{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T09:36:56Z","timestamp":1773221816230,"version":"3.50.1"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T00:00:00Z","timestamp":1765411200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T00:00:00Z","timestamp":1765411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s12083-025-02155-w","type":"journal-article","created":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T02:55:49Z","timestamp":1765421749000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["AFL-SecNet: An adaptive federated learning framework for secure and privacy-preserving network traffic analysis"],"prefix":"10.1007","volume":"19","author":[{"given":"Abida","family":"Naz","sequence":"first","affiliation":[]},{"given":"Irshad","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Uzair","sequence":"additional","affiliation":[]},{"given":"Muhammad Fayyaz","family":"Khokhar","sequence":"additional","affiliation":[]},{"given":"Ayesha","family":"Sabir","sequence":"additional","affiliation":[]},{"given":"Riaz Ullah","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,11]]},"reference":[{"key":"2155_CR1","doi-asserted-by":"crossref","unstructured":"Azeri N, Hioual O, Hioual O (2024) A distributed intelligence framework for enhancing resilience and data privacy in dynamic cyber-physical systems. Clust Comput 1\u201316","DOI":"10.1007\/s10586-024-04349-y"},{"key":"2155_CR2","doi-asserted-by":"crossref","unstructured":"Le M, Huynh-The T, Do-Duy T, Vu T-H, Hwang W-J, Pham Q-V (2024) Applications of distributed machine learning for the internet-of-things: a comprehensive survey. IEEE Commun Surv Tutor","DOI":"10.1109\/COMST.2024.3427324"},{"key":"2155_CR3","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.future.2023.10.011","volume":"152","author":"PMS S\u00e1nchez","year":"2024","unstructured":"S\u00e1nchez PMS, Celdr\u00e1n AH, Bovet G, P\u00e9rez GM (2024) Adversarial attacks and defenses on ml-and hardware-based iot device fingerprinting and identification. Futur Gener Comput Syst 152:30\u201342","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"2155_CR4","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1002\/spy2.366","volume":"7","author":"H Bilakanti","year":"2024","unstructured":"Bilakanti H, Pasam S, Palakollu V, Utukuru S (2024) Anomaly detection in iot environment using machine learning. Security and Privacy 7(3):366","journal-title":"Security and Privacy"},{"key":"2155_CR5","doi-asserted-by":"publisher","first-page":"104067","DOI":"10.1016\/j.cose.2024.104067","volume":"147","author":"K Huang","year":"2024","unstructured":"Huang K, Xian R, Xian M, Wang H, Ni L (2024) A comprehensive intrusion detection method for the internet of vehicles based on federated learning architecture. Comput Secur 147:104067","journal-title":"Comput Secur"},{"key":"2155_CR6","doi-asserted-by":"publisher","first-page":"123808","DOI":"10.1016\/j.eswa.2024.123808","volume":"249","author":"H Nandanwar","year":"2024","unstructured":"Nandanwar H, Katarya R (2024) Deep learning enabled intrusion detection system for industrial iot environment. Expert Syst Appl 249:123808","journal-title":"Expert Syst Appl"},{"issue":"1","key":"2155_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-024-01821-9","volume":"18","author":"I Ullah","year":"2025","unstructured":"Ullah I, Deng X, Pei X, Mushtaq H, Uzair M (2025) Iov-sfl: A blockchain-based federated learning framework for secure and efficient data sharing in the internet of vehicles. Peer-to-Peer Netw Appl 18(1):1\u201320","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"4","key":"2155_CR8","first-page":"1","volume":"18","author":"S