{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T23:15:41Z","timestamp":1776899741952,"version":"3.51.2"},"reference-count":90,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004175","name":"Orta Do\u011fu Teknik \u00dcniversitesi","doi-asserted-by":"publisher","award":["GAP-312-2020-10297"],"award-info":[{"award-number":["GAP-312-2020-10297"]}],"id":[{"id":"10.13039\/501100004175","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018384","name":"Directorate General for European Programmes, Coordination and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018384","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018693","name":"Horizon 2020","doi-asserted-by":"publisher","award":["739578"],"award-info":[{"award-number":["739578"]}],"id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1016\/j.comcom.2024.02.023","type":"journal-article","created":{"date-parts":[[2024,2,24]],"date-time":"2024-02-24T11:22:40Z","timestamp":1708773760000},"page":"209-239","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":66,"special_numbering":"C","title":["GEMLIDS-MIOT: A Green Effective Machine Learning Intrusion Detection System based on Federated Learning for Medical IoT network security hardening"],"prefix":"10.1016","volume":"218","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1562-5543","authenticated-orcid":false,"given":"Iacovos","family":"Ioannou","sequence":"first","affiliation":[]},{"given":"Prabagarane","family":"Nagaradjane","sequence":"additional","affiliation":[]},{"given":"Pelin","family":"Angin","sequence":"additional","affiliation":[]},{"given":"Palaniappan","family":"Balasubramanian","sequence":"additional","affiliation":[]},{"given":"Karthick Jeyagopal","family":"Kavitha","sequence":"additional","affiliation":[]},{"given":"Palani","family":"Murugan","sequence":"additional","affiliation":[]},{"given":"Vasos","family":"Vassiliou","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2024.02.023_b1","series-title":"2017 26th International Conference on Computer Communication and Networks","first-page":"1","article-title":"Machine-learning classifiers for security in connected medical devices","author":"Gao","year":"2017"},{"issue":"6","key":"10.1016\/j.comcom.2024.02.023_b2","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MNET.001.1900105","article-title":"Intrusion detection based on stacked autoencoder for connected healthcare systems","volume":"33","author":"He","year":"2019","journal-title":"IEEE Netw."},{"key":"10.1016\/j.comcom.2024.02.023_b3","series-title":"2020 IEEE Conference on Communications and Network Security","first-page":"1","article-title":"HEKA: A novel intrusion detection system for attacks to personal medical devices","author":"Newaz","year":"2020"},{"key":"10.1016\/j.comcom.2024.02.023_b4","series-title":"2017 Seventh International Conference on Emerging Security Technologies","first-page":"144","article-title":"Distributed intrusion detection using mobile agents in wireless body area networks","author":"Odesile","year":"2017"},{"key":"10.1016\/j.comcom.2024.02.023_b5","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.comcom.2020.05.048","article-title":"An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture","volume":"160","author":"R.M.","year":"2020","journal-title":"Comput. Commun."},{"key":"10.1016\/j.comcom.2024.02.023_b6","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.comcom.2020.12.003","article-title":"An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks","volume":"166","author":"Kumar","year":"2021","journal-title":"Comput. Commun."},{"issue":"2","key":"10.1016\/j.comcom.2024.02.023_b7","first-page":"1537","article-title":"M-IDM: A multi-classification based intrusion detection model in healthcare IoT","volume":"67","author":"Jae-Dong-Lee Hyo-Soung-Cha","year":"2021","journal-title":"Comput. Mater. Contin."},{"key":"10.1016\/j.comcom.2024.02.023_b8","doi-asserted-by":"crossref","first-page":"106576","DOI":"10.1109\/ACCESS.2020.3000421","article-title":"Intrusion detection system for healthcare systems using medical and network data: A comparison study","volume":"8","author":"Hady","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2024.02.023_b9","series-title":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics Mobile Communication Conference","first-page":"0515","article-title":"FBAD: Fog-based attack detection for IoT healthcare in smart cities","author":"Alrashdi","year":"2019"},{"key":"10.1016\/j.comcom.2024.02.023_b10","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/j.comcom.2021.01.013","article-title":"A hybrid DL-driven intelligent SDN-enabled malware detection framework for internet of medical things (IoMT)","volume":"170","author":"Khan","year":"2021","journal-title":"Comput. Commun."