{"id":"https://openalex.org/W4387789879","doi":"https://doi.org/10.1109/access.2023.3325992","title":"SecFedIDM-V1: A Secure Federated Intrusion Detection Model With Blockchain and Deep Bidirectional Long Short-Term Memory Network","display_name":"SecFedIDM-V1: A Secure Federated Intrusion Detection Model With Blockchain and Deep Bidirectional Long Short-Term Memory Network","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4387789879","doi":"https://doi.org/10.1109/access.2023.3325992"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3325992","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3325992","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10287938.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10287938.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024137518","display_name":"Emmanuel Baldwin Mbaya","orcid":"https://orcid.org/0000-0002-5326-0653"},"institutions":[{"id":"https://openalex.org/I186771145","display_name":"Covenant University","ror":"https://ror.org/00frr1n84","country_code":"NG","type":"education","lineage":["https://openalex.org/I186771145"]}],"countries":["NG"],"is_corresponding":true,"raw_author_name":"Emmanuel Baldwin Mbaya","raw_affiliation_strings":["Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria","Department of Computer Science, Federal University, Gashua, Yobe State, Nigeria","Covenant Applied Informatics and Communication African Center of Excellence, Covenant University, Ota, Ogun State, Nigeria"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria","institution_ids":["https://openalex.org/I186771145"]},{"raw_affiliation_string":"Department of Computer Science, Federal University, Gashua, Yobe State, Nigeria","institution_ids":[]},{"raw_affiliation_string":"Covenant Applied Informatics and Communication African Center of Excellence, Covenant University, Ota, Ogun State, Nigeria","institution_ids":["https://openalex.org/I186771145"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064263474","display_name":"Emmanuel Adetiba","orcid":"https://orcid.org/0000-0001-9227-7389"},"institutions":[{"id":"https://openalex.org/I177181097","display_name":"Durban University of Technology","ror":"https://ror.org/0303y7a51","country_code":"ZA","type":"education","lineage":["https://openalex.org/I177181097"]},{"id":"https://openalex.org/I186771145","display_name":"Covenant University","ror":"https://ror.org/00frr1n84","country_code":"NG","type":"education","lineage":["https://openalex.org/I186771145"]}],"countries":["NG","ZA"],"is_corresponding":false,"raw_author_name":"Emmanuel Adetiba","raw_affiliation_strings":["Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria","Covenant Applied Informatics and Communication African Center of Excellence, Covenant University, Ota, Ogun State, Nigeria","HRA, Institute for Systems Science, Durban University of Technology, Durban, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria","institution_ids":["https://openalex.org/I186771145"]},{"raw_affiliation_string":"Covenant Applied Informatics and Communication African Center of Excellence, Covenant University, Ota, Ogun State, Nigeria","institution_ids":["https://openalex.org/I186771145"]},{"raw_affiliation_string":"HRA, Institute for Systems Science, Durban University of Technology, Durban, South Africa","institution_ids":["https://openalex.org/I177181097"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066081646","display_name":"Joke A. Badejo","orcid":"https://orcid.org/0000-0002-5646-7385"},"institutions":[{"id":"https://openalex.org/I186771145","display_name":"Covenant University","ror":"https://ror.org/00frr1n84","country_code":"NG","type":"education","lineage":["https://openalex.org/I186771145"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Joke A. Badejo","raw_affiliation_strings":["Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria","Covenant Applied Informatics and Communication African Center of Excellence, Covenant University, Ota, Ogun State, Nigeria"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria","institution_ids":["https://openalex.org/I186771145"]},{"raw_affiliation_string":"Covenant Applied Informatics and Communication African Center of Excellence, Covenant University, Ota, Ogun State, Nigeria","institution_ids":["https://openalex.org/I186771145"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049570575","display_name":"John S. Wejin","orcid":"https://orcid.org/0000-0003-2157-3273"},"institutions":[{"id":"https://openalex.org/I186771145","display_name":"Covenant