<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href='static/style.xsl' type='text/xsl'?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-04-07T17:02:16Z</responseDate><request verb="GetRecord" identifier="oai:ebiltegia.mondragon.edu:20.500.11984/6217" metadataPrefix="mods">https://ebiltegia.mondragon.edu/oai/request</request><GetRecord><record><header><identifier>oai:ebiltegia.mondragon.edu:20.500.11984/6217</identifier><datestamp>2024-04-19T08:21:39Z</datestamp><setSpec>com_20.500.11984_473</setSpec><setSpec>col_20.500.11984_478</setSpec></header><metadata><mods:mods xmlns:mods="http://www.loc.gov/mods/v3" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:doc="http://www.lyncode.com/xoai" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
   <mods:name>
      <mods:namePart>Zurutuza, Urko</mods:namePart>
   </mods:name>
   <mods:extension>
      <mods:dateAvailable encoding="iso8601">2024-02-02T08:53:12Z</mods:dateAvailable>
   </mods:extension>
   <mods:extension>
      <mods:dateAccessioned encoding="iso8601">2024-02-02T08:53:12Z</mods:dateAccessioned>
   </mods:extension>
   <mods:originInfo>
      <mods:dateIssued encoding="iso8601">2023</mods:dateIssued>
   </mods:originInfo>
   <mods:identifier type="issn">0167-4048 (papel)</mods:identifier>
   <mods:identifier type="issn">1872-6208 (online)</mods:identifier>
   <mods:identifier type="other">https://katalogoa.mondragon.edu/janium-bin/janium_login_opac.pl?find&amp;ficha_no=173003</mods:identifier>
   <mods:identifier type="uri">https://hdl.handle.net/20.500.11984/6217</mods:identifier>
   <mods:abstract>There is a growing trend of cyberattacks against Internet of Things (IoT) devices; moreover, the sophistication and motivation of those attacks is increasing. The vast scale of IoT, diverse hardware and software, and being typically placed in uncontrolled environments make traditional IT security mechanisms such as signature-based intrusion detection and prevention systems challenging to integrate. They also struggle to cope with the rapidly evolving IoT threat landscape due to long delays between the analysis and publication of the detection rules. Machine learning methods have shown faster response to emerging threats; however, model training architectures like cloud or edge computing face multiple drawbacks in IoT settings, including network overhead and data isolation arising from the large scale and heterogeneity that characterizes these networks.</mods:abstract>
   <mods:language>
      <mods:languageTerm>eng</mods:languageTerm>
   </mods:language>
   <mods:accessCondition type="useAndReproduction">Attribution 4.0 International</mods:accessCondition>
   <mods:accessCondition type="useAndReproduction">http://creativecommons.org/licenses/by/4.0/</mods:accessCondition>
   <mods:accessCondition type="useAndReproduction">© 2023 The Authors</mods:accessCondition>
   <mods:subject>
      <mods:topic>Anomaly detection</mods:topic>
   </mods:subject>
   <mods:subject>
      <mods:topic>Botnet</mods:topic>
   </mods:subject>
   <mods:subject>
      <mods:topic>Internet of things</mods:topic>
   </mods:subject>
   <mods:subject>
      <mods:topic>Intrusion detection</mods:topic>
   </mods:subject>
   <mods:subject>
      <mods:topic>Machine learning</mods:topic>
   </mods:subject>
   <mods:subject>
      <mods:topic>Network security</mods:topic>
   </mods:subject>
   <mods:titleInfo>
      <mods:title>Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks</mods:title>
   </mods:titleInfo>
   <mods:genre>http://purl.org/coar/resource_type/c_6501</mods:genre>
</mods:mods></metadata></record></GetRecord></OAI-PMH>