{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T04:41:02Z","timestamp":1771389662550,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T00:00:00Z","timestamp":1753747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T00:00:00Z","timestamp":1753747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s00034-025-03256-w","type":"journal-article","created":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T18:32:08Z","timestamp":1753813928000},"page":"9592-9618","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Comparative Analysis of Intrusion Detection Models Using Quantum Machine Learning Techniques"],"prefix":"10.1007","volume":"44","author":[{"given":"Barkha","family":"Singh","sequence":"first","affiliation":[]},{"given":"S.","family":"Indu","sequence":"additional","affiliation":[]},{"given":"Sudipta","family":"Majumdar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,29]]},"reference":[{"key":"3256_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102549","author":"AA Abd El-Latif","year":"2021","unstructured":"A.A. Abd El-Latif, B. Abd-El-Atty, I. Mehmood, K. Muhammad, S.E. Venegas-Andraca, J. Peng, Quantum-inspired blockchain-based cybersecurity: securing smart edge utilities in IoT-based smart cities. Inf. Process. Manag. (2021). https:\/\/doi.org\/10.1016\/j.ipm.2021.102549","journal-title":"Inf. Process. Manag."},{"issue":"7","key":"3256_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MSPEC.2018.8389185","volume":"55","author":"C Abellan","year":"2018","unstructured":"C. Abellan, V. Pruneri, The future of cybersecurity is quantum. IEEE Spectr. 55(7), 30\u201335 (2018). https:\/\/doi.org\/10.1109\/MSPEC.2018.8389185","journal-title":"IEEE Spectr."},{"issue":"4","key":"3256_CR3","doi-asserted-by":"publisher","first-page":"2279","DOI":"10.3390\/ai5040112","volume":"5","author":"R Abreu","year":"2024","unstructured":"R. Abreu, E. Simao, C. Serodio, F. Branco, A. Valente, Enhancing IoT security in vehicles: a comprehensive review of AI-driven solutions for cyber- threat detection. AI 5(4), 2279\u20132299 (2024). https:\/\/doi.org\/10.3390\/ai5040112","journal-title":"AI"},{"key":"3256_CR4","doi-asserted-by":"publisher","unstructured":"A.A. Abushgra, How quantum computing impacts cyber security, in 2023 Intelligent Methods, Systems, and Applications (IMSA) (2023), pp. 74\u201379. https:\/\/doi.org\/10.1109\/IMSA58542.2023.10217756. https:\/\/api.semanticscholar.org\/CorpusID:261127638","DOI":"10.1109\/IMSA58542.2023.10217756"},{"issue":"1","key":"3256_CR5","doi-asserted-by":"publisher","first-page":"e4150","DOI":"10.1002\/ett.4150","volume":"32","author":"Z Ahmad","year":"2020","unstructured":"Z. Ahmad, A.S. Khan, W.S. Cheah, J. Bin Abdullah, F. Ahmad, Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans. Emerg. Telecommun. Technol. 32(1), e4150 (2020)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"07","key":"3256_CR6","doi-asserted-by":"publisher","first-page":"2340001","DOI":"10.1142\/S0219749923400012","volume":"21","author":"Y Ahmed","year":"2023","unstructured":"Y. Ahmed, B. Yue, Z. Gu, J. Yang, An overview: big data analysis by deep learning and image processing. Int. J. Quant. Inf. 21(07), 2340001 (2023). https:\/\/doi.org\/10.1142\/S0219749923400012","journal-title":"Int. J. Quant. Inf."