},{"issue":"May 2022","key":"10.1016\/j.comcom.2024.02.023_b11","article-title":"AnoFed: Adaptive anomaly detection for digital health using transformer-based federated learning and support vector data description","volume":"121","author":"Raza","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.comcom.2024.02.023_b12","series-title":"2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications","first-page":"600","article-title":"Denial-of-service detection in 6lowpan based internet of things","author":"Kasinathan","year":"2013"},{"key":"10.1016\/j.comcom.2024.02.023_b13","first-page":"1","article-title":"Identification of malicious activities in industrial internet of things based on deep learning models","volume":"41","author":"Muna","year":"2018","journal-title":"J. Inf. Secur. Appl."},{"issue":"12","key":"10.1016\/j.comcom.2024.02.023_b14","doi-asserted-by":"crossref","first-page":"24188","DOI":"10.3390\/s141224188","article-title":"A malicious pattern detection engine for embedded security systems in the internet of things","volume":"14","author":"Oh","year":"2014","journal-title":"Sensors"},{"key":"10.1016\/j.comcom.2024.02.023_b15","series-title":"Proceedings of the 13th ACM International Conference on PErvasive Technologies Related to Assistive Environments","article-title":"Neural network architectures for the detection of SYN flood attacks in IoT systems","author":"Evmorfos","year":"2020"},{"issue":"16","key":"10.1016\/j.comcom.2024.02.023_b16","doi-asserted-by":"crossref","first-page":"4372","DOI":"10.3390\/s20164372","article-title":"Machine learning-based IoT-botnet attack detection with sequential architecture","volume":"20","author":"Soe","year":"2020","journal-title":"Sensors"},{"key":"10.1016\/j.comcom.2024.02.023_b17","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.asoc.2018.05.049","article-title":"Semi-supervised learning based distributed attack detection framework for IoT","volume":"72","author":"Rathore","year":"2018","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.comcom.2024.02.023_b18","series-title":"Asia-Pacific Network Operations and Management Symposium","first-page":"515","article-title":"Attack model and detection scheme for botnet on 6lowpan","author":"Cho","year":"2009"},{"key":"10.1016\/j.comcom.2024.02.023_b19","series-title":"2016 13th IEEE Annual Consumer Communications & Networking Conference","first-page":"319","article-title":"Distributed internal anomaly detection system for internet-of-things","author":"Thanigaivelan","year":"2016"},{"key":"10.1016\/j.comcom.2024.02.023_b20","series-title":"2015 IEEE 34th International Performance Computing and Communications Conference","first-page":"1","article-title":"Ultra-lightweight deep packet anomaly detection for internet of things devices","author":"Summerville","year":"2015"},{"key":"10.1016\/j.comcom.2024.02.023_b21","series-title":"Advanced Technologies, Embedded and Multimedia for Human-Centric Computing","first-page":"1205","article-title":"A lightweight intrusion detection scheme based on energy consumption analysis in 6LowPAN","author":"Lee","year":"2014"},{"issue":"9","key":"10.1016\/j.comcom.2024.02.023_b22","article-title":"Real time intrusion and wormhole attack detection in internet of things","volume":"121","author":"Pongle","year":"2015","journal-title":"Int. J. Comput. Appl."},{"key":"10.1016\/j.comcom.2024.02.023_b23","series-title":"2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress","first-page":"836","article-title":"A dimension reduction model and classifier for anomaly-based intrusion detection in internet of things","author":"Zhao","year":"2017"},{"key":"10.1016\/j.comcom.2024.02.023_b24","article-title":"A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks","author":"Pajouh","year":"2016","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"June","key":"10.1016\/j.comcom.2024.02.023_b25","article-title":"Fed-ANIDS: Federated learning for anomaly-based network intrusion detection systems","volume":"234","author":"Idrissi","year":"2023","journal-title":"Expert Syst. Appl."