{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T15:10:17Z","timestamp":1758121817907},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T00:00:00Z","timestamp":1713312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T00:00:00Z","timestamp":1713312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11227-024-06109-6","type":"journal-article","created":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T18:01:41Z","timestamp":1713376901000},"page":"16860-16886","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Gradient scaling and segmented SoftMax Regression Federated Learning (GDS-SRFFL): a novel methodology for attack detection in industrial internet of things (IIoT) networks"],"prefix":"10.1007","volume":"80","author":[{"given":"Vijay Anand","family":"Rajasekaran","sequence":"first","affiliation":[]},{"given":"Alagiri","family":"Indirajithu","sequence":"additional","affiliation":[]},{"given":"P.","family":"Jayalakshmi","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]},{"given":"Balamurugan","family":"Balusamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,17]]},"reference":[{"key":"6109_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2022.101322","volume":"38","author":"HC Altunay","year":"2023","unstructured":"Altunay HC, Albayrak Z (2023) A hybrid CNN+ LSTM based intrusion detection system for industrial IoT networks. Eng Sci Technol Int J 38:101322. https:\/\/doi.org\/10.1016\/j.jestch.2022.101322","journal-title":"Eng Sci Technol Int J"},{"issue":"1","key":"6109_CR2","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1109\/TII.2022.3190352","volume":"19","author":"F Khan","year":"2022","unstructured":"Khan F, Alturki R, Rahman MA, Mastorakis S, Razzak I, Shah ST (2022) Trustworthy and reliable deep-learning-based cyberattack detection in industrial IoT. IEEE Trans Ind Inf 19(1):1030\u20131038. https:\/\/doi.org\/10.1109\/TII.2022.3190352","journal-title":"IEEE Trans Ind Inf"},{"key":"6109_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108744","volume":"205","author":"M Salehi","year":"2022","unstructured":"Salehi M, De Borger G, Hughes D, Crispo B (2022) NemesisGuard: mitigating interrupt latency side channel attacks with static binary rewriting. Comput Netw 205:108744. https:\/\/doi.org\/10.1016\/j.comnet.2021.108744","journal-title":"Comput Netw"},{"issue":"4","key":"6109_CR4","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.icte.2020.04.005","volume":"6","author":"QD Ngo","year":"2020","unstructured":"Ngo QD, Nguyen HT, Le VH, Nguyen DH (2020) A survey of IoT malware and detection methods based on static features. ICT Express 6(4):280\u2013286. https:\/\/doi.org\/10.1016\/j.icte.2020.04.005","journal-title":"ICT Express"},{"issue":"1","key":"6109_CR5","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.dcan.2022.09.008","volume":"9","author":"A Yazdinejad","year":"2023","unstructured":"Yazdinejad A, Kazemi M, Parizi RM, Dehghantanha A, Karimipour H (2023) An ensemble deep learning model for cyber threat hunting in industrial internet of things. Digit Commun Netw 9(1):101\u2013110. https:\/\/doi.org\/10.1016\/j.dcan.2022.09.008","journal-title":"Digit Commun Netw"},{"key":"6109_CR6","doi-asserted-by":"publisher","first-page":"92390","DOI":"10.1109\/ACCESS.2022.3202914","volume":"10","author":"H Sarjan","year":"2022","unstructured":"Sarjan H, Ameli A, Ghafouri M (2022) Cyber-security of industrial internet of things in electric power systems. IEEE Access 10:92390\u201392409. https:\/\/doi.org\/10.1109\/ACCESS.2022.3202914","journal-title":"IEEE Access"},{"key":"6109_CR7","doi-asserted-by":"publisher","first-page":"62722","DOI":"10.1109\/ACCESS.2022.3176317","volume":"10","author":"I Ullah","year":"2022","unstructured":"Ullah I, Mahmoud QH (2022) Design and development of RNN anomaly detection model for IoT networks. IEEE Access 10:62722\u201362750. https:\/\/doi.org\/10.1109\/ACCESS.2022.3176317","journal-title":"IEEE Access"},{"key":"6109_CR8","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.013852","author":"V