{"id":"https://openalex.org/W7117866801","doi":"https://doi.org/10.1093/cybsec/tyaf041","title":"On the fog\u2019s frontline: a federated machine learning approach for industrial network threat detection and intrusion prevention","display_name":"On the fog\u2019s frontline: a federated machine learning approach for industrial network threat detection and intrusion prevention","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7117866801","doi":"https://doi.org/10.1093/cybsec/tyaf041"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyaf041","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf041","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1093/cybsec/tyaf041","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080669385","display_name":"Basharat Ali","orcid":"https://orcid.org/0000-0003-0136-8897"},"institutions":[{"id":"https://openalex.org/I134687103","display_name":"Nanjing Tech University","ror":"https://ror.org/03sd35x91","country_code":"CN","type":"education","lineage":["https://openalex.org/I134687103"]},{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Basharat Ali","raw_affiliation_strings":["State Key Laboratory of Novel Software Technology, Nanjing University , Nanjing, Jiangsu 210093 ,"],"raw_orcid":"https://orcid.org/0000-0002-5449-3088","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Novel Software Technology, Nanjing University , Nanjing, Jiangsu 210093 ,","institution_ids":["https://openalex.org/I881766915","https://openalex.org/I134687103"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5080669385"],"corresponding_institution_ids":["https://openalex.org/I134687103","https://openalex.org/I881766915"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":10.1971,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.98150374,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5705999732017517,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5705999732017517,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.06870000064373016,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.043699998408555984,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6935999989509583},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6772000193595886},{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.5967000126838684},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3955000042915344},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.3720000088214874},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.366100013256073},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.352400004863739},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.352400004863739}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7330999970436096},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6935999989509583},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6772000193595886},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6133999824523926},{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.5967000126838684},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5834000110626221},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.398499995470047},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3955000042915344},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.3720000088214874},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.366100013256073},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.352400004863739},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.352400004863739},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3443000018596649},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.33340001106262207},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.3183000087738037},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.31369999051094055},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3061000108718872},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2962000072002411},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.27880001068115234},{"id":"https://openalex.org/C105446022","wikidata":"https://www.wikidata.org/wiki/Q445962","display_name":"Legacy system","level":3,"score":0.2786000072956085},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.2775999903678894},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.2770000100135803},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.26669999957084656},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.25929999351501465},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2547999918460846},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/cybsec/tyaf041","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf041","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyaf041","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf041","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.515956699848175,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W2124430419","https://openalex.org/W2887132990","https://openalex.org/W3040204705","https://openalex.org/W3097365940","https://openalex.org/W3120548213","https://openalex.org/W3174663754","https://openalex.org/W3176231977","https://openalex.org/W3182520603","https://openalex.org/W4226193470","https://openalex.org/W4282562922","https://openalex.org/W4288685593","https://openalex.org/W4291007245","https://openalex.org/W4302025106","https://openalex.org/W4306965379","https://openalex.org/W4318486183","https://openalex.org/W4321243464","https://openalex.org/W4366813481","https://openalex.org/W4379619057","https://openalex.org/W4400948916","https://openalex.org/W4401242558","https://openalex.org/W4401295443","https://openalex.org/W4402302652","https://openalex.org/W4403569467","https://openalex.org/W4403937073","https://openalex.org/W4405113708","https://openalex.org/W4405580502","https://openalex.org/W4405732037","https://openalex.org/W4406117287"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"The":[1,168],"rapidly":[2],"increasing":[3],"field":[4],"of":[5,15,135,201],"industrial":[6,59,196,230],"network":[7,70,91,231],"security":[8],"has":[9],"led":[10],"to":[11,35,67,82,115,163,209],"the":[12,43,62,101,121,138,193,199,220],"rapid":[13],"growth":[14],"interconnecting":[16],"devices,":[17],"significantly":[18],"enlarging":[19],"attack":[20],"surfaces":[21],"and":[22,37,87,111,129,142,148,154,175,184,215],"exposing":[23],"flaws":[24],"that":[25],"older":[26],"intrusion":[27,56],"detection":[28,57,166],"systems":[29],"(IDS)":[30],"cannot":[31],"even":[32],"handle":[33],"due":[34],"scalability":[36],"privacy":[38,128],"constraints.":[39],"This":[40,189],"work":[41],"addresses":[42],"shortcomings":[44],"by":[45],"presenting":[46],"an":[47,133],"advanced":[48],"federated":[49,96,202],"framework":[50],"for":[51,90,229],"machine":[52,76,97],"learning":[53,77,98,203],"tailored":[54],"toward":[55,198],"in":[58,79,186,195,207],"networks.":[60],"Using":[61],"detailed":[63],"UNSW-NB15":[64],"dataset,":[65],"known":[66],"represent":[68],"realistic":[69],"traffic,":[71],"we":[72],"have":[73],"analysed":[74],"numerous":[75],"methods":[78],"great":[80],"detail":[81],"build":[83],"a":[84,94,116,211,226],"robust,":[85],"adaptive,":[86],"privacy-preserving":[88],"model":[89,169],"protection.":[92],"In":[93],"decentralized":[95],"(FML)":[99],"approach,":[100],"edge":[102],"devices":[103,180],"could":[104],"train":[105],"local":[106],"models":[107],"on":[108],"their":[109],"own":[110],"send":[112],"aggregated":[113],"parameters":[114],"central":[117],"server":[118],"while":[119],"keeping":[120],"data":[122],"private.":[123],"Our":[124],"model,":[125],"with":[126,181,204],"differential":[127],"secure":[130],"aggregation,":[131],"achieved":[132],"accuracy":[134],"99.98%":[136],"using":[137],"Random":[139],"Forest":[140],"Classifier":[141],"differentiated":[143],"very":[144],"well":[145],"between":[146],"benign":[147],"malicious":[149],"traffic.":[150],"Advanced":[151],"feature":[152],"engineering":[153],"interpretability":[155],"tools,":[156],"such":[157],"as":[158],"SHAP":[159],"analysis,":[160],"were":[161],"used":[162],"identify":[164],"critical":[165],"features.":[167],"was":[170],"tested":[171],"through":[172],"iterative":[173],"training":[174],"in-depth":[176],"testing":[177],"across":[178],"distributed":[179],"remarkable":[182],"resilience":[183],"efficiency":[185],"resource-limited":[187],"environments.":[188],"research":[190],"is":[191],"therefore":[192],"shift":[194],"cybersecurity":[197],"integration":[200],"privacy-centric":[205],"protocols":[206],"order":[208],"create":[210],"new":[212,227],"effective,":[213],"scalable,":[214],"resilient":[216],"defense":[217],"mechanism":[218],"than":[219],"traditional":[221],"IDS,":[222],"which":[223],"may":[224],"offer":[225],"standard":[228],"protection":[232],"against":[233],"evolving":[234],"cyber":[235],"threats.":[236]},"counts_by_year":[{"year":2026,"cited_by_count":8}],"updated_date":"2026-05-08T15:41:06.802602","created_date":"2026-01-01T00:00:00"}