},{"issue":"March","key":"10.1016\/j.comcom.2024.02.023_b26","article-title":"Federated deep learning for anomaly detection in the internet of things","volume":"108","author":"Wang","year":"2023","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"10.1016\/j.comcom.2024.02.023_b27","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.dcan.2022.02.007","article-title":"Enhancing IoT anomaly detection performance for federated learning","volume":"8","author":"Weinger","year":"2022","journal-title":"Digit. Commun. Netw."},{"key":"10.1016\/j.comcom.2024.02.023_b28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2019\/6516253","article-title":"Multiclass classification procedure for detecting attacks on MQTT-IoT protocol","volume":"2019","author":"Alaiz-Moreton","year":"2019","journal-title":"Complexity"},{"issue":"4","key":"10.1016\/j.comcom.2024.02.023_b29","doi-asserted-by":"crossref","first-page":"930","DOI":"10.3390\/electronics12040930","article-title":"Intrusion detection system based on one-class support vector machine and Gaussian mixture model","volume":"12","author":"Wang","year":"2023","journal-title":"Electronics"},{"key":"10.1016\/j.comcom.2024.02.023_b30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2014.09.008","article-title":"The internet of things vision: Key features, applications and open issues","volume":"54","author":"Borgia","year":"2014","journal-title":"Comput. Commun."},{"issue":"4","key":"10.1016\/j.comcom.2024.02.023_b31","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","article-title":"Internet of things: A survey on enabling technologies, protocols, and applications","volume":"17","author":"Al-Fuqaha","year":"2015","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"10.1016\/j.comcom.2024.02.023_b32","series-title":"REST: Architectural Styles and the Design of Network-Based Software Architectures","author":"Fielding","year":"2000"},{"key":"10.1016\/j.comcom.2024.02.023_b33","series-title":"International Workshop on Security Protocols","first-page":"31","article-title":"Secure communications and man-in-the-middle","author":"Charles","year":"2002"},{"issue":"2","key":"10.1016\/j.comcom.2024.02.023_b34","first-page":"317","article-title":"Modeling and defending against DDoS attacks","volume":"92","author":"Mirkovic","year":"2004","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.comcom.2024.02.023_b35","series-title":"Proceedings of the 2009 ACM Workshop on Cloud Computing Security","first-page":"13","article-title":"Efficient brute-force attack search algorithms","author":"Nitta","year":"2009"},{"key":"10.1016\/j.comcom.2024.02.023_b36","series-title":"Proceedings of the IEEE\/RSJ International Conference on Intelligent Robots and Systems","first-page":"2615","article-title":"Real-time detection of NMAP scans","author":"Raghavan","year":"2016"},{"issue":"2.5","key":"10.1016\/j.comcom.2024.02.023_b37","first-page":"3","article-title":"Tutorial on support vector machine (svm)","volume":"37","author":"Jakkula","year":"2006","journal-title":"Sch. EECS Washington State Univ."},{"key":"10.1016\/j.comcom.2024.02.023_b38","series-title":"International Workshop on Multiple Classifier Systems","first-page":"181","article-title":"Ensembles of one class support vector machines","author":"Shieh","year":"2009"},{"key":"10.1016\/j.comcom.2024.02.023_b39","series-title":"AMIA Annual Symposium Proceedings","first-page":"172","article-title":"Outlier detection with one-class SVMs: an application to melanoma prognosis","volume":"Vol. 2010","author":"Dreiseitl","year":"2010"},{"issue":"4","key":"10.1016\/j.comcom.2024.02.023_b40","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1007\/s10462-013-9395-x","article-title":"One-class support vector machines: analysis of outlier detection for wireless sensor networks in harsh environments","volume":"43","author":"Shahid","year":"2015","journal-title":"Artif. Intell. Rev."},{"issue":"2","key":"10.1016\/j.comcom.2024.02.023_b41","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1093\/comjnl\/bxab166","article-title":"Detecting urban anomalies using factor analysis and one class support vector machine","volume":"66","author":"Lu","year":"2023","journal-title":"Comput. J."