},{"key":"3256_CR7","doi-asserted-by":"crossref","unstructured":"M.S. Akter, H. Shahriar, S.I. Ahamed, K.D. Gupta, M.A. Rahman, A. Mohamed, M.A. Rahman, A.A.U. Rahman, F. Wu, Case study-based approach of quantum machine learning in cybersecurity: quantum support vector machine for malware classification and protection, in 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC) (2023), pp. 1057\u20131063. https:\/\/api.semanticscholar.org\/CorpusID:258999713","DOI":"10.1109\/COMPSAC57700.2023.00161"},{"issue":"2169\u20133536","key":"3256_CR8","doi-asserted-by":"publisher","first-page":"157356","DOI":"10.1109\/ACCESS.2020.3019345","volume":"8","author":"OS Althobaiti","year":"2020","unstructured":"O.S. Althobaiti, M. Dohler, Cybersecurity challenges associated with the internet of things in a post-quantum world. IEEE Access 8(2169\u20133536), 157356\u2013157381 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3019345","journal-title":"IEEE Access"},{"key":"3256_CR9","doi-asserted-by":"publisher","DOI":"10.55041\/IJSREM17616","author":"V Bhagwani","year":"2023","unstructured":"V. Bhagwani, V. Mishra, Quantum computing and blockchain technologies over IoT applications: a review. Int. J. Sci. Res. Eng. Manag. (2023). https:\/\/doi.org\/10.55041\/IJSREM17616","journal-title":"Int. J. Sci. Res. Eng. Manag."},{"key":"3256_CR10","doi-asserted-by":"publisher","unstructured":"K.S. Bhosale, S. Ambre, Z. Valkova-Jarvis, A. Singh, M. Nenova, Quantum technology: unleashing the power and shaping the future of cybersecurity, in 2023 Eight Junior Conference on Lighting (Lighting) (IEEE, Sozopol, Bulgaria, 2023), pp. 1\u20134. https:\/\/doi.org\/10.1109\/lighting59819.2023.10299447","DOI":"10.1109\/lighting59819.2023.10299447"},{"key":"3256_CR11","doi-asserted-by":"publisher","unstructured":"G. Cavallaro, M. Riedel, T. Lippert, K. Michielsen, Hybrid quantum-classical workflows in modular supercomputing architectures with the Julich unified infrastructure for quantum computing, in IGARSS 2022\u20132022 IEEE International Geoscience and Remote Sensing Symposium (2022), pp. 4149\u20134152. https:\/\/doi.org\/10.1109\/IGARSS46834.2022.9883225. https:\/\/api.semanticscholar.org\/CorpusID:252589081","DOI":"10.1109\/IGARSS46834.2022.9883225"},{"key":"3256_CR12","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/OJCOMS.2020.3046110","volume":"2","author":"MY Al-darwbi","year":"2021","unstructured":"M.Y. Al-darwbi, A.A. Ghorbani, A.H. Lashkari, KeyShield: a scalable and quantum-safe key management scheme. IEEE Open J. Commun. Soc. 2, 87\u2013101 (2021). https:\/\/doi.org\/10.1109\/OJCOMS.2020.3046110","journal-title":"IEEE Open J. Commun. Soc."},{"issue":"1","key":"3256_CR13","doi-asserted-by":"publisher","first-page":"1555","DOI":"10.30574\/wjarr.2024.21.1.2640","volume":"21","author":"B Dash","year":"2024","unstructured":"B. Dash, S. Ullah, Quantum-safe: cybersecurity in the age of quantum-powered AI. World J. Adv. Res. Rev. 21(1), 1555\u20131563 (2024)","journal-title":"World J. Adv. Res. Rev."},{"key":"3256_CR14","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/MIC.2021.3133675","volume":"26","author":"Y Ding","year":"2022","unstructured":"Y. Ding, A. Javadi-Abhari, Quantum and post-Moore\u2019s law computing. IEEE Internet Comput. 26, 5\u20136 (2022). https:\/\/doi.org\/10.1109\/MIC.2021.3133675","journal-title":"IEEE Internet Comput."