{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:54:07Z","timestamp":1773377647470,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T00:00:00Z","timestamp":1731888000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T00:00:00Z","timestamp":1731888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s10115-024-02273-6","type":"journal-article","created":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T14:12:19Z","timestamp":1731939139000},"page":"2395-2426","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Digital twin: securing IoT networks using integrated ECC with blockchain for healthcare ecosystem"],"prefix":"10.1007","volume":"67","author":[{"given":"Vikas","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Akshi","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Kapil","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,18]]},"reference":[{"issue":"7775","key":"2273_CR1","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1038\/d41586-019-02849-1","volume":"573","author":"F Tao","year":"2019","unstructured":"Tao F, Qi Q (2019) Make more digital twins. Nature 573(7775):490\u2013491","journal-title":"Nature"},{"key":"2273_CR2","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.jmsy.2020.03.005","volume":"55","author":"W Mao","year":"2020","unstructured":"Mao W, Tian S, Fan J, Liang X, Safian A (2020) Online detection of bearing incipient fault with semi-supervised architecture and deep feature representation. J Manuf Syst 55:179\u2013198","journal-title":"J Manuf Syst"},{"key":"2273_CR3","doi-asserted-by":"publisher","first-page":"100661","DOI":"10.1016\/j.measen.2022.100661","volume":"25","author":"L Gopal","year":"2023","unstructured":"Gopal L, Singh H, Mounica P, Mohankumar N, Challa NP, Jayaraman P (2023) Digital twin and IOT technology for secure manufacturing systems. Meas. Sensors 25:100661. https:\/\/doi.org\/10.1016\/j.measen.2022.100661","journal-title":"Meas. Sensors"},{"key":"2273_CR4","doi-asserted-by":"crossref","unstructured":"Pavlov V (2022) Security aspects of digital twins in IoT platform. MS thesis. University of Twente","DOI":"10.5220\/0011714500003405"},{"key":"2273_CR5","doi-asserted-by":"publisher","DOI":"10.3390\/app13169165","author":"CL Stergiou","year":"2023","unstructured":"Stergiou CL, Koidou MP, Psannis KE (2023) IoT-based big data secure transmission and management over cloud system: a healthcare digital twin scenario. Appl Sci. https:\/\/doi.org\/10.3390\/app13169165","journal-title":"Appl Sci"},{"key":"2273_CR6","doi-asserted-by":"publisher","first-page":"50523","DOI":"10.1109\/ACCESS.2022.3173617","volume":"10","author":"SS Akash","year":"2022","unstructured":"Akash SS, Ferdous MS (2022) A blockchain based system for healthcare digital twin. IEEE Access 10:50523\u201350547","journal-title":"IEEE Access"},{"key":"2273_CR7","doi-asserted-by":"crossref","unstructured":"Zheng Y, Lu R, Guan Y, Zhang S, Shao J (2021) Towards private similarity query based healthcare monitoring over digital twin cloud platform. In: 2021 IEEE\/ACM 29th International symposium on quality of service (IWQOS), IEEE, pp. 1\u201310","DOI":"10.1109\/IWQOS52092.2021.9521351"},{"issue":"2","key":"2273_CR8","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1109\/MNET.118.2200071","volume":"37","author":"SD Okegbile","year":"2022","unstructured":"Okegbile SD, Cai J, Yi C, Niyato D (2022) Human digital twin for personalized healthcare: vision, architecture and future directions. IEEE Network 37(2):262\u2013269","journal-title":"IEEE Network"},{"key":"2273_CR9","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.jpdc.2022.01.030","volume":"164","author":"R Kumar","year":"2022","unstructured":"Kumar R, Kumar P, Tripathi R, Gupta GP, Garg S, Hassan MM (2022) A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network. J