A Customized Temporal Federated Learning Through Adversarial Networks for Cyber Attack Detection in IoT
DOI:
https://doi.org/10.18196/jrc.v6i1.24529Keywords:
Federated Learning, Adversarial Networks, Cyber-Attack Detection, Temporal Convolutional Networks, Privacy PreservationAbstract
The exponential growth of the Internet of Things (IoT) has heightened the need for secure, privacy-preserving, and efficient cyber-attack detection mechanisms. This study introduces the Customized Temporal Federated Learning through Adversarial Networks (CusTFL-AN) framework, which combines Temporal Convolutional Networks (TCNs) and Generative Adversarial Networks (GANs) for robust and personalized attack detection. CusTFL-AN enables clients to train local models while maintaining data privacy by generating synthetic datasets using GANs and aggregating these at a central server, thereby mitigating risks associated with direct data sharing. The framework's effectiveness is demonstrated on three benchmark datasets—UNSW-NB15, BoT-IoT, and Edge-IIoT—achieving detection accuracies of 99.2%, 99.5%, and 99.25%, respectively, significantly outperforming state-of-the-art methods. Key enhancements include addressing data heterogeneity through federated aggregation, minimizing overfitting using GAN validation and cross-validation techniques, and ensuring interpretability to support practical adoption in real-world IoT scenarios. Privacy mechanisms are strengthened to prevent potential data leakage during aggregation, and ethical considerations surrounding the use of synthetic datasets are acknowledged. Furthermore, the impact of computational constraints, network latency, and communication overhead on resource-constrained IoT devices has been carefully analyzed. While the results affirm the robustness and scalability of CusTFL-AN, future work will focus on extending evaluations to more diverse datasets and addressing the challenges of adversarial attacks. CusTFL-AN represents a significant step forward in privacy-preserving federated learning, offering practical solutions to real-world IoT cybersecurity challenges.
References
A. Hassebo and M. Tealab, “Global Models of Smart Cities and Potential IoT Applications: A Review,” IoT, vol. 4, no. 3, pp. 366–411, Aug. 2023, doi: 10.3390/iot4030017.
D. Anand, A. Kaur, and M. Singh, “Research on Internet of Medical Things: Systematic Review, Research Trends and Challenges,” Recent Advances in Computer Science and Communications, vol. 17, no. 6, Sep. 2024, doi: 10.2174/0126662558248187231124052846.
Y. N. Soe, Y. Feng, P. I. Santosa, R. Hartanto, and K. Sakurai, “Towards a Lightweight Detection System for Cyber Attacks in the IoT Environment Using Corresponding Features,” Electronics, vol. 9, no. 1, p. 144, Jan. 2020, doi: 10.3390/electronics9010144.
H. Hamid et al., “IoT-based botnet attacks systematic mapping study of literature,” Scientometrics, vol. 126, no. 4, pp. 2759–2800, Feb. 2021, doi: 10.1007/s11192-020-03819-5.
F. M. Aswad, A. M. S. Ahmed, N. A. M. Alhammadi, B. A. Khalaf, and S. A. Mostafa, “Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks,” Journal of Intelligent Systems, vol. 32, no. 1, Jan. 2023, doi: 10.1515/jisys-2022-0155.
M. Bhavsingh, K. Samunnisa, and B. Pannalal, “A Blockchain-based Approach for Securing Network Communications in IoT Environments,” International Journal of Computer Engineering in Research Trends, vol. 10, no. 10, pp. 37–43, Oct. 2023, doi: 10.22362/ijcert/2023/v10/i10/v10i106.
H. P. H. Luu, A. Sakhi, and M. Latief, “Optimizing Group Management and Cryptographic Techniques for Secure and Efficient MTC Communication,” Int. J. Comput. Eng. Res. Trends, vol. 11, no. 2, pp. 1–8, Feb. 2024, doi: 10.22362/ijcert/2024/v11/i2/v11i201.
K. Bichya, “Vampire Attacks in WSN Can Lead By Eloa,” Macaw Int. J. Adv. Res. Comput. Sci. Eng, vol. 1, no. 1, pp. 21–27, Nov. 2015.
