{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T12:00:16Z","timestamp":1768910416609,"version":"3.49.0"},"reference-count":15,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Network"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/mnet.2025.3619162","type":"journal-article","created":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T17:35:48Z","timestamp":1761672948000},"page":"13-19","source":"Crossref","is-referenced-by-count":1,"title":["Federated Retrieval-Augmented Generation-Based LLM for Enhanced Cyber Threat Detection in the Internet-of-Energy"],"prefix":"10.1109","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-7597-9034","authenticated-orcid":false,"given":"Tianxing","family":"Fu","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Exeter, Exeter, U.K"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5406-8420","authenticated-orcid":false,"given":"Jia","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Exeter, Exeter, U.K"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1395-7314","authenticated-orcid":false,"given":"Geyong","family":"Min","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Exeter, Exeter, U.K"}]},{"given":"Sunder Ali","family":"Khowaja","sequence":"additional","affiliation":[{"name":"Dublin City University, Dublin 9, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9028-4518","authenticated-orcid":false,"given":"Keshav","family":"Singh","sequence":"additional","affiliation":[{"name":"National Sun Yat-sen University, Kaohsiung, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1262-8594","authenticated-orcid":false,"given":"Kapal","family":"Dev","sequence":"additional","affiliation":[{"name":"Department of Computer Science, ADAPT Centre, Munster Technological University, Cork, Ireland"}]}],"member":"263","reference":[{"key":"ref1","article-title":"A comprehensive overview of large language models (LLMs) for cyber defences: Opportunities and directions","author":"Hassanin","year":"2024","journal-title":"arXiv:2405.14487"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671824"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3363469"},{"key":"ref4","article-title":"GPT-4 technical report","volume-title":"arXiv:2303.08774","author":"Achiam","year":"2023"},{"key":"ref5","first-page":"35","article-title":"Interpretable online log analysis using large language models with prompt strategies","volume-title":"Proc. 32nd IEEE\/ACM Int. Conf. Program Comprehension","author":"Liu"},{"key":"ref6","article-title":"LogLLM: Log-based anomaly detection using large language models","author":"Guan","year":"2024","journal-title":"arXiv:2411.08561"},{"key":"ref7","first-page":"9459","article-title":"Retrieval-augmented generation for knowledge-intensive NLP tasks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Lewis"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1810.04805"},{"key":"ref10","first-page":"27730","article-title":"Training language models to follow instructions with human feedback","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NIPS)","author":"Ouyang"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE62328.2024.00023"},{"key":"ref12","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","volume":"54","author":"McMahan"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2025.3618474"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"}],"container-title":["IEEE Network"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/65\/11355952\/11219341.pdf?arnumber=11219341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T20:55:56Z","timestamp":1768856156000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11219341\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":15,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/mnet.2025.3619162","relation":{},"ISSN":["0890-8044","1558-156X"],"issn-type":[{"value":"0890-8044","type":"print"},{"value":"1558-156X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}