Parallel Distrib Comput 164:55\u201368. https:\/\/doi.org\/10.1016\/j.jpdc.2022.01.030","journal-title":"J Parallel Distrib Comput"},{"issue":"2","key":"2273_CR10","doi-asserted-by":"publisher","first-page":"137","DOI":"10.3103\/S0146411621020085","volume":"55","author":"P Kumar","year":"2021","unstructured":"Kumar P, Gupta GP, Tripathi R (2021) Design of anomaly-based intrusion detection system using fog computing for IoT network. Autom Control Comput Sci 55(2):137\u2013147. https:\/\/doi.org\/10.3103\/S0146411621020085","journal-title":"Autom Control Comput Sci"},{"issue":"4","key":"2273_CR11","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/JIOT.2021.3077803","volume":"9","author":"V Mothukuri","year":"2022","unstructured":"Mothukuri V, Khare P, Parizi RM, Pouriyeh S, Dehghantanha A, Srivastava G (2022) Federated-learning-based anomaly detection for IoT security attacks. IEEE Internet Things J 9(4):2545\u20132554. https:\/\/doi.org\/10.1109\/JIOT.2021.3077803","journal-title":"IEEE Internet Things J"},{"key":"2273_CR12","doi-asserted-by":"crossref","unstructured":"Kumar P, Tripathi R, Gupta GP (2021) P2IDF: a privacy-preserving based intrusion detection framework for software defined Internet of Things-Fog (SDIoT-Fog). ACM International conference proceeding series, pp. 37\u201342","DOI":"10.1145\/3427477.3429989"},{"key":"2273_CR13","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.inffus.2020.08.003","volume":"65","author":"A Belhadi","year":"2021","unstructured":"Belhadi A, Djenouri Y, Srivastava G, Djenouri D, Lin JCW, Fortino G (2021) Deep learning for pedestrian collective behavior analysis in smart cities: a model of group trajectory outlier detection. Inf Fusion 65:13\u201320. https:\/\/doi.org\/10.1016\/j.inffus.2020.08.003","journal-title":"Inf Fusion"},{"key":"2273_CR14","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.comcom.2021.09.029","volume":"181","author":"SA Latif","year":"2022","unstructured":"Latif SA et al (2022) AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems. Comput Commun 181:274\u2013283. https:\/\/doi.org\/10.1016\/j.comcom.2021.09.029","journal-title":"Comput Commun"},{"issue":"9","key":"2273_CR15","doi-asserted-by":"publisher","first-page":"16492","DOI":"10.1109\/TITS.2021.3098636","volume":"23","author":"R Kumar","year":"2022","unstructured":"Kumar R, Kumar P, Tripathi R, Gupta GP, Kumar N, Hassan MM (2022) A privacy-preserving-based secure framework using blockchain-enabled deep-learning in cooperative intelligent transport system. IEEE Trans Intell Transp Syst 23(9):16492\u201316503. https:\/\/doi.org\/10.1109\/TITS.2021.3098636","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2273_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101954","author":"P Kumar","year":"2021","unstructured":"Kumar P, Gupta GP, Tripathi R (2021) TP2SF: a trustworthy privacy-preserving secured framework for sustainable smart cities by leveraging blockchain and machine learning. J Syst Archit. https:\/\/doi.org\/10.1016\/j.sysarc.2020.101954","journal-title":"J Syst Archit"},{"issue":"6","key":"2273_CR17","doi-asserted-by":"publisher","first-page":"e4112","DOI":"10.1002\/ett.4112","volume":"32","author":"P Kumar","year":"2021","unstructured":"Kumar P, Kumar R, Gupta GP, Tripathi R (2021) A dis0074ributed framework for detecting DDoS attacks in smart contract-based blockchain-IoT systems by leveraging fog computing. Trans Emerg Telecommun Technol 32(6):e4112","journal-title":"Trans Emerg Telecommun Technol"},{"key":"2273_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113249","author":"H Alazzam","year":"2020","unstructured":"Alazzam H, Sharieh A, Sabri KE (2020) A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Syst