{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:28:43Z","timestamp":1766564923234,"version":"3.48.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T00:00:00Z","timestamp":1759708800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,6]]},"DOI":"10.1109\/isc266238.2025.11293319","type":"proceedings-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T18:28:12Z","timestamp":1766514492000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Federated Edge AI for Adaptive Zero-Trust Security in Resource-Constrained IoT Networks"],"prefix":"10.1109","author":[{"given":"Dina","family":"Al-Sadi","sequence":"first","affiliation":[{"name":"Jordan University of Science and Technology,Computer Engineering Department,Irbid,Jordan,22110"}]},{"given":"Abdoul","family":"Rjoub","sequence":"additional","affiliation":[{"name":"Jordan University of Science and Technology,Computer Engineering Department,Irbid,Jordan,22110"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-021-00145-8"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/su13169463"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08907-0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/su141710964"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s20164372"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s23031279"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2021.3071496"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.30574\/wjarr.2024.24.2.3449"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/brainsci13040683"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1016\/j.future.2021.09.027","article-title":"Lightweight intrusion detection for IoT","volume":"127","author":"Roy","year":"2021","journal-title":"Future Gen. Comput. Syst."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-10092-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00866-4"},{"key":"ref13","first-page":"417","article-title":"Security of IoT systems: challenges and opportunities","volume-title":"IEEE\/ACM ICCAD","author":"Xu","year":"2014"},{"key":"ref14","first-page":"59353","article-title":"IoT applications and security: A systematic review","volume-title":"IEEE Access","volume":"9","author":"Mishra","year":"2021"},{"key":"ref15","article-title":"Privacy-preserving data in IoT cloud with AI","author":"Dhinakaran","year":"2024","journal-title":"arXiv"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3097146"},{"issue":"17","key":"ref17","doi-asserted-by":"crossref","first-page":"9937","DOI":"10.3390\/app13179937","article-title":"Lightweight DDoS detection using ML","volume":"13","author":"Sadhwani","year":"2023","journal-title":"Appl. Sci."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT54823.2022.9770931"},{"issue":"3","key":"ref19","article-title":"AI and edge computing in IoT: A review","volume":"23","author":"Bourechak","year":"2023","journal-title":"Sensors"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12204316"},{"key":"ref21","article-title":"Zero-Touch, Zero-Trust AI\/ML IoT Security","author":"Shakya","year":"2025","journal-title":"arXiv"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/su15032255"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-021-10199-5"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/e25121595"},{"key":"ref25","article-title":"Explainable AI for Zero-Trust API Gateways","author":"Anderson","year":"2025","journal-title":"Microsoft Azure"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3174679"},{"key":"ref27","article-title":"Zero trust: Applications, challenges, opportunities","author":"Ghasemshirazi","year":"2023","journal-title":"arXiv"},{"key":"ref28","first-page":"1","article-title":"IoT Security: Challenges and key issues","author":"Azrour","year":"2021","journal-title":"Sec. Commun. Netw."},{"issue":"10","key":"ref29","doi-asserted-by":"crossref","first-page":"101820","DOI":"10.1016\/j.jksuci.2023.101820","article-title":"ML for IoT botnet detection","volume":"35","author":"Nazir","year":"2023","journal-title":"J. King Saud Univ. - Comput. Inf. Sci."},{"key":"ref30","first-page":"336","article-title":"IoT security: status, challenges, measures","author":"Mahmoud","year":"2015","journal-title":"ICITST"}],"event":{"name":"2025 IEEE International Smart Cities Conference (ISC2)","start":{"date-parts":[[2025,10,6]]},"location":"Patras, Greece","end":{"date-parts":[[2025,10,9]]}},"container-title":["2025 IEEE International Smart Cities Conference (ISC2)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11293139\/11293247\/11293319.pdf?arnumber=11293319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T07:23:34Z","timestamp":1766561014000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11293319\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/isc266238.2025.11293319","relation":{},"subject":[],"published":{"date-parts":[[2025,10,6]]}}}