Priya","year":"2021","unstructured":"Priya V, Thaseen IS, Gadekallu TR, Aboudaif MK, Nasr EA (2021) Robust attack detection approach for IIoT using ensemble classifier. Comput Mater Contin. https:\/\/doi.org\/10.32604\/cmc.2021.013852","journal-title":"Comput Mater Contin"},{"key":"6109_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108672","volume":"205","author":"N Nasser","year":"2022","unstructured":"Nasser N, Fadlullah ZM, Fouda MM, Ali A, Imran M (2022) A lightweight federated learning based privacy preserving B5G pandemic response network using unmanned aerial vehicles: a proof-of-concept. Comput Netw 205:108672. https:\/\/doi.org\/10.1016\/j.comnet.2021.108672","journal-title":"Comput Netw"},{"issue":"8","key":"6109_CR10","doi-asserted-by":"publisher","first-page":"5615","DOI":"10.1109\/TII.2020.3023430","volume":"17","author":"B Li","year":"2020","unstructured":"Li B, Wu Y, Song J, Lu R, Li T, Zhao L (2020) DeepFed: federated deep learning for intrusion detection in industrial cyber\u2013physical systems. IEEE Trans Ind Inf 17(8):5615\u20135624. https:\/\/doi.org\/10.1109\/TII.2020.3023430","journal-title":"IEEE Trans Ind Inf"},{"issue":"3","key":"6109_CR11","doi-asserted-by":"publisher","first-page":"7273","DOI":"10.48084\/etasr.4202","volume":"11","author":"M Anwer","year":"2021","unstructured":"Anwer M, Khan SM, Farooq MU (2021) Attack detection in IoT using machine learning. Eng Technol Appl Sci Res 11(3):7273\u20137278. https:\/\/doi.org\/10.48084\/etasr.4202","journal-title":"Eng Technol Appl Sci Res"},{"issue":"21","key":"6109_CR12","doi-asserted-by":"publisher","first-page":"8085","DOI":"10.3390\/s22218085","volume":"22","author":"H Benaddi","year":"2022","unstructured":"Benaddi H, Jouhari M, Ibrahimi K, Ben Othman J, Amhoud EM (2022) Anomaly detection in industrial IoT using distributional reinforcement learning and generative adversarial networks. Sensors 22(21):8085. https:\/\/doi.org\/10.3390\/s22218085","journal-title":"Sensors"},{"key":"6109_CR13","doi-asserted-by":"publisher","first-page":"138509","DOI":"10.1109\/ACCESS.2021.3118642","volume":"9","author":"MA Ferrag","year":"2021","unstructured":"Ferrag MA, Friha O, Maglaras L, Janicke H, Shu L (2021) Federated deep learning for cyber security in the internet of things: concepts, applications, and experimental analysis. IEEE Access 9:138509\u2013138542. https:\/\/doi.org\/10.1109\/ACCESS.2021.3118642","journal-title":"IEEE Access"},{"key":"6109_CR14","doi-asserted-by":"publisher","first-page":"113199","DOI":"10.1109\/ACCESS.2021.3104113","volume":"9","author":"SM Kasongo","year":"2021","unstructured":"Kasongo SM (2021) An advanced intrusion detection system for IIoT based on GA and tree based algorithms. IEEE Access 9:113199\u2013113212. https:\/\/doi.org\/10.1109\/ACCESS.2021.3104113","journal-title":"IEEE Access"},{"key":"6109_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102661","volume":"123","author":"S Nayak","year":"2021","unstructured":"Nayak S, Ahmed N, Misra S (2021) Deep learning-based reliable routing attack detection mechanism for industrial internet of things. Ad Hoc Netw 123:102661. https:\/\/doi.org\/10.1016\/j.adhoc.2021.102661","journal-title":"Ad Hoc Netw"},{"key":"6109_CR16","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7424094","author":"C Ma","year":"2022","unstructured":"Ma C, Yu H, Li Z, Yang Z (2022) Federated learning framework based on data value evaluation in industrial IoT. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2022\/7424094","journal-title":"Secur Commun Netw"},{"key":"6109_CR17","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8568917","author":"J Guo","year":"2022","unstructured":"Guo J, Shen Y (2022) Online anomaly detection of industrial IoT based on hybrid machine learning architecture. Comput Intell Neurosci. https:\/\/doi.org\/10.1155\/2022\/8568917","journal-title":"Comput Intell Neurosci"},{"key":"6109_CR18","doi-asserted-by":"publisher","first-page":"89337","DOI":"10.1109\/ACCESS.2020","volume":"8","author":"S Latif","year":"2020","unstructured":"Latif S, Zou