{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:19:51Z","timestamp":1760710791110,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T00:00:00Z","timestamp":1635638400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T00:00:00Z","timestamp":1635638400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T00:00:00Z","timestamp":1635638400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,31]]},"DOI":"10.1109\/isncc52172.2021.9615816","type":"proceedings-article","created":{"date-parts":[[2021,11,25]],"date-time":"2021-11-25T20:32:15Z","timestamp":1637872335000},"page":"1-8","source":"Crossref","is-referenced-by-count":18,"title":["Federated Learning for Anomaly-Based Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Mohamed Ali","family":"Ayed","sequence":"first","affiliation":[]},{"given":"Chamseddine","family":"Talhi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Communication-efficient learning of deep networks from decentralized data","year":"2016","author":"mcmahan","key":"ref10"},{"key":"ref11","first-page":"352","article-title":"Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning","author":"qin","year":"2020","journal-title":"2020 IFIP Networking Conference (Networking) Networking"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023430"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102033"},{"key":"ref14","first-page":"374","author":"zhang","year":"2019","journal-title":"Poisoning attack in federated learning using generative adversarial nets"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN48605.2020.9207094"},{"key":"ref16","article-title":"D&#x00EF;ot: A crowdsourced self-learning approach for detecting compromised iot devices","volume":"abs 1804 7474","author":"nguyen","year":"2018","journal-title":"CoRR"},{"journal-title":"Long short term memory networks for anomaly detection in time series","year":"2015","author":"malhotra","key":"ref17"},{"key":"ref18","first-page":"108","author":"sharafaldin","year":"2018","journal-title":"Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2019.8746576"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.220"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2929409"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","article-title":"A survey of network anomaly detection techniques","volume":"60","author":"ahmed","year":"2015","journal-title":"Journal of Network and Computer Applications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2402161"},{"journal-title":"Intrusion Detection with Unlabeled Data Using Clustering","year":"2001","author":"portnoy","key":"ref5"},{"key":"ref8","first-page":"1","author":"ran","year":"2019","journal-title":"A Semi-Supervised Learning Approach to IEEE 802 11 Network Anomaly Detection"},{"key":"ref7","first-page":"95","author":"wang","year":"2018","journal-title":"Intrusion Detection for WiFi Network A Deep Learning Approach 11th EAI International Conference WiCON 2018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2013.09.005"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.92653"},{"key":"ref9","first-page":"1","author":"thing","year":"2017","journal-title":"Ieee 802 11 network anomaly detection and attack classification A deep learning approach"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"journal-title":"Privacy Aware Learning","year":"2013","author":"duchi","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005507"},{"key":"ref23","article-title":"Federated learning of deep networks using model averaging","volume":"abs 1602 5629","author":"mcmahan","year":"2016","journal-title":"CoRR"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9173960"},{"key":"ref25","article-title":"Robust and communication-efficient federated learning from non-iid data","volume":"abs 1903 2891","author":"sattler","year":"2019","journal-title":"CoRR"}],"event":{"name":"2021 International Symposium on Networks, Computers and Communications (ISNCC)","start":{"date-parts":[[2021,10,31]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2021,11,2]]}},"container-title":["2021 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9615623\/9615626\/09615816.pdf?arnumber=9615816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:52:46Z","timestamp":1652201566000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9615816\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,31]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/isncc52172.2021.9615816","relation":{},"subject":[],"published":{"date-parts":[[2021,10,31]]}}}