{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T18:43:47Z","timestamp":1778611427536,"version":"3.51.4"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:00:00Z","timestamp":1750204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:00:00Z","timestamp":1750204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,18]]},"DOI":"10.1109\/ntms65597.2025.11076682","type":"proceedings-article","created":{"date-parts":[[2025,7,18]],"date-time":"2025-07-18T17:42:27Z","timestamp":1752860547000},"page":"317-325","source":"Crossref","is-referenced-by-count":2,"title":["Federated Secure Intelligent Intrusion Detection and Mitigation Framework for SD-IoT Networks using ViT-GraphSAGE and Automated Attack Reporting"],"prefix":"10.1109","author":[{"given":"Walid El","family":"Gadal","sequence":"first","affiliation":[{"name":"University of Victoria,Dept. of computer science,Victoria,Canada"}]},{"given":"Sudhakar","family":"Ganti","sequence":"additional","affiliation":[{"name":"University of Victoria,Dept. of computer science,Victoria,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/csnet64211.2024.10851474"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106432"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109892"},{"key":"ref4","article-title":"Comparison of mitigating DDoS attacks in software defined networking and IoT platforms","author":"Parthiban","year":"2025"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-87454-1"},{"key":"ref6","article-title":"Sdn Intrusion Detection Using Machine Learning Method","author":"Mahmud","year":"2024","journal-title":"arXiv preprint arXiv:2411.05888"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.52783\/cana.v31.666"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-16436-0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13726"},{"issue":"4","key":"ref10","first-page":"975","article-title":"A comprehensive analyses of intrusion detection system for IoT environment","volume-title":"Journal of Information Processing Systems","volume":"16","author":"Sicato"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123853"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-024-08835-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.386"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HORA61326.2024.10550685"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.054966"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3472707"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-05809-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109484"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15725-y"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104109"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/fi17010025"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2024.100068"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.059999"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101231"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3416746"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2024.3453748"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-93977-0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00737-4"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3222765"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789878"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIT61638.2024.10690747"},{"key":"ref32","article-title":"SD-IoT Intrusion Detection Dataset"}],"event":{"name":"2025 12th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","location":"Paris, France","start":{"date-parts":[[2025,6,18]]},"end":{"date-parts":[[2025,6,20]]}},"container-title":["2025 12th IFIP International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11076604\/11076612\/11076682.pdf?arnumber=11076682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T05:09:31Z","timestamp":1752901771000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11076682\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,18]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/ntms65597.2025.11076682","relation":{},"subject":[],"published":{"date-parts":[[2025,6,18]]}}}