{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:23:57Z","timestamp":1776075837273,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031569494","type":"print"},{"value":"9783031569500","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56950-0_22","type":"book-chapter","created":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T03:01:57Z","timestamp":1711594917000},"page":"256-267","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Security Challenges and Solutions in Smart Cities"],"prefix":"10.1007","author":[{"given":"Faisal","family":"Alzyoud","sequence":"first","affiliation":[]},{"given":"Ruba","family":"Al-Falah","sequence":"additional","affiliation":[]},{"given":"Monther","family":"Tarawneh","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Tarawneh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,29]]},"reference":[{"issue":"2","key":"22_CR1","first-page":"7","volume":"6","author":"D Gade","year":"2019","unstructured":"Gade, D.: Introduction to smart cities and selected literature review. Int. J. Adv. Innov. Res. 6(2), 7\u201315 (2019)","journal-title":"Int. J. Adv. Innov. Res."},{"key":"22_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cities.2021.103187","volume":"114","author":"T Bj\u00f8rner","year":"2021","unstructured":"Bj\u00f8rner, T.: The advantages of and barriers to being smart in a smart city: the perceptions of project managers within a smart city cluster project in Greater Copenhagen. Cities 114, 103187 (2021)","journal-title":"Cities"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Farahat, I.S., Tolba, A.S., Elhoseny, M., Eladrosy, W.: Data security and challenges in smart cities. Secur. Smart Cities Models Appl. Challenges 117\u2013142 (2019)","DOI":"10.1007\/978-3-030-01560-2_6"},{"key":"22_CR4","unstructured":"Alzyoud, F.Y., Wa\u2019elJum\u2019ah Al_Zyadat, F.H., Shrouf, F.: A proposed hybrid approach combined QoS with CR system in smart city. Eurasian J. Anal. Chem. 13(6), 178\u2013185 (2018)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Alzyoud, F.: Improved model for traffic accident management system using KDD and big data: case study Jordan. Int. J. Comput. Commun. Control 18(3) (2023)","DOI":"10.15837\/ijccc.2023.3.5006"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Alzyoud, F., Maqableh, W., Al Shrouf, F.: A semi smart adaptive approach for trash classification. Int. J. Comput. Commun. Control 16(4) (2021)","DOI":"10.15837\/ijccc.2021.4.4172"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Nafrees, A.C.M., Sujah, A.M.A., Mansoor, C.: Smart cities: emerging technologies and potential solutions to the cyber security threads. In: 2021 5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT), pp. 220\u2013228. IEEE (2021)","DOI":"10.1109\/ICEECCOT52851.2021.9707994"},{"issue":"2","key":"22_CR8","doi-asserted-by":"publisher","first-page":"1718","DOI":"10.1109\/COMST.2018.2867288","volume":"21","author":"M Sookhak","year":"2018","unstructured":"Sookhak, M., Tang, H., He, Y., Yu, F.R.: Security and privacy of smart cities: a survey, research issues and challenges. IEEE Commun. Surv. Tutor. 21(2), 1718\u20131743 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"22_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2023.104771","volume":"98","author":"L Xia","year":"2023","unstructured":"Xia, L., Semirumi, D.T., Rezaei, R.: A thorough examination of smart city applications: exploring challenges and solutions throughout the life cycle with emphasis on safeguarding citizen privacy. Sustain. Cities Soc. 98, 104771 (2023)","journal-title":"Sustain. Cities Soc."},{"issue":"1","key":"22_CR10","first-page":"55","volume":"7","author":"I Bianchi","year":"2023","unstructured":"Bianchi, I., Schmidt, L.: The smart city revolution: design principles and best practices for urban transformation. Eigenpub Rev. Sci. Technol. 7(1), 55\u201370 (2023)","journal-title":"Eigenpub Rev. Sci. Technol."},{"issue":"1","key":"22_CR11","first-page":"1","volume":"2","author":"AA Mughal","year":"2019","unstructured":"Mughal, A.A.: Cybersecurity hygiene in the era of internet of things (IoT): best practices and challenges. Appl. Res. Artif. Intell. Cloud Comput. 2(1), 1\u201331 (2019)","journal-title":"Appl. Res. Artif. Intell. Cloud Comput."},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"143222","DOI":"10.1109\/ACCESS.2021.3120843","volume":"9","author":"G Mylonas","year":"2021","unstructured":"Mylonas, G., Kalogeras, A., Kalogeras, G., Anagnostopoulos, C., Alexakos, C., Mu\u00f1oz, L.: Digital twins from smart manufacturing to smart cities: a survey. IEEE Access 9, 143222\u2013143249 (2021)","journal-title":"IEEE Access"},{"key":"22_CR13","unstructured":"Alzyoud, F., Alsharman, N., Almofleh, A.: Best practice fundamentals in smart grids for a modern energy system development in Jordan. In: Proceedings of the 9th International Conference on Advances in Computing, Communication and Information Technology, Rome, pp. 7\u20138 (2019)"},{"issue":"2","key":"22_CR14","first-page":"2677","volume":"24","author":"I Ashraf","year":"2022","unstructured":"Ashraf, I., et al.: A survey on cyber security threats in IoT-enabled maritime industry. IEEE Trans. Intell. Transp. Syst. 24(2), 