{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:30:52Z","timestamp":1776101452307,"version":"3.50.1"},"reference-count":67,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T00:00:00Z","timestamp":1773360000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004895","name":"European Social Fund Plus","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004895","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014440","name":"Espana Ministerio de Ciencia Innovacion y Universidades","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100014440","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007480","name":"Universidad de Castilla-La Mancha","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007480","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013410","name":"Instituto Nacional de Ciberseguridad","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013410","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["MCIN\/AEI\/10.13039\/501100011033"],"award-info":[{"award-number":["MCIN\/AEI\/10.13039\/501100011033"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["TED2021-131115A-I00"],"award-info":[{"award-number":["TED2021-131115A-I00"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011698","name":"Regional Government of Castilla-La Mancha","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011698","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.comnet.2026.112205","type":"journal-article","created":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T16:14:29Z","timestamp":1773504869000},"page":"112205","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Hybrid clustering-guided federated learning for robust intrusion detection in highly heterogeneous IoT environments"],"prefix":"10.1016","volume":"281","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-3852-6313","authenticated-orcid":false,"given":"Luis Miguel","family":"Garc\u00eda-S\u00e1ez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1063-7000","authenticated-orcid":false,"given":"Sergio","family":"Ruiz-Villafranca","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5787-1294","authenticated-orcid":false,"given":"Jos\u00e9","family":"Rold\u00e1n-G\u00f3mez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8371-4305","authenticated-orcid":false,"given":"Javier","family":"Carrillo-Mond\u00e9jar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5119-2418","authenticated-orcid":false,"given":"Jos\u00e9 Luis","family":"Mart\u00ednez","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2026.112205_bib0001","doi-asserted-by":"crossref","DOI":"10.1016\/j.cie.2021.107174","article-title":"The evolution of the internet of things (IoT) over the past 20 years","volume":"155","author":"Wang","year":"2021","journal-title":"Computers Industr. Eng."},{"issue":"4","key":"10.1016\/j.comnet.2026.112205_bib0002","doi-asserted-by":"crossref","first-page":"1174","DOI":"10.3390\/s21041174","article-title":"Next-generation internet of things (IoT): opportunities, challenges, and solutions","volume":"21","author":"Zikria","year":"2021","journal-title":"Sensors"},{"issue":"19","key":"10.1016\/j.comnet.2026.112205_bib0003","doi-asserted-by":"crossref","first-page":"7433","DOI":"10.3390\/s22197433","article-title":"Internet of things: security and solutions survey","volume":"22","author":"Sadhu","year":"2022","journal-title":"Sensors"},{"issue":"5","key":"10.1016\/j.comnet.2026.112205_bib0004","article-title":"Security in the IoT: state-of-the-art, issues, solutions, and challenges","volume":"14","author":"Srhir","year":"2023","journal-title":"Int. J. Adv. Computer Sci. Appl. (IJACSA)"},{"key":"10.1016\/j.comnet.2026.112205_bib0005","series-title":"2022 IEEE World AI IoT Congress (AIIoT)","first-page":"725","article-title":"An evaluation of IoT DDos cryptojacking malware and mirai botnet","author":"Borys","year":"2022"},{"issue":"1","key":"10.1016\/j.comnet.2026.112205_bib0006","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/IOTM.001.2100183","article-title":"Evolution of IoT security: the era of smart attacks","volume":"5","author":"Bout","year":"2022","journal-title":"IEEE Internet of Things Magazine"},{"issue":"3","key":"10.1016\/j.comnet.2026.112205_bib0007","doi-asserted-by":"crossref","first-page":"164","DOI":"10.3390\/info15030164","article-title":"A comparison of neural-network-based