Vemuru","year":"2025","unstructured":"Vemuru S et al (2025) A privacy-preserving hybrid ensemble classifier using decision tree and na\u00efve bayes approach for federated learning. Peer-to-Peer Netw Appl 18(4):1\u201311","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"5","key":"2155_CR9","doi-asserted-by":"publisher","first-page":"2256","DOI":"10.1007\/s12083-023-01531-8","volume":"16","author":"I Ullah","year":"2023","unstructured":"Ullah I, Deng X, Pei X, Jiang P, Mushtaq H (2023) A verifiable and privacy-preserving blockchain-based federated learning approach. Peer-to-Peer Netw Appl 16(5):2256\u20132270","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"2","key":"2155_CR10","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1007\/s10207-023-00787-8","volume":"23","author":"H Nandanwar","year":"2024","unstructured":"Nandanwar H, Katarya R (2024) Tl-bilstm iot: transfer learning model for prediction of intrusion detection system in iot environment. Int J Inf Secur 23(2):1251\u20131277","journal-title":"Int J Inf Secur"},{"issue":"4","key":"2155_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3696354","volume":"24","author":"M Zang","year":"2024","unstructured":"Zang M, Zheng C, Koziak T, Zilberman N, Dittmann L (2024) Federated in-network machine learning for privacy-preserving iot traffic analysis. ACM Trans Internet Technol 24(4):1\u201324","journal-title":"ACM Trans Internet Technol"},{"issue":"4","key":"2155_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-025-02014-8","volume":"18","author":"K Kumar","year":"2025","unstructured":"Kumar K, Khari M (2025) Federated active meta-learning with blockchain for zero-day attack detection in industrial iot. Peer-to-Peer Netw Appl 18(4):1\u201347","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2155_CR13","doi-asserted-by":"crossref","unstructured":"Alcoz AG, Strohmeier M, Lenders V, Vanbever L (2022) Aggregate-based congestion control for pulse-wave ddos defense. In: Proceedings of the ACM SIGCOMM 2022 Conference, pp 693\u2013706","DOI":"10.1145\/3544216.3544263"},{"key":"2155_CR14","doi-asserted-by":"crossref","unstructured":"Feraudo A, Yadav P, Safronov V, Popescu DA, Mortier R, Wang S, Bellavista P, Crowcroft J (2020) Colearn: Enabling federated learning in mud-compliant iot edge networks. In: Proceedings of the Third ACM International workshop on edge systems, analytics and networking, pp 25\u201330","DOI":"10.1145\/3378679.3394528"},{"issue":"7","key":"2155_CR15","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10586-025-05135-0","volume":"28","author":"H Nandanwar","year":"2025","unstructured":"Nandanwar H, Katarya R (2025) A hybrid blockchain-based framework for securing intrusion detection systems in internet of things. Clust Comput 28(7):471","journal-title":"Clust Comput"},{"key":"2155_CR16","doi-asserted-by":"crossref","unstructured":"Zheng C, Xiong Z, Bui TT, Kaupmees S, Bensoussane R, Bernabeu A, Vargaftik S, Ben-Itzhak Y, Zilberman N (2024) Iisy: Hybrid in-network classification using programmable switches. IEEE\/ACM Trans Netw","DOI":"10.1109\/TNET.2024.3364757"},{"key":"2155_CR17","unstructured":"Zhou G, Liu Z, Fu C, Li Q, Xu K (2023) An efficient design of intelligent network data plane. In: 32nd USENIX Security Symposium (USENIX Security 23), pp 6203\u20136220"},{"key":"2155_CR18","doi-asserted-by":"crossref","unstructured":"Zheng C, Hong X, Ding D, Vargaftik S, Ben-Itzhak Y, Zilberman N (2023) In-network machine learning using programmable network devices: a survey. IEEE Commun Surv Tutor","DOI":"10.1109\/COMST.2023.3344351"},{"key":"2155_CR19","doi-asserted-by":"crossref","unstructured":"Vyas