Appl. https:\/\/doi.org\/10.1016\/j.eswa.2020.113249","journal-title":"Expert Syst Appl"},{"issue":"7","key":"2273_CR19","doi-asserted-by":"publisher","first-page":"9786","DOI":"10.1109\/TITS.2021.3114199","volume":"23","author":"L Zhao","year":"2022","unstructured":"Zhao L, Li H, Lin N, Lin M, Fan C, Shi J (2022) Intelligent content caching strategy in autonomous driving toward 6G. IEEE Trans Intell Transp Syst 23(7):9786\u20139796. https:\/\/doi.org\/10.1109\/TITS.2021.3114199","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2273_CR20","doi-asserted-by":"publisher","first-page":"101264","DOI":"10.1016\/j.cogsys.2024.101264","volume":"87","author":"V Sharma","year":"2024","unstructured":"Sharma V, Akshi K, Kapil S (2024) Digital twin application in women\u2019s health: Cervical cancer diagnosis with CervixNet. Cogn Syst Res 87:101264","journal-title":"Cogn Syst Res"},{"key":"2273_CR21","first-page":"25","volume":"115","author":"V Damjanovic-Behrendt","year":"2018","unstructured":"Damjanovic-Behrendt V (2018) A digital twin architecture for security, privacy and safety. ERCIM NEWS 115:25\u201326","journal-title":"ERCIM NEWS"},{"key":"2273_CR22","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-023-00523-6","author":"H Yi","year":"2023","unstructured":"Yi H (2023) Improving cloud storage and privacy security for digital twin based medical records. J Cloud Comput. https:\/\/doi.org\/10.1186\/s13677-023-00523-6","journal-title":"J Cloud Comput"},{"key":"2273_CR23","doi-asserted-by":"publisher","first-page":"3095","DOI":"10.3390\/rs14133095","volume":"14","author":"J Gr\u00fcbel","year":"2022","unstructured":"Gr\u00fcbel J, Thrash T, Aguilar L, Gath-morad M, Chatain J (2022) The Hitchhiker\u2019s guide to fused twins: a review of access to digital twins in situ in smart cities. Remote Sens 14:3095","journal-title":"Remote Sens"},{"key":"2273_CR24","doi-asserted-by":"publisher","first-page":"1785","DOI":"10.1109\/JPROC.2020.2998530","volume":"108","author":"R Minerva","year":"2020","unstructured":"Minerva R, Lee GM, Crespi N (2020) Digital twin in the IoT context: a survey on technical features, scenarios, and architectural models. Proc IEEE 108:1785\u20131824. https:\/\/doi.org\/10.1109\/JPROC.2020.2998530","journal-title":"Proc IEEE"},{"key":"2273_CR25","doi-asserted-by":"crossref","unstructured":"Varghese SA, Ghadim AD, Balador A, Alimadadi Z, Papadimitratos P (2022) Digital twin-based intrusion detection for industrial control systems. In: 2022 IEEE international conference on pervasive computing and communications workshops and other affiliated events (PerCom Workshops), IEEE, pp. 611\u2013617.","DOI":"10.1109\/PerComWorkshops53856.2022.9767492"},{"issue":"2","key":"2273_CR26","doi-asserted-by":"publisher","first-page":"95","DOI":"10.3390\/info14020095","volume":"14","author":"P Empl","year":"2023","unstructured":"Empl P (2023) Digital-twin-based security analytics for the Internet of Things. Information 14(2):95","journal-title":"Information"},{"key":"2273_CR27","unstructured":"Sancho N (2023) A review of digital twins and their application in cybersecurity based on artificial intelligence. arXiv:2311.01154"},{"issue":"1","key":"2273_CR28","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1109\/COMST.2023.3308717","volume":"26","author":"J Chen","year":"2023","unstructured":"Chen J, Yi C, Okegbile SD, Cai J, Shen XS (2023) Networking architecture and key supporting technologies for human digital twin in personalized healthcare: a comprehensive survey. IEEE Commun Surv Tutor 26(1):706\u2013746","journal-title":"IEEE Commun Surv Tutor"},{"issue":"5","key":"2273_CR29","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/S0167-4048(02)00514-X","volume":"21","author":"Y Liao","year":"2002","unstructured":"Liao Y, Vemuri VR (2002) Use of k-nearest