intrusion detection against signature-based detection in IoT networks","volume":"15","author":"Schr\u00f6tter","year":"2024","journal-title":"Information"},{"issue":"1","key":"10.1016\/j.comnet.2026.112205_bib0008","article-title":"A review of security and privacy concerns in the internet of things (IoT)","volume":"2022","author":"Aqeel","year":"2022","journal-title":"J. Sensors"},{"issue":"2","key":"10.1016\/j.comnet.2026.112205_bib0009","first-page":"31:1","article-title":"When machine learning meets privacy: a survey and outlook","volume":"54","author":"Liu","year":"2021","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"10.1016\/j.comnet.2026.112205_bib0010","article-title":"A systematic review of centralized and decentralized machine learning models: security concerns, defenses and future directions","volume":"6","author":"Samuel","year":"2024","journal-title":"NIPES - Journal of Science and Technology Research"},{"issue":"10","key":"10.1016\/j.comnet.2026.112205_bib0011","doi-asserted-by":"crossref","first-page":"4802","DOI":"10.1109\/TNNLS.2017.2771290","article-title":"A systematic study of online class imbalance learning with concept drift","volume":"29","author":"Wang","year":"2018","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"11","key":"10.1016\/j.comnet.2026.112205_bib0012","doi-asserted-by":"crossref","first-page":"19188","DOI":"10.1109\/JIOT.2024.3376548","article-title":"Federated learning with non-IID data: a survey","volume":"11","author":"Lu","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"10.1016\/j.comnet.2026.112205_bib0013","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/s13042-022-01647-y","article-title":"A survey on federated learning: challenges and applications","volume":"14","author":"Wen","year":"2023","journal-title":"Int. J. Mach. Learn. Cybern."},{"issue":"3","key":"10.1016\/j.comnet.2026.112205_bib0014","doi-asserted-by":"crossref","first-page":"1622","DOI":"10.1109\/COMST.2021.3075439","article-title":"Federated learning for internet of things: a comprehensive survey","volume":"23","author":"Nguyen","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"12","key":"10.1016\/j.comnet.2026.112205_bib0015","doi-asserted-by":"crossref","first-page":"309:1","DOI":"10.1145\/3731596","article-title":"Intrusion detection based on federated learning: a systematic review","volume":"57","author":"Hernandez-Ramos","year":"2025","journal-title":"ACM Comput. Surv."},{"issue":"3","key":"10.1016\/j.comnet.2026.112205_bib0016","first-page":"79:1","article-title":"Heterogeneous federated learning: state-of-the-art and research challenges","volume":"56","author":"Ye","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.comnet.2026.112205_bib0017","series-title":"Advances in Neural Information Processing Systems","first-page":"7611","article-title":"Tackling the objective inconsistency problem in heterogeneous federated optimization","volume":"33","author":"Wang","year":"2020"},{"key":"10.1016\/j.comnet.2026.112205_bib0018","unstructured":"T.-M. H. Hsu, H. Qi, M. Brown, Measuring the Effects of Non-Identical Data Distribution for Federated Visual Classification, 2019, 10.48550\/arXiv.1909.06335."},{"key":"10.1016\/j.comnet.2026.112205_bib0019","series-title":"Proceedings 2018 Network and Distributed System Security Symposium","article-title":"Kitsune: an ensemble of autoencoders for online network intrusion detection","author":"Mirsky","year":"2018"},{"key":"10.1016\/j.comnet.2026.112205_bib0020","doi-asserted-by":"crossref","unstructured":"Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, D. Breitenbacher, A. Shabtai, Y. Elovici, N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders, IEEE Pervasive Comput. 17(3) (2018) 12\u201322. http:\/\/arxiv.org\/abs\/1805.03409. 