University","ror":"https://ror.org/00frr1n84","country_code":"NG","type":"education","lineage":["https://openalex.org/I186771145"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"John Simon Wejin","raw_affiliation_strings":["Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria","institution_ids":["https://openalex.org/I186771145"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061581435","display_name":"Oluwadamilola Oshin","orcid":"https://orcid.org/0000-0001-9313-7441"},"institutions":[{"id":"https://openalex.org/I186771145","display_name":"Covenant University","ror":"https://ror.org/00frr1n84","country_code":"NG","type":"education","lineage":["https://openalex.org/I186771145"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Oluwadamilola Oshin","raw_affiliation_strings":["Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria","Covenant Applied Informatics and Communication African Center of Excellence, Covenant University, Ota, Ogun State, Nigeria"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria","institution_ids":["https://openalex.org/I186771145"]},{"raw_affiliation_string":"Covenant Applied Informatics and Communication African Center of Excellence, Covenant University, Ota, Ogun State, Nigeria","institution_ids":["https://openalex.org/I186771145"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017758359","display_name":"Olisaemeka Isife","orcid":"https://orcid.org/0009-0009-0160-204X"},"institutions":[{"id":"https://openalex.org/I186771145","display_name":"Covenant University","ror":"https://ror.org/00frr1n84","country_code":"NG","type":"education","lineage":["https://openalex.org/I186771145"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Olisaemeka Isife","raw_affiliation_strings":["Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Information Engineering, Covenant University, Ota, Ogun State, Nigeria","institution_ids":["https://openalex.org/I186771145"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019289174","display_name":"Surendra Thakur","orcid":"https://orcid.org/0000-0003-4900-0119"},"institutions":[{"id":"https://openalex.org/I177181097","display_name":"Durban University of Technology","ror":"https://ror.org/0303y7a51","country_code":"ZA","type":"education","lineage":["https://openalex.org/I177181097"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Surendra Colin Thakur","raw_affiliation_strings":["Department of Information Technology and KZN e-Skills Co-Laboratory, Durban University of Technology, Durban, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology and KZN e-Skills Co-Laboratory, Durban University of Technology, Durban, South Africa","institution_ids":["https://openalex.org/I177181097"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038432211","display_name":"Sibusiso Moyo","orcid":"https://orcid.org/0000-0001-5613-7290"},"institutions":[{"id":"https://openalex.org/I26092322","display_name":"Stellenbosch University","ror":"https://ror.org/05bk57929","country_code":"ZA","type":"education","lineage":["https://openalex.org/I26092322"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Sibusiso Moyo","raw_affiliation_strings":["Department of Mathematical Sciences, School for Data Science and Computational Thinking, Stellenbosch University, Stellenbosch, South Africa","School for Data Science and Computational Thinking and Department of Mathematical Sciences, Stellenbosch University, Stellenbosch, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Mathematical Sciences, School for Data Science and Computational Thinking, Stellenbosch University, Stellenbosch, South Africa","institution_ids":["https://openalex.org/I26092322"]},{"raw_affiliation_string":"School for Data Science and Computational Thinking and Department of Mathematical Sciences, Stellenbosch University, Stellenbosch, South Africa","institution_ids":["https://openalex.org/I26092322"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077171389","display_name":"Ezekiel Adebiyi","orcid":"https://orcid.org/0000-0002-1390-2359"},"institutions":[{"id":"https://openalex.org/I186771145","display_name":"Covenant University","ror":"https://ror.org/00frr1n84","country_code":"NG","type":"education","lineage":["https://openalex.org/I186771145"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Ezekiel F. Adebiyi","raw_affiliation_strings":["Covenant Applied Informatics and Communication African Center of Excellence, Covenant University, Ota, Ogun State, Nigeria"],"affiliations":[{"raw_affiliation_string":"Covenant Applied Informatics and Communication African Center of Excellence, Covenant University, Ota, Ogun