neighbor classifier for intrusion detection. Comput Secur 21(5):439\u2013448","journal-title":"Comput Secur"},{"key":"2273_CR30","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.cose.2019.05.022","volume":"86","author":"J Gu","year":"2019","unstructured":"Gu J, Wang L, Wang H, Wang S (2019) A novel approach to intrusion detection using SVM ensemble with feature augmentation. Comput Secur 86:53\u201362","journal-title":"Comput Secur"},{"key":"2273_CR31","doi-asserted-by":"crossref","unstructured":"Kumar GR, Mangathayaru N, Narasimha G (2015) An improved k-means clustering algorithm for intrusion detection using Gaussian function. In: Proceedings of the the international conference on engineering & MIS 2015, pp. 1\u20137","DOI":"10.1145\/2832987.2833082"},{"issue":"22","key":"2273_CR32","doi-asserted-by":"publisher","first-page":"17265","DOI":"10.1007\/s00500-020-05017-0","volume":"24","author":"B Riyaz","year":"2020","unstructured":"Riyaz B, Ganapathy S (2020) A deep learning approach for effective intrusion detection in wireless networks using CNN. Soft Comput 24(22):17265\u201317278. https:\/\/doi.org\/10.1007\/s00500-020-05017-0","journal-title":"Soft Comput"},{"key":"2273_CR33","doi-asserted-by":"publisher","first-page":"115524","DOI":"10.1016\/j.eswa.2021.115524","volume":"185","author":"Y Imrana","year":"2021","unstructured":"Imrana Y, Xiang Y, Ali L, Abdul-Rauf Z (2021) A bidirectional LSTM deep learning approach for intrusion detection. Expert Syst Appl 185:115524. https:\/\/doi.org\/10.1016\/j.eswa.2021.115524","journal-title":"Expert Syst Appl"},{"key":"2273_CR34","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.comcom.2022.12.010","volume":"199","author":"SM Kasongo","year":"2023","unstructured":"Kasongo SM (2023) A deep learning technique for intrusion detection system using a recurrent neural networks based framework. Comput Commun 199:113\u2013125. https:\/\/doi.org\/10.1016\/j.comcom.2022.12.010","journal-title":"Comput Commun"},{"key":"2273_CR35","doi-asserted-by":"publisher","first-page":"108383","DOI":"10.1016\/j.compeleceng.2022.108383","volume":"103","author":"N Kunhare","year":"2022","unstructured":"Kunhare N, Tiwari R, Dhar J (2022) Intrusion detection system using hybrid classifiers with meta-heuristic algorithms for the optimization and feature selection by genetic algorithm. Comput Electr Eng 103:108383","journal-title":"Comput Electr Eng"},{"issue":"10","key":"2273_CR36","first-page":"8112","volume":"34","author":"J Ahmad","year":"2022","unstructured":"Ahmad J, Shah SA, Latif S, Ahmed F, Zou Z, Pitropakis N (2022) DRaNN_PSO: a deep random neural network with particle swarm optimization for intrusion detection in the industrial internet of things. J King Saud Univ Inf Sci 34(10):8112\u20138121","journal-title":"J King Saud Univ Inf Sci"},{"key":"2273_CR37","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.tcs.2022.08.019","volume":"941","author":"S Perumalla","year":"2023","unstructured":"Perumalla S, Chatterjee S, Kumar APS (2023) Modelling of oppositional Aquila Optimizer with machine learning enabled secure access control in Internet of drones environment. Theor Comput Sci 941:39\u201354. https:\/\/doi.org\/10.1016\/j.tcs.2022.08.019","journal-title":"Theor Comput Sci"},{"issue":"2","key":"2273_CR38","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1007\/s11276-021-02866-x","volume":"28","author":"M Otair","year":"2022","unstructured":"Otair M, Ibrahim OT, Abualigah L, Altalhi M, Sumari P (2022) An enhanced grey wolf optimizer based particle swarm optimizer for intrusion detection system in wireless sensor networks. Wirel Netw 28(2):721\u2013744","journal-title":"Wirel Netw"},{"issue":"3","key":"2273_CR39","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.1007\/s11277-021-08766-9","volume":"127","author":"A