﻿<?xml version="1.0" encoding="utf-8"?><ArticleSet><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>52</Issue><PubDate PubStatus="epublish"><Year>2026</Year><Month>2</Month><Day>3</Day></PubDate></Journal><ArticleTitle>Adaptive PID and Fuzzy Logic Control for Yaw Attitude in LEO Satellites </ArticleTitle><VernacularTitle>Adaptive PID and Fuzzy Logic Control for Yaw Attitude in LEO Satellites </VernacularTitle><FirstPage>266</FirstPage><LastPage>277</LastPage><ELocationID EIdType="doi">10.66224/jist.48337.13.52.266</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Stanley E</FirstName><LastName>Ajagba</LastName><Affiliation>Department of Electronic and Computer Engineering, University of Nigeria, Nsukka, Enugu State, Nigeria </Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Udora N</FirstName><LastName>Nwawelu </LastName><Affiliation>Department of Electronic and Computer Engineering, University of Nigeria, Nsukka, Enugu State, Nigeria </Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Bonaventure O</FirstName><LastName>Ekengwu</LastName><Affiliation>Department of Electronic and Computer Engineering, University of Nigeria, Nsukka, Enugu State, Nigeria </Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Nnaemeka C</FirstName><LastName>Asiegbu</LastName><Affiliation>Department of Electronic and Computer Engineering, University of Nigeria, Nsukka, Enugu State, Nigeria </Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Dumtochukwu O</FirstName><LastName>Oyeka</LastName><Affiliation>Department of Electronic and Computer Engineering, University of Nigeria, Nsukka, Enugu State, Nigeria </Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Maryrose M</FirstName><LastName>Ogbuka</LastName><Affiliation>Department of Electronic and Computer Engineering, University of Nigeria, Nsukka, Enugu State, Nigeria </Affiliation><Identifier Source="ORCID" /></Author></AuthorList><History PubStatus="received"><Year>2024</Year><Month>10</Month><Day>21</Day></History><Abstract>&lt;p class="Sammary" style="page-break-after: auto;"&gt;The significance of an effective satellite attitude control system lies in its ability to ensure that data acquisition by a Low Earth Orbit (LEO) satellite is of good quality and reliable. In this paper, the design of an adaptive Proportional Integral Derivative (PID) controller and its modified form (PIDD), which includes an additional derivative component for a microsatellite y-axis attitude control system (ACS), is presented. Additionally, a Fuzzy Logic Controller (FLC) and its enhanced version, called Adjustable Gain Enhanced FLC (AGE-FLC), were designed. Models of the amplifier, actuator, and satellite structure were developed to derive the transfer function of the LEO satellite's yaw-axis attitude dynamics. Model Reference Adaptive Control (MRAC) based Proportional Integral Derivative (PID), referred to as MRAC-PID and its modified form, MRAC-PIDD, were designed. The models of the various control systems were developed in MATLAB and were used to simulate the designed control systems. The simulation results and analysis revealed that the MRAC-PID controller offered the most efficient performance in terms of fast response and transient time, with a rise time of 1.74 seconds and a settling time of 6.19 seconds. Also, the MRAC-PIDD and AGE-FLC exhibited no overshoot, indicating efficient performance in terms of stability and smoothness in torque control. All proposed control systems for the LEO satellite yaw-axis ACS met the performance criteria, except for the PID and FLC controllers, which yielded overshoots of 12% and 21.97%, respectively. Generally, it suffices to say that the introduction of the designed adaptive PID/PIDD controllers and the AGE-FLC enhanced the system performance.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Adaptive PID</Param></Object><Object Type="Keyword"><Param Name="Value"> Attitude Control System</Param></Object><Object Type="Keyword"><Param Name="Value"> Fuzzy Logic Controller</Param></Object><Object Type="Keyword"><Param Name="Value"> LEO Satellite</Param></Object><Object Type="Keyword"><Param Name="Value"> Yaw-axis </Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/48337</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>52</Issue><PubDate PubStatus="epublish"><Year>2026</Year><Month>2</Month><Day>3</Day></PubDate></Journal><ArticleTitle>Automatic Concept Extraction from Persian News Text Based On Deep Learning</ArticleTitle><VernacularTitle>Automatic Concept Extraction from Persian News Text Based On Deep Learning</VernacularTitle><FirstPage>278</FirstPage><LastPage>288</LastPage><ELocationID EIdType="doi">10.66224/jist.48902.13.52.278</ELocationID><Language>en</Language><AuthorList><Author><FirstName>ZahraSadat</FirstName><LastName>Hosseini</LastName><Affiliation>Department of Electrical and Computer Engineering, Malek-Ashtar University of