M. V. A. Kumar, R. A. Nandedapu, and K. V. Sharma, “Real-Time Abdominal Trauma Detection Using LSTM Neural Networks with MediaPipe and OpenCV Integration,” Macaw Int. J. Adv. Res. Comput. Sci. Eng, vol. 10, no. 1, pp. 36–48, Jun. 2024, doi: 10.70162/mijarcse//2024/v10/i1/v10i104.
K. Samunnisa and S. V. K. Gaddam, “Blockchain-Based Decentralized Identity Management for Secure Digital Transactions,” Synth. Multidiscip. Res. J., vol. 1, no. 2, pp. 22–29, Jun. 2023.
A. Z. Tan, H. Yu, L. Cui, and Q. Yang, “Towards personalized Federated Learning,” IEEE Trans. Neural Netw. Learn. Syst., vol. 34, no. 12, pp. 9587–9603, 2023, doi: 10.1109/TNNLS.2022.3160699.
M. J. Pasha, K. P. Rao, A. MallaReddy, and V. Bande, “LRDADF: An AI enabled framework for detecting low-rate DDoS attacks in cloud computing environments,” Measurement: Sensors, vol. 28, p. 100828, Aug. 2023, doi: 10.1016/j.measen.2023.100828.
C. Thapa, M. A. P. Chamikara, and S. A. Camtepe, “Advancements of Federated Learning Towards Privacy Preservation: From Federated Learning to Split Learning,” Federated Learning Systems, pp. 79–109, 2021, doi: 10.1007/978-3-030-70604-3_4.
J.-P. A. Yaacoub, H. N. Noura, and O. Salman, “Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions,” Internet of Things and Cyber-Physical Systems, vol. 3, pp. 155–179, 2023, doi: 10.1016/j.iotcps.2023.04.001.
P. Divyaja, M. K. Devi, and M. U. Rani, “Secure Smart bed on villages for monitoring and storing patient records on Cloud using IoT with Android Mobile,” International Journal of Computer Engineering in Research Trends, vol. 9, no. 1, pp. 16–20, Jan. 2022, doi: 10.22362/ijcert/2022/v9/i01/v9i0103.
E. M. Campos et al., “Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges,” Computer Networks, vol. 203, p. 108661, Feb. 2022, doi: 10.1016/j.comnet.2021.108661.
M. Sarhan, W. W. Lo, S. Layeghy, and M. Portmann, “HBFL: A hierarchical blockchain-based federated learning framework for collaborative IoT intrusion detection,” Computers and Electrical Engineering, vol. 103, p. 108379, Oct. 2022, doi: 10.1016/j.compeleceng.2022.108379.
G. Gitanjali and Er. R. Misra, “FedIoTect: Federated Machine Learning for Collaborative Internet of Things Threat Detection,” Research Square, Feb. 2024, doi: 10.21203/rs.3.rs-3958165/v1.
E. Petrova and A. El-Sayed, “Multi-Objective Optimization for Link Stability in IoT-Fog-Cloud Architectures,” Int. J. Comput. Eng. Res. Trends, vol. 11, no. 10, pp. 13–23, Oct. 2024, doi: 10.22362/ijcert/2024/v11/i10/v11i1002.
A. A. Wardana, G. Kołaczek, and P. Sukarno, “Lightweight, Trust-Managing, and Privacy-Preserving Collaborative Intrusion Detection for Internet of Things,” Applied Sciences, vol. 14, no. 10, p. 4109, May 2024, doi: 10.3390/app14104109.
M. Amiri-Zarandi, R. A. Dara, and X. Lin, “SIDS: A federated learning approach for intrusion detection in IoT using Social Internet of Things,” Computer Networks, vol. 236, p. 110005, Nov. 2023, doi: 10.1016/j.comnet.2023.110005.
M. Sarhan, W. W. Lo, S. Layeghy, and M. Portmann, “HBFL: A hierarchical blockchain-based federated learning framework for collaborative IoT intrusion detection,” Computers and Electrical Engineering, vol. 103, p. 108379, Oct. 2022, doi: 10.1016/j.compeleceng.2022.108379.