State, Nigeria","institution_ids":["https://openalex.org/I186771145"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5024137518"],"corresponding_institution_ids":["https://openalex.org/I186771145"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":2.9954,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.91817373,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"11","issue":null,"first_page":"116011","last_page":"116025"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8606173992156982},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6529849171638489},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6343940496444702},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5518225431442261},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.542605996131897},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.477313369512558},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.4751584231853485},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.447894424200058},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43746721744537354},{"id":"https://openalex.org/keywords/host-based-intrusion-detection-system","display_name":"Host-based intrusion detection system","score":0.42746463418006897},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15777269005775452},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.10266223549842834}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8606173992156982},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6529849171638489},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6343940496444702},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5518225431442261},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.542605996131897},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.477313369512558},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.4751584231853485},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.447894424200058},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43746721744537354},{"id":"https://openalex.org/C90936777","wikidata":"https://www.wikidata.org/wiki/Q917189","display_name":"Host-based intrusion detection system","level":4,"score":0.42746463418006897},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15777269005775452},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.10266223549842834}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2023.3325992","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3325992","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10287938.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:388826d314224c169e717192527c0a76","is_oa":true,"landing_page_url":"https://doaj.org/article/388826d314224c169e717192527c0a76","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 116011-116025 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3325992","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3325992","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10287938.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6399999856948853}],"awards":[],"funders":[{"id":"https://openalex.org/F4320323779","display_name":"Covenant University","ror":"https://ror.org/00frr1n84"},{"id":"https://openalex.org/F4320335893","display_name":"Covenant University Centre for Research, Innovation and Discovery","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4387789879.pdf","grobid_xml":"https://content.openalex.org/works/W4387789879.grobid-xml"},"referenced_works_count":55,"referenced_works":["https://openalex.org/W1499296111","https://openalex.org/W2009199002","https://openalex.org/W2048087366","https://openalex.org/W2061686014","https://openalex.org/W2158690812","https://openalex.org/W2185271194","https://openalex.org/W2365795845","https://openalex.org/W2461531175","https://openalex.org/W2531967557","https://openalex.org/W2624307925","https://openalex.org/W2730380569","https://openalex.org/W2762776925","https://openalex.org/W2765181145","https://openalex.org/W2789828921","https://openalex.org/W2792850657","https://openalex.org/W2794209590","https://openalex.org/W2801889078","https://openalex.org/W2802341379","https://openalex.org/W2805759893","https://openalex.org/W2889165715","https://openalex.org/W2889470580","https://openalex.org/W2958285686","https://openalex.org/W2964129362","https://openalex.org/W2966623401","https://openalex.org/W2968669983","https://openalex.org/W2972178360","https://openalex.org/W2981978050","https://openalex.org/W2987485128","https://openalex.org/W2993463367","https://openalex.org/W3016987480","https://openalex.org/W3027095011","https://openalex.org/W3031231147","https://openalex.org/W3031802354","https://openalex.org/W3034127534","https://openalex.org/W3040937085","https