},{"key":"3256_CR15","doi-asserted-by":"publisher","first-page":"012007","DOI":"10.1088\/1742-6596\/2122\/1\/012007","volume":"2122","author":"V Dixit","year":"2021","unstructured":"V. Dixit, Y. Koshka, T. Aldwairi, M.A. Novotny, Comparison of quantum and classical methods for labels and patterns in Restricted Boltzmann Machines. J. Phys. Conf. Ser. 2122, 012007 (2021). https:\/\/doi.org\/10.1088\/1742-6596\/2122\/1\/012007","journal-title":"J. Phys. Conf. Ser."},{"issue":"3","key":"3256_CR16","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1109\/TETCI.2021.3074916","volume":"6","author":"V Dixit","year":"2022","unstructured":"V. Dixit, R. Selvarajan, T. Aldwairi, Y. Koshka, M.A. Novotny, T.S. Humble, M.A. Alam, S. Kais, Training a Quantum annealing based restricted Boltzmann machine on cybersecurity data. IEEE Trans. Emerg. Top. Comput. Intell. 6(3), 417\u2013428 (2022). https:\/\/doi.org\/10.1109\/TETCI.2021.3074916","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"3256_CR17","doi-asserted-by":"publisher","unstructured":"A. Dwivedi, G.K. Saini, U.I. Musa, Kunal, Cybersecurity and prevention in the quantum era, in 2023 2nd International Conference for Innovation in Technology (INOCON) (2023), pp. 1\u20136. https:\/\/doi.org\/10.1109\/INOCON57975.2023.10101186. https:\/\/api.semanticscholar.org\/CorpusID:258219957","DOI":"10.1109\/INOCON57975.2023.10101186"},{"key":"3256_CR18","doi-asserted-by":"publisher","unstructured":"D. Edwards, D.B. Rawat, Quantum adversarial machine learning: status, challenges and perspectives, in 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) (IEEE, Piscataway, NJ, USA, 2020), pp. 128\u2013133. https:\/\/doi.org\/10.1109\/TPS-ISA50397.2020.00026","DOI":"10.1109\/TPS-ISA50397.2020.00026"},{"issue":"12","key":"3256_CR19","doi-asserted-by":"publisher","first-page":"18145","DOI":"10.1109\/TNNLS.2023.3312170","volume":"35","author":"F Fan","year":"2023","unstructured":"F. Fan, Y. Shi, T. Guggemos, X.X. Zhu, Hybrid quantum-classical convolutional neural network model for image classification. IEEE Trans. Neural Netw. Learn. Syst. 35(12), 18145\u201318159 (2023). https:\/\/doi.org\/10.1109\/TNNLS.2023.3312170","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"3256_CR20","doi-asserted-by":"publisher","first-page":"21091","DOI":"10.1109\/ACCESS.2020.2968985","volume":"8","author":"TM Fern\u00e1ndez-Caram\u00e9s","year":"2020","unstructured":"T.M. Fern\u00e1ndez-Caram\u00e9s, P. Fraga-Lamas, Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 8, 21091\u201321116 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2968985","journal-title":"IEEE Access"},{"issue":"3","key":"3256_CR21","doi-asserted-by":"publisher","first-page":"1748","DOI":"10.1109\/COMST.2024","volume":"26","author":"H Gharavi","year":"2024","unstructured":"H. Gharavi, J. Granjal, E. Monteiro, Post-quantum blockchain security for the Internet of Things: survey and research directions. IEEE Commun. Surv. Tutor. 26(3), 1748\u20131774 (2024). https:\/\/doi.org\/10.1109\/COMST.2024","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"3256_CR22","doi-asserted-by":"publisher","first-page":"6","DOI":"10.18372\/2410-7840.25.17593","volume":"25","author":"A Havrylova","year":"2023","unstructured":"A. Havrylova, Y. Khokhlachova, A. Tkachov, N. Voropay, V. Khvostenko, Justification of directions for improving authentication protocols in information and communication systems. Ukr. Inf. Secur. Res. J. 25(1), 6\u201319 (2023). https:\/\/doi.org\/10.18372\/2410-7840.25.17593","journal-title":"Ukr. Inf. Secur. Res. J."