{"id":"https://openalex.org/W4399172047","doi":"https://doi.org/10.1145/3651781.3651825","title":"Collaborative Botnet Detection in Heterogeneous Devices of Internet of Things using Federated Deep Learning","display_name":"Collaborative Botnet Detection in Heterogeneous Devices of Internet of Things using Federated Deep Learning","publication_year":2024,"publication_date":"2024-02-01","ids":{"openalex":"https://openalex.org/W4399172047","doi":"https://doi.org/10.1145/3651781.3651825"},"language":"en","primary_location":{"id":"doi:10.1145/3651781.3651825","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3651781.3651825","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3651781.3651825","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 13th International Conference on Software and Computer Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3651781.3651825","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011017239","display_name":"Aulia Arif Wardana","orcid":"https://orcid.org/0000-0003-2201-0464"},"institutions":[{"id":"https://openalex.org/I862893732","display_name":"Telkom University","ror":"https://ror.org/0004wsx81","country_code":"ID","type":"education","lineage":["https://openalex.org/I862893732"]}],"countries":["ID"],"is_corresponding":true,"raw_author_name":"Aulia Arif Wardana","raw_affiliation_strings":["School of Computing, Telkom University, Indonesia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Telkom University, Indonesia","institution_ids":["https://openalex.org/I862893732"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012436255","display_name":"Parman Sukarno","orcid":"https://orcid.org/0000-0002-2565-3580"},"institutions":[{"id":"https://openalex.org/I862893732","display_name":"Telkom University","ror":"https://ror.org/0004wsx81","country_code":"ID","type":"education","lineage":["https://openalex.org/I862893732"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Parman Sukarno","raw_affiliation_strings":["School of Computing, Telkom University, Indonesia"],"affiliations":[{"raw_affiliation_string":"School of Computing, Telkom University, Indonesia","institution_ids":["https://openalex.org/I862893732"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114170381","display_name":"Muhammad Salman","orcid":null},"institutions":[{"id":"https://openalex.org/I29617571","display_name":"University of Indonesia","ror":"https://ror.org/0116zj450","country_code":"ID","type":"education","lineage":["https://openalex.org/I29617571"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Muhammad Salman","raw_affiliation_strings":["Engineering Faculty, Universitas Indonesia, Indonesia"],"affiliations":[{"raw_affiliation_string":"Engineering Faculty, Universitas Indonesia, Indonesia","institution_ids":["https://openalex.org/I29617571"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011017239"],"corresponding_institution_ids":["https://openalex.org/I862893732"],"apc_list":null,"apc_paid":null,"fwci":4.0295,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.94214601,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"287","last_page":"291"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.9599793553352356},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8113371133804321},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7774325609207153},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5878902077674866},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.553016185760498},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.47442784905433655},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.45634257793426514},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3585802912712097},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35578256845474243},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.28586485981941223},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.16199269890785217}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.9599793553352356},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8113371133804321},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7774325609207153},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5878902077674866},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.553016185760498},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.47442784905433655},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.45634257793426514},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3585802912712097},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35578256845474243},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.28586485981941223},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.16199269890785217},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3651781.3651825","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3651781.3651825","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3651781.3651825","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 13th International Conference on Software and Computer Applications","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3651781.3651825","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3651781.3651825","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3651781.3651825","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 13th International Conference on Software and Computer Applications","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4399172047.pdf"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W2592212178","https://openalex.org/W2606981059","https://openalex.org/W2799758613","https://openalex.org/W2900594532","https://openalex.org/W2919115771","https://openalex.org/W2937249073","https://openalex.org/W3006372726","https://openalex.org/W3021654819","https://openalex.org/W3122864121","https://openalex.org/W3178297575","https://openalex.org/W3185153723","https://openalex.org/W3195928301","https://openalex.org/W4206724648","https://openalex.org/W4210960727","https://openalex.org/W4296218597","https://openalex.org/W4312882998","https://openalex.org/W4353110502","https://openalex.org/W4384038596","https://openalex.org/W4387713572","https://openalex.org/W6769357154"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W3187581118","https://openalex.org/W2938399969","https://openalex.org/W3143747655","https://openalex.org/W2002178493","https://openalex.org/W2901835651","https://openalex.org/W2883616266","https://openalex.org/W186576250","https://openalex.org/W2193050358"],"abstract_inverted_index":{"This":[0],"research":[1],"introduces":[2],"a":[3,36,76,160,176],"pioneering":[4],"approach,":[5],"termed":[6],"Hierarchical":[7],"Collaborative":[8],"Botnet":[9],"Detection,":[10],"leveraging":[11],"Federated":[12,53],"Deep":[13,54],"Learning":[14,55],"to":[15,159],"address":[16],"the":[17,22,73,87,91,103,107,112,127,156,173,183],"escalating":[18],"security":[19],"concerns":[20],"within":[21],"Internet":[23],"of":[24,75,81,111,137,140,143,148,155,185],"Things":[25],"(IoT)":[26],"ecosystems":[27],"characterized":[28],"by":[29],"heterogeneous":[30],"devices.":[31,122],"The":[32,70,150],"proposed":[33,113,128],"framework":[34],"establishes":[35],"hierarchical":[37,151],"structure":[38],"facilitating":[39],"efficient":[40],"collaboration":[41],"among":[42],"devices":[43],"at":[44],"different":[45],"levels,":[46],"enabling":[47],"scalable":[48,164],"and":[49,99,109,145,152,163,178],"distributed":[50],"botnet":[51,117,165],"detection.":[52],"ensures":[56],"model":[57,79,157],"training":[58],"without":[59],"centralizing":[60],"sensitive":[61],"data,":[62],"respecting":[63],"privacy":[64],"constraints":[65],"inherent":[66],"in":[67,115,182],"IoT":[68,88,121,170,180],"environments.":[69],"methodology":[71],"involves":[72],"development":[74],"collaborative":[77,179],"learning":[78],"capable":[80],"analyzing":[82],"diverse":[83,120],"data":[84],"sources":[85],"across":[86,119],"landscape,":[89],"utilizing":[90],"N-BaIoT":[92,104],"dataset":[93],"for":[94,168,175],"comprehensive":[95],"evaluation.":[96],"Comprehensive":[97],"simulations":[98],"experiments,":[100],"conducted":[101],"with":[102,133],"dataset,":[105],"showcase":[106],"robustness":[108],"efficiency":[110],"approach":[114],"detecting":[116],"activities":[118],"Based":[123],"on":[124],"experimental":[125],"results,":[126],"method":[129],"can":[130],"identify":[131],"botnets":[132],"an":[134,146],"average":[135],"accuracy":[136],"98,97,":[138],"precision":[139],"98,75,":[141],"recall":[142],"99,41,":[144],"F1-score":[147],"99,11.":[149],"federated":[153],"nature":[154],"contributes":[158],"more":[161],"resilient":[162],"detection":[166],"system":[167],"large-scale":[169],"deployments,":[171],"laying":[172],"foundation":[174],"secure":[177],"landscape":[181],"face":[184],"evolving":[186],"cyber":[187],"threats.":[188]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
