{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:32:14Z","timestamp":1774539134003,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,15]]},"DOI":"10.1109\/syscon61195.2024.10553450","type":"proceedings-article","created":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T17:55:15Z","timestamp":1718646915000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Cross Device Federated Intrusion Detector for Early Stage Botnet Propagation in IoT"],"prefix":"10.1109","author":[{"given":"Angela Grace","family":"Famera","sequence":"first","affiliation":[{"name":"Miami University,Department of Computer Science and Software Engineering,Oxford,Ohio"}]},{"given":"Raj Mani","family":"Shukla","sequence":"additional","affiliation":[{"name":"Anglia Ruskin University,Computing and Information Science,Cambridge"}]},{"given":"Suman","family":"Bhunia","sequence":"additional","affiliation":[{"name":"Miami University,Department of Computer Science and Software Engineering,Oxford,Ohio"}]}],"member":"263","reference":[{"key":"ref1","article-title":"134 cybersecurity statistics and trends for 2021: Varonis","author":"Sobers","year":"2021"},{"key":"ref2","article-title":"Evolution of iot attacks: An interactive infographicd"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.15394\/jdfsl.2015.1195"},{"key":"ref4","article-title":"IRC (Internet Relay Chat)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1459"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714637"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ic-ETITE47903.2020.Id-70"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom60117.2023.00333"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1602.05629"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106854"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3150363"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106775"},{"key":"ref14","article-title":"Less is more: A privacyrespecting android malware classifier using federated learning","volume":"abs\/2007.08319","author":"Galvez","year":"2020","journal-title":"CoRR"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS50894.2020.00031"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3368926.3369705"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108693"},{"key":"ref18","article-title":"Protect your organization against cyber poisoning attacks"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5220\/0009187802070218"}],"event":{"name":"2024 IEEE International Systems Conference (SysCon)","location":"Montreal, QC, Canada","start":{"date-parts":[[2024,4,15]]},"end":{"date-parts":[[2024,4,18]]}},"container-title":["2024 IEEE International Systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10553374\/10553399\/10553450.pdf?arnumber=10553450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T19:13:55Z","timestamp":1719342835000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10553450\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,15]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/syscon61195.2024.10553450","relation":{},"subject":[],"published":{"date-parts":[[2024,4,15]]}}}