},{"key":"3256_CR23","doi-asserted-by":"publisher","first-page":"204","DOI":"10.3233\/SHTI230463","volume":"305","author":"CE Hawks","year":"2023","unstructured":"C.E. Hawks, B. Colmenares, D. Verma, M. Gil, Patient-centric interoperability and cybersecurity for cross-border healthcare. Stud. Health Technol. Inform. 305, 204\u2013207 (2023). https:\/\/doi.org\/10.3233\/SHTI230463","journal-title":"Stud. Health Technol. Inform."},{"issue":"3","key":"3256_CR24","doi-asserted-by":"publisher","first-page":"1313","DOI":"10.3934\/nhm.2023057","volume":"18","author":"SK Henge","year":"2023","unstructured":"S.K. Henge, G. Jayaraman, M. Sreedevi, R.R.M. Rashid, S.S. Alshamrani, M.M. Alnfiai, A.S. Alghamdi, Secure keys data distribution-based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology. Netw. Heterogeneous Media 18(3), 1313\u20131334 (2023). https:\/\/doi.org\/10.3934\/nhm.2023057","journal-title":"Netw. Heterogeneous Media"},{"key":"3256_CR25","doi-asserted-by":"publisher","unstructured":"A. Hummelholm, AI-based quantum-safe cybersecurity automation and orchestration for edge intelligence in future networks, in European Conference on Cyber Warfare and Security, vol. 22, ed. By A. Andreatos, C. Douligeris (2023), pp. 696\u2013702. https:\/\/doi.org\/10.34190\/eccws.22.1.1211. https:\/\/api.semanticscholar.org\/CorpusID:259453663.","DOI":"10.34190\/eccws.22.1.1211"},{"issue":"1","key":"3256_CR26","doi-asserted-by":"publisher","first-page":"47","DOI":"10.54851\/v4i1y202206","volume":"4","author":"M-D Iancu","year":"2022","unstructured":"M.-D. Iancu, Study on actual developments in the field of quantum computing in terms of cyber security and physical systems. Roman. Cyber Secur. J. 4(1), 47\u201356 (2022). https:\/\/doi.org\/10.54851\/v4i1y202206","journal-title":"Roman. Cyber Secur. J."},{"key":"3256_CR27","doi-asserted-by":"publisher","unstructured":"D. Jingbo, Big data classification model and algorithm based on double quantum particle swarm optimization, in 2023 IEEE International Conference on Control, Electronics and Computer Technology (ICCECT), Changsha, China (2023), pp. 1309\u20131313. https:\/\/doi.org\/10.1109\/ICCECT57938.2023.10140247","DOI":"10.1109\/ICCECT57938.2023.10140247"},{"key":"3256_CR28","unstructured":"N. Kilber, D. Kaestle, S. Wagner, Cybersecurity for quantum computing, in Proceedings of the Q-SET@QCE 2021 Workshop, co-located with IEEE Quantum Week (2021), pp. 20\u201328. https:\/\/api.semanticscholar.org\/CorpusID:240070611"},{"issue":"19","key":"3256_CR29","doi-asserted-by":"publisher","DOI":"10.3390\/app11199085","volume":"11","author":"K-K Ko","year":"2021","unstructured":"K.-K. Ko, E.-S. Jung, Development of cybersecurity technology and algorithm based on quantum computing. Appl. Sci. 11(19), 9085 (2021). https:\/\/doi.org\/10.3390\/app11199085","journal-title":"Appl. Sci."},{"issue":"6","key":"3256_CR30","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11128-022-03557-y","volume":"21","author":"R Kuang","year":"2022","unstructured":"R. Kuang, M. Barbeau, Quantum permutation pad for universal quantum-safe cryptography. Quant. Inf. Process. 21(6), 211 (2022). https:\/\/doi.org\/10.1007\/s11128-022-03557-y","journal-title":"Quant. Inf. Process."