{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T18:51:25Z","timestamp":1771786285571,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031733178","type":"print"},{"value":"9783031733185","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-73318-5_32","type":"book-chapter","created":{"date-parts":[[2024,12,26]],"date-time":"2024-12-26T12:54:44Z","timestamp":1735217684000},"page":"316-325","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive Quantum Learning Frameworks for Real-Time IIoT Attack Identification"],"prefix":"10.1007","author":[{"given":"Poonam","family":"Joshi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8411-7630","authenticated-orcid":false,"given":"S. B.","family":"Goyal","sequence":"additional","affiliation":[]},{"given":"Anand Singh","family":"Rajawat","sequence":"additional","affiliation":[]},{"given":"Ram Kumar","family":"Solanki","sequence":"additional","affiliation":[]},{"given":"Chuqiao","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,27]]},"reference":[{"key":"32_CR1","doi-asserted-by":"publisher","first-page":"66767","DOI":"10.1109\/ACCESS.2023.3289764","volume":"11","author":"S Paramasivam","year":"2023","unstructured":"Paramasivam S, Jenitha J, Sanjana S, Haghparast M (2023) Compact quantum circuit design of PUFFIN and PRINT lightweight ciphers for quantum key recovery attack. IEEE Access 11:66767\u201366776","journal-title":"IEEE Access"},{"key":"32_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TQE.2021.3094983","volume":"2","author":"T Satoh","year":"2021","unstructured":"Satoh T, Nagayama S, Suzuki S, Matsuo T, Hajdu\u0161ek M, Meter RV (2021) Attacking the quantum internet. IEEE Trans Quant Eng 2:1\u201317","journal-title":"IEEE Trans Quant Eng"},{"key":"32_CR3","doi-asserted-by":"publisher","first-page":"21091","DOI":"10.1109\/ACCESS.2020.2968985","volume":"8","author":"TM Fern\u00e1ndez-Caram\u00e8s","year":"2020","unstructured":"Fern\u00e1ndez-Caram\u00e8s TM, Fraga-Lamas P (2020) Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 8:21091\u201321116","journal-title":"IEEE Access"},{"issue":"9","key":"32_CR4","first-page":"209","volume":"23","author":"Z Zhang","year":"2022","unstructured":"Zhang Z, Wu W, Sui H, Wang B, Quantum KA (2022) Shim: attacks on Type-3 generalized Feistel scheme and unbalanced Feistel scheme with expanding functions. IEEE Trans Intell Transp Syst 23(9):209\u2013216","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"32_CR5","doi-asserted-by":"publisher","first-page":"125868","DOI":"10.1109\/ACCESS.2021.3109816","volume":"9","author":"A Kumar","year":"2021","unstructured":"Kumar A (2021) Survey of promising technologies for quantum drones and networks. IEEE Access 9:125868\u2013125911","journal-title":"IEEE Access"},{"key":"32_CR6","doi-asserted-by":"publisher","first-page":"4564","DOI":"10.1109\/TIT.2021.3078812","volume":"67","author":"G Kato","year":"2021","unstructured":"Kato G, Owari M, Hayashi M (2021) Single-shot secure quantum network coding for general multiple unicast network with free one-way public communication. IEEE Trans Inf Theory 67:4564\u20134587","journal-title":"IEEE Trans Inf Theory"},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"1699","DOI":"10.1109\/LCOMM.2023.3273305","volume":"27","author":"M Jarzyna","year":"2023","unstructured":"Jarzyna M, Jachura M, Banaszek K (2023) Quantum pulse gate attack on IM\/DD optical key distribution exploiting symbol shape distortion. IEEE Commun Lett 27:1699\u20131703","journal-title":"IEEE Commun Lett"},{"issue":"7","key":"32_CR8","doi-asserted-by":"publisher","first-page":"6457","DOI":"10.1109\/JIOT.2019.2958788","volume":"7","author":"TM Fern\u00e1ndez-Caram\u00e9s","year":"2020","unstructured":"Fern\u00e1ndez-Caram\u00e9s TM (2020) From pre-quantum to post-quantum IoT security: a survey on quantum-resistant cryptosystems for the Internet of Things. IEEE Internet Things J 7(7):6457\u20136480","journal-title":"IEEE Internet Things J"},{"key":"32_CR9","doi-asserted-by":"publisher","first-page":"21848","DOI":"10.1109\/ACCESS.2023.3252504","volume":"11","author":"DSC Putranto","year":"2023","unstructured":"Putranto DSC, Wardhani RW, Larasati HT, Kim H (2023) Space and time-efficient quantum multiplier in post quantum cryptography era. IEEE Access 11:21848\u201321862","journal-title":"IEEE Access"},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"121146","DOI":"10.1109\/ACCESS.2020.3006136","volume":"8","author":"D Pan","year":"2020","unstructured":"Pan D, Li K, Ruan D, Ng SX, Hanzo L (2020) Single-photon-memory two-step quantum secure direct communication relying on Einstein-Podolsky-Rosen pairs. IEEE Access 8:121146\u2013121161","journal-title":"IEEE Access"},{"key":"32_CR11","doi-asserted-by":"publisher","first-page":"3264","DOI":"10.1109\/TIFS.2022.3203316","volume":"17","author":"Q