},{"key":"10.1016\/j.comcom.2024.02.023_b42","series-title":"Dimensionality Reduction with Unsupervised Nearest Neighbors","first-page":"13","article-title":"K-nearest neighbors","author":"Kramer","year":"2013"},{"issue":"6","key":"10.1016\/j.comcom.2024.02.023_b43","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1002\/cem.873","article-title":"An introduction to decision tree modeling","volume":"18","author":"Myles","year":"2004","journal-title":"J. Chemometr.: J. Chemometr. Soc."},{"issue":"1","key":"10.1016\/j.comcom.2024.02.023_b44","first-page":"713","article-title":"Na\u00efve Bayes.","volume":"15","author":"Webb","year":"2010","journal-title":"Encyclopedia Mach. Learn."},{"key":"10.1016\/j.comcom.2024.02.023_b45","series-title":"Ensemble Machine Learning: Methods and Applications","first-page":"157","article-title":"Random forests","author":"Cutler","year":"2012"},{"key":"10.1016\/j.comcom.2024.02.023_b46","series-title":"2009 International Joint Conference on Neural Networks","first-page":"302","article-title":"On the selection of decision trees in random forests","author":"Bernard","year":"2009"},{"issue":"1","key":"10.1016\/j.comcom.2024.02.023_b47","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"key":"10.1016\/j.comcom.2024.02.023_b48","series-title":"Introduction to Programming with Fortran: With Coverage of Fortran 90, 95, 2003, 2008 and 77","first-page":"359","article-title":"An introduction to algorithms and the big o notation","author":"Chivers","year":"2015"},{"issue":"1","key":"10.1016\/j.comcom.2024.02.023_b49","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"issue":"1","key":"10.1016\/j.comcom.2024.02.023_b50","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/TII.2019.2915559","article-title":"Enhanced random forest with concurrent analysis of static and dynamic nodes for industrial fault classification","volume":"16","author":"Chai","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"3","key":"10.1016\/j.comcom.2024.02.023_b51","first-page":"18","article-title":"Classification and regression by randomforest","volume":"2","author":"Liaw","year":"2002","journal-title":"R News"},{"key":"10.1016\/j.comcom.2024.02.023_b52","unstructured":"C. Chen, A. Liaw, L. Breiman, Random forests for imbalanced data, in: Proceedings of the International Conference on Machine Learning, ICML, 2010."},{"key":"10.1016\/j.comcom.2024.02.023_b53","unstructured":"C. Chen, A. Liaw, L. Breiman, Using random forest to learn imbalanced data, in: Proceedings of the International Conference on Machine Learning, ICML, 2004."},{"key":"10.1016\/j.comcom.2024.02.023_b54","unstructured":"J. Bergstra, Y. Bengio, Random search for hyper-parameter optimization, in: Proceedings of the International Conference on Machine Learning, ICML, 2012."},{"issue":"6","key":"10.1016\/j.comcom.2024.02.023_b55","doi-asserted-by":"crossref","first-page":"2759","DOI":"10.1109\/TCBB.2020.3041527","article-title":"An enhanced random forests approach to predict heart failure from small imbalanced gene expression data","volume":"18","author":"Chicco","year":"2020","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinform."},{"key":"10.1016\/j.comcom.2024.02.023_b56","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.neucom.2015.03.096","article-title":"Robust head pose estimation using Dirichlet-tree distribution enhanced random forests","volume":"173","author":"Liu","year":"2016","journal-title":"Neurocomputing"},{"issue":"18","key":"10.1016\/j.comcom.2024.02.023_b57","doi-asserted-by":"crossref","first-page":"2010","DOI":"10.1093\/bioinformatics\/btn356","article-title":"Enriched random forests","volume":"24","author":"Amaratunga","year":"2008","journal-title":"Bioinformatics"},{"issue":"4","key":"10.1016\/j.comcom.2024.02.023_b58","doi-asserted-by":"crossref","first-page":"1404","DOI":"10.1109\/JBHI.2018.2856276","article-title":"Automated layer segmentation of retinal optical coherence tomography images using a deep feature enhanced structured random forests classifier","volume":"23","author":"Liu","year":"2018","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"10.1016\/j.comcom.2024.02.023_b59","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.eng.2021.12.002","article-title":"Federated learning for 6G: Applications, challenges, and opportunities","volume":"8","author":"Yang","year":"2022","journal-title":"Engineering"},{"key":"10.1016\/j.comcom.2024.02.023_b60","series-title":"Federated optimization: Distributed optimization beyond the datacenter","author":"Kone\u010dn\u1ef3","year":"2015"},{"issue":"1\u20132","key":"10.1016\/j.comcom.2024.02.023_b61","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/2200000083","article-title":"Advances and open problems in federated learning","volume":"14","author":"Kairouz","year":"2021","journal-title":"Found. Trends\u00ae Mach. Learn."