S. Xuan, M. Jin, X. Li, Z. Yao, W. Yang, and D. Man, “DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems,” Security and Communication Networks, vol. 2021, pp. 1–14, Jul. 2021, doi: 10.1155/2021/9965157.
M. Bhavsingh, A. Lavanya, and K. Samunnisa, “Sustainable Computing Architectures for Ethical AI: Balancing Performance, Energy Efficiency, and Equity,” Int. J. Comput. Eng. Res. Trends, vol. 11, no. 10, pp. 24–32, Oct. 2024, doi: 10.22362/ijcert/2024/v11/i10/v11i1003
P. Tyagi and S. K. M. bargavi, “Using Federated Artificial Intelligence System of Intrusion Detection for IoT Healthcare System Based on Blockchain,” International Journal of Data Informatics and Intelligent Computing, vol. 2, no. 1, pp. 1–10, Mar. 2023, doi: 10.59461/ijdiic.v2i1.42.
M. Sarhan, W. W. Lo, S. Layeghy, and M. Portmann, “HBFL: A hierarchical blockchain-based federated learning framework for collaborative IoT intrusion detection,” Computers and Electrical Engineering, vol. 103, p. 108379, Oct. 2022, doi: 10.1016/j.compeleceng.2022.108379.
M. A. Ferrag, O. Friha, L. Maglaras, H. Janicke, and L. Shu, “Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis,” IEEE Access, vol. 9, pp. 138509–138542, 2021, doi: 10.1109/access.2021.3118642.
S. Bahadoripour, H. Karimipour, A. N. Jahromi, and A. Islam, “An explainable multi-modal model for advanced cyber-attack detection in industrial control systems,” Internet of Things, vol. 25, p. 101092, Apr. 2024, doi: 10.1016/j.iot.2024.101092.
S. I. Popoola, G. Gui, M. Hammoudeh, R. Ande, B. Adebisi, and O. Jogunola, "Federated Deep Learning for Zero-Day Botnet Attack Detection in IoT-Edge Devices," IEEE Internet of Things Journal, vol. 9, no. 5, pp. 3930–3944, 2022, doi: 10.1109/JIOT.2021.3100755.
M. Roopak, J. Chambers, and G. Yun Tian, "Deep Learning Models for Cyber Security in IoT Networks," 2019 IEEE CCWC, 2019, doi: 10.1109/CCWC.2019.8666588.
M. A. Ferrag, O. Friha, L. Maglaras, H. Janicke, and L. Shu, "Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis," IEEE Access, vol. 9, pp. 138509–138542, 2021. DOI: 10.1109/ACCESS.2021.3118642.
V. Kumar and D. Sinha, "A robust intelligent zero-day cyber-attack detection technique," Complex & Intelligent Systems, vol. 7, no. 5, pp. 2211–2234, 2021. DOI: 10.1007/s40747-021-00347-1.
Y. Nohara, K. Matsumoto, H. Soejima, and N. Nakashima, "Explanation of machine learning models using shapley additive explanation and application for real data in hospital," Computer Methods and Programs in Biomedicine, vol. 214, p. 106584, 2022. DOI: 10.1016/j.cmpb.2021.106584.
A. A. Abdellatif, N. Mhaisen, A. Mohamed, A. Erbad, M. Guizani, Z. Dawy, and W. Nasreddine, "Communication-efficient hierarchical federated learning for IoT heterogeneous systems with imbalanced data," Future Generation Computer Systems, vol. 128, pp. 406–419, 2022. DOI: 10.1016/j.future.2021.10.015.
S. Sun, P. Sharma, K. Nwodo, A. Stavrou, and H. Wang, "FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method," arXiv: 2201.00123, 2024.
S. Mekala, “A Continuous Neighbour Discovery Protocol for Asymmetric Wireless Sensor Networks,” Journal of Advanced Research in Dynamical and Control Systems, vol. 12, no. SP7, pp. 633–645, Jul. 2020, doi: 10.5373/jardcs/v12sp7/20202153.
