{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T18:40:14Z","timestamp":1775673614669,"version":"3.50.1"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Union\u2019s Horizon 2020 Research and Innovation Program","doi-asserted-by":"publisher","award":["101021911"],"award-info":[{"award-number":["101021911"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002341","name":"Academy of Finland 6Genesis Flagship Program","doi-asserted-by":"publisher","award":["318927"],"award-info":[{"award-number":["318927"]}],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3327922","type":"journal-article","created":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T18:01:58Z","timestamp":1698343318000},"page":"121325-121339","source":"Crossref","is-referenced-by-count":18,"title":["Autonomous Federated Learning for Distributed Intrusion Detection Systems in Public Networks"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-3192-7711","authenticated-orcid":false,"given":"Alireza Bakhshi Zadi","family":"Mahmoodi","sequence":"first","affiliation":[{"name":"Faculty of Information Technology and Electrical Engineering, University of Oulu, Oulu, Finland"}]},{"given":"Saeid","family":"Sheikhi","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology and Electrical Engineering, University of Oulu, Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3374-671X","authenticated-orcid":false,"given":"Ella","family":"Peltonen","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology and Electrical Engineering, University of Oulu, Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8545-599X","authenticated-orcid":false,"given":"Panos","family":"Kostakos","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology and Electrical Engineering, University of Oulu, Oulu, Finland"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"ADFA Intrustion Detection Datasets","year":"2023"},{"key":"ref2","volume-title":"CDX Dataset","year":"2023"},{"key":"ref3","volume-title":"Center for Applied Internet Data Analysis","year":"2023"},{"key":"ref4","volume-title":"CIC DoS Dataset","year":"2023"},{"key":"ref5","volume-title":"ISCX Dataset","year":"2023"},{"key":"ref6","volume-title":"MAWI Datasets","year":"2023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972719.29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.09.012"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2019.01.006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4731953"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0040"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2018.8478898"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03738-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2018.11.013"},{"key":"ref16","first-page":"149","article-title":"The utilization of artificial intelligence in a hybrid intrusion detection system","volume-title":"Proc. Annu. Res. Conf. South Afr. Inst. Comput. Scientists Inf. Technologists Enablement Through Technol.","author":"Botha"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2023.3236543"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906980"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.09.014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102419"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICISSEC.2016.7885840"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2793284"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973730"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973219"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905633"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/s21206743"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899721"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461194"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.04.006"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148987"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2018.02.001"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3327922"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MSN53354.2021.00044"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2847722"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102994"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00100"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/65.283931"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.6169141"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11530-1_13"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2018.01.005"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"ref47","article-title":"6G white paper on edge intelligence","author":"Peltonen","year":"2020","journal-title":"arXiv:2004.14850"},{"key":"ref48","volume-title":"Network function virtualization (NFV) software-defined network (SDN) network-to-network interfaces (NNIs)","author":"Rajagopal","year":"2018"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20505-7_26"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978676"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.52953\/DGKO1067"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref55","first-page":"1231","article-title":"Corporate directors\u2019 and officers\u2019 cybersecurity standard of care: The Yahoo data breach","volume":"66","author":"Trautman","year":"2016","journal-title":"Amer. Univ. Law Rev."},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39945-3_6"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1728303"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.3390\/s22176623"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2903723"},{"key":"ref61","first-page":"1","article-title":"A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015","volume":"4","author":"\u00d6zg\u00fcr","year":"2016","journal-title":"PeerJ Preprints"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10296918.pdf?arnumber=10296918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T06:09:47Z","timestamp":1721282987000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10296918\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3327922","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}