A, Lin P-C, Hwang R-H, Tripathi M (2024) Privacy-preserving federated learning for intrusion detection in iot environments: a survey. IEEE Access","DOI":"10.1109\/ACCESS.2024.3454211"},{"key":"2155_CR20","doi-asserted-by":"crossref","unstructured":"Chen C, Liao T, Deng X, Wu Z, Huang S, Zheng Z (2025) Advances in robust federated learning: a survey with heterogeneity considerations. IEEE Trans Big Data","DOI":"10.1109\/TBDATA.2025.3527202"},{"key":"2155_CR21","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-031-75764-8_15","volume-title":"Information security","author":"S Sun","year":"2025","unstructured":"Sun S, Sharma P, Nwodo K, Stavrou A, Wang H (2025) Fedmade: Robust federated learning for intrusion detection in iot networks using a dynamic aggregation method. In: Mouha N, Nikiforakis N (eds) Information security. Springer, Cham, pp 286\u2013306"},{"issue":"14","key":"2155_CR22","doi-asserted-by":"publisher","first-page":"4309","DOI":"10.3390\/s25144309","volume":"25","author":"H Peng","year":"2025","unstructured":"Peng H, Wu C, Xiao Y (2025) Fd-ids: Federated learning with knowledge distillation for intrusion detection in non-iid iot environments. Sensors 25(14):4309","journal-title":"Sensors"},{"key":"2155_CR23","doi-asserted-by":"publisher","first-page":"119830","DOI":"10.1016\/j.ins.2023.119830","volume":"654","author":"Y Li","year":"2024","unstructured":"Li Y, Lai J, Zhang R, Sun M (2024) Secure and efficient multi-key aggregation for federated learning. Inf Sci 654:119830","journal-title":"Inf Sci"},{"key":"2155_CR24","doi-asserted-by":"crossref","unstructured":"Rathee M, Shen C, Wagh S, Popa RA (2023) Elsa: Secure aggregation for federated learning with malicious actors. In: 2023 IEEE Symposium on Security and Privacy (SP). IEEE, pp 1961\u20131979","DOI":"10.1109\/SP46215.2023.10179468"},{"key":"2155_CR25","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1016\/j.future.2020.12.003","volume":"117","author":"Y Qi","year":"2021","unstructured":"Qi Y, Hossain MS, Nie J, Li X (2021) Privacy-preserving blockchain-based federated learning for traffic flow prediction. Futur Gener Comput Syst 117:328\u2013337","journal-title":"Futur Gener Comput Syst"},{"key":"2155_CR26","doi-asserted-by":"crossref","unstructured":"Zhang C, Dang S, Shihada B, Alouini M-S (2021) Dual attention-based federated learning for wireless traffic prediction. In: IEEE INFOCOM 2021-IEEE Conference on Computer Communications. IEEE, pp 1\u201310","DOI":"10.1109\/INFOCOM42981.2021.9488883"},{"key":"2155_CR27","doi-asserted-by":"publisher","first-page":"122302","DOI":"10.1016\/j.eswa.2023.122302","volume":"238","author":"X Shen","year":"2024","unstructured":"Shen X, Chen J, Zhu S, Yan R (2024) A decentralized federated learning-based spatial-temporal model for freight traffic speed forecasting. Expert Syst Appl 238:122302","journal-title":"Expert Syst Appl"},{"issue":"4","key":"2155_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-025-01991-0","volume":"18","author":"M Shawkat","year":"2025","unstructured":"Shawkat M, El-desoky A, Ali ZH, Salem M (2025) Blockchain and federated learning based on aggregation techniques for industrial iot: a contemporary survey. Peer-to-Peer Netw Appl 18(4):1\u201325","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2155_CR29","doi-asserted-by":"crossref","unstructured":"Nandanwar H, Katarya R (2024) A secure and privacy-preserving ids for iot networks using hybrid blockchain and federated learning. In: International conference on next-generation communication and computing. Springer, pp 