10.1109\/MPRV.2018.03367731.","DOI":"10.1109\/MPRV.2018.03367731"},{"issue":"3","key":"10.1016\/j.comnet.2026.112205_bib0021","doi-asserted-by":"crossref","first-page":"509","DOI":"10.3390\/ai4030028","article-title":"Federated learning for IoT intrusion detection","volume":"4","author":"Lazzarini","year":"2023","journal-title":"AI"},{"key":"10.1016\/j.comnet.2026.112205_bib0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108661","article-title":"Evaluating federated learning for intrusion detection in internet of things: review and challenges","volume":"203","author":"Campos","year":"2022","journal-title":"Comput. Networks"},{"issue":"1","key":"10.1016\/j.comnet.2026.112205_bib0023","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/s43926-025-00169-7","article-title":"Federated learning for intrusion detection in IoT environments: a privacy-preserving strategy","volume":"5","author":"Khraisat","year":"2025","journal-title":"Discover Internet of Things"},{"key":"10.1016\/j.comnet.2026.112205_bib0024","series-title":"Proceedings of the 34th International Conference on Neural Information Processing Systems","first-page":"19586","article-title":"An efficient framework for clustered federated learning","author":"Ghosh","year":"2020"},{"issue":"8","key":"10.1016\/j.comnet.2026.112205_bib0025","doi-asserted-by":"crossref","first-page":"3710","DOI":"10.1109\/TNNLS.2020.3015958","article-title":"Clustered federated learning: model-agnostic distributed multitask optimization under privacy constraints","volume":"32","author":"Sattler","year":"2021","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.comnet.2026.112205_bib0026","unstructured":"E.S. Lubana, C.I. Tang, F. Kawsar, R.P. Dick, A. Mathur, Orchestra: Unsupervised Federated Learning via Globally Consistent Clustering, 2022, 10.48550\/arXiv.2205.11506."},{"key":"10.1016\/j.comnet.2026.112205_bib0027","doi-asserted-by":"crossref","unstructured":"B.G. de Carvalho, L.A.P. Junior, A.L.d. Santos, O. Saotome, Generalizing intrusion detection for heterogeneous networks: A stacked-unsupervised federated learning approach, Computers Secur. 127(2023) 103106. arXiv: 2209.00721\">arXiv: 2209.00721, 10.1016\/j.cose.2023.103106.","DOI":"10.1016\/j.cose.2023.103106"},{"key":"10.1016\/j.comnet.2026.112205_bib0028","unstructured":"T. Wei, B. Mei, J. Lyu, R. Zhang, F. Zhou, Y. Sun, Personalized Bayesian Federated Learning with Wasserstein Barycenter Aggregation, 2025, 10.48550\/arXiv.2505.14161."},{"issue":"1","key":"10.1016\/j.comnet.2026.112205_bib0029","doi-asserted-by":"crossref","first-page":"18","DOI":"10.3390\/fi17010018","article-title":"Hierarchical aggregation for federated learning in heterogeneous IoT scenarios: enhancing privacy and communication efficiency","volume":"17","author":"Qiu","year":"2025","journal-title":"Future Internet"},{"issue":"1","key":"10.1016\/j.comnet.2026.112205_bib0030","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s12083-024-01869-7","article-title":"Heterogeneity-aware device selection for clustered federated learning in IoT","volume":"18","author":"Zhang","year":"2024","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"5","key":"10.1016\/j.comnet.2026.112205_bib0031","doi-asserted-by":"crossref","first-page":"8090","DOI":"10.1109\/JIOT.2023.3319986","article-title":"Handling data heterogeneity for IoT devices in federated learning: a knowledge fusion approach","volume":"11","author":"Zhou","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"10.1016\/j.comnet.2026.112205_bib0032","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1002\/asmb.870","article-title":"Information measures of Dirichlet distribution with applications","volume":"27","author":"Ebrahimi","year":"2011","journal-title":"Appl. Stoch. Models Bus. Ind."},{"issue":"3","key":"10.1016\/j.comnet.2026.112205_bib0033","doi-asserted-by":"crossref","first-page":"923","DOI":"10.1007\/s10844-023-00797-x","article-title":"A review of federated learning: taxonomy, privacy and future directions","volume":"61","author":"Ratnayake","year":"2023","journal-title":"J. Intell. Inf. Syst."},{"key":"10.1016\/j.comnet.2026.112205_bib0034","series-title":"Proceedings of the 19th International Conference on World Wide Web","first-page":"1177","article-title":"Web-scale k-means clustering","author":"Sculley","year":"2010"},{"issue":"1","key":"10.1016\/j.comnet.2026.112205_bib0035","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum likelihood from incomplete data via the EM algorithm","volume":"39","author":"Dempster","year":"1977","journal-title":"J. R. Stat. Soc. Ser. B (Methodological)"},{"issue":"2","key":"10.1016\/j.comnet.2026.112205_bib0036","doi-asserted-by":"crossref","first-page":"788","DOI":"10.2307\/2532178","article-title":"Review of finding groups in data: an introduction to cluster analysis","volume":"47","author":"Gentle","year":"1991","journal-title":"Biometrics"},{"key":"10.1016\/j.comnet.2026.112205_bib0037","series-title":"Proceedings