{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:40:48Z","timestamp":1763811648510,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031840777"},{"type":"electronic","value":"9783031840784"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-84078-4_19","type":"book-chapter","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T19:06:23Z","timestamp":1741806383000},"page":"269-282","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Advances and\u00a0Strategies in\u00a0Quantum Computing Integration for\u00a0Cybersecurity: A Systematic Literature Review"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9384-2515","authenticated-orcid":false,"given":"Sebasti\u00e1n","family":"Berr\u00edos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7321-3326","authenticated-orcid":false,"given":"Francisco","family":"Alonso","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9840-0586","authenticated-orcid":false,"given":"Bady","family":"Gana","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7945-9890","authenticated-orcid":false,"given":"Sebasti\u00e1n","family":"Contreras","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1109\/OJCOMS.2024.3356508","volume":"5","author":"HM Kamdjou","year":"2024","unstructured":"Kamdjou, H.M., Baudry, D., Havard, V., Ouchani, S.: Resource-constrained extended reality operated with digital twin in industrial internet of things. IEEE Open J. Commun. Soc. 5, 928\u2013950 (2024)","journal-title":"IEEE Open J. Commun. Soc."},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Said, D.: Quantum computing and machine learning for cybersecurity: distributed denial of service (DDoS) attack detection on smart micro-grid. Energies\u00a016(8) (2023). https:\/\/www.mdpi.com\/1996-1073\/16\/8\/3572","DOI":"10.3390\/en16083572"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"El-Latif, A.A.A., et\u00a0al.: Providing end-to-end security using quantum walks in IoT networks. IEEE Access\u00a08, 92\u00a0687\u201392\u00a0696 (2020)","DOI":"10.1109\/ACCESS.2020.2992820"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Althobaiti, O.S.,\u00a0Dohler, M.: Quantum-resistant cryptography for the internet of things based on location-based lattices. IEEE Access\u00a09, 133\u00a0185\u2013133\u00a0203 (2021)","DOI":"10.1109\/ACCESS.2021.3115087"},{"issue":"11","key":"19_CR5","doi-asserted-by":"publisher","first-page":"2351","DOI":"10.3390\/sym14112351","volume":"14","author":"OS Althobaiti","year":"2022","unstructured":"Althobaiti, O.S., Mahmoodi, T., Dohler, M.: Intelligent bio-latticed cryptography: a quantum-proof efficient proposal. Symmetry 14(11), 2351 (2022)","journal-title":"Symmetry"},{"issue":"24","key":"19_CR6","doi-asserted-by":"publisher","first-page":"9818","DOI":"10.3390\/s23249818","volume":"23","author":"A Green","year":"2023","unstructured":"Green, A., Lawrence, J., Siopsis, G., Peters, N.A., Passian, A.: Quantum key distribution for critical infrastructures: towards cyber-physical security for hydropower and dams. Sensors 23(24), 9818 (2023)","journal-title":"Sensors"},{"issue":"23","key":"19_CR7","doi-asserted-by":"publisher","first-page":"12025","DOI":"10.3390\/app122312025","volume":"12","author":"F Mercaldo","year":"2022","unstructured":"Mercaldo, F., Ciaramella, G., Iadarola, G., Storto, M., Martinelli, F., Santone, A.: Towards explainable quantum machine learning for mobile malware detection and classification. Appl. Sci.-Basel 12(23), 12025 (2022)","journal-title":"Appl. Sci.-Basel"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Lloyd, S.: Simuladores cu\u00e1nticos universales. Ciencia 273(5278), 1073\u20131078 (1996). https:\/\/science.sciencemag.org\/content\/273\/5278\/1073","DOI":"10.1126\/science.273.5278.1073"},{"key":"19_CR9","unstructured":"Arute, F.,\u00a0Arya, K.,\u00a0Babbush, R., et\u00a0al.: Supremac\u00eda cu\u00e1ntica utilizando un procesador superconductor programable. Naturaleza 574(7779), 505\u2013510 (2019). https:\/\/www.nature.com\/articles\/s41586-019-1666-5"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Childs, A.M.,\u00a0Gosset, D.,\u00a0Webb, Z.: Computaci\u00f3n universal mediante caminata cu\u00e1ntica multipart\u00edcula. Ciencia 339(6121), 791\u2013794 (2017). https:\/\/science.sciencemag.org\/content\/339\/6121\/791","DOI":"10.1126\/science.1229957"},{"key":"19_CR11","unstructured":"Bennett, C.H.,\u00a0Brassard, G.: Criptograf\u00eda cu\u00e1ntica: distribuci\u00f3n de claves p\u00fablicas y lanzamiento de monedas. In: Actas de la conferencia internacional IEEE sobre computadoras, sistemas y procesamiento de se\u00f1ales, pp. 175\u2013179 (1984). https:\/\/ieeexplore.ieee.org\/document\/1084743"},{"key":"19_CR12","unstructured":"Grover, L.K.: Un algoritmo r\u00e1pido de mec\u00e1nica cu\u00e1ntica para la b\u00fasqueda de bases de datos. In: Actas del Vig\u00e9simo Octavo Simposio Anual ACM sobre Teor\u00eda de la Computaci\u00f3n, pp. 212\u2013219 (1996). https:\/\/dl.acm.org\/doi\/10.1145\/237814.237866"},{"key":"19_CR13","unstructured":"Harrow, A.W.,\u00a0Hassidim, A.,\u00a0Lloyd, S.: Algoritmo cu\u00e1ntico para sistemas lineales de ecuaciones. Cartas de revisi\u00f3n f\u00edsica 103(15), 150502 (2009). https:\/\/journals.aps.org\/prl\/abstract\/10.1103\/PhysRevLett.103.150502"},{"issue":"2","key":"19_CR14","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/MC.2022.3227657","volume":"56","author":"P Ford","year":"2023","unstructured":"Ford, P.: The quantum cybersecurity threat may arrive sooner than you think. Computer 56(2), 134\u2013136 (2023)","journal-title":"Computer"},{"key":"19_CR15","unstructured":"Schneier, B.: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W. W. Norton & Company (2015). https:\/\/books.google.com\/books?id=vXxXCQAAQBAJ"},{"key":"19_CR16","unstructured":"Dye, K.M.: Cybersecurity and Cyberwar: What Everyone Needs to Know\u00ae. Oxford University Press (2017). https:\/\/global.oup.com\/academic\/product\/cybersecurity-and-cyberwar-9780190231076"},{"key":"19_CR17","unstructured":"Clarke, N.,\u00a0Furnell, S.,\u00a0Warren, M.: Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions. Auerbach Publications (2018). https:\/\/www.taylorfrancis.com\/books\/9780429981268"},{"key":"19_CR18","unstructured":"National Institute of Standards and Technology: NIST cybersecurity framework version 1.1 (2018). https:\/\/www.nist.gov\/publications\/nist-cybersecurity-framework-version-11"},{"key":"19_CR19","unstructured":"Schmitt, M.E.: The Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization. Apress (2017). https:\/\/link.springer.com\/book\/10.1007%2F978-1-4842-3001-0"},{"key":"19_CR20","unstructured":"SANS Institute: SANS 2021 cyber threat intelligence survey (2019). https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/cyber-threat-intelligence-survey-2021-39750"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Raheman, F.: The future of cybersecurity in the age of quantum computers. Future Internet\u00a014(11) (2022)","DOI":"10.3390\/fi14110335"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Gisin, N.,\u00a0Ribordy, G., Tittel, W.,\u00a0Zbinden, H.: Quantum cryptography. Rev. Modern Phys.\u00a074(1), 145 (2002). https:\/\/journals.aps.org\/rmp\/abstract\/10.1103\/RevModPhys.74.145","DOI":"10.1103\/RevModPhys.74.145"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Lo, H.-K.,\u00a0Curty, M.,\u00a0Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2014). https:\/\/journals.aps.org\/prl\/abstract\/10.1103\/PhysRevLett.108.130503","DOI":"10.1103\/PhysRevLett.108.130503"},{"issue":"3","key":"19_CR24","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81(3), 1301 (2009)","journal-title":"Rev. Mod. Phys."},{"key":"19_CR25","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2014","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theoret. Comput. Sci. 560, 7\u201311 (2014)","journal-title":"Theoret. Comput. Sci."},{"key":"19_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2022.100242","volume":"15","author":"M Kumar","year":"2022","unstructured":"Kumar, M.: Post-quantum cryptography algorithm\u2019s standardization and performance analysis. Array 15, 100242 (2022)","journal-title":"Array"},{"issue":"24","key":"19_CR27","doi-asserted-by":"publisher","first-page":"11784","DOI":"10.3390\/app112411784","volume":"11","author":"H Alyami","year":"2021","unstructured":"Alyami, H., et al.: The evaluation of software security through quantum computing techniques: a durability perspective. Appl. Sci. 11(24), 11784 (2021)","journal-title":"Appl. Sci."},{"issue":"4","key":"19_CR28","first-page":"97","volume":"42","author":"W Ronhaar","year":"2021","unstructured":"Ronhaar, W., Zehner, W.B., Langhorne, R.: Zero identity - the new cybersecurity paradigm. Mark. Sci. Res. Organ. 42(4), 97\u2013109 (2021)","journal-title":"Mark. Sci. Res. Organ."},{"issue":"8","key":"19_CR29","doi-asserted-by":"publisher","first-page":"3572","DOI":"10.3390\/en16083572","volume":"16","author":"D Said","year":"2023","unstructured":"Said, D.: Quantum computing and machine learning for cybersecurity: distributed denial of service (DDoS) attack detection on smart micro-grid. Energies 16(8), 3572 (2023)","journal-title":"Energies"},{"issue":"2","key":"19_CR30","doi-asserted-by":"publisher","first-page":"245","DOI":"10.4067\/S0718-33052015000200009","volume":"23","author":"LC Alvarez","year":"2015","unstructured":"Alvarez, L.C., Palacios, R.F., Caiconte, P.C.: Desarrollo de un simulador para el protocolo de criptograf\u00eda cu\u00e1ntica e91 en un ambiente distribuido. Ingeniare Rev. Chil. Ing. 23(2), 245\u2013258 (2015)","journal-title":"Ingeniare Rev. Chil. Ing."