207\u2013219","DOI":"10.1007\/978-981-96-3725-6_18"},{"key":"2155_CR30","doi-asserted-by":"publisher","first-page":"103677","DOI":"10.1016\/j.adhoc.2024.103677","volume":"167","author":"F Mansouri","year":"2025","unstructured":"Mansouri F, Tarhouni M, Alaya B, Zidi S (2025) A distributed intrusion detection framework for vehicular ad hoc networks via federated learning and blockchain. Ad Hoc Netw 167:103677","journal-title":"Ad Hoc Netw"},{"key":"2155_CR31","doi-asserted-by":"publisher","first-page":"103881","DOI":"10.1016\/j.cose.2024.103881","volume":"142","author":"X Chen","year":"2024","unstructured":"Chen X, Qiu W, Chen L, Ma Y, Ma J (2024) Fast and practical intrusion detection system based on federated learning for vanet. Comput Secur 142:103881","journal-title":"Comput Secur"},{"issue":"8","key":"2155_CR32","doi-asserted-by":"publisher","first-page":"8738","DOI":"10.1109\/TITS.2022.3157056","volume":"24","author":"X Yuan","year":"2022","unstructured":"Yuan X, Chen J, Yang J, Zhang N, Yang T, Han T, Taherkordi A (2022) Fedstn: Graph representation driven federated learning for edge computing enabled urban traffic flow prediction. IEEE Trans Intell Transp Syst 24(8):8738\u20138748","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2155_CR33","doi-asserted-by":"publisher","first-page":"102002","DOI":"10.1016\/j.inffus.2023.102002","volume":"101","author":"IA Khan","year":"2024","unstructured":"Khan IA, Razzak I, Pi D, Khan N, Hussain Y, Li B, Kousar T (2024) Fed-inforce-fusion: a federated reinforcement-based fusion model for security and privacy protection of iomt networks against cyber-attacks. Inf Fusion 101:102002","journal-title":"Inf Fusion"},{"key":"2155_CR34","doi-asserted-by":"crossref","unstructured":"Nandanwar H, Katarya R (2025) Privacy-preserving data sharing in blockchain-enabled iot healthcare management system. Comput J 065","DOI":"10.1093\/comjnl\/bxaf065"},{"key":"2155_CR35","doi-asserted-by":"crossref","unstructured":"Nandanwar H, Katarya R (2025) Optimized intrusion detection and secure data management in iot networks using gao-xgboost and ecc-integrated blockchain framework. Knowl Inf Syst 1\u201356","DOI":"10.1007\/s10115-025-02513-3"},{"issue":"12","key":"2155_CR36","first-page":"1","volume":"56","author":"J Chen","year":"2024","unstructured":"Chen J, Yan H, Liu Z, Zhang M, Xiong H, Yu S (2024) When federated learning meets privacy-preserving computation. ACM Comput Surv 56(12):1\u201336","journal-title":"ACM Comput Surv"},{"issue":"14","key":"2155_CR37","doi-asserted-by":"publisher","first-page":"24569","DOI":"10.1109\/JIOT.2024.3382875","volume":"11","author":"Q Xie","year":"2024","unstructured":"Xie Q, Jiang S, Jiang L, Huang Y, Zhao Z, Khan S, Dai W, Liu Z, Wu K (2024) Efficiency optimization techniques in privacy-preserving federated learning with homomorphic encryption: a brief survey. IEEE Internet Things J 11(14):24569\u201324580","journal-title":"IEEE Internet Things J"},{"key":"2155_CR38","doi-asserted-by":"publisher","first-page":"103088","DOI":"10.1016\/j.sysarc.2024.103088","volume":"148","author":"A Yazdinejad","year":"2024","unstructured":"Yazdinejad A, Dehghantanha A, Srivastava G, Karimipour H, Parizi RM (2024) Hybrid privacy preserving federated learning against irregular users in next-generation internet of things. J Syst Architect 148:103088","journal-title":"J Syst Architect"},{"key":"2155_CR39","doi-asserted-by":"publisher","first-page":"2244","DOI":"10.1016\/j.egyr.2024.08.033","volume":"12","author":"V Michalakopoulos","year":"2024","unstructured":"Michalakopoulos V, Sarantinopoulos E, Sarmas E, Marinakis V (2024) Empowering federated learning