of the Second International Conference on Knowledge Discovery and Data Mining","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","author":"Ester","year":"1996"},{"key":"10.1016\/j.comnet.2026.112205_bib0038","series-title":"Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Statistics","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","volume":"5.1","author":"MacQueen","year":"1967"},{"key":"10.1016\/j.comnet.2026.112205_bib0039","series-title":"Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms","first-page":"1027","article-title":"k-means++: the advantages of careful seeding","author":"Arthur","year":"2007"},{"issue":"2","key":"10.1016\/j.comnet.2026.112205_bib0040","first-page":"62","article-title":"A survey on clustering algorithms and complexity analysis","volume":"12","author":"Firdaus","year":"2015","journal-title":"Int. J. Computer Sci. Issues (IJCSI)"},{"key":"10.1016\/j.comnet.2026.112205_bib0041","series-title":"Advances in Knowledge Discovery and Data Mining","first-page":"160","article-title":"Density-based clustering based on hierarchical density estimates","author":"Campello","year":"2013"},{"key":"10.1016\/j.comnet.2026.112205_bib0042","doi-asserted-by":"crossref","first-page":"87918","DOI":"10.1109\/ACCESS.2021.3089036","article-title":"Comparative analysis review of pioneering DBSCAN and successive density-based clustering algorithms","volume":"9","author":"Bushra","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2026.112205_bib0043","series-title":"Applied Data Science in Tourism: Interdisciplinary Approaches, Methodologies, and Applications","first-page":"129","article-title":"Clustering","author":"Fuchs","year":"2022"},{"issue":"5","key":"10.1016\/j.comnet.2026.112205_bib0044","doi-asserted-by":"crossref","first-page":"3962","DOI":"10.1109\/JIOT.2021.3102056","article-title":"X-IIoTID: a connectivity-agnostic and device-agnostic intrusion data set for industrial internet of things","volume":"9","author":"Al-Hawawreh","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"10.1016\/j.comnet.2026.112205_bib0045","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1186\/s42400-023-00178-5","article-title":"Quantized autoencoder (QAE) intrusion detection system for anomaly detection in resource-constrained IoT devices using RT-IoT2022 dataset","volume":"6","author":"Sharmila","year":"2023","journal-title":"Cybersecurity"},{"key":"10.1016\/j.comnet.2026.112205_bib0046","doi-asserted-by":"crossref","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","article-title":"Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIot applications for centralized and federated learning","volume":"10","author":"Ferrag","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2026.112205_bib0047","series-title":"A Primer on Statistical Distributions","first-page":"269","article-title":"Dirichlet distribution","author":"Balakrishnan","year":"2003"},{"key":"10.1016\/j.comnet.2026.112205_bib0048","series-title":"Integrating Advanced Technologies for Enhanced Security and Efficiency","first-page":"63","article-title":"Federated threat detection with Dirichlet distribution","author":"Chatterjee","year":"2025"},{"key":"10.1016\/j.comnet.2026.112205_bib0049","series-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"key":"10.1016\/j.comnet.2026.112205_bib0050","series-title":"Proceedings of Machine Learning and Systems","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume":"2","author":"Li","year":"2020"},{"key":"10.1016\/j.comnet.2026.112205_bib0051","series-title":"Adaptive federated optimization","author":"Reddi","year":"2021"},{"key":"10.1016\/j.comnet.2026.112205_bib0052","series-title":"Proceedings of the 37th International Conference on Machine Learning","first-page":"5132","article-title":"SCAFFOLD: Stochastic controlled averaging for federated learning","author":"Karimireddy","year":"2020"},{"key":"10.1016\/j.comnet.2026.112205_bib0053","article-title":"A survey on intrusion detection system in IoT networks","volume":"3","author":"Rahman","year":"2025","journal-title":"Cyber Secur. Appl."},{"issue":"4","key":"10.1016\/j.comnet.2026.112205_bib0054","doi-asserted-by":"crossref","first-page":"1981","DOI":"10.1007\/s11277-024-11260-7","article-title":"ABCNN-IDS: Attention-based convolutional neural network for intrusion detection in IoT networks","volume":"136","author":"Momand","year":"2024","journal-title":"Wireless Personal Commun."