},{"key":"3256_CR31","doi-asserted-by":"publisher","unstructured":"A. Kuznetsov, A. Kiian, V. Babenko, I. Perevozova, I. Chepurko, O. Smirnov, New approach to the implementation of post-quantum digital signature scheme, in 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT) (IEEE, Kyiv, Ukraine, 2020), pp. 166\u2013171. https:\/\/doi.org\/10.1109\/DESSERT50317.2020.9125053","DOI":"10.1109\/DESSERT50317.2020.9125053"},{"key":"3256_CR32","doi-asserted-by":"publisher","unstructured":"M.C. Libicki, D. Gompert, Quantum communication for post-pandemic cybersecurity, in 2021 13th International Conference on Cyber Conflict (CyCon) (IEEE, 2021), pp. 371\u2013386. https:\/\/doi.org\/10.23919\/CyCon51939.2021.9468295","DOI":"10.23919\/CyCon51939.2021.9468295"},{"issue":"3","key":"3256_CR33","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1007\/s11082-023-05854-x","volume":"56","author":"Z Liu","year":"2024","unstructured":"Z. Liu, X. Jia, B. Li, E-healthcare application cyber security analysis using quantum machine learning in malicious user detection. Opt. Quant. Electron. 56(3), 476 (2024). https:\/\/doi.org\/10.1007\/s11082-023-05854-x","journal-title":"Opt. Quant. Electron."},{"key":"3256_CR34","doi-asserted-by":"publisher","unstructured":"M. Masum, M. Nazim, M.J.H. Faruk, H. Shahriar, M. Valero, M.A.H. Khan, G. Uddin, S. Barzanjeh, E. Saglamyurek, A. Rahman, S.I. Ahamed, Quantum machine learning for software supply chain attacks: how far can we go?, in 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2022), pp. 530\u2013538. https:\/\/doi.org\/10.1109\/COMPSAC54236.2022.00097","DOI":"10.1109\/COMPSAC54236.2022.00097"},{"issue":"5","key":"3256_CR35","doi-asserted-by":"publisher","first-page":"41","DOI":"10.9734\/CJAST\/2024\/v43i54377","volume":"43","author":"U Mmaduekwe","year":"2024","unstructured":"U. Mmaduekwe, E. Mmaduekwe, Cybersecurity and cryptography: the new era of quantum computing. Curr. J. Appl. Sci. Technol. 43(5), 41\u201351 (2024). https:\/\/doi.org\/10.9734\/CJAST\/2024\/v43i54377","journal-title":"Curr. J. Appl. Sci. Technol."},{"key":"3256_CR36","doi-asserted-by":"publisher","unstructured":"K. Nakka, S. Ahmad, T. Kim, L. Atkinson, H.M. Ammari, Post-quantum cryptography (PQC)-grade IEEE 2030.5 for quantum secure distributed energy resources networks, in 2024 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT) (2024), pp. 1\u20135. https:\/\/doi.org\/10.1109\/ISGT59692.2024.10454235. https:\/\/api.semanticscholar.org\/CorpusID:268254710","DOI":"10.1109\/ISGT59692.2024.10454235"},{"key":"3256_CR37","doi-asserted-by":"publisher","unstructured":"M. Osborne, Applying Post-quantum cryptography\u2014survey and application of machine learning, in: 2023. https:\/\/doi.org\/10.48550\/arXiv.2310.04425","DOI":"10.48550\/arXiv.2310.04425"},{"key":"3256_CR38","doi-asserted-by":"crossref","unstructured":"P. Radanliev, D.D. Roure, O. Santos, Red teaming generative AI\/NLP, the BB84 quantum cryptography protocol and the NIST-approved quantum-resistant cryptographic algorithms, in: arXiv:2310.04425 (2023). https:\/\/api.semanticscholar.org\/CorpusID:262219397","DOI":"10.31224\/3230"},{"key":"3256_CR39","doi-asserted-by":"publisher","unstructured":"M.A. Rahman, H. Shahriar, V.A. Clincy, M.F. Hossain, M.A. Rahman, A quantum generative adversarial network-based intrusion detection system, in 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC) (2023), pp. 1810\u20131815. https:\/\/doi.org\/10.1109\/COMPSAC59017.2023. https:\/\/api.semanticscholar.org\/CorpusID:260387399","DOI":"10.1109\/COMPSAC59017.2023"},{"issue":"S5","key":"3256_CR40","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.17762\/jaz.v44iS-5.1854","volume":"44","author":"P Ravindra","year":"2023","unstructured":"P. Ravindra, S. Vasu, V. Suresh, K.B. Lakshmi, A study on \u201csecurity of cyber-physical systems in the cloud.