Technology, Tehran, Iran</Affiliation><Identifier Source="ORCID">0009-0004-4539-694X </Identifier></Author><Author><FirstName>SayedGholamHassan </FirstName><LastName>Tabatabaei</LastName><Affiliation>Department of Electrical and Computer, Engineering Malek-Ashtar University of Technology, Tehran, Iran,</Affiliation><Identifier Source="ORCID">https://orcid.org/0000-0003-2869-748X</Identifier></Author></AuthorList><History PubStatus="received"><Year>2024</Year><Month>12</Month><Day>18</Day></History><Abstract>&lt;p&gt;One of the most critical issues in natural-language understanding is extracting concepts from the text. The concept expresses essential information from the text. Concept Extraction to the process of extracting and generating keyphrases that may exist or not in the text. Automatic concept extraction from the Persian news text is a challenging problem due to the complexity of the Persian language. In this paper, we first review traditional and deep learning-based models in keyphrase extraction and generation. Then, an automated Persian news concept extraction algorithm is presented, which exploits encoder-decoder models. Specifically, our proposed models use the output vector of BERT-Base and ParsBERT language models as a word embedding. The evaluation results have shown that changing the word embedding layer has improved recall, precision, and F1 measures about 3.15%. Since encoder-decoder models get inputs consecutively, the training time increases. Also, if the sentence is long, they cannot store much information from the sentences. Therefore, for the first time, we have used mT5-Base with Transformer architecture, which receives and processes data parallelly. Recall, precision, and F1 measures used for the concept extraction results of the mT5-Base model are 55.66%, 55.47%, and 55.48%, respectively. The F1 score has increased by 19.8% compared to the previous models. Therefore, this model is effective for extracting the concept of Persian news texts.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Concept Extraction</Param></Object><Object Type="Keyword"><Param Name="Value"> Deep Learning</Param></Object><Object Type="Keyword"><Param Name="Value"> Keyphrase</Param></Object><Object Type="Keyword"><Param Name="Value">BERT-BASE</Param></Object><Object Type="Keyword"><Param Name="Value"> ParsBERT</Param></Object><Object Type="Keyword"><Param Name="Value"> mT5</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/48902</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>52</Issue><PubDate PubStatus="epublish"><Year>2026</Year><Month>2</Month><Day>3</Day></PubDate></Journal><ArticleTitle>A Comprehensive Framework for Enhancing Intrusion Detection Systems through Advanced Analytical Techniques</ArticleTitle><VernacularTitle>A Comprehensive Framework for Enhancing Intrusion Detection Systems through Advanced Analytical Techniques</VernacularTitle><FirstPage>289</FirstPage><LastPage>299</LastPage><ELocationID EIdType="doi">10.66224/jist.49054.13.52.289</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Chetan</FirstName><LastName>Gupta</LastName><Affiliation>Department of Computer Science and Engineering, Jaypee University of Engineering and Technology, Guna, India</Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Amit</FirstName><LastName>Kumar</LastName><Affiliation>Department of Computer Science and Engineering, Jaypee University of Engineering and Technology, Guna, India</Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Neelesh Kumar</FirstName><LastName>Jain</LastName><Affiliation>Department of Computer Science and Engineering, Jaypee University of Engineering and Technology, Guna, India</Affiliation><Identifier Source="ORCID" /></Author></AuthorList><History PubStatus="received"><Year>2025</Year><Month>1</Month><Day>1</Day></History><Abstract>&lt;p&gt;Intrusion detection systems (IDS) are security technologies that monitor system activity, network traffic, and settings to detect potential threats. IDS provide proactive security management, detecting anomalies and ensuring continuous monitoring. It protects critical assets, such as sensitive data and intellectual property, from unauthorized access or data breaches, preventing downtime and disruption to business operations. In this paper we present a hybrid model based on Principal Component Analysis (PCA) and XGBoost algorithms. To show the effectiveness of the proposed system, various parameters are evaluated on the standard NSL-KDD dataset. First we trained the model using trained dataset and then evaluate the performance the model using testing dataset. In proposed work the we store the data into two-dimensional structure then we standardized and take a most significance features of the data then calculate the covariance matrix, after that calculate the eigenvalues and eigenvectors of the matrix and short in the descending order and using principal component identify the new features and remove the insignificant features. The proposed model outperforms and produces 97.76% accuracy and 94.51% precision; the recall rate is 93.44% and 93.97% F1-Score, which is much better than the previous proposed models. This hybrid approach is better to handle the categorical data and able to find the pattern well and the outcome of the model clearly shows the effectiveness of the proposed system.