{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T17:10:57Z","timestamp":1770743457604,"version":"3.49.0"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T00:00:00Z","timestamp":1768435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T00:00:00Z","timestamp":1768435200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T00:00:00Z","timestamp":1768435200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2026,1,15]]},"DOI":"10.1109\/jiot.2025.3631450","type":"journal-article","created":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T18:29:25Z","timestamp":1762885765000},"page":"3082-3093","source":"Crossref","is-referenced-by-count":1,"title":["MOAT: Federated Learning-Based Method for Improved Detection of IoT Botnets"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3322-134X","authenticated-orcid":false,"given":"Yangzong","family":"Zhang","sequence":"first","affiliation":[{"name":"Faculty of Data Science, City University of Macau, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9794-5160","authenticated-orcid":false,"given":"Wenjian","family":"Liu","sequence":"additional","affiliation":[{"name":"Faculty of Data Science, City University of Macau, Macau, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3411-7947","authenticated-orcid":false,"given":"Tianqing","family":"Zhu","sequence":"additional","affiliation":[{"name":"Faculty of Data Science, City University of Macau, Macau, China"}]}],"member":"263","reference":[{"issue":"2","key":"ref1","first-page":"243","article-title":"The Internet of Things: A survey","volume":"17","author":"Li","year":"2014","journal-title":"Comput. Netw."},{"issue":"7","key":"ref2","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","article-title":"Internet of Things (IoT): A vision, architectural elements, and future directions","volume":"29","author":"Gubbi","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"key":"ref3","first-page":"701","article-title":"The quest for sense: Physical phenomena classification in the Internet of Things","volume-title":"Proc. 15th Int. Conf. Distrib. Comput. Sensor Syst. (DCOSS)","author":"Borges"},{"issue":"3","key":"ref4","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","article-title":"A survey of machine and deep learning methods for Internet of Things (IoT) security","volume":"22","author":"Al-Garadi","year":"2020","journal-title":"IEEE Commun. Surveys Tuts."},{"issue":"2","key":"ref5","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MC.2017.62","article-title":"Botnets and Internet of Things security","volume":"50","author":"Bertino","year":"2017","journal-title":"Computer"},{"issue":"7","key":"ref6","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MC.2017.201","article-title":"DDoS in the IoT: Mirai and other botnets","volume":"50","author":"Kolias","year":"2017","journal-title":"Computer"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2020.107391","article-title":"Detection of zero-day attacks: An unsupervised port-based approach","volume":"180","author":"Blaise","year":"2020","journal-title":"Comput. Netw."},{"key":"ref8","first-page":"122","article-title":"A threat modelling approach to analyze and mitigate botnet attacks in smart home use case","volume-title":"Proc. IEEE 14th Int. Conf. Big Data Sci. Eng. (BigDataSE)","author":"Abbas"},{"key":"ref9","first-page":"379","article-title":"Delving into internet DDoS attacks by botnets: Characterization and analysis","volume-title":"Proc. 45th Annu. IEEE\/IFIP Int. Conf. Dependable Syst. Netw.","author":"Wang"},{"issue":"1","key":"ref10","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","article-title":"Anomaly-based network intrusion detection: Techniques, systems and challenges","volume":"28","author":"Garc\u00eda-Teodoro","year":"2009","journal-title":"Comput. Secur."},{"issue":"3","key":"ref11","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","article-title":"N-BaIoT\u2014Network-based detection of IoT botnet attacks using deep autoencoders","volume":"17","author":"Meidan","year":"2018","journal-title":"IEEE Pervasive Comput."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.99.154102"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.4279\/pip.070006","article-title":"Noise versus chaos in a causal Fisher\u2013Shannon plane","volume":"7","author":"Rosso","year":"2015","journal-title":"Papers Phys."},{"key":"ref14","first-page":"1048","article-title":"Unsupervised anomaly based botnet detection in IoT networks","volume-title":"Proc. 17th IEEE Int. Conf. Mach. Learn. Appl. (ICMLA)","author":"N\u00f5mm"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11207-2_16"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3381028"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1016\/j.protcy.2012.10.121","article-title":"Hybrid approach for detection of anomaly network traffic using data mining techniques","volume":"6","author":"Agarwal","year":"2012","journal-title":"Proc. Technol."},{"issue":"10","key":"ref19","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1016\/j.sysarc.2013.08.008","article-title":"An in-depth analysis on traffic flooding attacks detection and system using data mining techniques","volume":"59","author":"Yu","year":"2013","journal-title":"J. Syst. Archit."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s20216336"},{"issue":"5","key":"ref22","doi-asserted-by":"crossref","first-page":"3930","DOI":"10.1109\/JIOT.2021.3100755","article-title":"Federated deep learning for zero-day botnet attack detection in IoT-edge devices","volume":"9","author":"Popoola","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/j.comcom.2023.04.018","article-title":"CANET: A hierarchical CNN-attention model for network intrusion detection","volume":"205","author":"Ren","year":"2023","journal-title":"Comput. Commun."},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLCN59089.2024.10624761"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","article-title":"Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning","volume":"10","author":"Ferrag","year":"2022","journal-title":"IEEE Access"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset","volume":"100","author":"Koroniotis","year":"2019","journal-title":"Future Gener. Comput. Syst."}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11346825\/11240155.pdf?arnumber=11240155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T09:11:49Z","timestamp":1768295509000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11240155\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,15]]},"references-count":26,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3631450","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,15]]}}}