{"id":"https://openalex.org/W4415624473","doi":"https://doi.org/10.1109/mnet.2025.3619162","title":"Federated Retrieval-Augmented Generation-Based LLM for Enhanced Cyber Threat Detection in the Internet-of-Energy","display_name":"Federated Retrieval-Augmented Generation-Based LLM for Enhanced Cyber Threat Detection in the Internet-of-Energy","publication_year":2025,"publication_date":"2025-10-28","ids":{"openalex":"https://openalex.org/W4415624473","doi":"https://doi.org/10.1109/mnet.2025.3619162"},"language":null,"primary_location":{"id":"doi:10.1109/mnet.2025.3619162","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.2025.3619162","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077096942","display_name":"Taibai Fu","orcid":"https://orcid.org/0009-0009-7597-9034"},"institutions":[{"id":"https://openalex.org/I23923803","display_name":"University of Exeter","ror":"https://ror.org/03yghzc09","country_code":"GB","type":"education","lineage":["https://openalex.org/I23923803"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Tianxing Fu","raw_affiliation_strings":["Department of Computer Science, University of Exeter, Exeter, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Exeter, Exeter, U.K","institution_ids":["https://openalex.org/I23923803"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002896600","display_name":"Jia Hu","orcid":"https://orcid.org/0000-0001-5406-8420"},"institutions":[{"id":"https://openalex.org/I23923803","display_name":"University of Exeter","ror":"https://ror.org/03yghzc09","country_code":"GB","type":"education","lineage":["https://openalex.org/I23923803"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jia Hu","raw_affiliation_strings":["Department of Computer Science, University of Exeter, Exeter, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Exeter, Exeter, U.K","institution_ids":["https://openalex.org/I23923803"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100770003","display_name":"Geyong Min","orcid":"https://orcid.org/0000-0003-1395-7314"},"institutions":[{"id":"https://openalex.org/I23923803","display_name":"University of Exeter","ror":"https://ror.org/03yghzc09","country_code":"GB","type":"education","lineage":["https://openalex.org/I23923803"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Geyong Min","raw_affiliation_strings":["Department of Computer Science, University of Exeter, Exeter, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Exeter, Exeter, U.K","institution_ids":["https://openalex.org/I23923803"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051309937","display_name":"Sunder Ali Khowaja","orcid":"https://orcid.org/0000-0002-4586-4131"},"institutions":[{"id":"https://openalex.org/I42934936","display_name":"Dublin City University","ror":"https://ror.org/04a1a1e81","country_code":"IE","type":"education","lineage":["https://openalex.org/I42934936"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Sunder Ali Khowaja","raw_affiliation_strings":["Dublin City University, Dublin 9, Ireland"],"affiliations":[{"raw_affiliation_string":"Dublin City University, Dublin 9, Ireland","institution_ids":["https://openalex.org/I42934936"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071647281","display_name":"Keshav Singh","orcid":"https://orcid.org/0000-0001-9028-4518"},"institutions":[{"id":"https://openalex.org/I142974352","display_name":"National Sun Yat-sen University","ror":"https://ror.org/00mjawt10","country_code":"TW","type":"education","lineage":["https://openalex.org/I142974352"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Keshav Singh","raw_affiliation_strings":["National Sun Yat-sen University, Kaohsiung, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Sun Yat-sen University, Kaohsiung, Taiwan","institution_ids":["https://openalex.org/I142974352"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064768354","display_name":"Kapal Dev","orcid":"https://orcid.org/0000-0003-1262-8594"},"institutions":[{"id":"https://openalex.org/I4210100923","display_name":"Munster Technological University","ror":"https://ror.org/013xpqh61","country_code":"IE","type":"facility","lineage":["https://openalex.org/I4210100923"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Kapal Dev","raw_affiliation_strings":["Department of Computer Science, ADAPT Centre, Munster Technological University, Cork, Ireland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, ADAPT Centre, Munster Technological University, Cork, Ireland","institution_ids":["https://openalex.org/I4210100923"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5077096942"],"corresponding_institution_ids":["https://openalex.org/I23923803"],"apc_list":null,"apc_paid":null,"fwci":1.6666,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.8925936,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"40","issue":"1","first_page":"13","last_page":"19"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.1437000036239624,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.1437000036239624,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.10939999669790268,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.09040000289678574,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interconnectivity","display_name":"Interconnectivity","score":0.6697999835014343},{"id":"https://openalex.org/keywords/transformative-learning","display_name":"Transformative learning","score":0.5394999980926514},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.44749999046325684},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.44269999861717224},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.42239999771118164},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.39809998869895935},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.3878999948501587},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.3725000023841858},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.3467999994754791},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.34279999136924744}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7991999983787537},{"id":"https://openalex.org/C25516864","wikidata":"https://www.wikidata.org/wiki/Q1665949","display_name":"Interconnectivity","level":2,"score":0.6697999835014343},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6191999912261963},{"id":"https://openalex.org/C70587473","wikidata":"https://www.wikidata.org/wiki/Q7834111","display_name":"Transformative