{"id":"https://openalex.org/W7127345627","doi":"https://doi.org/10.1007/s43926-026-00292-z","title":"Explainable federated learning through causal reasoning for intrusion detection in IoT","display_name":"Explainable federated learning through causal reasoning for intrusion detection in IoT","publication_year":2026,"publication_date":"2026-02-03","ids":{"openalex":"https://openalex.org/W7127345627","doi":"https://doi.org/10.1007/s43926-026-00292-z"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-026-00292-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-026-00292-z","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s43926-026-00292-z","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010945725","display_name":"Fatima Asiri","orcid":"https://orcid.org/0009-0000-4296-9483"},"institutions":[{"id":"https://openalex.org/I82952536","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30","country_code":"SA","type":"education","lineage":["https://openalex.org/I82952536"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Fatima Asiri","raw_affiliation_strings":["Informatics and Computer Systems Department, College of Computer Science, King Khalid University, Abha, 61421, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Informatics and Computer Systems Department, College of Computer Science, King Khalid University, Abha, 61421, Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5010945725"],"corresponding_institution_ids":["https://openalex.org/I82952536"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1986723,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.49779999256134033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.49779999256134033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.12489999830722809,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.08320000022649765,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6700000166893005},{"id":"https://openalex.org/keywords/counterfactual-thinking","display_name":"Counterfactual thinking","score":0.6243000030517578},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.5694000124931335},{"id":"https://openalex.org/keywords/causal-reasoning","display_name":"Causal reasoning","score":0.5615000128746033},{"id":"https://openalex.org/keywords/intrusion-tolerance","display_name":"Intrusion tolerance","score":0.5087000131607056},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5008000135421753},{"id":"https://openalex.org/keywords/rendering","display_name":"Rendering (computer graphics)","score":0.4311000108718872}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7817000150680542},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6700000166893005},{"id":"https://openalex.org/C108650721","wikidata":"https://www.wikidata.org/wiki/Q1783253","display_name":"Counterfactual thinking","level":2,"score":0.6243000030517578},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.5694000124931335},{"id":"https://openalex.org/C115086926","wikidata":"https://www.wikidata.org/wiki/Q17004651","display_name":"Causal reasoning","level":3,"score":0.5615000128746033},{"id":"https://openalex.org/C196903269","wikidata":"https://www.wikidata.org/wiki/Q6059063","display_name":"Intrusion tolerance","level":3,"score":0.5087000131607056},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5008000135421753},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.4311000108718872},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.366100013256073},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35429999232292175},{"id":"https://openalex.org/C11671645","wikidata":"https://www.wikidata.org/wiki/Q5054567","display_name":"Causal model","level":2,"score":0.3395000100135803},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.322299987077713},{"id":"https://openalex.org/C158600405","wikidata":"https://www.wikidata.org/wiki/Q5054566","display_name":"Causal inference","level":2,"score":0.3052000105381012},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.3018999993801117},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2994000017642975},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.29910001158714294},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2888999879360199},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2809000015258789},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.27079999446868896},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2612999975681305}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-026-00292-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-026-00292-z","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:cec6923e0b274481a1e7392b160bdd4d","is_oa":true,"landing_page_url":"https://doaj.org/article/cec6923e0b274481a1e7392b160bdd4d","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 