2024)","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"issue":"35","key":"5905_CR63","first-page":"1","volume":"12","author":"N Imtiaz","year":"2025","unstructured":"Imtiaz, N., Wahid, A., Ul Abideen, S.Z., Muhammad Kamal, M., Sehito, N., Khan, S., Alibakhshikenari, M.: A deep learning-based approach for the detection of various Internet of Things intrusion attacks through optical networks. Photonics 12(35), 1\u201339 (2025)","journal-title":"Photonics"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05905-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05905-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05905-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T19:03:40Z","timestamp":1771268620000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05905-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,16]]},"references-count":63,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["5905"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05905-w","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,16]]},"assertion":[{"value":"29 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors affirm that there are no conflicting interests to declare. All co-authors have thoroughly reviewed and approved the manuscript\u2019s content, and there are no conflicts of interest to report. The authors certify that this submission represents original work and is not concurrently under review by any other publication. The authors also declare that they have no competing interests connected to this publication. All co-authors confirm they have read and approved the entire manuscript. The authors also confirm that this submission is original work and is not being considered for publication elsewhere.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All authors unanimously agree to publish the paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"164"}}