Li","year":"2022","unstructured":"Li Q, Wu J, Quan J, Shi J, Zhang S (2022) Efficient quantum blockchain with a consensus mechanism QDPoS. IEEE Trans Inf Forens Secur 17:3264\u20133276","journal-title":"IEEE Trans Inf Forens Secur"},{"issue":"1","key":"32_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/JLT.2022.3211442","volume":"41","author":"X Kang","year":"2023","unstructured":"Kang X (2023) Patterning-effect calibration algorithm for secure decoy-state quantum key distribution. J Lightwave Technol 41(1):75\u201382","journal-title":"J Lightwave Technol"},{"issue":"14","key":"32_CR13","doi-asserted-by":"publisher","first-page":"4680","DOI":"10.1109\/JLT.2023.3244880","volume":"41","author":"ZZ Sun","year":"2023","unstructured":"Sun ZZ, Pan D, Ruan D, Long GL (2023) One-sided measurement-device-independent practical quantum secure direct communication. J Lightwave Technol 41(14):4680\u20134690","journal-title":"J Lightwave Technol"},{"key":"32_CR14","first-page":"2978","volume":"67","author":"K Sutradhar","year":"2020","unstructured":"Sutradhar K, Om H (2020) A generalized quantum protocol for secure multiparty summation. IEEE Trans Circuits Syst II Express Briefs 67:2978\u20132982","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Zhonghua C, Goyal SB, Rajawat AS (2023) Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing. J Supercomput","DOI":"10.1007\/s11227-023-05517-4"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Rajawat AS (2023) Enhancing security and scalability of metaverse with blockchain-based consensus mechanisms. In: 2023 15th International conference on electronics, computers and artificial intelligence (ECAI), pp 1\u20136","DOI":"10.1109\/ECAI58194.2023.10194035"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Rajawat AS (2023) Blockchain-based security framework for metaverse: a decentralized approach. In: 2023 15th International conference on electronics, computers and artificial intelligence (ECAI), pp 1\u20136","DOI":"10.1109\/ECAI58194.2023.10193962"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Goyal SB, Rajawat AS, Solanki RK, Zaaba MAM, Long ZA (2023) Integrating AI with cyber security for smart Industry 4.0 application. In: 2023 International conference on inventive computation technologies (ICICT), pp 1223\u20131232","DOI":"10.1109\/ICICT57646.2023.10134374"},{"key":"32_CR19","doi-asserted-by":"publisher","unstructured":"Nagaraj S, Kathole AB, Arya L, Tyagi N, Goyal SB, Rajawat AS, Raboaca MS, Mihaltan TC, Verma C, Suciu G (2023) https:\/\/doi.org\/10.3390\/en16010008","DOI":"10.3390\/en16010008"},{"key":"32_CR20","doi-asserted-by":"publisher","unstructured":"Ali MH, Zolkipli MF (2019) Model of improved a kernel fast learning network based on intrusion detection system. In: Vasant P, Zelinka I, Weber GW (eds) Intelligent computing & optimization. ICO 2018. Advances in intelligent systems and computing, vol 866. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-00979-3_15","DOI":"10.1007\/978-3-030-00979-3_15"},{"key":"32_CR21","doi-asserted-by":"publisher","unstructured":"Zarin I, Akter O, Hosen KS, Islam AU, Hossain S (2023) SWINC: secured wireless intelligent network using cryptography. In: Vasant P, Weber GW, Marmolejo-Saucedo JA, Munapo E, Thomas JJ (eds) Intelligent computing & optimization. ICO 2022. Lecture notes in networks and systems, vol 569. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-19958-5_15","DOI":"10.1007\/978-3-031-19958-5_15"},{"key":"32_CR22","doi-asserted-by":"publisher","unstructured":"Hossain S, Hasan MM, Rahman MM, Barid M (2022) Factors behind the world crime index: some parametric observations using DBSCAN and linear regression. In: Vasant P, Zelinka I, Weber GW (eds) Intelligent computing & optimization. ICO 2021. Lecture notes in networks and systems, vol 371. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-93247-3_69","DOI":"10.1007\/978-3-030-93247-3_69"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing and Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73318-5_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,26]],"date-time":"2024-12-26T13:05:35Z","timestamp":1735218335000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73318-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031733178","9783031733185"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73318-5_32","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"27 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing & Optimization","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Phnom Penh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cambodia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ico2023a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icico.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}