<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href='static/style.xsl' type='text/xsl'?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-04-07T17:03:33Z</responseDate><request verb="GetRecord" identifier="oai:ebiltegia.mondragon.edu:20.500.11984/6217" metadataPrefix="rdf">https://ebiltegia.mondragon.edu/oai/request</request><GetRecord><record><header><identifier>oai:ebiltegia.mondragon.edu:20.500.11984/6217</identifier><datestamp>2024-04-19T08:21:39Z</datestamp><setSpec>com_20.500.11984_473</setSpec><setSpec>col_20.500.11984_478</setSpec></header><metadata><rdf:RDF xmlns:rdf="http://www.openarchives.org/OAI/2.0/rdf/" xmlns:ow="http://www.ontoweb.org/ontology/1#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ds="http://dspace.org/ds/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:doc="http://www.lyncode.com/xoai" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/rdf/ http://www.openarchives.org/OAI/2.0/rdf.xsd">
   <ow:Publication rdf:about="oai:ebiltegia.mondragon.edu:20.500.11984/6217">
      <dc:title>Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks</dc:title>
      <dc:creator>Zurutuza, Urko</dc:creator>
      <dc:contributor>Sáez-de-Cámara, Xabier</dc:contributor>
      <dc:contributor>Flores, José Luis</dc:contributor>
      <dc:contributor>Arellano, Cristóbal</dc:contributor>
      <dc:contributor>Urbieta, Aitor</dc:contributor>
      <dc:subject>Anomaly detection</dc:subject>
      <dc:subject>Botnet</dc:subject>
      <dc:subject>Internet of things</dc:subject>
      <dc:subject>Intrusion detection</dc:subject>
      <dc:subject>Machine learning</dc:subject>
      <dc:subject>Network security</dc:subject>
      <dc:description>APC (formulario). 2790 EUR</dc:description>
      <dc:description>There is a growing trend of cyberattacks against Internet of Things (IoT) devices; moreover, the sophistication and motivation of those attacks is increasing. The vast scale of IoT, diverse hardware and software, and being typically placed in uncontrolled environments make traditional IT security mechanisms such as signature-based intrusion detection and prevention systems challenging to integrate. They also struggle to cope with the rapidly evolving IoT threat landscape due to long delays between the analysis and publication of the detection rules. Machine learning methods have shown faster response to emerging threats; however, model training architectures like cloud or edge computing face multiple drawbacks in IoT settings, including network overhead and data isolation arising from the large scale and heterogeneity that characterizes these networks.</dc:description>
      <dc:date>2024-02-02T08:53:12Z</dc:date>
      <dc:date>2024-02-02T08:53:12Z</dc:date>
      <dc:date>2023</dc:date>
      <dc:type>http://purl.org/coar/resource_type/c_6501</dc:type>
      <dc:identifier>0167-4048 (papel)</dc:identifier>
      <dc:identifier>1872-6208 (online)</dc:identifier>
      <dc:identifier>https://katalogoa.mondragon.edu/janium-bin/janium_login_opac.pl?find&amp;ficha_no=173003</dc:identifier>
      <dc:identifier>https://hdl.handle.net/20.500.11984/6217</dc:identifier>
      <dc:language>eng</dc:language>
      <dc:rights>Attribution 4.0 International</dc:rights>
      <dc:rights>http://creativecommons.org/licenses/by/4.0/</dc:rights>
      <dc:rights>© 2023 The Authors</dc:rights>
      <dc:publisher>Elsevier</dc:publisher>
   </ow:Publication>
</rdf:RDF></metadata></record></GetRecord></OAI-PMH>