S. Mekala, M. A, D. Baswaraj, J. Joshi, and R. M, “EASND: Energy Adaptive Secure Neighbour Discovery Scheme for Wireless Sensor Networks,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 11, no. 5s, pp. 446–458, Jun. 2023, doi: 10.17762/ijritcc.v11i5s.7097.
M. Jdaitawi, A. F. Kan’an, and K. Samunnisa, “Blockchain-Enabled Secure Data Sharing in Distributed IoT Networks: A Paradigm for Smart City Applications,” Int. J. Comput. Eng. Res. Trends, vol. 11, no. 11, pp. 24–32, Nov. 2024, doi: 10.22362/ijcert/2024/v11/i11/v11i1103%20.
X. Zhang, M. Hong, S. Dhople, W. Yin, and Y. Liu, "Fedpd: A federated learning framework with adaptivity to non-iid data," IEEE Transactions on Signal Processing, vol. 69, pp. 6055–6070, 2021.
D. Namakshenas, A. Yazdinejad, A. Dehghantanha, and G. Srivastava, "Federated quantum-based privacy-preserving threat detection model for consumer internet of things," IEEE Transactions on Consumer Electronics, vol. 70, no. 1, 2024.
M. Ozkan-Okay, R. Samet, Ö. Aslan, and D. Gupta, "A comprehensive systematic literature review on intrusion detection systems," IEEE Access, vol. 9, pp. 157727–157760, 2021.
W. Al Mahmud and S. Huang, “Hybrid Cloud-Edge Systems for Computational Physics: Enhancing Large-Scale Simulations Through Distributed Models,” Int. J. Comput. Eng. Res. Trends, vol. 11, no. 12, pp. 23–32, Dec. 2024, doi: 10.22362/ijcert/2024/v11/i12/v11i1203.
H. Wang, Y. Cai, J. Wang, C. Ma, C. Ge, X. Qu, and L. Zhou, "Voltran: Unlocking trust and confidentiality in decentralized federated learning aggregation," IEEE Transactions on Information Forensics and Security, vol. 19, 2024.
C. G. V. N. Prasad, A. Mallareddy, M. Pounambal, and V. Velayutham, “Edge Computing and Blockchain in Smart Agriculture Systems,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 10, no. 1s, pp. 265–273, Dec. 2022, doi: 10.17762/ijritcc.v10i1s.5848.
R. Boddupalli, K. Malika, R. M. Harshita, and K. V. Sharma, “QuickCert - A Scalable Web-Based Certificate Management System for Academic Institutions with Enhanced Security and Real-Time Automation,” Synth. Multidiscip. Res. J., vol. 2, no. 3, pp. 1–10, Sep. 2024 doi: 10.70162/smrj/2024/v2/i3/v2i301.
R. Doriguzzi-Corin and D. Siracusa, "FLAD: adaptive federated learning for DDoS attack detection," Computers & Security, vol. 137, p. 103597, 2024.
S. Bahadoripour, H. Karimipour, A. N. Jahromi, and A. Islam, "An explainable multi-modal model for advanced cyber-attack detection in industrial control systems," Internet of Things, vol. 25, p. 101092, 2024. DOI: 10.1016/j.iot.2024.101092.
N. Moustafa and J. Slay, "UNSW-NB15: A comprehensive data set for network intrusion detection systems," in Proceedings of the Military Communications and Information Systems Conference (MilCIS), pp. 1–6, 2015, doi: 10.1109/MilCIS.2015.7348942.
N. Koroniotis, N. Moustafa, E. Sitnikova, and B. Turnbull, "Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset," Future Generation Computer Systems, vol. 100, pp. 779–796, 2019, doi: 10.1016/j.future.2019.05.041.
M. A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, and H. Janicke, "Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning," IEEE Access, vol. 10, pp. 40277–40288, 2022, doi: 10.1109/ACCESS.2022.3165809.S.
Mekala and K. S. S. Chatrapathi, "Energy-Efficient Neighbor Discovery Using Bacterial Foraging Optimization (BFO) Algorithm for Directional Wireless Sensor Networks," in Lecture Notes in Electrical Engineering, vol. 749, pp. 93–107, 2021.