},{"key":"19_CR31","doi-asserted-by":"crossref","unstructured":"Page, M.J., et al.: The prisma 2020 statement: an updated guideline for reporting systematic reviews. BMJ 372 (2021). https:\/\/www.bmj.com\/content\/372\/bmj.n71","DOI":"10.1136\/bmj.n71"},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Lizama-P\u00e9rez, L.A., L\u00f3pez, J.M.,\u00a0De\u00a0Carlos-L\u00f3pez, E., Venegas-Andraca, S.E.: Quantum flows for secret key distribution in the presence of the photon number splitting attack. Entropy\u00a016(6), 3121\u20133135 (2014). https:\/\/www.mdpi.com\/1099-4300\/16\/6\/3121","DOI":"10.3390\/e16063121"},{"issue":"1","key":"19_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-021-00103-8","volume":"5","author":"RA Disha","year":"2022","unstructured":"Disha, R.A., Waheed, S.: Performance analysis of machine learning models for intrusion detection system using gini impurity-based weighted random forest (GIWRF) feature selection technique. Cybersecurity 5(1), 1 (2022)","journal-title":"Cybersecurity"},{"issue":"1","key":"19_CR34","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s11219-023-09633-5","volume":"32","author":"J Alvarado-Valiente","year":"2024","unstructured":"Alvarado-Valiente, J., Romero-\u00c1lvarez, J., Moguel, E., Garc\u00eda-Alonso, J., Murillo, J.M.: Technological diversity of quantum computing providers: a comparative study and a proposal for API gateway integration. Softw. Qual. J. 32(1), 53\u201373 (2024)","journal-title":"Softw. Qual. J."},{"issue":"21","key":"19_CR35","doi-asserted-by":"publisher","first-page":"8151","DOI":"10.3390\/s22218151","volume":"22","author":"S Shamshad","year":"2022","unstructured":"Shamshad, S., Riaz, F., Riaz, R., Rizvi, S.S., Abdulla, S.: An enhanced architecture to resolve public-key cryptographic issues in the internet of things (IoT), employing quantum computing supremacy. Sensors 22(21), 8151 (2022)","journal-title":"Sensors"},{"issue":"1","key":"19_CR36","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1038\/s41534-017-0025-3","volume":"3","author":"JF Fitzsimons","year":"2017","unstructured":"Fitzsimons, J.F.: Private quantum computation: an introduction to blind quantum computing and related protocols. Npj Quantum Inf. 3(1), 23 (2017)","journal-title":"Npj Quantum Inf."},{"issue":"1","key":"19_CR37","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1140\/epjqt\/s40507-022-00143-0","volume":"9","author":"M Mohageg","year":"2022","unstructured":"Mohageg, M., et al.: The deep space quantum link: prospective fundamental physics experiments using long-baseline quantum optics. EPJ Quant. Technol. 9(1), 25 (2022)","journal-title":"EPJ Quant. Technol."},{"issue":"6","key":"19_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.07.009","volume":"35","author":"C Mangla","year":"2023","unstructured":"Mangla, C., Rani, S., Qureshi, N.M.F., Singh, A.: Mitigating 5G security challenges for next-gen industry using quantum computing. J. King Saud Univ. Comput. Inf. Sci. 35(6), 101334 (2023)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"3","key":"19_CR39","doi-asserted-by":"publisher","first-page":"714","DOI":"10.3390\/en15030714","volume":"15","author":"J Ahn","year":"2022","unstructured":"Ahn, J., et al.: Toward quantum secured distributed energy resources: adoption of post-quantum cryptography (PQC) and quantum key distribution (QKD). Energies 15(3), 714 (2022)","journal-title":"Energies"}],"container-title":["Communications in Computer and Information Science","Advanced Research in Technologies, Information, Innovation and Sustainability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-84078-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T19:06:30Z","timestamp":1741806390000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-84078-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031840777","9783031840784"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-84078-4_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article (If EquinOCS, our proceedings submission system, is used, then the disclaimer can be provided directly in the system).","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ARTIIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santiago de Chile","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chile","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"artiis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.artiis.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}