{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:59:07Z","timestamp":1763193547315,"version":"3.45.0"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T00:00:00Z","timestamp":1757894400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T00:00:00Z","timestamp":1757894400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,15]]},"DOI":"10.1109\/cscn67557.2025.11230705","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:46:39Z","timestamp":1763145999000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Edge-Cloud Collaboration for Dynamic Threat Detection in IoT Networks"],"prefix":"10.1109","author":[{"given":"Jawad","family":"Ahmad","sequence":"first","affiliation":[{"name":"Prince Mohammad Bin Fahd University,Cybersecurity Center,Al-Khobar,Saudi Arabia"}]},{"given":"Tamara","family":"Zhukabayeva","sequence":"additional","affiliation":[{"name":"L.N. Gumilyov Eurasian National University,Faculty of Information Technology,Astana,Kazakhstan"}]},{"given":"Shahid","family":"Latif","sequence":"additional","affiliation":[{"name":"University of the West of England,School of Computing and Creative Technologies,Bristol,United Kingdom"}]},{"given":"Lazzat","family":"Zholshiyeva","sequence":"additional","affiliation":[{"name":"L.N. Gumilyov Eurasian National University,Faculty of Information Technology,Astana,Kazakhstan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.32604\/cmes.2025.064874","article-title":"A hybrid wasserstein gan and autoencoder model for robust intrusion detection in iot","volume-title":"Computer Modeling in Engineering & Sciences","author":"Alshehri"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13726"},{"key":"ref3","first-page":"34","article-title":"Acids-ml: Advancing cloud intrusion detection","author":"Singh","year":"2025","journal-title":"Mobile Cloud Computing, Services and Engineering"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s25010213"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109724"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2023.05.001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2023.11.023"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2025.127183"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2024.10.014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2296"},{"article-title":"A real time dataset \u201didsiot2024\"","year":"2024","author":"Koppula","key":"ref11"}],"event":{"name":"2025 IEEE Conference on Standards for Communications and Networking (CSCN)","start":{"date-parts":[[2025,9,15]]},"location":"Bologna, Italy","end":{"date-parts":[[2025,9,17]]}},"container-title":["2025 IEEE Conference on Standards for Communications and Networking (CSCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11230662\/11230587\/11230705.pdf?arnumber=11230705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T07:56:41Z","timestamp":1763193401000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11230705\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,15]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/cscn67557.2025.11230705","relation":{},"subject":[],"published":{"date-parts":[[2025,9,15]]}}}