{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T04:36:44Z","timestamp":1770525404003,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T00:00:00Z","timestamp":1770422400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T00:00:00Z","timestamp":1770422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100015322","name":"Instituto Polit\u00e9cnico de Bragan\u00e7a","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100015322","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-026-04750-x","type":"journal-article","created":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T07:26:24Z","timestamp":1770449184000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Cloud-Driven Support Layer for Enhancing Distributed IDS in IoT Networks"],"prefix":"10.1007","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9691-9956","authenticated-orcid":false,"given":"Gustavo","family":"Funchal","sequence":"first","affiliation":[]},{"given":"Tiago","family":"Pedrosa","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"De la Prieta","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Leit\u00e3o","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,7]]},"reference":[{"key":"4750_CR1","doi-asserted-by":"publisher","unstructured":"Morenas J, Silva CM, Funchal GS, Melo V, Vallim M, Leitao P. Security experiences in iot based applications for building and factory automation. in 2020 IEEE International Conference on Industrial Technology (ICIT), pp. 322\u20137 (2020). https:\/\/doi.org\/10.1109\/ICIT45562.2020.9067229","DOI":"10.1109\/ICIT45562.2020.9067229"},{"issue":"6","key":"4750_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCOM.2017.1601039","volume":"55","author":"R Cziva","year":"2017","unstructured":"Cziva R, Pezaros DP. Container network functions bringing: nfv to the network edge. IEEE Commun Mag. 2017;55(6):24\u201331. https:\/\/doi.org\/10.1109\/MCOM.2017.1601039.","journal-title":"IEEE Commun Mag"},{"issue":"5","key":"4750_CR3","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi W, Cao J, Zhang Q, Li Y, Xu L. Edge computing: vision and challenges. IEEE Internet Things J. 2016;3(5):637\u201346. https:\/\/doi.org\/10.1109\/JIOT.2016.2579198.","journal-title":"IEEE Internet Things J"},{"key":"4750_CR4","doi-asserted-by":"publisher","unstructured":"Hamouda D, Ferrag M.A, Benhamida N, Seridi H. Intrusion detection systems for industrial internet of things: a survey. in 2021 ICTAACS (2021). https:\/\/doi.org\/10.1109\/ICTAACS53298.2021.9715177","DOI":"10.1109\/ICTAACS53298.2021.9715177"},{"key":"4750_CR5","doi-asserted-by":"publisher","unstructured":"Funchal G, Pedrosa T, Prieta FDL, Leitao P. Edge multi-agent intrusion detection system architecture for IoT devices with cloud continuum. in 2024 IEEE 7th ICPS (2024). https:\/\/doi.org\/10.1109\/ICPS59941.2024.10639952","DOI":"10.1109\/ICPS59941.2024.10639952"},{"key":"4750_CR6","doi-asserted-by":"crossref","unstructured":"Funchal G, Pedrosa T, Prieta F, Leit\u00e3o P. Distributed machine learning and multi-agent systems for enhanced attack detection and resilience in iot networks. in Proceedings of the 11th international conference on information systems security and privacy, pp. 192\u2013203. SCITEPRESS - Science and Technology Publications, Porto, Portugal (2025)","DOI":"10.5220\/0013154400003899"},{"key":"4750_CR7","doi-asserted-by":"publisher","unstructured":"Alsboui T, Qin Y, Hill R, Al-Aqrabi H. Distributed intelligence in the internet of things: challenges and opportunities. SN Comput Sci. 2(4) (2021). https:\/\/doi.org\/10.1007\/s42979-021-00677-7","DOI":"10.1007\/s42979-021-00677-7"},{"key":"4750_CR8","doi-asserted-by":"publisher","unstructured":"Kong L, Tan J, Huang J, Chen G, Wang S, Jin X, et al. Edge-computing-driven Internet of Things A Survey. ACM Computing Surveys 2022;55(8):1\u201341. https:\/\/doi.org\/10.1145\/3555308.","DOI":"10.1145\/3555308"},{"issue":"10","key":"4750_CR9","doi-asserted-by":"publisher","first-page":"3744","DOI":"10.3390\/s22103744","volume":"22","author":"E Gyamfi","year":"2022","unstructured":"Gyamfi E, Jurcut A. Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets. Sensors. 