2677\u20132690 (2022)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Kitchin, R., Dodge, M.: The (in) security of smart cities: vulnerabilities, risks, mitigation, and prevention. In: Smart Cities and Innovative Urban Technologies, pp. 47\u201365. Routledge (2020)","DOI":"10.4324\/9781003132851-4"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Gedris, K., et al.: Simulating municipal cybersecurity incidents: recommendations from expert interviews. In: Proceedings of the Annual Hawaii International Conference on System Sciences (2021)","DOI":"10.24251\/HICSS.2021.249"},{"issue":"1","key":"22_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10708-018-9845-8","volume":"84","author":"P Cardullo","year":"2019","unstructured":"Cardullo, P., Kitchin, R.: Being a \u2018citizen\u2019 in the smart city: up and down the scaffold of smart citizen participation in Dublin, Ireland. GeoJ 84(1), 1\u201313 (2019)","journal-title":"GeoJ"},{"issue":"2","key":"22_CR18","doi-asserted-by":"publisher","first-page":"374","DOI":"10.3390\/s18020374","volume":"18","author":"R Velazquez-Pupo","year":"2018","unstructured":"Velazquez-Pupo, R., et al.: Vehicle detection with occlusion handling, tracking, and OC-SVM classification: a high performance vision-based system. Sensors 18(2), 374 (2018)","journal-title":"Sensors"},{"key":"22_CR19","doi-asserted-by":"publisher","unstructured":"Ustundag, A., Cevikcan, E.: Industry 4.0: Managing the Digital Transformation. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57870-5","DOI":"10.1007\/978-3-319-57870-5"},{"key":"22_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2022.108975","volume":"215","author":"M Ghiasi","year":"2023","unstructured":"Ghiasi, M., Niknam, T., Wang, Z., Mehrandezh, M., Dehghani, M., Ghadimi, N.: A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: past, present, and future. Electr. Power Syst. Res. 215, 108975 (2023)","journal-title":"Electr. Power Syst. Res."},{"key":"22_CR21","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.cities.2013.12.010","volume":"38","author":"P Neirotti","year":"2014","unstructured":"Neirotti, P., De Marco, A., Cagliano, A.C., Mangano, G., Scorrano, F.: Current trends in Smart City initiatives: some stylised facts. Cities 38, 25\u201336 (2014)","journal-title":"Cities"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Ray, P.P.: Web3: a comprehensive review on background, technologies, applications, zero-trust architectures, challenges, and future directions. Internet of Things and Cyber-Physical Systems (2023)","DOI":"10.1016\/j.iotcps.2023.05.003"},{"key":"22_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102436","volume":"110","author":"C Buck","year":"2021","unstructured":"Buck, C., Olenberger, C., Schweizer, A., V\u00f6lter, F., Eymann, T.: Never trust, always verify: a multivocal literature review on current knowledge and research gaps of zero-trust. Comput. Sec. 110, 102436 (2021)","journal-title":"Comput. Sec."},{"issue":"6","key":"22_CR24","doi-asserted-by":"publisher","first-page":"2196","DOI":"10.3390\/s22062196","volume":"22","author":"G Fortino","year":"2022","unstructured":"Fortino, G., Guerrieri, A., Pace, P., Savaglio, C., Spezzano, G.: IoT platforms and security: an analysis of the leading industrial\/commercial solutions. Sensors 22(6), 2196 (2022)","journal-title":"Sensors"},{"issue":"4","key":"22_CR25","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1353\/lib.2020.0014","volume":"68","author":"J Nield","year":"2020","unstructured":"Nield, J., Scanlan, J., Roehrer, E.: Exploring consumer information-security awareness and preparedness of data-breach events. Libr. Trends 68(4), 611\u2013635 (2020)","journal-title":"Libr. Trends"},{"key":"22_CR26","unstructured":"Shu, X., Tian, K., Ciambrone, A., Yao, D.: Breaking the target: an analysis of target data breach and lessons learned. arXiv preprint arXiv:1701.04940 (2017)"},{"issue":"7","key":"22_CR27","first-page":"1","volume":"6","author":"M Rai","year":"2019","unstructured":"Rai, M., Mandoria, H.: A study on cyber-crimes cyber criminals and major security breaches. Int. Res. J. Eng. Technol. 6(7), 1\u20138 (2019)","journal-title":"Int. Res. J. Eng. Technol."},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Hsiao, S.C., Kao, D.Y.: The static analysis of WannaCry ransomware. In: 2018 20th International Conference on Advanced Communication Technology (ICACT), pp. 153\u2013158. IEEE (2018)","DOI":"10.23919\/ICACT.2018.8323679"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the Second International Conference on Advances in Computing Research (ACR\u201924)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56950-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T03:13:25Z","timestamp":1711595605000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56950-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031569494","9783031569500"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56950-0_22","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing Research","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acr2023a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iicser.org\/ACR24","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}