://openalex.org/W3043476533","https://openalex.org/W3080859806","https://openalex.org/W3082603384","https://openalex.org/W3092771185","https://openalex.org/W3094686023","https://openalex.org/W3104896896","https://openalex.org/W3105095413","https://openalex.org/W3113277549","https://openalex.org/W3121747242","https://openalex.org/W3158350046","https://openalex.org/W3167680842","https://openalex.org/W3172979816","https://openalex.org/W3200069532","https://openalex.org/W3202990235","https://openalex.org/W4210561126","https://openalex.org/W4224220262","https://openalex.org/W4300127641","https://openalex.org/W4312204616","https://openalex.org/W4313591247","https://openalex.org/W4319439792"],"related_works":["https://openalex.org/W3148526535","https://openalex.org/W2380962566","https://openalex.org/W2368379890","https://openalex.org/W2183525346","https://openalex.org/W2350859535","https://openalex.org/W2009124313","https://openalex.org/W2379417114","https://openalex.org/W2184360008","https://openalex.org/W2081159194","https://openalex.org/W2383965035"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,8,16,114,285],"is":[2],"a":[3,11,78,119,182,205,215,244,282],"technology":[4,130],"for":[5,14,30,157,190],"efficiently":[6],"using":[7,128],"infrastructures":[9,27],"and":[10,18,25,46,51,71,131,150,155,160,267],"business":[12],"model":[13],"selling":[15],"resources":[17],"services.":[19],"However,":[20],"intruders":[21],"find":[22],"such":[23],"complex":[24],"distributed":[26],"appealing":[28],"targets":[29],"cyber-attacks.":[31],"Cyber-attacks":[32,53],"are":[33,54,102,202],"severe":[34],"threats":[35],"that":[36,94,186],"can":[37,84,276],"jeopardize":[38],"the":[39,68,76,88,165,172,225,228,232,235,289,292],"quality":[40],"of":[41,171,231,246,249,253,259,265,272,291],"service":[42],"provided":[43],"to":[44,62,67,107,163,212,218,287],"clients":[45],"compromise":[47],"data":[48],"integrity,":[49],"confidentiality,":[50],"availability.":[52],"becoming":[55],"more":[56,60],"complex,":[57],"making":[58],"it":[59],"challenging":[61],"detect":[63],"intrusions":[64],"effectively.":[65],"Due":[66],"high":[69],"traffic":[70,168],"increased":[72],"malicious":[73],"activities":[74],"on":[75],"Internet,":[77],"single":[79],"Intrusion":[80,122,143],"Detection":[81,123,144],"System":[82],"(IDS)":[83],"be":[85,108,219,277],"overwhelmed.":[86],"Despite":[87],"various":[89],"Deep":[90],"Learning":[91],"(DL)":[92],"approaches":[93],"have":[95],"been":[96],"proposed":[97,166,173],"as":[98,181,214],"alternative":[99],"solutions,":[100],"there":[101],"still":[103],"pertinent":[104],"security":[105,290],"issues":[106],"addressed":[109],"especially":[110],"in":[111,204,224,281],"federated":[112,283],"cloud":[113,284],"domains.":[115],"This":[116],"work":[117],"proposes":[118],"Secure":[120],"Federated":[121],"Model":[124],"Version":[125],"1":[126],"(SecFedIDM-V1)":[127],"blockchain":[129,210],"Bidirectional":[132],"Long":[133],"Short-Term":[134],"Memory":[135],"(BiLSTM)":[136],"Recurrent":[137],"Neural":[138],"Network":[139],"(RNN).":[140],"The":[141,175,199,274],"Cobourg":[142],"Dataset":[145],"(CIDDS)":[146],"was":[147,178],"acquired,":[148],"pre-processed":[149],"split":[151],"into":[152,193],"60:20:20,":[153],"70:15:15,":[154],"80:10:10":[156,236],"training,":[158],"testing,":[159],"validation":[161],"respectively":[162],"develop":[164],"intrusion":[167,233],"classification":[169],"component":[170],"model.":[174],"developed":[176],"SecFedIDM-V1":[177,275],"later":[179],"deployed":[180,278],"Python-based":[183],"web":[184],"application":[185],"captures":[187],"network":[188,238],"packets":[189,201],"classifying":[191],"attacks":[192],"normal":[194],"or":[195],"an":[196],"attack":[197,200],"type.":[198],"recorded":[203],"Hyperledger":[206],"Fabric":[207],"(a":[208],"private":[209],"technology)":[211],"serve":[213],"signature":[216],"database":[217],"used":[220],"by":[221],"other":[222],"nodes":[223],"network.":[226],"From":[227],"evaluation":[229],"results":[230],"classifier,":[234],"BiLSTM":[237],"performed":[239],"better":[240],"than":[241],"GRU":[242],"with":[243],"Precision":[245],"0.99624,":[247],"Recall":[248],"0.99906,":[250],"F1":[251],"Score":[252],"0.99614,":[254],"False":[255,261],"Positive":[256,269],"Rate":[257,263,270],"(FPR)":[258],"0.00094,":[260],"Negative":[262],"(FNR)":[264],"0.00395":[266],"True":[268],"(TPR)":[271],"0.99605.":[273],"alongside":[279],"Firewalls":[280],"environment":[286],"reinforce":[288],"infrastructure.":[293]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":5}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2025-10-10T00:00:00"}