Khanna","year":"2022","unstructured":"Khanna A, Rani P, Garg P, Singh PK, Khamparia A (2022) An enhanced crow search inspired feature selection technique for intrusion detection based wireless network system. Wirel Pers Commun 127(3):2021\u20132038","journal-title":"Wirel Pers Commun"},{"key":"2273_CR40","doi-asserted-by":"crossref","unstructured":"Varghese SA, Dehlaghi Ghadim A, Balador A, Alimadadi Z, Papadimitratos P (2022) Digital twin-based intrusion detection for industrial control systems. In: 2022 IEEE international conference on pervasive computing and communications workshops and other affiliated events (PerCom Workshops) pp. 611\u2013617.","DOI":"10.1109\/PerComWorkshops53856.2022.9767492"},{"key":"2273_CR41","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8111210","author":"A Khraisat","year":"2019","unstructured":"Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A (2019) A novel ensemble of hybrid intrusion detection system for detecting Internet of Things attacks. Electron. https:\/\/doi.org\/10.3390\/electronics8111210","journal-title":"Electron"},{"issue":"1","key":"2273_CR42","doi-asserted-by":"publisher","first-page":"51","DOI":"10.56781\/ijsret.2023.2.1.0020","volume":"2","author":"S Lipsa","year":"2023","unstructured":"Lipsa S, Dash RK (2023) A novel intrusion detection system based on deep learning and random forest for digital twin on IOT platform. Int J Sch Res Eng Technol 2(1):51\u201364. https:\/\/doi.org\/10.56781\/ijsret.2023.2.1.0020","journal-title":"Int J Sch Res Eng Technol"},{"issue":"6","key":"2273_CR43","doi-asserted-by":"publisher","first-page":"1110","DOI":"10.3390\/healthcare10061110","volume":"10","author":"E Ashraf","year":"2022","unstructured":"Ashraf E, Areed NF, Salem H, Abdelhay EH, Farouk A (2022) Fidchain: federated intrusion detection system for blockchain-enabled iot healthcare applications. Healthcare 10(6):1110","journal-title":"Healthcare"},{"key":"2273_CR44","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.inffus.2022.09.026","volume":"90","author":"A Thakkar","year":"2023","unstructured":"Thakkar A, Lohiya R (2023) Fusion of statistical importance for feature selection in deep neural network-based intrusion detection system. Inf Fusion 90:353\u2013363. https:\/\/doi.org\/10.1016\/j.inffus.2022.09.026","journal-title":"Inf Fusion"},{"issue":"11","key":"2273_CR45","doi-asserted-by":"publisher","first-page":"3561","DOI":"10.1109\/JSAC.2023.3310091","volume":"41","author":"H Wang","year":"2023","unstructured":"Wang H, Di X, Wang Y, Ren B, Gao G, Deng J (2023) An intelligent digital twin method based on spatio-temporal feature fusion for IoT attack behavior identification. IEEE J Sel Areas Commun 41(11):3561\u20133572. https:\/\/doi.org\/10.1109\/JSAC.2023.3310091","journal-title":"IEEE J Sel Areas Commun"},{"key":"2273_CR46","doi-asserted-by":"crossref","unstructured":"Fraser B, Al-Rubaye S, Aslam S, Tsourdos A (2021) Enhancing the security of unmanned aerial systems using digital-twin technology and intrusion detection. In: 2021 IEEE\/AIAA 40th Digital avionics systems conference (DASC) pp. 1\u201310","DOI":"10.1109\/DASC52595.2021.9594321"},{"key":"2273_CR47","doi-asserted-by":"crossref","unstructured":"Xu Q, Ali S, Yue T (2021) Digital twin-based anomaly detection in cyber-physical systems. In: 2021 14th IEEE conference on software testing, verification and validation (ICST), pp. 205\u2013216","DOI":"10.1109\/ICST49551.2021.00031"},{"key":"2273_CR48","doi-asserted-by":"publisher","DOI":"10.3390\/fi13050111","author":"AO Alzahrani","year":"2021","unstructured":"Alzahrani AO, Alenazi MJF (2021) Designing a network intrusion detection system based on machine learning for software defined networks. Futur