{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T14:58:41Z","timestamp":1777733921203,"version":"3.51.4"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1109\/cloudnet55617.2022.9978815","type":"proceedings-article","created":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T18:50:52Z","timestamp":1671216652000},"page":"118-125","source":"Crossref","is-referenced-by-count":13,"title":["DDoS Attack Detection via Privacy-aware Federated Learning and Collaborative Mitigation in Multi-domain Cyber Infrastructures"],"prefix":"10.1109","author":[{"given":"Marinos","family":"Dimolianis","sequence":"first","affiliation":[{"name":"National Technical University of Athens (NTUA),Zografou,Greece"}]},{"given":"Dimitrios K.","family":"Kalogeras","sequence":"additional","affiliation":[{"name":"Institute of Computer &#x0026; Communication Systems (ICCS),Zografou,Greece"}]},{"given":"Nikos","family":"Kostopoulos","sequence":"additional","affiliation":[{"name":"National Technical University of Athens (NTUA),Zografou,Greece"}]},{"given":"Vasilis","family":"Maglaris","sequence":"additional","affiliation":[{"name":"National Technical University of Athens (NTUA),Zografou,Greece"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2005.50"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140298"},{"key":"ref33","article-title":"Ryu Component-based Software Defined Networking Framework","year":"0"},{"key":"ref32","article-title":"RabbitMQ Message Broker","year":"0"},{"key":"ref31","article-title":"BGP Advertisements for Content URIs","author":"narayanan","year":"0"},{"key":"ref30","article-title":"Jinja Documentation","year":"0"},{"key":"ref37","article-title":"BGP Routing Table Analysis - IPv4 Prefixes and their Origin ASNs","year":"0"},{"key":"ref36","article-title":"Traffic Data Repository at the WIDE Project","author":"cho","year":"2000","journal-title":"Proceedings of the USENIX Annual Technical Conference"},{"key":"ref35","article-title":"PF RING &#x2013; ntop","year":"0"},{"key":"ref34","article-title":"Netronome Agilio SmartNICs","year":"0"},{"key":"ref28","article-title":"Cisco ASR 9000 Series Aggregation Services Router Routing Configuration Guide - Implementing BGP Flowspec","year":"0"},{"key":"ref27","article-title":"Interpretable Machine Learning: A Guide for Making Black Box Models Explainable","author":"molnar","year":"0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2933491"},{"key":"ref2","first-page":"1273","article-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data","author":"mcmahan","year":"2017","journal-title":"Proceedings of the International Conference on Artificial Intelligence and Statistics"},{"key":"ref1","article-title":"General Data Protection Regulation - GDPR","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00121"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00095"},{"key":"ref21","article-title":"FLAD: Adaptive Federated Learning for DDoS Attack Detection","author":"doriguzzi-corin","year":"2022"},{"key":"ref24","first-page":"1","article-title":"Building Hybrid Virtual Network Functions with eXpress Data Path","author":"van tu","year":"2019","journal-title":"Proc of the International Conference on Networking and Services"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3368926.3369705"},{"key":"ref26","article-title":"Threats to Federated Learning: A Survey","author":"lyu","year":"2020"},{"key":"ref25","article-title":"DE-CIX &#x2013; Deutscher Commercial Internet Exchange","year":"0"},{"key":"ref50","first-page":"263","article-title":"A Comprehensive Measurement Study of Domain Generating Malware","author":"plohmann","year":"2016","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3104115"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281443"},{"key":"ref40","first-page":"1","article-title":"Adam: A Method for Stochastic Optimization","author":"kingma","year":"2015","journal-title":"Proceedings of the 3rd International Conference on Learning Representations"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1111"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2194508"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502852"},{"key":"ref15","article-title":"CONCORDIA Cyber security cOmpeteNCe fOr Research anD InnovAtion DDoS Clearing House for Europe Cross-sector Pilot Demo","author":"hesselman","year":"0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485385"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502849"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888920000259"},{"key":"ref19","article-title":"The Global Leaders&#x2019; Forum launches Communications Blockchain Network (CBN) - Deutsche Telekom Global Carrier","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3286490.3286559"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2018.01.007"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484622"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3088938"},{"key":"ref8","article-title":"RFC 5575 - Dissemination of Flow Specification Rules","author":"marques","year":"0"},{"key":"ref49","article-title":"DPDK: Data Plane Development Kit","year":"0"},{"key":"ref7","article-title":"RFC 3882 - Configuring BGP to Block Denial-of-Service Attacks","author":"turk","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN51074.2021.9385540"},{"key":"ref46","article-title":"Federated Feature Selection for Cyber-Physical Systems of Systems","author":"cassar\u00e0","year":"2021"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355593"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref47","article-title":"On the Importance of Trust in Next-Generation Networked CPS Systems: An AI Perspective","author":"gholami","year":"2021"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2019.8806651"},{"key":"ref41","article-title":"Hyperparameter Optimization - Grid Search","year":"0"},{"key":"ref44","article-title":"perf (Linux) - Wikipedia","year":"0"},{"key":"ref43","article-title":"Computer Architecture - A Quantitative Approach 5th edition","author":"hennessy","year":"2012"}],"event":{"name":"2022 IEEE 11th International Conference on Cloud Networking (CloudNet)","location":"Paris, France","start":{"date-parts":[[2022,11,7]]},"end":{"date-parts":[[2022,11,10]]}},"container-title":["2022 IEEE 11th International Conference on Cloud Networking (CloudNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9978662\/9978738\/09978815.pdf?arnumber=9978815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T19:36:39Z","timestamp":1673897799000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9978815\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/cloudnet55617.2022.9978815","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]}}}