techniques for privacy-preserving pv forecasting. Energy Rep 12:2244\u20132256","journal-title":"Energy Rep"},{"issue":"1","key":"2155_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-024-06752-z","volume":"81","author":"K Kamatchi","year":"2025","unstructured":"Kamatchi K, Uma E (2025) Securing the edge: privacy-preserving federated learning for insider threats in iot networks. J Supercomput 81(1):1\u201349","journal-title":"J Supercomput"},{"issue":"6","key":"2155_CR41","doi-asserted-by":"publisher","first-page":"3228","DOI":"10.1109\/JBHI.2024.3352013","volume":"28","author":"IA Khan","year":"2024","unstructured":"Khan IA, Razzak I, Pi D, Zia U, Kamal S, Hussain Y (2024) A novel collaborative sru network with dynamic behaviour aggregation, reduced communication overhead and explainable features. IEEE J Biomed Health Inform 28(6):3228\u20133235","journal-title":"IEEE J Biomed Health Inform"},{"key":"2155_CR42","doi-asserted-by":"crossref","unstructured":"Kumar H, Kumar H, Nandanwar H, Katarya R et al (2025) Enhancing security and scalability of iomt systems using blockchain: addressing key challenges and limitations. In: 6th International Conference on Deep Learning, Artificial Intelligence and Robotics (ICDLAIR 2024). Atlantis Press, pp 191\u2013202","DOI":"10.2991\/978-94-6463-740-3_17"},{"key":"2155_CR43","doi-asserted-by":"crossref","unstructured":"Ju L, Zhang T, Toor S, Hellander A (2024) Accelerating fair federated learning: adaptive federated adam. IEEE Trans Mach Learn Commun Netw","DOI":"10.1109\/TMLCN.2024.3423648"},{"key":"2155_CR44","doi-asserted-by":"crossref","unstructured":"Zhou X, Liang W, Kawai A, Fueda K, She J, Kevin I, Wang K (2024) Adaptive segmentation enhanced asynchronous federated learning for sustainable intelligent transportation systems. IEEE Trans Intell Transp Syst","DOI":"10.1109\/TITS.2024.3362058"},{"key":"2155_CR45","doi-asserted-by":"crossref","unstructured":"Wu X, Huang F, Hu Z, Huang H (2023) Faster adaptive federated learning. In: Proceedings of the AAAI conference on artificial intelligence, vol 37, pp 10379\u201310387","DOI":"10.1609\/aaai.v37i9.26235"},{"issue":"2","key":"2155_CR46","doi-asserted-by":"publisher","first-page":"6340","DOI":"10.1109\/TCE.2024.3499942","volume":"71","author":"IA Khan","year":"2025","unstructured":"Khan IA, Pi D, Kamal S, Alsuhaibani M, Alshammari BM (2025) Federated-boosting: a distributed and dynamic boosting-powered cyber-attack detection scheme for security and privacy of consumer iot. IEEE Trans Consum Electron 71(2):6340\u20136347","journal-title":"IEEE Trans Consum Electron"},{"issue":"7","key":"2155_CR47","doi-asserted-by":"publisher","first-page":"1655","DOI":"10.1109\/TC.2021.3099723","volume":"71","author":"J Zhang","year":"2021","unstructured":"Zhang J, Guo S, Qu Z, Zeng D, Zhan Y, Liu Q, Akerkar R (2021) Adaptive federated learning on non-iid data with resource constraint. IEEE Trans Comput 71(7):1655\u20131667","journal-title":"IEEE Trans Comput"},{"key":"2155_CR48","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (2015) Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS). IEEE, pp 1\u20136","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"2155_CR49","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistic distributed denial of service (ddos) attack dataset and taxonomy. In: 2019 International Carnahan Conference on Security Technology (ICCST). IEEE, pp 1\u20138","DOI":"10.1109\/CCST.2019.8888419"},{"key":"2155_CR50","doi-asserted-by":"crossref","unstructured":"Singh P, Pankaj A, Mitra R et al (2021) Edge-detect: edge-centric network intrusion detection using deep neural network. In: 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC). IEEE, pp 1\u20136","DOI":"10.1109\/CCNC49032.2021.9369469"},{"key":"2155_CR51","doi-asserted-by":"crossref","unstructured":"Wu P, Moustafa N, Yang S, Guo H (2020) Densely connected residual network for attack recognition. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, pp 233\u2013242","DOI":"10.1109\/TrustCom50675.2020.00042"},{"issue":"1","key":"2155_CR52","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1186\/s40537-020-00379-6","volume":"7","author":"SM Kasongo","year":"2020","unstructured":"Kasongo SM, Sun Y (2020) Performance analysis of intrusion detection systems using a feature selection method on the unsw-nb15 dataset. J Big Data 7(1):105","journal-title":"J Big Data"},{"key":"2155_CR53","doi-asserted-by":"publisher","first-page":"142206","DOI":"10.1109\/ACCESS.2021.3120626","volume":"9","author":"AR Gad","year":"2021","unstructured":"Gad AR, Nashat AA, Barkat TM (2021) Intrusion detection system using machine learning for vehicular ad hoc networks based on ton-iot dataset. IEEE Access 9:142206\u2013142217","journal-title":"IEEE Access"},{"key":"2155_CR54","doi-asserted-by":"publisher","first-page":"103597","DOI":"10.1016\/j.cose.2023.103597","volume":"137","author":"R Doriguzzi-Corin","year":"2024","unstructured":"Doriguzzi-Corin R, Siracusa D (2024) Flad: adaptive federated learning for ddos attack detection. Comput Secur 137:103597","journal-title":"Comput Secur"},{"key":"2155_CR55","doi-asserted-by":"crossref","unstructured":"Nguyen T-A, Le LT, Nguyen TD, Bao W, Seneviratne S, Hong CS, Tran NH (2024) Federated pca on grassmann manifold for iot anomaly detection. IEEE\/ACM Trans Netw","DOI":"10.1109\/TNET.2024.3423780"},{"key":"2155_CR56","doi-asserted-by":"crossref","unstructured":"Zhang X, Zhao R, Jiang Z, Chen H, Ding Y, Ngai EC, Yang S-H (2024) Continual learning with strategic selection and forgetting for network intrusion detection. arXiv:2412.16264","DOI":"10.1109\/INFOCOM55648.2025.11044615"},{"key":"2155_CR57","doi-asserted-by":"crossref","unstructured":"Zhang X, Zhao R, Jiang Z, Sun Z, Ding Y, Ngai ECH, Yang S-H (2024) Aoc-ids: Autonomous online framework with contrastive learning for intrusion detection. In: IEEE INFOCOM 2024 - IEEE Conference on Computer Communications, pp 581\u2013590","DOI":"10.1109\/INFOCOM52122.2024.10621346"},{"key":"2155_CR58","doi-asserted-by":"crossref","unstructured":"Jahin MA, Soudeep S, Farid FA, Mridha MF, Kabir R, Islam MR, Karim HA (2025) Cagn-gat fusion: A hybrid contrastive attentive graph neural network for network intrusion detection. In: Fujita H, Watanobe Y, Ali M, Wang Y (eds) Advances and trends in artificial intelligence. Theory and applications. Springer, Singapore, pp 415\u2013428","DOI":"10.1007\/978-981-96-8892-0_35"},{"key":"2155_CR59","doi-asserted-by":"publisher","first-page":"114520","DOI":"10.1016\/j.eswa.2020.114520","volume":"169","author":"AE Cil","year":"2021","unstructured":"Cil AE, Yildiz K, Buldu A (2021) Detection of ddos attacks with feed forward based deep neural network model. Expert Syst Appl 169:114520","journal-title":"Expert Syst Appl"},{"key":"2155_CR60","doi-asserted-by":"crossref","unstructured":"Castro F, Impedovo D, Pirlo G (2025) An efficient and privacy-preserving federated learning approach based on homomorphic encryption. IEEE Open J Comput Soc","DOI":"10.1109\/OJCS.2025.3536562"},{"issue":"2","key":"2155_CR61","first-page":"100048","volume":"1","author":"O Thorat","year":"2021","unstructured":"Thorat O, Parekh N, Mangrulkar R (2021) Taxodacml: Taxonomy based divide and conquer using machine learning