Internet. https:\/\/doi.org\/10.3390\/fi13050111","journal-title":"Futur Internet"},{"key":"2273_CR49","doi-asserted-by":"publisher","first-page":"29434","DOI":"10.1109\/JSEN.2023.3316088","volume":"23","author":"AA Khan","year":"2023","unstructured":"Khan AA, Laghari AA, Elmannai H, Shaikh AA, Bourouis S, Hadjouni M, Alroobaea R (2023) GAN-IoTVS: a novel internet of multimedia things-enabled video streaming compression model using GAN and fuzzy logic. IEEE Sens J 23:29434\u201329441","journal-title":"IEEE Sens J"},{"key":"2273_CR50","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1933","author":"AA Khan","year":"2024","unstructured":"Khan AA, Laghari AA, Baqasah AM, Alroobaea R, Almadhor A, Sampedro GA, Kryvinska N (2024) Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing. Peer J Comput Sci. https:\/\/doi.org\/10.7717\/peerj-cs.1933","journal-title":"Peer J Comput Sci"},{"key":"2273_CR51","doi-asserted-by":"publisher","first-page":"108234","DOI":"10.1016\/j.compeleceng.2022.108234","volume":"102","author":"AA Khan","year":"2022","unstructured":"Khan AA, Laghari AA, Gadekallu TR, Shaikh ZA, Javed AR, Rashid M, Estrela VV, Mikhaylov A (2022) A drone-based data management and optimization using metaheuristic algorithms and blockchain smart contracts in a secure fog environment. Comput Electr Eng 102:108234","journal-title":"Comput Electr Eng"},{"key":"2273_CR52","doi-asserted-by":"publisher","first-page":"122679","DOI":"10.1109\/ACCESS.2022.3223370","volume":"10","author":"AA Khan","year":"2022","unstructured":"Khan AA, Laghari AA, Shaikh ZA, Dacko-Pikiewicz Z, Kot S (2022) Internet of Things (IoT) security with blockchain technology: a state-of-the-art review. IEEE Access 10:122679\u2013122695","journal-title":"IEEE Access"},{"key":"2273_CR53","unstructured":"Khan AA, Laghari AA, Baqasah AM, Alroobaea R, Gadekallu TR, Sampedro GA, Zhu Y (2024) ORAN-B5G: a next generation open radio access network architecture with machine learning for beyond 5G in industrial 5.0. IEEE Trans Green Commun Netw"},{"key":"2273_CR54","doi-asserted-by":"publisher","first-page":"69383","DOI":"10.1109\/ACCESS.2024.3401591","volume":"12","author":"AA Khan","year":"2024","unstructured":"Khan AA, Laghari AA, Alroobaea R, Baqasah AM, Alsafyani M, Bacarra R, Alsayaydeh JAJ (2024) Secure remote sensing data with blockchain distributed ledger technology: a solution for smart cities. IEEE Access 12:69383\u201369396","journal-title":"IEEE Access"},{"issue":"1","key":"2273_CR55","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/JIOT.2022.3200121","volume":"10","author":"X He","year":"2023","unstructured":"He X, Chen Q, Tang L, Wang W, Liu T (2023) CGAN-based collaborative intrusion detection for UAV networks: a blockchain-empowered distributed federated learning approach. IEEE Internet Things J 10(1):120\u2013132. https:\/\/doi.org\/10.1109\/JIOT.2022.3200121","journal-title":"IEEE Internet Things J"},{"key":"2273_CR56","doi-asserted-by":"publisher","first-page":"107764","DOI":"10.1016\/j.compeleceng.2022.107764","volume":"99","author":"M Imran","year":"2022","unstructured":"Imran M, Haider N, Shoaib M, Razzak I (2022) An intelligent and efficient network intrusion detection system using deep learning. Comput Electr Eng 99:107764. