The Evolution of Federated Learning-based Intrusion Detection and Mitigation: a Survey

: . .

BibTeX (Download)

@{,
keywords = {•Security and privacy Usability in security and p, 0, 2020, 4, a, Access control, Access Policy, Accounting, adaptation, and Dependability, ANN, any medium or format, app store, as long as you, attack, attacks, Authentication, Autonomous certificate management, autonomous computing, autonomous management, Autonomous service management, Autonomous service management, by, Caching, Case Studies, case-based reasoning system, Certificates, Certificates, ChaCha20, CoAP, CoAP, CoAP, Collaborative, Collaborative, Collaborative interaction, collaborative visualization, common operational, Configuration, constrained nodes, countermeasures, creative commons attribution 4, creativecommons, CSIRT Human experience, cyber physical system, cyber physical system, Cyber security, Cyber security, Cyber security, Cyber security, Cyber-Physical Systems, Cyber-Physical Systems, Cybersecurity, Cybersecurity {textperiodcentered}, Data and device security, Data-centric, deep learning, deep learning, des pratiques, design, diagnosis, Differential privacy, Discovery, distributed computing, distributed computing, distribution and reproduction in, Domain type enforcement (DTE), Dynamic Password, E2E security, ectuer, entropy, even commercially, event model, File Syste, file system tra-, firewall, firewall, firewall, fonction des donn{\'{e}}es et, for any purpose, framework, Graphical Password, group key management, hping3, https, human, Human computer interaction (HCI), Human Semantic Authentication Protocol, Human-centered computing, Identity management, ind, ind, industrial systems, Information disclosure risk, ing, Interaction {textperiodcentered}, Interaction paradigms, international license, Internet of Things, Internet of Things (IoT), Internet of Things (IoT), Internet of Things (IoT); Data service management; IT service management; Distributed management, Internet of Things (IoT); Data service management; IT service management; Distributed management, Intrusion Detection System, Intrusion Detection System, IoT, IoT, IoT, IoT, IoT, IoT, IoT, IoT, IoT, IPv6, is licensed under a, licenses, Logs, LoPy4, Machine learning, Machine learning, measurement, Metadata, metrics, metrics, Mi-croservices, Microservices, Microservices, MITM attack, Moving Target Defense, moving target defense (MTD), MQTT, MTD, n de disposer d, naming scheme, Network Functions Virtualization (NFV), Network traffic, network traffic prediction, Network virtualization; FCAPS: Fault, nous allons e, OAuth, OPC UA, open access this article, open-source, org, Other aspects relevant to manage IoT systems., Passive monitoring, pattern matching, Performance and Security Management; Cybersystems, PIN Code, Policy enforcement, port-hopping, Privacy budget distribution, psychology, Publish/Subscribe, Query Rewriting, Ransomware, Ransomware, Reality, reconnaissance, reliability, resilience, resilience, RPL, s, safety, SCADA, SCADA, scalability, searchable encryption, Security, Security, Security, Security, Security, Security, Security, Security, Security, Security, Security, Security, Security, Security, Security and Privacy, Security and Reliability in Network Softwarization and Management; Network security; Policybased management, semantic analysis, Semantic Mediation, shar, Shoulder Surfing Attack, smart space, SOC, Software security engineering, stream-cipher, survey, Survivability, Systematic literature review, Systematic literature review, taxonomy, Testbeds and Practical Experiences; Internet of Things (IoT); Applications and case studies; Sensor networks, the author, threat classification, un cas d, Unattended nodes, Unattended nodes, Unattended nodes, Usability study, utilisation r{\'{e}}el, V2V, V2X, Validation and Verification of data and functional, Virtual, Virtual reality, Virtual reality, Visual analytics, Visual analytics, Visualization, Visualization, Visualization application domains, Visualization application domains, which permits unrestricted use, X.509, X.509},
pubstate = {},
tppubtype = {}
}