2022;22(10):3744. https:\/\/doi.org\/10.3390\/s22103744.","journal-title":"Sensors"},{"issue":"5","key":"4750_CR10","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi W, Cao J, Zhang Q, Li Y, Xu L. Edge computing: vision and challenges. IEEE Internet Things J. 2016;3(5):637\u201346. https:\/\/doi.org\/10.1109\/JIOT.2016.2579198.","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"4750_CR11","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1007\/s11277-023-10669-w","volume":"132","author":"NM Quy","year":"2023","unstructured":"Quy NM, Ngoc LA, Ban NT, Hau NV, Quy VK. Edge computing for real-time Internet of Things applications: future internet revolution. Wireless Pers Commun. 2023;132(2):1423\u201352.","journal-title":"Wireless Pers Commun"},{"issue":"4","key":"4750_CR12","doi-asserted-by":"publisher","first-page":"2271","DOI":"10.1109\/TNSE.2019.2941754","volume":"7","author":"S Ghosh","year":"2020","unstructured":"Ghosh S, Mukherjee A, Ghosh SK, Buyya R. Mobi-IoST: mobility-aware cloud-fog-edge-iot collaborative framework for time-critical applications. IEEE Trans Netw Sci Eng. 2020;7(4):2271\u201385. https:\/\/doi.org\/10.1109\/TNSE.2019.2941754.","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"4750_CR13","doi-asserted-by":"crossref","unstructured":"Wang H, Liu T, Kim B, Lin C, Shiraishi S, Xie JL, Han Z. Architectural design alternatives based on cloud\/edge\/fog computing for connected vehicles. CoRR abs\/2009.12509 (2020)","DOI":"10.1109\/COMST.2020.3020854"},{"key":"4750_CR14","doi-asserted-by":"publisher","first-page":"178942","DOI":"10.1109\/ACCESS.2019.2957749","volume":"7","author":"R Xie","year":"2019","unstructured":"Xie R, Tang Q, Wang Q, Liu X, Yu FR, Huang T. Collaborative vehicular edge computing networks: architecture design and research challenges. IEEE Access. 2019;7:178942\u201352. https:\/\/doi.org\/10.1109\/ACCESS.2019.2957749.","journal-title":"IEEE Access"},{"key":"4750_CR15","doi-asserted-by":"publisher","unstructured":"Qadir J, Sainz-De-Abajo B, Khan A, Garc\u00eda-Zapirain B, De\u00a0La\u00a0Torre-D\u00edez I, Mahmood H. Towards mobile edge computing: taxonomy, challenges, applications and future realms. IEEE Access 8, 189129\u2013189162 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3026938","DOI":"10.1109\/ACCESS.2020.3026938"},{"key":"4750_CR16","unstructured":"IEEE Computer Society: Cloud Continuum, Volume 2, Number 1 (2022)"},{"key":"4750_CR17","unstructured":"Dell Technologies: Edge to Cloud Continuum Overview. https:\/\/infohub.delltechnologies.com\/it-it\/l\/integrated-edge-management-in-smart-manufacturing-white-paper-1\/edge-to-cloud-continuum-overview\/. White paper (2022)"},{"key":"4750_CR18","doi-asserted-by":"publisher","unstructured":"Duan J, Zhang S, Wang Z, Jiang L, Qu W, Hu Q, Wang G, Weng Q, Yan H, Zhang X, Qiu X, Lin D, Wen Y, Jin X, Zhang T, Sun P. Efficient training of large language models on distributed infrastructures: a survey. arXiv (2024). https:\/\/doi.org\/10.48550\/ARXIV.2407.20018","DOI":"10.48550\/ARXIV.2407.20018"},{"key":"4750_CR19","unstructured":"Khouas A.R, Bouadjenek M.R, Hacid H, Aryal S. Training machine learning models at the edge: a survey (2024). arXiv:2403.02619"},{"key":"4750_CR20","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/j.future.2022.01.013","volume":"131","author":"C Mwase","year":"2022","unstructured":"Mwase C, Jin Y, Westerlund T, Tenhunen H, Zou Z. Communication-efficient distributed AI strategies for the IoT edge. Future Gener Comput Syst. 2022;131:292\u2013308. https:\/\/doi.org\/10.1016\/j.future.2022.01.013.","journal-title":"Future Gener Comput Syst"},{"key":"4750_CR21","doi-asserted-by":"crossref","unstructured":"Wang YE, Wu C-J, Wang X, Hazelwood K, Brooks D. Exploiting parallelism opportunities with deep learning frameworks (2020). arXiv:1908.04705","DOI":"10.1145\/3431388"},{"key":"4750_CR22","unstructured":"Jia Z, Zaharia M, Aiken A. Beyond data and model parallelism for deep neural networks (2018). arXiv:1807.05358"},{"key":"4750_CR23","unstructured":"Mirhoseini A, Pham H, Le Q.V, Steiner B, Larsen R, Zhou Y, Kumar N, Norouzi M, Bengio S, Dean J. Device placement optimization with reinforcement learning (2017). arXiv:1706.04972"},{"key":"4750_CR24","doi-asserted-by":"publisher","unstructured":"Zhou Z-H. Ensemble learning, pp. 181\u2013210. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-1967-3_8","DOI":"10.1007\/978-981-15-1967-3_8"},{"key":"4750_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.iswa.2023.200189","volume":"17","author":"N Prazeres","year":"2023","unstructured":"Prazeres N, Costa RL, Santos L, Rabad\u00e3o C. Engineering the application of machine learning in an IDS based on IoT traffic flow. Intell Syst Appl. 2023;17:200189. https:\/\/doi.org\/10.1016\/j.iswa.2023.200189.","journal-title":"Intell Syst Appl"},{"key":"4750_CR26","doi-asserted-by":"publisher","unstructured":"Berman DS, Buczak AL, Chavis JS, Corbett CL. A survey of deep learning methods for cyber security. Information 10(4) (2019). https:\/\/doi.org\/10.3390\/info10040122","DOI":"10.3390\/info10040122"},{"issue":"4","key":"4750_CR27","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s11416-022-00456-9","volume":"19","author":"M Mohy-eddine","year":"2022","unstructured":"Mohy-eddine M, Guezzaz A, Benkirane S, Azrour M. An effective intrusion detection approach based on ensemble learning for IIoT edge computing. J Comput Virol Hack Tech. 2022;19(4):469\u201381. https:\/\/doi.org\/10.1007\/s11416-022-00456-9.","journal-title":"J Comput Virol Hack Tech"},{"key":"4750_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109724","volume":"228","author":"R Yang","year":"2023","unstructured":"Yang R, He H, Xu Y, Xin B, Wang Y, Qu Y, et al. Efficient intrusion detection toward IoT networks using cloud-edge collaboration. Comput Netw. 2023;228:109724. https:\/\/doi.org\/10.1016\/j.comnet.2023.109724.","journal-title":"Comput Netw"},{"key":"4750_CR29","unstructured":"Wooldridge M. An introduction to MultiAgent systems. Wiley, Chichester, UK (2009). https:\/\/books.google.pt\/books?id=X3ZQ7yeDn2IC"},{"key":"4750_CR30","doi-asserted-by":"publisher","unstructured":"Queiroz J, Leit\u00e3o P, Barbosa J, Oliveira E. Distributing intelligence among cloud, fog and edge in industrial cyber-physical systems. in Proceedings of the 16th ICINCO. SCITEPRESS - Science and Technology Publications, Prague, Czech Republic (2019). https:\/\/doi.org\/10.5220\/0007979404470454","DOI":"10.5220\/0007979404470454"},{"issue":"7","key":"4750_CR31","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1016\/j.engappai.2008.09.005","volume":"22","author":"P Leit\u00e3o","year":"2009","unstructured":"Leit\u00e3o P. Agent-based distributed manufacturing control: a state-of-the-art survey. Eng Appl Artif Intell. 2009;22(7):979\u201391. https:\/\/doi.org\/10.1016\/j.engappai.2008.09.005.","journal-title":"Eng Appl Artif Intell."},{"key":"4750_CR32","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.compind.2015.08.004","volume":"81","author":"P Leit\u00e3o","year":"2016","unstructured":"Leit\u00e3o P, Colombo AW, Karnouskos S. Industrial automation based on cyber-physical systems technologies: prototype implementations and challenges. Comput Ind. 2016;81:11\u201325. https:\/\/doi.org\/10.1016\/j.compind.2015.08.004.","journal-title":"Comput Ind"},{"key":"4750_CR33","doi-asserted-by":"publisher","first-page":"2586","DOI":"10.1016\/j.procs.2025.01.318","volume":"253","author":"N Ali","year":"2025","unstructured":"Ali N, Aloi G, De Rango F, Savaglio C, Gravina R. Edge-cloud continuum driven industry 4.0. Procedia Comput Sci. 2025;253:2586\u201394. https:\/\/doi.org\/10.1016\/j.procs.2025.01.318.","journal-title":"Procedia Comput Sci"},{"key":"4750_CR34","doi-asserted-by":"publisher","unstructured":"Neto ECP, Dadkhah S, Ferreira R, Zohourian A, Lu R, Ghorbani AA. CICIoT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors 23(13) (2023). https:\/\/doi.org\/10.3390\/s23135941","DOI":"10.3390\/s23135941"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04750-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-026-04750-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04750-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T07:26:27Z","timestamp":1770449187000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-026-04750-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,7]]},"references-count":34,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,2]]}},"alternative-id":["4750"],"URL":"https:\/\/doi.org\/10.1007\/s42979-026-04750-x","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,7]]},"assertion":[{"value":"4 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We hereby declare that we have no conflict of interest to disclose, whether financial or non-financial, that are directly or indirectly related to the work presented in this paper. We confirm that there are no personal, professional, or commercial affiliations that may influence or bias the content of this manuscript. This declaration is made to ensure transparency and integrity in the publication process.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human and\/or Animals"}}],"article-number":"186"}}