{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T20:19:14Z","timestamp":1772223554715,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10586-026-05998-x","type":"journal-article","created":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T18:55:56Z","timestamp":1771527356000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Protecting IIoT ecosystems: a hybrid CNN-LSTM approach in federated learning"],"prefix":"10.1007","volume":"29","author":[{"given":"Qawsar","family":"Gulzar","sequence":"first","affiliation":[]},{"given":"Khurram","family":"Mustafa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,19]]},"reference":[{"issue":"4","key":"5998_CR1","doi-asserted-by":"publisher","first-page":"6822","DOI":"10.1109\/JIOT.2019.2912022","volume":"6","author":"M Zolanvari","year":"2019","unstructured":"Zolanvari, M., Teixeira, M.A., Gupta, L., Khan, K.M., Jain, R.: Machine learning-based network vulnerability analysis of industrial internet of things. IEEE Internet Things J. 6(4), 6822\u20136834 (2019)","journal-title":"IEEE Internet Things J."},{"key":"5998_CR2","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Keshky, M., Debiez, E., Janicke, H.: Federated ton_iot windows datasets for evaluating ai-based security applications. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 848\u2013855 (2020). IEEE","DOI":"10.1109\/TrustCom50675.2020.00114"},{"key":"5998_CR3","doi-asserted-by":"crossref","unstructured":"Bukhari, S.M.S., Zafar, M.H., Abou\u00a0Houran, M., Qadir, Z., Moosavi, S.K.R., Sanfilippo, F.: Enhancing cybersecurity in edge iiot networks: An asynchronous federated learning approach with a deep hybrid detection model. Internet of Things, 101252 (2024)","DOI":"10.1016\/j.iot.2024.101252"},{"key":"5998_CR4","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag, M.A., Friha, O., Hamouda, D., Maglaras, L., Janicke, H.: Edge-iiotset: A new comprehensive realistic cyber security dataset of iot and iiot applications for centralized and federated learning. IEEE Access 10, 40281\u201340306 (2022)","journal-title":"IEEE Access"},{"key":"5998_CR5","doi-asserted-by":"crossref","unstructured":"Prajapati, S., Singh, A.: Cyber-attacks on internet of things (iot) devices, attack vectors, and remedies: a position paper. IoT and cloud computing for societal good, 277\u2013295 (2022)","DOI":"10.1007\/978-3-030-73885-3_17"},{"key":"5998_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102481","volume":"149","author":"J Sengupta","year":"2020","unstructured":"Sengupta, J., Ruj, S., Bit, S.D.: A comprehensive survey on attacks, security issues and blockchain solutions for iot and iiot. J. Netw. Comput. Appl. 149, 102481 (2020)","journal-title":"J. Netw. Comput. Appl."},{"issue":"22","key":"5998_CR7","doi-asserted-by":"publisher","first-page":"6578","DOI":"10.3390\/s20226578","volume":"20","author":"I Vaccari","year":"2020","unstructured":"Vaccari, I., Chiola, G., Aiello, M., Mongelli, M., Cambiaso, E.: Mqttset, a new dataset for machine learning techniques on mqtt. Sensors 20(22), 6578 (2020)","journal-title":"Sensors"},{"issue":"3","key":"5998_CR8","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., Elovici, Y.: N-baiot- network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12\u201322 (2018)","journal-title":"IEEE Pervasive Comput."},{"key":"5998_CR9","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Futur. Gener. Comput. Syst. 100, 779\u2013796 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5998_CR10","doi-asserted-by":"publisher","first-page":"138509","DOI":"10.1109\/ACCESS.2021.3118642","volume":"9","author":"MA Ferrag","year":"2021","unstructured":"Ferrag, M.A., Friha, O., Maglaras, L., Janicke, H., Shu, L.: Federated deep learning for cyber security in the internet of things: Concepts, applications, and experimental analysis. IEEE Access 9, 138509\u2013138542 (2021)","journal-title":"IEEE Access"},{"issue":"4","key":"5998_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s11416-022-00456-9","volume":"19","author":"M Mohy-Eddine","year":"2023","unstructured":"Mohy-Eddine, M., Guezzaz, A., Benkirane, S., Azrour, M.: An effective intrusion detection approach based on ensemble learning for iiot edge computing. J. Comput. Virol. Hacking Tech. 19(4), 469\u2013481 (2023)","journal-title":"J. Comput. Virol. Hacking Tech."