\u201d J. Adv. Zool. 44(S5), 2347\u20132364 (2023)","journal-title":"J. Adv. Zool."},{"key":"3256_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.47577\/technium.v5i.8293","volume":"5","author":"JE Raya","year":"2023","unstructured":"J.E. Raya, A.S. Yahya, E.K. Ahmad, Protection from a quantum computer cyber-attack. Tech. Roman. J. Appl. Sci. Technol. 5, 1\u201312 (2023). https:\/\/doi.org\/10.47577\/technium.v5i.8293","journal-title":"Tech. Roman. J. Appl. Sci. Technol."},{"key":"3256_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.47577\/technium.v5i.8293","volume":"5","author":"JE Raya","year":"2023","unstructured":"J.E. Raya, A.S. Yahya, E.K. Ahmad, Protection from A quantum computer cyber-attack: survey. Tech. Roman. J. Appl. Sci. Technol. 5, 1\u201312 (2023). https:\/\/doi.org\/10.47577\/technium.v5i.8293","journal-title":"Tech. Roman. J. Appl. Sci. Technol."},{"key":"3256_CR43","unstructured":"M.A. Serrano, L.E.S. Crespo, A.S.-O. Parra, D.G. Rosado, C. Blanco, E. Fern\u00e1ndez-Medina, Towards a quantum world in cybersecurity land. in IS-EUD Workshops, vol. 3408. CEUR Workshop Proceedings (Cagliari, Italy, 2023), pp. 1\u20138. ISBN:1613-0073. https:\/\/ceur-ws.org\/Vol-3408\/paper-idXXX.pdf"},{"key":"3256_CR44","doi-asserted-by":"publisher","DOI":"10.46610\/JBDTBA.2022.v01i01.005","author":"K Singh","year":"2022","unstructured":"K. Singh, A. Tomar, V. Singh, Performance of quantum computers in machine learning and big data analysis. J. Big Data Technol. Bus. Anal. (2022). https:\/\/doi.org\/10.46610\/JBDTBA.2022.v01i01.005","journal-title":"J. Big Data Technol. Bus. Anal."},{"issue":"3","key":"3256_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/algorithms4030001","volume":"4","author":"S Singh","year":"2024","unstructured":"S. Singh, D. Kumar, Enhancing cyber security using quantum computing and artificial intelligence: a review. Algorithms 4(3), 1\u201318 (2024). https:\/\/doi.org\/10.3390\/algorithms4030001","journal-title":"Algorithms"},{"issue":"2","key":"3256_CR46","doi-asserted-by":"publisher","first-page":"49","DOI":"10.30574\/gjeta.2024.18.2.0026","volume":"18","author":"EO Sodiya","year":"2024","unstructured":"E.O. Sodiya, U.J. Umoga, O.O. Amoo, A. Atadoga, Quantum computing and its potential impact on U.S. cybersecurity: a review: Scrutinizing the challenges and opportunities presented by quantum technologies in safeguarding digital assets. Glob. J. Eng. Technol. Adv. 18(2), 49\u201364 (2024). https:\/\/doi.org\/10.30574\/gjeta.2024.18.2.0026","journal-title":"Glob. J. Eng. Technol. Adv."},{"issue":"2","key":"3256_CR47","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.procs.2021.12.135","volume":"197","author":"H Suryotrisongko","year":"2022","unstructured":"H. Suryotrisongko, Y. Musashi, Evaluating hybrid quantum-classical deep learning for cybersecurity botnet DGA detection. Procedia Comput. Sci. 197(2), 223\u2013229 (2022). https:\/\/doi.org\/10.1016\/j.procs.2021.12.135","journal-title":"Procedia Comput. Sci."