approach for ddos attack classification. Int J Inf Manag Data Insights 1(2):100048","journal-title":"Int J Inf Manag Data Insights"},{"issue":"1","key":"2155_CR62","doi-asserted-by":"publisher","first-page":"13098","DOI":"10.1038\/s41598-024-84879-y","volume":"15","author":"S Abiramasundari","year":"2025","unstructured":"Abiramasundari S, Ramaswamy V (2025) Distributed denial-of-service (ddos) attack detection using supervised machine learning algorithms. Sci Rep 15(1):13098","journal-title":"Sci Rep"},{"key":"2155_CR63","doi-asserted-by":"crossref","unstructured":"Saluja K, Bagchi S, Solanki V, Khan MNA, Dhamija E, Debnath SK (2024) Exploring robust ddos detection: a machine learning analysis with the cicddos2019 dataset. In: 2024 IEEE 5th India Council International Subsections Conference (INDISCON). IEEE, pp 1\u20136","DOI":"10.1109\/INDISCON62179.2024.10744272"},{"key":"2155_CR64","doi-asserted-by":"crossref","unstructured":"Hussain F, Abbas SG, Husnain M, Fayyaz UU, Shahzad F, Shah GA (2020) Iot dos and ddos attack detection using resnet. In: 2020 IEEE 23rd International Multitopic Conference (INMIC). IEEE, pp 1\u20136","DOI":"10.1109\/INMIC50486.2020.9318216"},{"key":"2155_CR65","doi-asserted-by":"publisher","first-page":"2420","DOI":"10.1016\/j.procs.2023.01.217","volume":"218","author":"D Kumar","year":"2023","unstructured":"Kumar D, Pateriya R, Gupta RK, Dehalwar V, Sharma A (2023) Ddos detection using deep learning. Procedia Comput Sci 218:2420\u20132429","journal-title":"Procedia Comput Sci"},{"issue":"4","key":"2155_CR66","doi-asserted-by":"publisher","first-page":"395","DOI":"10.30630\/joiv.5.4.734","volume":"5","author":"MAH Azmi","year":"2021","unstructured":"Azmi MAH, Foozy CFM, Sukri KAM, Abdullah NA, Hamid IRA, Amnur H (2021) Feature selection approach to detect ddos attack using machine learning algorithms. JOIV: Int J Inform Visualization 5(4):395\u2013401","journal-title":"JOIV: Int J Inform Visualization"},{"issue":"2","key":"2155_CR67","doi-asserted-by":"publisher","first-page":"101975","DOI":"10.1016\/j.jksuci.2024.101975","volume":"36","author":"Y Xie","year":"2024","unstructured":"Xie Y, Chen H (2024) A novel method for effective intrusion detection based on convolutional speaking neural networks. J King Saud Univ - Comput Inf Sci 36(2):101975","journal-title":"J King Saud Univ - Comput Inf Sci"},{"key":"2155_CR68","doi-asserted-by":"crossref","unstructured":"Narmadha D et al (2024) Detection of distributed denial of service attack on controller in software defined network. In: 2024 IEEE International Conference on Smart Power Control and Renewable Energy (ICSPCRE). IEEE, pp 1\u20136","DOI":"10.1109\/ICSPCRE62303.2024.10675161"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02155-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02155-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02155-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T12:19:01Z","timestamp":1773145141000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02155-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,11]]},"references-count":68,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["2155"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02155-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,11]]},"assertion":[{"value":"27 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest related to the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"All authors have read and approved the final manuscript and unanimously agree to its publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"Not applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"25"}}