{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:05:28Z","timestamp":1775837128701,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825993","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"4921-4929","source":"Crossref","is-referenced-by-count":4,"title":["Ensuring Security Continuum from Edge to Cloud : Adaptive Security for IoT-based Critical Infrastructures using FL at the Edge"],"prefix":"10.1109","author":[{"given":"Ismail","family":"Ari","sequence":"first","affiliation":[{"name":"Ozyegin University,Computer Engineering Department,Istanbul,Turkey"}]},{"given":"Kerem","family":"Balkan","sequence":"additional","affiliation":[{"name":"Ozyegin University,Computer Engineering Department,Istanbul,Turkey"}]},{"given":"Sandeep","family":"Pirbhulal","sequence":"additional","affiliation":[{"name":"Norwegian Computing Center,Oslo,Norway"}]},{"given":"Habtamu","family":"Abie","sequence":"additional","affiliation":[{"name":"Norwegian Computing Center,Oslo,Norway"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2019.2952350"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00865-5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3078081"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-61382-1_10"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISMICT.2019.8743670"},{"key":"ref6","article-title":"Secure federated learning for neuroimaging","author":"Stripelis","year":"2022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.04.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.03.005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102662"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2021.3119950"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10141-4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2021.100008"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/9781119892199.ch5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s23239495"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3603166.3632541"},{"key":"ref17","article-title":"System and method for management of neural network models","volume-title":"USPTO Patent Publication","author":"Ari"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17671\/gazibtd.976711"},{"key":"ref19","article-title":"Gemma 2: Improving open language models at a practical size","author":"Riviere","year":"2024"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10774-7"},{"key":"ref21","article-title":"Autonomous Adaptive Security Framework for 5G-Enabled IoT","author":"Abie","year":"2024"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1900025"},{"key":"ref23","article-title":"Flower: A friendly federated learning research framework","author":"Beutel","year":"2020"},{"key":"ref24","article-title":"Phi-3 technical report: A highly capable language model locally on your phone","author":"Abdin","year":"2024"},{"key":"ref25","article-title":"Large Language Models (LLMs): Deployment, Tokenomics and Sustainability","author":"Dong","year":"2024"},{"issue":"14","key":"ref26","article-title":"Sensitivity Analysis of Federated Learning over Decentralized Data and Communication Rounds","volume-title":"7th National High-Performance Computing Conference (BASARIM)","author":"Camli"},{"key":"ref27","volume-title":"Raspberry Pi 5 datasheet"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"ref29","article-title":"IoT-23 Dataset: A labeled dataset of Malware and Benign IoT Traffic","volume-title":"Stratosphere IPS","author":"Parmisano"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ASYU62119.2024.10756968"},{"key":"ref32","article-title":"Machine learning for anomaly detection in IoT networks: Malware analysis on the IoT-23 data set","volume-title":"Bachelor\u2019s thesis","author":"Stoian","year":"2020"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3371996"},{"key":"ref34","first-page":"1737","article-title":"Deep learning with limited numerical precision","volume-title":"International conference on machine learning","author":"Gupta"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3642968.3654813"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-24383-7_28"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/fi13030073"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.01.1900525"},{"key":"ref39","article-title":"FedLoRA: When Personalized Federated Learning Meets Low-Rank Adaptation","author":"Wu","year":"2024"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.21105\/joss.00265"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3425531"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","location":"Washington, DC, USA","start":{"date-parts":[[2024,12,15]]},"end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825993.pdf?arnumber=10825993","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T07:48:55Z","timestamp":1737100135000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825993\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825993","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}