},{"key":"3256_CR48","doi-asserted-by":"publisher","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","volume":"6","author":"Y Xin","year":"2018","unstructured":"Y. Xin, L. Kong, Z. Liu, Y. Chen, Y. Li, H. Zhu, M. Gao, H. Hou, C. Wang, Machine learning and deep learning methods for cybersecurity. IEEE Access 6, 35365\u201335381 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2836950","journal-title":"IEEE Access"},{"key":"3256_CR49","doi-asserted-by":"publisher","unstructured":"D.C. Yadav, R. Bhagwat, A. Saha, Quantum computing enhancements in deep learning models for cybersecurity, in 2023 International Conference on Recent Advances in Science and Engineering Technology (ICRASET) (Online\/India, IEEE, 2023), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICRASET59632.2023.10420030","DOI":"10.1109\/ICRASET59632.2023.10420030"},{"issue":"2","key":"3256_CR50","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1109\/COMST.2023.3325761","volume":"26","author":"Z Yang","year":"2023","unstructured":"Z. Yang, H. Alfauri, B. Farkiani, R. Jain, R. Di Pietro, A. Erbad, A survey and comparison of post-quantum and quantum blockchains. IEEE Commun. Surv. Tutor. 26(2), 967\u20131002 (2023). https:\/\/doi.org\/10.1109\/COMST.2023.3325761","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3256_CR51","doi-asserted-by":"publisher","unstructured":"S. Yevseiev, Y. Khokhlachova, S. Ostapov, O. Laptiev, Models of socio-cyberphysical systems security, in Models of Socio-Cyber-Physical Systems Security (2023), p. 168. https:\/\/doi.org\/10.15587\/978-617-7319-72-5. https:\/\/api.semanticscholar.org\/CorpusID:259985117","DOI":"10.15587\/978-617-7319-72-5"},{"issue":"12","key":"3256_CR52","doi-asserted-by":"publisher","DOI":"10.3390\/math11122653","volume":"11","author":"B Zaid","year":"2023","unstructured":"B. Zaid, A. Sayeed, P. Bala, A. Alshehri, A.M. Alanazi, S. Zubair, Toward secure and resilient networks: a zero-trust security framework with quantum fingerprinting for devices accessing network. Mathematics 11(12), 2653 (2023). https:\/\/doi.org\/10.3390\/math11122653","journal-title":"Mathematics"},{"key":"3256_CR53","doi-asserted-by":"publisher","first-page":"8214619:1","DOI":"10.1155\/2018\/8214619","volume":"2018","author":"T Zhou","year":"2018","unstructured":"T. Zhou, J.-G. Shen, X. Li, C. Wang, J. Shen, Quantum cryptography for the future internet and the security analysis. Secur. Commun. Netw. 2018, 8214619:1-8214619:7 (2018)","journal-title":"Secur. Commun. Netw."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03256-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-025-03256-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03256-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,30]],"date-time":"2025-11-30T03:28:49Z","timestamp":1764473329000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-025-03256-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,29]]},"references-count":53,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["3256"],"URL":"https:\/\/doi.org\/10.1007\/s00034-025-03256-w","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,29]]},"assertion":[{"value":"7 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable as no new data is created for this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}