},{"issue":"5","key":"5998_CR12","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1016\/j.dcan.2022.09.010","volume":"9","author":"A Yazdinejad","year":"2023","unstructured":"Yazdinejad, A., Zolfaghari, B., Dehghantanha, A., Karimipour, H., Srivastava, G., Parizi, R.M.: Accurate threat hunting in industrial internet of things edge devices. Digit. Commun. Netw 9(5), 1123\u20131130 (2023)","journal-title":"Digit. Commun. Netw"},{"issue":"18","key":"5998_CR13","doi-asserted-by":"publisher","first-page":"3951","DOI":"10.3390\/math11183951","volume":"11","author":"M Wang","year":"2023","unstructured":"Wang, M., Zhang, B., Zang, X., Wang, K., Ma, X.: Malicious traffic classification via edge intelligence in iiot. Mathematics 11(18), 3951 (2023)","journal-title":"Mathematics"},{"key":"5998_CR14","doi-asserted-by":"crossref","unstructured":"Maddali, D.: Convnext-eesnn: An effective deep learning based malware detection in edge based iiot. Journal of Intelligent & Fuzzy Systems (Preprint), 1\u201317 (2024)","DOI":"10.3233\/JIFS-234897"},{"issue":"1","key":"5998_CR15","first-page":"13","volume":"16","author":"A Rajak","year":"2024","unstructured":"Rajak, A., Tripathi, R.: Dl-sklstm approach for cyber security threats detection in 5g enabled iiot. Int. J. Inf. Technol. 16(1), 13\u201320 (2024)","journal-title":"Int. J. Inf. Technol."},{"key":"5998_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111785","volume":"294","author":"K Hassini","year":"2024","unstructured":"Hassini, K., Khalis, S., Habibi, O., Chemmakha, M., Lazaar, M.: An end-to-end learning approach for enhancing intrusion detection in industrial-internet of things. Knowl.-Based Syst. 294, 111785 (2024)","journal-title":"Knowl.-Based Syst."},{"issue":"6","key":"5998_CR17","doi-asserted-by":"publisher","first-page":"4189","DOI":"10.1109\/TII.2021.3124848","volume":"18","author":"X Wang","year":"2021","unstructured":"Wang, X., Hu, J., Lin, H., Garg, S., Kaddoum, G., Piran, M.J., Hossain, M.S.: Qos and privacy-aware routing for 5g-enabled industrial internet of things: A federated reinforcement learning approach. IEEE Trans. Industr. Inf. 18(6), 4189\u20134197 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"10","key":"5998_CR18","doi-asserted-by":"publisher","first-page":"7110","DOI":"10.1109\/JIOT.2021.3074382","volume":"9","author":"X Wang","year":"2021","unstructured":"Wang, X., Garg, S., Lin, H., Hu, J., Kaddoum, G., Piran, M.J., Hossain, M.S.: Toward accurate anomaly detection in industrial internet of things using hierarchical federated learning. IEEE Internet Things J. 9(10), 7110\u20137119 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"16","key":"5998_CR19","doi-asserted-by":"publisher","first-page":"14237","DOI":"10.1109\/JIOT.2020.3023588","volume":"9","author":"X Wang","year":"2020","unstructured":"Wang, X., Garg, S., Lin, H., Kaddoum, G., Hu, J., Hossain, M.S.: A secure data aggregation strategy in edge computing and blockchain-empowered internet of things. IEEE Internet Things J. 9(16), 14237\u201314246 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"5998_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101939","volume":"36","author":"A Nazir","year":"2024","unstructured":"Nazir, A., He, J., Zhu, N., Wajahat, A., Ullah, F., Qureshi, S., Ma, X., Pathan, M.S.: Collaborative threat intelligence: Enhancing iot security through blockchain and machine learning integration. J. King Saud Univ. Comput. Inf. Sci 36(2), 101939 (2024)","journal-title":"J. King Saud Univ. Comput. Inf. Sci"},{"issue":"6","key":"5998_CR21","doi-asserted-by":"publisher","first-page":"8367","DOI":"10.1007\/s10586-024-04436-0","volume":"27","author":"A Nazir","year":"2024","unstructured":"Nazir, A., He, J., Zhu, N., Anwar, M.S., Pathan, M.S.: Enhancing iot security: a collaborative framework integrating federated learning, dense neural networks, and blockchain. Clust. Comput. 27(6), 8367\u20138392 (2024)","journal-title":"Clust. Comput."