learning","level":2,"score":0.5394999980926514},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.44749999046325684},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.44269999861717224},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.42239999771118164},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.39809998869895935},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.3878999948501587},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.3725000023841858},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.3467999994754791},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.34279999136924744},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3425000011920929},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.33970001339912415},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.335099995136261},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.3321000039577484},{"id":"https://openalex.org/C2779208394","wikidata":"https://www.wikidata.org/wiki/Q7140460","display_name":"Participatory sensing","level":2,"score":0.32989999651908875},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3197000026702881},{"id":"https://openalex.org/C126082660","wikidata":"https://www.wikidata.org/wiki/Q4252370","display_name":"Digital transformation","level":2,"score":0.31850001215934753},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.2924000024795532},{"id":"https://openalex.org/C72634772","wikidata":"https://www.wikidata.org/wiki/Q386824","display_name":"Data integration","level":2,"score":0.2924000024795532},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.2879999876022339},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.2858000099658966},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2727000117301941},{"id":"https://openalex.org/C207267971","wikidata":"https://www.wikidata.org/wiki/Q120208","display_name":"Emerging technologies","level":2,"score":0.2655999958515167},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.26489999890327454},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.26460000872612},{"id":"https://openalex.org/C127627568","wikidata":"https://www.wikidata.org/wiki/Q1639361","display_name":"Sociotechnical system","level":2,"score":0.2628999948501587},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C30772137","wikidata":"https://www.wikidata.org/wiki/Q5164762","display_name":"Consumption (sociology)","level":2,"score":0.2558000087738037},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.2533000111579895},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.2531999945640564},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mnet.2025.3619162","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.2025.3619162","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2107263349","https://openalex.org/W2767094836","https://openalex.org/W2896457183","https://openalex.org/W4226346873","https://openalex.org/W4385245566","https://openalex.org/W4391582407","https://openalex.org/W4404953656","https://openalex.org/W4415124086"],"related_works":[],"abstract_inverted_index":{"The":[0],"Internet-of-Energy":[1],"(IoE)":[2],"represents":[3],"a":[4,50,110],"transformative":[5],"integration":[6,182],"of":[7,155,166],"digital":[8],"technologies":[9],"and":[10,25,32,81,96,132,143,148],"AI-driven":[11],"analytics":[12],"with":[13,73,183],"energy":[14,22],"infrastructure,":[15],"creating":[16],"an":[17],"intelligent":[18],"ecosystem":[19],"that":[20],"optimizes":[21],"generation,":[23],"distribution,":[24],"consumption":[26],"across":[27,193],"interconnected":[28],"grids,":[29],"renewable":[30],"resources,":[31],"smart":[33],"consumer":[34],"devices.":[35],"While":[36],"enabling":[37,188],"unprecedented":[38],"efficiency,":[39],"this":[40,105],"interconnectivity":[41],"introduces":[42],"significant":[43,89],"cybersecurity":[44,71,167,179],"vulnerabilities,":[45],"as":[46,145],"each":[47],"component":[48],"presents":[49],"potential":[51],"entry":[52],"point":[53],"for":[54,116,176],"adversaries":[55],"seeking":[56],"to":[57,121],"disrupt":[58],"critical":[59],"operations.":[60],"Large":[61],"language":[62,77],"models":[63],"(LLMs)":[64],"have":[65],"shown":[66],"immense":[67],"promise":[68],"in":[69,91,101,163],"addressing":[70],"issues":[72],"their":[74],"powerful":[75],"natural":[76],"understanding,":[78],"semantic":[79],"reasoning,":[80],"robust":[82],"knowledge":[83],"representation":[84],"capabilities.":[85],"However,":[86],"LLMs":[87],"encounter":[88],"limitations":[90],"processing":[92],"sensitive,":[93],"distributed":[94],"data":[95,186],"executing":[97],"real-time":[98],"threat":[99,124,168,191],"detection":[100,125,130,192],"IoE":[102,196],"environments.":[103],"In":[104],"paper,":[106],"we":[107],"propose":[108],"FeRAG,":[109],"Federated":[111],"Retrieval-Augmented":[112],"Generation-based":[113],"LLM":[114,146],"system":[115],"autonomous":[117],"log":[118,160],"analysis,":[119],"designed":[120],"enhance":[122],"cyber":[123],"performance":[126],"while":[127],"significantly":[128],"increasing":[129],"efficiency":[131],"mitigating":[133],"privacy":[134],"risks.":[135],"We":[136],"evaluate":[137],"our":[138,149],"method":[139],"using":[140],"both":[141],"GPT-3.5-turbo":[142],"GPT-4o":[144],"models,":[147],"experimental":[150],"results":[151],"demonstrate":[152],"remarkable":[153],"improvements":[154],"FeRAG":[156],"over":[157],"other":[158],"LLM-driven":[159],"analysis":[161],"methods":[162],"the":[164,194],"precision":[165],"detection.":[169],"Our":[170],"research":[171],"also":[172],"explores":[173],"promising":[174],"opportunities":[175],"expanding":[177],"LLMs\u2019":[178],"capabilities":[180],"through":[181],"diverse":[184],"multi-modal":[185],"sources,":[187],"more":[189],"comprehensive":[190],"evolving":[195],"landscape.":[197]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-28T00:00:00"}
