{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:37:38Z","timestamp":1730209058108,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T00:00:00Z","timestamp":1688342400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T00:00:00Z","timestamp":1688342400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,3]]},"DOI":"10.1109\/codit58514.2023.10284221","type":"proceedings-article","created":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T17:46:12Z","timestamp":1698169572000},"page":"351-356","source":"Crossref","is-referenced-by-count":1,"title":["A Privacy-Preserving Federated Learning for IoT Intrusion Detection System"],"prefix":"10.1109","author":[{"given":"Riadh Ben","family":"Chaabene","sequence":"first","affiliation":[{"name":"Ecole de Technologie Superieure,Canada"}]},{"given":"Darine","family":"Ameyed","sequence":"additional","affiliation":[{"name":"Ecole de Technologie Superieure,Canada"}]},{"given":"Fehmi","family":"Jaafar","sequence":"additional","affiliation":[{"name":"Ecole de Technologie Superieure,Canada"}]},{"given":"Alexis","family":"Roger","sequence":"additional","affiliation":[{"name":"Ecole de Technologie Superieure,Canada"}]},{"given":"Aimeur","family":"Esma","sequence":"additional","affiliation":[{"name":"Ecole de Technologie Superieure,Canada"}]},{"given":"Mohamed","family":"Cheriet","sequence":"additional","affiliation":[{"name":"Ecole de Technologie Superieure,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2417"},{"issue":"6","key":"ref2","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1016\/j.cose.2006.05.003","article-title":"RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks","volume":"25","author":"Amini","year":"2006","journal-title":"Computers & Security"},{"issue":"5","key":"ref3","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.cose.2008.12.001","article-title":"A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach","volume":"28","author":"Su","year":"2009","journal-title":"Computers & Security"},{"key":"ref4","first-page":"000277","article-title":"Evaluation of machine learning algorithms for intrusion detection system","volume-title":"2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY)","author":"Almseidin"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"108693","DOI":"10.1016\/j.comnet.2021.108693","article-title":"Federated Learning for Malware Detection in IoT Devices","volume":"204","author":"Rey","year":"2022","journal-title":"Computer Networks"},{"journal-title":"FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial ioT","year":"2021","author":"Li","key":"ref6"},{"key":"ref7","first-page":"514","article-title":"Identification of Compromised IoT Devices: Combined Approach Based on Energy Consumption and Network Traffic Analysis","volume-title":"2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS)","author":"Jaafar"},{"issue":"3","key":"ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3178582","article-title":"A Survey of Random Forest Based Methods for Intrusion Detection Systems","volume":"51","author":"Resende","year":"2019","journal-title":"ACM Computing Surveys"},{"key":"ref9","article-title":"Flower: A friendly federated learning research framework","author":"Beutel","year":"2020","journal-title":"arXiv preprint"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1201.0490"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00017"}],"event":{"name":"2023 9th International Conference on Control, Decision and Information Technologies (CoDIT)","start":{"date-parts":[[2023,7,3]]},"location":"Rome, Italy","end":{"date-parts":[[2023,7,6]]}},"container-title":["2023 9th International Conference on Control, Decision and Information Technologies (CoDIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10284032\/10284045\/10284221.pdf?arnumber=10284221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T12:47:31Z","timestamp":1711457251000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10284221\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,3]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/codit58514.2023.10284221","relation":{},"subject":[],"published":{"date-parts":[[2023,7,3]]}}}