},{"key":"5998_CR22","unstructured":"Gulzar, Q., Mustafa, K.: Enhancing network security in industrial iot environments: a deepclg hybrid learning model for cyberattack detection. International Journal of Machine Learning and Cybernetics, 1\u201319 (2025)"},{"key":"5998_CR23","doi-asserted-by":"crossref","unstructured":"Dadkhah, S., Mahdikhani, H., Danso, P.K., Zohourian, A., Truong, K.A., Ghorbani, A.A.: Towards the development of a realistic multidimensional iot profiling dataset. In: 2022 19th Annual International Conference on Privacy, Security & Trust (PST), pp. 1\u201311 (2022). IEEE","DOI":"10.1109\/PST55820.2022.9851966"},{"key":"5998_CR24","doi-asserted-by":"crossref","unstructured":"Azizjon, M., Jumabek, A., Kim, W.: 1d cnn based network intrusion detection with normalization on imbalanced data. In: 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), pp. 218\u2013224 (2020). IEEE","DOI":"10.1109\/ICAIIC48513.2020.9064976"},{"issue":"7","key":"5998_CR25","doi-asserted-by":"publisher","first-page":"1235","DOI":"10.1162\/neco_a_01199","volume":"31","author":"Y Yu","year":"2019","unstructured":"Yu, Y., Si, X., Hu, C., Zhang, J.: A review of recurrent neural networks: Lstm cells and network architectures. Neural Comput. 31(7), 1235\u20131270 (2019)","journal-title":"Neural Comput."},{"key":"5998_CR26","unstructured":"Nguyen, J., Malik, K., Zhan, H., Yousefpour, A., Rabbat, M., Malek, M., Huba, D.: Federated learning with buffered asynchronous aggregation. In: International Conference on Artificial Intelligence and Statistics, pp. 3581\u20133607 (2022). PMLR"},{"key":"5998_CR27","doi-asserted-by":"publisher","first-page":"48970","DOI":"10.1109\/ACCESS.2020.2978082","volume":"8","author":"X Lu","year":"2020","unstructured":"Lu, X., Liao, Y., Lio, P., Hui, P.: Privacy-preserving asynchronous federated learning mechanism for edge network computing. Ieee Access 8, 48970\u201348981 (2020)","journal-title":"Ieee Access"},{"key":"5998_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108429","volume":"199","author":"J Liu","year":"2021","unstructured":"Liu, J., Xu, H., Xu, Y., Ma, Z., Wang, Z., Qian, C., Huang, H.: Communication-efficient asynchronous federated learning in resource-constrained edge computing. Comput. Netw. 199, 108429 (2021)","journal-title":"Comput. Netw."},{"issue":"3","key":"5998_CR29","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.dcan.2021.04.001","volume":"7","author":"Z Chen","year":"2021","unstructured":"Chen, Z., Liao, W., Hua, K., Lu, C., Yu, W.: Towards asynchronous federated learning for heterogeneous edge-powered internet of things. Digit. Commun. Netw 7(3), 317\u2013326 (2021)","journal-title":"Digit. Commun. Netw"},{"issue":"19","key":"5998_CR30","doi-asserted-by":"publisher","first-page":"9572","DOI":"10.3390\/app12199572","volume":"12","author":"I Tareq","year":"2022","unstructured":"Tareq, I., Elbagoury, B.M., El-Regaily, S., El-Horbaty, E.-S.M.: Analysis of ton-iot, unw-nb15, and edge-iiot datasets using dl in cybersecurity for iot. Appl. Sci. 12(19), 9572 (2022)","journal-title":"Appl. Sci."},{"key":"5998_CR31","doi-asserted-by":"crossref","unstructured":"Javeed, D., Gao, T., Saeed, M.S., Kumar, P.: An intrusion detection system for edge-envisioned smart agriculture in extreme environment. IEEE Internet of Things Journal (2023)","DOI":"10.1109\/JIOT.2023.3288544"},{"issue":"10","key":"5998_CR32","doi-asserted-by":"publisher","first-page":"8467","DOI":"10.1109\/JIOT.2022.3200048","volume":"10","author":"IA Khan","year":"2022","unstructured":"Khan, I.A., Pi, D., Abbas, M.Z., Zia, U., Hussain, Y., Soliman, H.: Federated-srus: A federated-simple-recurrent-units-based ids for accurate detection of cyber attacks against iot-augmented industrial control systems. IEEE Internet Things J. 10(10), 8467\u20138476 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"5998_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3695998","volume":"34","author":"D Torre","year":"2025","unstructured":"Torre, D., Chennamaneni, A., Jo, J., Vyas, G., Sabrsula, B.: Toward enhancing privacy preservation of a federated learning cnn intrusion detection system in iot: Method and empirical study. ACM Trans. Softw. Eng. Methodol. 34(2), 1\u201348 (2025)","journal-title":"ACM Trans. Softw. Eng. Methodol."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05998-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-026-05998-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-05998-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T18:55:59Z","timestamp":1771527359000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-026-05998-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,19]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["5998"],"URL":"https:\/\/doi.org\/10.1007\/s10586-026-05998-x","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,19]]},"assertion":[{"value":"16 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"174"}}