M. Nobakht, R. Javidan, and A. Pourebrahimi, "SIM-FED: Secure IoT Malware Detection Model with Federated Learning," Computers and Electrical Engineering, vol. 116, p. 109139, 2024.
M. Moustafa and J. Slay, "The UNSW-NB15 Dataset for Network Intrusion Detection Systems (NIDS) Benchmark," IEEE International Conference on Information Assurance and Security (IAS), pp. 1–6, 2015.
T. Alharbi, M. A. Ferrag, L. Maglaras, H. Janicke, and A. H. Al-Bayatti, "Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning," IEEE Access, vol. 9, pp. 149914–149944, 2021.
S. Mekala, M. A, D. Baswaraj, J. Joshi, and R. M, “EASND: Energy Adaptive Secure Neighbour Discovery Scheme for Wireless Sensor Networks,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 11, no. 5s, pp. 446–458, Jun. 2023, doi: 10.17762/ijritcc.v11i5s.7097.
M. Koroniotis, N. Moustafa, E. Sitnikova, and K. R. D. Choo, "Bot-IoT: A New IoT Botnet Dataset with Diversified Attack Types and Traffic Varieties," Future Generation Computer Systems, vol. 100, pp. 779–796, 2019.
R. Shahbazian and I. Trubitsyna, "DEGAIN: Generative-Adversarial-Network-Based Missing Data Imputation," Information, vol. 13, no. 12, p. 575, 2022.
Z. Guo, Y. Wan, and H. Ye, "A data imputation method for multivariate time series based on generative adversarial network," Neurocomputing, vol. 360, pp. 185–197, 2019.
S. Mekala and K. Chatrapati, “Present State-of-the-Art of Continuous Neighbor Discovery in Asynchronous Wireless Sensor Networks,” EAI Endorsed Transactions on Energy Web, p. 166772, Jul. 2018, doi: 10.4108/eai.27-10-2020.166772.
J. Teng, D. Zhang, W. Zou, M. Li, and D. J. Lee, "Typical facial expression network using a facial feature decoupler and spatial-temporal learning," IEEE Transactions on Affective Computing, vol. 14, no. 2, pp. 1125–1137, 2021.
S. Mekala, A. Mallareddy, R. R. Tandu, and K. Radhika, “Machine Learning and Fuzzy Logic Based Intelligent Algorithm for Energy Efficient Routing in Wireless Sensor Networks,” Multi-disciplinary Trends in Artificial Intelligence, pp. 523–533, 2023, doi: 10.1007/978-3-031-36402-0_49.
A. Silva and P. Müller, “Machine Learning-Driven Resource Allocation in IoT-Fog-Cloud Networks,” Synth. Multidiscip. Res. J., vol. 2, no. 3, pp. 11–21, Sep. 2024, doi: 10.70162/smrj/2024/v2/i3/v2i302.
Y. He and J. Zhao, "Temporal convolutional networks for anomaly detection in time series," in Journal of Physics: Conference Series, vol. 1213, no. 4, p. 042050, 2019.
M. G. Arivazhagan, V. Aggarwal, A. K. Singh, and S. Choudhary, "Federated learning with personalization layers," arXiv preprint arXiv:1912.00818, 2019.
L. Collins, H. Hassani, A. Mokhtari, and S. Shakkottai, "Exploiting shared representations for personalized federated learning," in Proceedings of the 38th International Conference on Machine Learning, vol. 139, pp. 2089–2099, 2021.
J. Zhang, Y. Hua, H. Wang, T. Song, Z. Xue, R. Ma, and H. Guan, "FedALA: Adaptive local aggregation for personalized federated learning," in Proceedings of the AAAI Conference on Artificial Intelligence, vol. 37, no. 9, pp. 11237–11244, June 2023.
X. Su and G. Zhang, "APFed: Adaptive personalized federated learning for intrusion detection in maritime meteorological sensor networks," Digital Communications and Networks, 2024.