},{"key":"10.1016\/j.comcom.2024.02.023_b62","series-title":"HeteroFL: Computation and communication efficient federated learning for heterogeneous clients","author":"Diao","year":"2020"},{"key":"10.1016\/j.comcom.2024.02.023_b63","series-title":"Artificial Intelligence and Statistics","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"key":"10.1016\/j.comcom.2024.02.023_b64","doi-asserted-by":"crossref","unstructured":"K. Bonawitz, V. Ivanov, B. Kreuter, A. Marcedone, H.B. McMahan, S. Patel, D. Ramage, A. Segal, K. Seth, Practical secure aggregation for privacy-preserving machine learning, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 1175\u20131191.","DOI":"10.1145\/3133956.3133982"},{"key":"10.1016\/j.comcom.2024.02.023_b65","series-title":"Federated quantization for communication-efficient collaborative learning","author":"Li","year":"2020"},{"issue":"10","key":"10.1016\/j.comcom.2024.02.023_b66","doi-asserted-by":"crossref","first-page":"9530","DOI":"10.1109\/JIOT.2020.2991416","article-title":"Personalized federated learning with differential privacy","volume":"7","author":"Hu","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comcom.2024.02.023_b67","series-title":"Computer and Information Security Handbook","author":"Vacca","year":"2012"},{"issue":"8","key":"10.1016\/j.comcom.2024.02.023_b68","doi-asserted-by":"crossref","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","article-title":"SVELTE: Real-time intrusion detection in the internet of things","volume":"11","author":"Raza","year":"2013","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.comcom.2024.02.023_b69","series-title":"2015 IFIP\/IEEE International Symposium on Integrated Network Management","first-page":"606","article-title":"Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for internet of things","author":"Cervantes","year":"2015"},{"issue":"8","key":"10.1016\/j.comcom.2024.02.023_b70","doi-asserted-by":"crossref","DOI":"10.1155\/2013\/794326","article-title":"Routing attacks and countermeasures in the RPL-based internet of things","volume":"9","author":"Wallgren","year":"2013","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"3","key":"10.1016\/j.comcom.2024.02.023_b71","doi-asserted-by":"crossref","first-page":"494","DOI":"10.3390\/electronics11030494","article-title":"Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT)","volume":"11","author":"Ali","year":"2022","journal-title":"Electronics"},{"key":"10.1016\/j.comcom.2024.02.023_b72","series-title":"2017 3rd International Conference on Advances in Computing, Communication & Automation","first-page":"1","article-title":"Man-in-the-middle attack in wireless and computer networking\u2014A review","author":"Bhushan","year":"2017"},{"key":"10.1016\/j.comcom.2024.02.023_b73","series-title":"Advances in Nature-Inspired Cyber Security and Resilience","first-page":"9","article-title":"Detection of reconnaissance attacks on IoT devices using deep neural networks","author":"Alani","year":"2021"},{"issue":"1","key":"10.1016\/j.comcom.2024.02.023_b74","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MNET.011.2000783","article-title":"Coordinated backdoor attacks against federated learning with model-dependent triggers","volume":"36","author":"Gong","year":"2022","journal-title":"IEEE Netw."},{"key":"10.1016\/j.comcom.2024.02.023_b75","doi-asserted-by":"crossref","first-page":"63229","DOI":"10.1109\/ACCESS.2021.3075203","article-title":"Vulnerabilities in federated learning","volume":"9","author":"Bouacida","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2024.02.023_b76","series-title":"Computer Security\u2013ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14\u201318, 2020, Proceedings, Part I 25","first-page":"480","article-title":"Data poisoning attacks against federated learning systems","author":"Tolpegin","year":"2020"},{"issue":"5","key":"10.1016\/j.comcom.2024.02.023_b77","doi-asserted-by":"crossref","first-page":"975","DOI":"10.1038\/bjc.1991.441","article-title":"Categorising continuous variables.","volume":"64","author":"Altman","year":"1991","journal-title":"Br. J. Cancer"},{"key":"10.1016\/j.comcom.2024.02.023_b78","first-page":"1710","article-title":"Improving the precision of classification trees","author":"Loh","year":"2009","journal-title":"Ann. Appl. Stat."