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107764","journal-title":"Comput Electr Eng"},{"key":"2273_CR57","doi-asserted-by":"publisher","first-page":"8820","DOI":"10.1109\/ACCESS.2021.3049564","volume":"9","author":"M Shabbir","year":"2021","unstructured":"Shabbir M et al (2021) Enhancing security of health information using modular encryption standard in mobile cloud computing. IEEE Access 9:8820\u20138834. https:\/\/doi.org\/10.1109\/ACCESS.2021.3049564","journal-title":"IEEE Access"},{"issue":"4","key":"2273_CR58","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1007\/s10207-023-00663-5","volume":"22","author":"B Bowen","year":"2023","unstructured":"Bowen B, Chennamaneni A, Goulart A, Lin D (2023) BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning. Int J Inf Secur 22(4):893\u2013917. https:\/\/doi.org\/10.1007\/s10207-023-00663-5","journal-title":"Int J Inf Secur"},{"key":"2273_CR59","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H (2022) Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 10:40281\u201340306","journal-title":"IEEE Access"},{"key":"2273_CR60","volume-title":"Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow","author":"A G\u00e9ron","year":"2022","unstructured":"G\u00e9ron A (2022) Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow. O\u2019Reilly Media Inc., Sebastopol"},{"key":"2273_CR61","unstructured":"Guyon I (1997) A scaling law for the validation-set training-set size ratio. AT&T Bell Lab 1(11)"},{"issue":"4","key":"2273_CR62","doi-asserted-by":"publisher","first-page":"6822","DOI":"10.1109\/JIOT.2019.2912022","volume":"6","author":"M Zolanvari","year":"2019","unstructured":"Zolanvari M, Teixeira MA, Gupta L, Khan KM, Jain R (2019) Machine learning-based network vulnerability analysis of industrial Internet of Things. IEEE Internet Things J 6(4):6822\u20136834","journal-title":"IEEE Internet Things J"},{"key":"2273_CR63","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis N, Moustafa N, Sitnikova E, Turnbull B (2019) Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Futur Gener Comput Syst 100:779\u2013796","journal-title":"Futur Gener Comput Syst"},{"issue":"22","key":"2273_CR64","doi-asserted-by":"publisher","first-page":"6578","DOI":"10.3390\/s20226578","volume":"20","author":"I Vaccari","year":"2020","unstructured":"Vaccari I, Chiola G, Aiello M, Mongelli M, Cambiaso E (2020) MQTTset, a new dataset for machine learning techniques on MQTT. Sensors 20(22):6578","journal-title":"Sensors"},{"issue":"5","key":"2273_CR65","doi-asserted-by":"publisher","first-page":"3962","DOI":"10.1109\/JIOT.2021.3102056","volume":"9","author":"M Al-Hawawreh","year":"2021","unstructured":"Al-Hawawreh M, Sitnikova E, Aboutorab N (2021) X-IIoTID: a connectivity-agnostic and device-agnostic intrusion data set for industrial Internet of Things. IEEE Internet Things J 9(5):3962\u20133977","journal-title":"IEEE Internet Things J"},{"key":"2273_CR66","first-page":"200298","volume":"20","author":"T Al Nuaimi","year":"2023","unstructured":"Al Nuaimi T et al (2023) A comparative evaluation of intrusion detection systems on the edge-IIoT-2022 dataset. Intell Syst Appl 20:200298","journal-title":"Intell Syst Appl"},{"issue":"1","key":"2273_CR67","doi-asserted-by":"publisher","first-page":"158","DOI":"10.3390\/network3010008","volume":"3","author":"MM Rashid","year":"2023","unstructured":"Rashid MM, Khan SU, Eusufzai F, Redwan MA, Sabuj SR, Elsharief M (2023) A federated learning-based approach for improving intrusion detection in industrial Internet of Things networks. Network 3(1):158\u2013179. https:\/\/doi.org\/10.3390\/network3010008","journal-title":"Network"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-024-02273-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-024-02273-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-024-02273-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T15:17:32Z","timestamp":1739373452000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-024-02273-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,18]]},"references-count":67,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["2273"],"URL":"https:\/\/doi.org\/10.1007\/s10115-024-02273-6","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,18]]},"assertion":[{"value":"5 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}