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">IDS</Param></Object><Object Type="Keyword"><Param Name="Value"> DOS</Param></Object><Object Type="Keyword"><Param Name="Value"> XGBOOST</Param></Object><Object Type="Keyword"><Param Name="Value"> PCA</Param></Object><Object Type="Keyword"><Param Name="Value"> HIDS</Param></Object><Object Type="Keyword"><Param Name="Value"> NIDS</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/49054</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>52</Issue><PubDate PubStatus="epublish"><Year>2026</Year><Month>2</Month><Day>3</Day></PubDate></Journal><ArticleTitle>Compilation of Avatar Development Roadmap in Iranian Banking with the Life Cycle Approach of System Development and Human-Computer Interaction</ArticleTitle><VernacularTitle>Compilation of Avatar Development Roadmap in Iranian Banking with the Life Cycle Approach of System Development and Human-Computer Interaction</VernacularTitle><FirstPage>300</FirstPage><LastPage>315</LastPage><ELocationID EIdType="doi">10.66224/jist.49601.13.52.300</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Amir Bahador</FirstName><LastName>Morovat</LastName><Affiliation>Department of Industrial and System Studies, Eyvanekey University, Semnan, Iran </Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Farhad</FirstName><LastName>Nazari zadeh</LastName><Affiliation>Department of Industrial Engineering, Malek Ashtar University of Technology, Tehran, Iran</Affiliation><Identifier Source="ORCID">0009-0001-2596-3335</Identifier></Author><Author><FirstName>Ahmad</FirstName><LastName>Haghiri Dehbarez</LastName><Affiliation>Department of Industrial and System Studies, Eyvanekey University, Semnan, Iran </Affiliation><Identifier Source="ORCID">0000-0001-6123-3754</Identifier></Author></AuthorList><History PubStatus="received"><Year>2025</Year><Month>3</Month><Day>3</Day></History><Abstract>&lt;p class="Sammary" style="page-break-after: auto;"&gt;The spread and use of emerging technologies have led to a significant transformation in the banking industry and has created widespread changes in the relationship between customers and banks. These changes have led to avatars, previously seen in Hollywood movies, entering the banking sector and are now used as useful tools for providing services to bank customers. Considering the move of Iranian banks towards the adoption of emerging technologies and the willingness of these banks&amp;rsquo; customers to use these technologies, this research outlines the roadmap of avatar technology in six stages of requirements gathering and analysis, system development, system implementation and coding, testing, deployment and system operation and maintenance, utilizing the expertise of 11 researchers from private and public banks as well as IT and information technology specialists in Iran. In addition, at each stage of the roadmap, the focus has been on customer satisfaction and improving the quality of avatars through human-computer interaction approaches. For this purpose, an estimated timeline of 37 to 49 weeks has been proposed for the roadmap, which describes the necessary actions for each stage, along with possible challenges and issues. What is certain is that the implementation and use of avatars in the Iranian banking industry requires short-term, medium-term, and long-term strategic planning to enable the use of this technology, according to the proposed strategic roadmap.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Avatar</Param></Object><Object Type="Keyword"><Param Name="Value"> AI</Param></Object><Object Type="Keyword"><Param Name="Value"> Machin learning</Param></Object><Object Type="Keyword"><Param Name="Value"> Roadmap</Param></Object><Object Type="Keyword"><Param Name="Value"> System Development Life Cycle (SDLC)</Param></Object><Object Type="Keyword"><Param Name="Value"> Human-Computer Interaction (HCI)</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/49601</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>52</Issue><PubDate PubStatus="epublish"><Year>2026</Year><Month>2</Month><Day>3</Day></PubDate></Journal><ArticleTitle>Optimally DBS Placement In 6G Communication Networks Using Improved Gray Wolf Optimization Algorithm to Enhance Network Energy Efficiency</ArticleTitle><VernacularTitle>Optimally DBS Placement In 6G Communication Networks Using Improved Gray Wolf Optimization Algorithm to Enhance Network Energy Efficiency</VernacularTitle><FirstPage>316</FirstPage><LastPage>325</LastPage><ELocationID EIdType="doi">10.66224/jist.50264.13.52.316</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Hussein</FirstName><LastName>Shakir Diwan Al-Khulaifawi</LastName><Affiliation>Department of Electrical and Computer Engineering, University of Tabriz, Tabriz, Iran.