},{"key":"10.1016\/j.comnet.2026.112205_bib0055","first-page":"2825","article-title":"Scikit-learn: machine learning in python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"10.1016\/j.comnet.2026.112205_bib0056","doi-asserted-by":"crossref","first-page":"2","DOI":"10.3390\/fi18010002","article-title":"Federated learning-based intrusion detection in industrial IoT networks","volume":"18","author":"Pecherle","year":"2026","journal-title":"Future Internet"},{"issue":"1","key":"10.1016\/j.comnet.2026.112205_bib0057","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JIOT.2021.3095077","article-title":"A survey on federated learning for resource-constrained IoT devices","volume":"9","author":"Imteaj","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112205_bib0058","series-title":"Computer Security - ESORICS 2025","first-page":"103","article-title":"PROTEAN: federated intrusion detection in non-IID environments through prototype-based knowledge sharing","author":"Chennoufi","year":"2026"},{"key":"10.1016\/j.comnet.2026.112205_bib0059","series-title":"Proceedings of the 29th USENIX Conference on Security Symposium","first-page":"1623","article-title":"Local model poisoning attacks to byzantine-robust federated learning","author":"Fang","year":"2020"},{"key":"10.1016\/j.comnet.2026.112205_bib0060","series-title":"Proceedings of the 31th USENIX Conference on Security Symposium (USENIX Security 22)","first-page":"1415","article-title":"FLAME: Taming backdoors in federated learning","author":"Nguyen","year":"2022"},{"key":"10.1016\/j.comnet.2026.112205_bib0061","series-title":"Proceedings of the 36th International Conference on Machine Learning","first-page":"634","article-title":"Analyzing federated learning through an adversarial lens","author":"Bhagoji","year":"2019"},{"key":"10.1016\/j.comnet.2026.112205_bib0062","series-title":"The limitations of federated learning in sybil settings","first-page":"301","author":"Fung","year":"2020"},{"issue":"8","key":"10.1016\/j.comnet.2026.112205_bib0063","doi-asserted-by":"crossref","first-page":"10511","DOI":"10.1007\/s11227-023-05846-4","article-title":"Exploring privacy measurement in federated learning","volume":"80","author":"Jagarlamudi","year":"2024","journal-title":"J. Supercomput."},{"issue":"9","key":"10.1016\/j.comnet.2026.112205_bib0064","doi-asserted-by":"crossref","first-page":"310","DOI":"10.3390\/fi15090310","article-title":"Exploring homomorphic encryption and differential privacy techniques towards secure federated learning paradigm","volume":"15","author":"Aziz","year":"2023","journal-title":"Future Internet"},{"issue":"21","key":"10.1016\/j.comnet.2026.112205_bib0065","doi-asserted-by":"crossref","first-page":"34617","DOI":"10.1109\/JIOT.2024.3407584","article-title":"Decentralized federated learning: a survey and perspective","volume":"11","author":"Yuan","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"10.1016\/j.comnet.2026.112205_bib0066","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1109\/COMST.2023.3330910","article-title":"Federated learning and meta learning: approaches, applications, and directions","volume":"26","author":"Liu","year":"2024","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.comnet.2026.112205_bib0067","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2024.102576","article-title":"Multimodal federated learning: concept, methods, applications and future directions","volume":"112","author":"Huang","year":"2024","journal-title":"Inf. Fusion"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626002173?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626002173?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:40:08Z","timestamp":1776098408000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128626002173"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":67,"alternative-id":["S1389128626002173"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112205","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Hybrid clustering-guided federated learning for robust intrusion detection in highly heterogeneous IoT environments","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112205","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"112205"}}