Z, Idrees Z, Ahmad J (2020) A novel attack detection scheme for the industrial internet of things using a lightweight random neural network. IEEE access 8:89337\u201389350. https:\/\/doi.org\/10.1109\/ACCESS.2020","journal-title":"IEEE access"},{"key":"6109_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/5533269","volume":"2021","author":"Y Wang","year":"2021","unstructured":"Wang Y, Jiang Y, Lan J (2021) Fcnn: an efficient intrusion detection method based on raw network traffic. Secur Commun Netw 2021:1\u201313. https:\/\/doi.org\/10.1155\/2021\/5533269","journal-title":"Secur Commun Netw"},{"issue":"9","key":"6109_CR20","doi-asserted-by":"publisher","first-page":"8462","DOI":"10.1109\/JIOT.2020.2991693","volume":"7","author":"MM Aboelwafa","year":"2020","unstructured":"Aboelwafa MM, Seddik KG, Eldefrawy MH, Gadallah Y, Gidlund M (2020) A machine-learning-based technique for false data injection attacks detection in industrial IoT. IEEE Internet Things J 7(9):8462\u20138471. https:\/\/doi.org\/10.1109\/JIOT.2020.2991693","journal-title":"IEEE Internet Things J"},{"issue":"21","key":"6109_CR21","doi-asserted-by":"publisher","first-page":"2662","DOI":"10.3390\/electronics10212662","volume":"10","author":"H Vargas","year":"2021","unstructured":"Vargas H, Lozano-Garzon C, Montoya GA, Donoso Y (2021) Detection of security attacks in industrial IoT networks: a blockchain and machine learning approach. Electronics 10(21):2662. https:\/\/doi.org\/10.3390\/electronics10212662","journal-title":"Electronics"},{"key":"6109_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/3806459","volume":"2021","author":"H Alkahtani","year":"2021","unstructured":"Alkahtani H, Aldhyani TH (2021) Botnet attack detection by using CNN-LSTM model for internet of things applications. Secur Commun Netw 2021:1\u201323. https:\/\/doi.org\/10.1155\/2021\/3806459","journal-title":"Secur Commun Netw"},{"key":"6109_CR23","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5448647","author":"A Li","year":"2022","unstructured":"Li A, Yi S (2022) Intelligent intrusion detection method of industrial internet of things based on CNN-BiLSTM. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2022\/5448647","journal-title":"Secur Commun Netw"},{"key":"6109_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/9023719","volume":"2022","author":"S Tharewal","year":"2022","unstructured":"Tharewal S, Ashfaque MW, Banu SS, Uma P, Hassen SM, Shabaz M (2022) Intrusion detection system for industrial internet of things based on deep reinforcement learning. Wirel Commun Mob Comput 2022:1\u20138. https:\/\/doi.org\/10.1155\/2022\/9023719","journal-title":"Wirel Commun Mob Comput"},{"issue":"2","key":"6109_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5455\/jeas.2022110103","volume":"9","author":"F Jeribi","year":"2022","unstructured":"Jeribi F (2022) A novel classifier for cyber attack detection system in industrial internet of things. J Eng Appl Sci 9(2):1\u201316. https:\/\/doi.org\/10.5455\/jeas.2022110103","journal-title":"J Eng Appl Sci"},{"key":"6109_CR26","unstructured":"The TON_IoT Datasets. https:\/\/research.unsw.edu.au\/projects\/toniot-datasets. Accessed 10 Dec 2023"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06109-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06109-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06109-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T12:06:39Z","timestamp":1720440399000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06109-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,17]]},"references-count":26,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["6109"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06109-6","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,17]]},"assertion":[{"value":"25 March 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"No human beings\/animals are involved in the research. All the authors have consented to participate and consented to publish in this Journal.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}