</Affiliation><Identifier Source="ORCID">https://orcid.org/0009-0003-4503-006X</Identifier></Author><Author><FirstName>Mahdi</FirstName><LastName>Nangir</LastName><Affiliation>Department of Electrical and Computer Engineering, University of Tabriz, Tabriz, Iran.</Affiliation><Identifier Source="ORCID">https://orcid.org/0000-0002-1926-743X</Identifier></Author></AuthorList><History PubStatus="received"><Year>2025</Year><Month>5</Month><Day>17</Day></History><Abstract>&lt;p class="KeywordsHeader"&gt;&lt;span style="font-weight: normal; font-style: normal;"&gt;The transition to sixth-generation (6G) networks demands highly energy-efficient solutions for large-scale IoT services. Drone Base Stations (DBSs) offer flexible coverage, but their three-dimensional placement must be optimized to reduce both transmission and hovering energy. This paper, model DBS deployment as a power-minimization problem and introduce an Improved Grey Wolf Optimization (IGWO) algorithm that integrates adaptive control parameters, exponential weighting of leader contributions (alpha/beta/delta), and a dynamic control structure that progressively favors elite solutions. This design improves search efficiency in high-dimensional, nonlinear spaces and reduces the risk of premature convergence. Extensive MATLAB simulations across multiple propagation environments demonstrate that IGWO achieves lower network power consumption and faster convergence compared to standard metaheuristics, while preserving coverage and connectivity. Specifically, the simulation results demonstrate that the proposed method achieves a remarkable superiority over other optimization algorithms, showing more than a 2% improvement compared to the best among them the standard GWO algorithm&amp;mdash;thereby confirming its effectiveness and efficiency in low-power network scenarios.&lt;/span&gt;&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">6G communication networks</Param></Object><Object Type="Keyword"><Param Name="Value"> Drone Base Stations (DBSs)</Param></Object><Object Type="Keyword"><Param Name="Value"> Internet of Things (IoT)</Param></Object><Object Type="Keyword"><Param Name="Value"> Improved Gray Wolf Optimization (IGWO)</Param></Object><Object Type="Keyword"><Param Name="Value"> Energy Efficiency</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/50264</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>52</Issue><PubDate PubStatus="epublish"><Year>2026</Year><Month>2</Month><Day>3</Day></PubDate></Journal><ArticleTitle>Fabric Defect Identification based on KNN and PCA Algorithms</ArticleTitle><VernacularTitle>Fabric Defect Identification based on KNN and PCA Algorithms</VernacularTitle><FirstPage>326</FirstPage><LastPage>332</LastPage><ELocationID EIdType="doi">10.66224/jist.49914.13.52.326</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Zahra</FirstName><LastName>Nouri</LastName><Affiliation>Department of Communications Engineering, University of Sistan and Baluchestan, Zahedan, Iran </Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Farahnaz</FirstName><LastName>Mohanna</LastName><Affiliation>Department of Communications Engineering, University of Sistan and Baluchestan, Zahedan, Iran </Affiliation><Identifier Source="ORCID">0000000286896201</Identifier></Author><Author><FirstName>Mina</FirstName><LastName>Boluki</LastName><Affiliation>Department of Communications Engineering, University of Sistan and Baluchestan, Zahedan, Iran </Affiliation><Identifier Source="ORCID" /></Author></AuthorList><History PubStatus="received"><Year>2025</Year><Month>4</Month><Day>12</Day></History><Abstract>&lt;p&gt;In this study, a K-Nearest Neighbor (KNN) classifier is employed for fabric defect identification. First, directional Grey-Level Co-occurrence Matrix (GLCM) of the fabric image is computed in , and directions. Six intensity-based features are then extracted from these directional GLCMs. In addition, the minimum, maximum, median, and mean grey levels of the fabric image are computed. These sixteen features are combined into a single feature vector representing the fabric image. Next, Principal Component Analysis (PCA) is applied to reduce the dimensionality of the feature vector. The reduced features are then classified using the KNN classifier, categorizing each fabric image as either defective or defect-free based on training data. To localize defects, patches containing defects are segmented from the original fabric image. Features of these defect patches are extracted, reduced via PCA, and classified using KNN. Finally, each defect class is identified, and defect locations are visualized using morphological operations. The proposed method is evaluated on the comprehensive TILDA dataset, which contains 3,200) fabric images (both defective and defect-free). Experimental results demonstrate a mean average accuracy of 95.65% for fabric defect identification across classes , , and .