6, Iss 1 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-026-00292-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-026-00292-z","pdf_url":null,"source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5756773352622986}],"awards":[{"id":"https://openalex.org/G5226997260","display_name":null,"funder_award_id":"RGP2/337/46","funder_id":"https://openalex.org/F4320324433","funder_display_name":"King Khalid University"}],"funders":[{"id":"https://openalex.org/F4320324433","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W2958285686","https://openalex.org/W3030475315","https://openalex.org/W3155912831","https://openalex.org/W3214148834","https://openalex.org/W4206713037","https://openalex.org/W4307955810","https://openalex.org/W4323545746","https://openalex.org/W4387321220","https://openalex.org/W4387475865","https://openalex.org/W4387830504","https://openalex.org/W4401247565","https://openalex.org/W4402742411","https://openalex.org/W4402813503","https://openalex.org/W4410491798","https://openalex.org/W4410783799","https://openalex.org/W4411232461","https://openalex.org/W4411957384","https://openalex.org/W4413754970","https://openalex.org/W6925994360"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"The":[1,118,183],"rapid":[2],"growth":[3],"of":[4,6,60,70,135],"Internet":[5],"Things":[7],"(IoT)":[8],"devices":[9],"has":[10,34],"significantly":[11],"increased":[12],"the":[13,56,68,95,133,160,165],"cyber-attack":[14],"surface,":[15],"rendering":[16],"traditional":[17],"centralized":[18],"Intrusion":[19,86],"Detection":[20,87],"Systems":[21],"(IDSs)":[22],"impractical":[23],"due":[24],"to":[25,114,123,146],"privacy":[26],"concerns":[27],"and":[28,67,108,149,174,180,202,213],"communication":[29,195],"bottlenecks.":[30],"Federated":[31,82],"Learning":[32,83],"(FL)":[33],"become":[35],"a":[36,77,115,125,207],"privacy-preserving":[37,111],"alternative,":[38],"but":[39,197],"most":[40],"FL-based":[41],"IDSs":[42],"function":[43],"as":[44],"\u201cblack":[45],"boxes,\"":[46],"relying":[47],"on":[48,154,159],"correlation-based":[49],"explainability":[50],"methods":[51],"that":[52,164,186],"do":[53],"not":[54,188],"reveal":[55],"underlying":[57],"causal":[58,91,106,112,127],"mechanisms":[59],"attacks.":[61],"These":[62],"limitations":[63],"impede":[64],"root-cause":[65],"analysis":[66],"creation":[69],"reliable":[71],"security":[72,144,215],"solutions.":[73],"This":[74,138],"paper":[75],"introduces":[76],"new":[78],"framework,":[79],"Causal":[80],"Explainable":[81],"for":[84,217],"IoT":[85,102,219],"(Causal-FL-ID),":[88],"which":[89],"integrates":[90],"reasoning":[92],"directly":[93],"into":[94,132],"FL":[96],"process.":[97],"In":[98],"this":[99],"setup,":[100],"distributed":[101],"clients":[103],"perform":[104],"local":[105],"discovery":[107],"send":[109],"lightweight,":[110],"summaries":[113,122],"central":[116],"server.":[117],"server":[119],"combines":[120],"these":[121],"create":[124],"global":[126],"graph,":[128],"providing":[129],"deep":[130],"insights":[131],"causes":[134],"an":[136],"intrusion.":[137],"method":[139],"enables":[140],"counterfactual":[141],"reasoning,":[142],"allowing":[143],"analysts":[145],"simulate":[147],"interventions":[148],"assess":[150],"their":[151],"potential":[152],"impact":[153],"threat":[155],"mitigation.":[156],"Extensive":[157],"experiments":[158],"IDSIoT2024":[161],"dataset":[162],"demonstrate":[163],"proposed":[166],"framework":[167],"achieves":[168],"high":[169],"prediction":[170],"accuracy":[171],"around":[172],"$$98.5\\%$$":[173],"scales":[175],"effectively":[176],"with":[177,193],"10,":[178],"25,":[179],"50":[181],"clients.":[182],"results":[184],"confirm":[185],"Causal-FL-ID":[187],"only":[189],"delivers":[190],"strong":[191],"performance":[192],"manageable":[194],"costs":[196],"also":[198],"offers":[199],"stable,":[200],"transparent,":[201],"causally":[203],"grounded":[204],"explanations,":[205],"marking":[206],"significant":[208],"step":[209],"toward":[210],"more":[211],"interpretable":[212],"resilient":[214],"systems":[216],"complex":[218],"environments.":[220]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-02-04T00:00:00"}