F. Sattler, S. Wiedemann, K. R. Müller, and W. Samek, "Robust and communication-efficient federated learning from non-iid data," IEEE Transactions on Neural Networks and Learning Systems, vol. 31, no. 9, pp. 3400–3413, 2019.
S. D., C. R. Mohan, B. H. Kumar, R. D. C. Pecho, and M. J. Pasha, "An Approach for Coordinating Lane Changes between Autonomous Vehicles in Congested Areas," International Journal of Intelligent Systems and Applications in Engineering, vol. 11, no. 6s, pp. 403–416, 2023.
M. S. Lakshmi, G. Rajavikram, V. Dattatreya, B. S. Jyothi, S. Patil, and M. Bhavsingh, "Evaluating the Isolation Forest Method for Anomaly Detection in Software-Defined Networking Security," Journal of Electrical Systems, vol. 19, no. 4, pp. 1–10, 2023.
T. Chai and R. R. Draxler, "Root mean square error (RMSE) or mean absolute error (MAE)," Geoscientific Model Development Discussions, vol. 7, no. 1, pp. 1525–1534, 2014.
S. Deshmukh, S. Inamdar, and S. Waghmode, "A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis," International Journal of Computer Engineering in Research Trends, vol. 3, no. 3, pp. 149–151, Mar. 2016.
M. Bhavsingh, "Autonomous Navigation in Urban Environments Using Deep Learning Models," International Conference on Intelligent Computation Technology and Automation (ICICTA), 2021, doi: 10.1109/ICICTA.2021.9355612.
J. Vinothini and S. V. J. E, “IOT edge computing layer modification based cyber-attack detection using Federated-Active Learning,” Research Square, Oct. 2024, doi: 10.21203/rs.3.rs-5281086/v1.
M. Bhavsingh, K. Samunnisa, and S. K. K. Shareef, "A Blockchain-Based Approach for Securing Network Communications in IoT Environments," Macaw International Journal of Advanced Research in Computer Science and Engineering, vol. 8, no. 1, pp. 1–7, 2022.
J. C. Kimeto and N. A. M. Mokmin, “Leveraging Augmented Reality for Inclusive Education: A Framework for Personalized Learning Experiences,” Int. J. Comput. Eng. Res. Trends, vol. 11, no. 12, pp. 10–22, Dec. 2024.
E. Rabieinejad, A. Yazdinejad, A. Dehghantanha, and G. Srivastava, "Two-Level Privacy-Preserving Framework: Federated Learning for Attack Detection in the Consumer Internet of Things," in IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 4258-4265, Feb. 2024, doi: 10.1109/TCE.2024.3349490.
Y. Lu, X. Huang, Y. Dai, S. Maharjan, and Y. Zhang, "Blockchain and federated learning for privacy-preserved data sharing in industrial IoT," IEEE Transactions on Industrial Informatics, vol. 16, no. 6, pp. 4177-4186, 2019.
A. N. Jahromi, H. Karimipour, and A. Dehghantanha, "An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things," Computer Communications, vol. 198, pp. 108-116, 2023.
S. Wang, T. Tuor, T. Salonidis, K. K. Leung, C. Makaya, T. He, and K. K. Chan, "Adaptive federated learning in resource constrained edge computing systems," IEEE Journal on Selected Areas in Communications, vol. 37, no. 6, pp. 1205-1221, 2019.
F. Sattler, S. Wiedemann, K. R. Müller, and W. Samek, "Robust and communication-efficient federated learning from non-iid data," IEEE Transactions on Neural Networks and Learning Systems, vol. 31, no. 9, pp. 3400-3413, 2019.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Lavanya Vemulapalli, P. Chandra Sekhar

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This journal is based on the work at https://journal.umy.ac.id/index.php/jrc under license from Creative Commons Attribution-ShareAlike 4.0 International License. You are free to:
- Share – copy and redistribute the material in any medium or format.
- Adapt – remix, transform, and build upon the material for any purpose, even comercially.
The licensor cannot revoke these freedoms as long as you follow the license terms, which include the following:
- Attribution. You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike. If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions. You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
• Creative Commons Attribution-ShareAlike (CC BY-SA)
JRC is licensed under an International License