&amp;nbsp; &amp;nbsp;&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Fabric Defect Identification</Param></Object><Object Type="Keyword"><Param Name="Value"> Feature Extraction</Param></Object><Object Type="Keyword"><Param Name="Value"> KNN Classifier</Param></Object><Object Type="Keyword"><Param Name="Value"> PCA Algorithm</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/49914</ArchiveCopySource></ARTICLE><ARTICLE><Journal><PublisherName>مرکز منطقه ای اطلاع رسانی علوم و فناوری</PublisherName><JournalTitle>Journal of Information Systems and Telecommunication (JIST) </JournalTitle><ISSN>2322-1437</ISSN><Volume>13</Volume><Issue>52</Issue><PubDate PubStatus="epublish"><Year>2026</Year><Month>2</Month><Day>3</Day></PubDate></Journal><ArticleTitle>Federated Learning for Privacy-Preserving Intrusion Detection: A Systematic Review, Taxonomy, Challenges and Future Directions</ArticleTitle><VernacularTitle>Federated Learning for Privacy-Preserving Intrusion Detection: A Systematic Review, Taxonomy, Challenges and Future Directions</VernacularTitle><FirstPage>333</FirstPage><LastPage>345</LastPage><ELocationID EIdType="doi">10.66224/jist.45751.13.52.333</ELocationID><Language>en</Language><AuthorList><Author><FirstName>Dattatray Raghunath</FirstName><LastName>Kale</LastName><Affiliation>Department of Computer Science &amp; Engineering, MIT Art Design and Technology University, Pune, India </Affiliation><Identifier Source="ORCID">0009-0008-8843-452X</Identifier></Author><Author><FirstName>Swati</FirstName><LastName>Shirke-Deshmukh</LastName><Affiliation>Department of Computer Science &amp; Engineering, Pimpri Chinchwad University, Pune, Maharashtra, India</Affiliation><Identifier Source="ORCID">https://orcid.org/0000-0001-6668-5610</Identifier></Author><Author><FirstName>Amulkumar</FirstName><LastName>Jadhav</LastName><Affiliation>Department of Computer Science &amp; Engineering, D Y Patil College of Engineering and Technology, Kolhapur, India</Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Shrihari </FirstName><LastName>Khatawkar </LastName><Affiliation>Department of Computer Science &amp; Engineering, Annasaheb Dange College of Engineering and Technology, Ashta</Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Sunny</FirstName><LastName>Mohite</LastName><Affiliation>D Y Patil College of Engineering and Technology, Kolhapur, India</Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Sarang</FirstName><LastName>Patil</LastName><Affiliation>Amity School of Engineering and Technology, Amity University, Mumbai, Maharashtra, India</Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Madhav</FirstName><LastName>Salunkhe</LastName><Affiliation>Annasaheb Dange College of Engineering and Technology Ashta</Affiliation><Identifier Source="ORCID" /></Author><Author><FirstName>Rahul</FirstName><LastName>Sonkamble</LastName><Affiliation>Department of Computer Science &amp; Engineering, Pimpri Chinchwad University, Pune, Maharashtra, India</Affiliation><Identifier Source="ORCID">https://orcid.org/0000-0001-6075-9519</Identifier></Author></AuthorList><History PubStatus="received"><Year>2024</Year><Month>2</Month><Day>8</Day></History><Abstract>&lt;p class="Sammary"&gt;This paper presents a systematic review of intrusion detection systems (IDS) that leverage federated learning (FL) to enhance privacy in distributed cybersecurity environments. A total of 78 peer-reviewed studies published between 2019 and 2024 were selected using PRISMA guidelines. We categorize FL-based IDS solutions based on architecture (centralized, decentralized, hierarchical), aggregation methods (e.g., FedAvg, DAFL), and privacy-preserving techniques (e.g., differential privacy, homomorphic encryption). The survey also examines solutions to key challenges such as communication overhead, data heterogeneity, and poisoning attacks. Furthermore, this study outlines unresolved issues and proposes future research directions, including adaptive federated optimization and cross-domain deployments. This review serves as a valuable resource for researchers and practitioners aiming to develop privacy-aware, scalable, and intelligent IDS using federated learning.&lt;/p&gt;</Abstract><ObjectList><Object Type="Keyword"><Param Name="Value">Federated Learning</Param></Object><Object Type="Keyword"><Param Name="Value"> Intrusion Detection</Param></Object><Object Type="Keyword"><Param Name="Value"> Data Privacy</Param></Object><Object Type="Keyword"><Param Name="Value"> Cyber security</Param></Object></ObjectList><ArchiveCopySource DocType="Pdf">http://jist.ir/en/Article/Download/45751</ArchiveCopySource></ARTICLE></ArticleSet>