},{"issue":"2","key":"10.1016\/j.comcom.2024.02.023_b79","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1080\/07350015.2013.863158","article-title":"Feature screening for ultrahigh dimensional categorical data with applications","volume":"32","author":"Huang","year":"2014","journal-title":"J. Bus. Econom. Statist."},{"issue":"1","key":"10.1016\/j.comcom.2024.02.023_b80","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/1007730.1007735","article-title":"A study of the behavior of several methods for balancing machine learning training data","volume":"6","author":"Batista","year":"2004","journal-title":"SIGKDD Explor. Newsl."},{"issue":"1","key":"10.1016\/j.comcom.2024.02.023_b81","first-page":"321","article-title":"SMOTE: Synthetic minority over-sampling technique","volume":"16","author":"Chawla","year":"2002","journal-title":"J. Artif. Int. Res."},{"issue":"3","key":"10.1016\/j.comcom.2024.02.023_b82","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/TPAMI.2009.187","article-title":"Sensitivity analysis of k-fold cross validation in prediction error estimation","volume":"32","author":"Rodriguez","year":"2009","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.comcom.2024.02.023_b83","doi-asserted-by":"crossref","first-page":"80151","DOI":"10.1109\/ACCESS.2022.3165792","article-title":"Efficient medical diagnosis of human heart diseases using machine learning techniques with and without GridSearchCV","volume":"10","author":"Ahmad","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2024.02.023_b84","series-title":"2023 International Conference on Computer Communication and Informatics","first-page":"1","article-title":"Recurrent gastric cancer prediction using randomized search cv optimizer","author":"Vishnu","year":"2023"},{"key":"10.1016\/j.comcom.2024.02.023_b85","series-title":"Towards Enhancement of Machine Learning Techniques using CSE-CIC-IDS2018 Cybersecurity Dataset","author":"Ravikumar","year":"2021"},{"issue":"1","key":"10.1016\/j.comcom.2024.02.023_b86","first-page":"683","article-title":"Machine learning based intrusion detection from wireless sensor network over NSL-KDD dataset","volume":"7","author":"Bisen","year":"2020","journal-title":"IJRAR Int. J. Res. Anal. Rev. (IJRAR)"},{"issue":"9","key":"10.1016\/j.comcom.2024.02.023_b87","doi-asserted-by":"crossref","first-page":"6445","DOI":"10.1109\/TII.2021.3140109","article-title":"A counter-eavesdropping technique for optimized privacy of wireless industrial iot communications","volume":"18","author":"Anajemba","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.comcom.2024.02.023_b88","series-title":"2017 IEEE 13th International Workshop on Factory Communication Systems","first-page":"1","article-title":"Security threats and issues in automation IoT","author":"Varga","year":"2017"},{"key":"10.1016\/j.comcom.2024.02.023_b89","doi-asserted-by":"crossref","first-page":"139244","DOI":"10.1109\/ACCESS.2020.3012121","article-title":"A secure and reliable device access control scheme for IoT based sensor cloud systems","volume":"8","author":"Chaudhry","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2024.02.023_b90","doi-asserted-by":"crossref","unstructured":"Y. Kim, S. Hakak, A. Ghorbani, DDoS Attack Dataset (CICEV2023) against EV Authentication in Charging Infrastructure, in: Proceedings of the 20th International Conference on Privacy, Security, and Trust, PST2023, Copenhagen, Denmark, 2023.","DOI":"10.1109\/PST58708.2023.10320202"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366424000793?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366424000793?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T23:46:48Z","timestamp":1758844008000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366424000793"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":90,"alternative-id":["S0140366424000793"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2024.02.023","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"GEMLIDS-MIOT: A Green Effective Machine Learning Intrusion Detection System based on Federated Learning for Medical IoT network security hardening","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2024.02.023","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}