{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:39:11Z","timestamp":1763811551625,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/fmec62297.2024.10710218","type":"proceedings-article","created":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T17:22:38Z","timestamp":1728926558000},"page":"114-121","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Approach for Intrusion Detection using Online Federated Learning on Streaming Data"],"prefix":"10.1109","author":[{"given":"Victor","family":"Arvidsson","sequence":"first","affiliation":[{"name":"Blekinge Institute of Technology,Department of Computer Science,Karlskrona,Sweden"}]},{"given":"Sadi","family":"Alawadi","sequence":"additional","affiliation":[{"name":"Blekinge Institute of Technology,Department of Computer Science,Karlskrona,Sweden"}]},{"given":"Martin","family":"Boldt","sequence":"additional","affiliation":[{"name":"Blekinge Institute of Technology,Department of Computer Science,Karlskrona,Sweden"}]},{"given":"Ola","family":"Angelsmark","sequence":"additional","affiliation":[{"name":"Advenica,Malm&#x00F6;,Sweden"}]},{"given":"Fanny","family":"S\u00f6derlund","sequence":"additional","affiliation":[{"name":"Advenica,Malm&#x00F6;,Sweden"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1201\/9781315385488"},{"issue":"3","key":"ref2","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1353-4858(12)70043-0","article-title":"Why multi-layered security is still the best defence","volume":"2012","author":"Denman","year":"2012","journal-title":"Network Security"},{"key":"ref3","article-title":"Federated optimization: Distributed machine learning for on-device intelligence","author":"Kone\u010dn\u00fd","year":"2016","journal-title":"arXiv:1610.02527"},{"key":"ref4","article-title":"Federated learning: Strategies for improving communication efficiency","author":"Kone\u010dn\u00fd","year":"2016","journal-title":"arXiv preprint arXiv:1610.05492"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ACCESS.2024.3380167"},{"year":"2022","author":"Belenguer","article-title":"A review of Federated Learning in Intrusion Detection Systems for IoT","key":"ref6"},{"key":"ref7","first-page":"1273","article-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics.","author":"McMahan"},{"key":"ref8","first-page":"3","article-title":"On the convergence of federated optimization in heterogeneous networks","volume":"3","author":"Sahu","year":"2018","journal-title":"arXiv:1812.06127"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3298981"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/s13748-024-00322-3"},{"year":"2023","author":"Hernandez-Ramos","article-title":"Intrusion Detection based on Federated Learning: a systematic review","key":"ref11"},{"year":"2022","author":"Huang","article-title":"Cross-Silo Federated Learning: Challenges and Opportunities","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/10654.001.0001","article-title":"Machine Learning for Data Streams: with Practical Examples in MOA","author":"Bifet","year":"2018"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1002\/9781119644682"},{"key":"ref15","first-page":"1","article-title":"A detailed analysis of the KDD CUP 99 data set","volume-title":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","author":"Tavallaee"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.5220\/0006639801080116"},{"key":"ref17","first-page":"53","article-title":"Network Intrusion Detection System with Stream Machine Learning in Fog Layer and Online Labeling in Cloud Layer","volume-title":"2021 International Conference on Electronic Communications, Internet of Things and Big Data (ICEIB)","author":"Chuang"},{"key":"ref18","first-page":"8889","article-title":"Federated Learning for Data Streams","volume-title":"Proceedings of The 26th International Conference on Artificial Intelligence and Statistics.","author":"Marfoq"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"119235","DOI":"10.1016\/j.ins.2023.119235","article-title":"Semi-supervised federated learning on evolving data streams","volume":"643","author":"Mawuli","year":"2023","journal-title":"Information Sciences"},{"key":"ref20","article-title":"KDD Cup. 1999 Data","author":"Stolfo","year":"1999","journal-title":"UCI Machine Learning Repository"},{"key":"ref21","first-page":"1","article-title":"Decentralized Online Federated G-Network Learning for Lightweight Intrusion Detection","volume-title":"2023 31st International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)","author":"Nak\u03b9p"},{"key":"ref22","first-page":"670","article-title":"Online Naive Bayes classification for network intrusion detection","volume-title":"2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","author":"Gumus"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.5555\/1642194.1642224"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1023\/a:1009769707641"},{"key":"ref25","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","volume-title":"Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, ser. KDD\u201996","author":"Ester"}],"event":{"name":"2024 9th International Conference on Fog and Mobile Edge Computing (FMEC)","start":{"date-parts":[[2024,9,2]]},"location":"Malm\u00f6, Sweden","end":{"date-parts":[[2024,9,5]]}},"container-title":["2024 9th International Conference on Fog and Mobile Edge Computing (FMEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10710134\/10710180\/10710218.pdf?arnumber=10710218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T04:56:51Z","timestamp":1728968211000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10710218\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/fmec62297.2024.10710218","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}