{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T11:50:32Z","timestamp":1769601032329,"version":"3.49.0"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:00:00Z","timestamp":1756166400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:00:00Z","timestamp":1756166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10207-025-01107-y","type":"journal-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:31:14Z","timestamp":1756236674000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A fuzzy logic-based trust framework against sybil and rank attacks in cyber-physical systems"],"prefix":"10.1007","volume":"24","author":[{"given":"Asim","family":"Noor","sequence":"first","affiliation":[]},{"given":"Noshina","family":"Tariq","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Asim","sequence":"additional","affiliation":[]},{"given":"Farrukh Aslam","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Javed","family":"Ali Khan","sequence":"additional","affiliation":[]},{"given":"Alexios","family":"Mylonas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,26]]},"reference":[{"issue":"8","key":"1107_CR1","doi-asserted-by":"publisher","first-page":"1887","DOI":"10.3390\/math11081887","volume":"11","author":"I Katib","year":"2023","unstructured":"Katib, I., Ragab, M.: Blockchain-assisted hybrid harris hawks optimization based deep ddos attack detection in the iot environment. Mathematics 11(8), 1887 (2023)","journal-title":"Mathematics"},{"issue":"1","key":"1107_CR2","doi-asserted-by":"publisher","first-page":"189","DOI":"10.3390\/math11010189","volume":"11","author":"ZA Sheikh","year":"2022","unstructured":"Sheikh, Z.A., Singh, Y., Tanwar, S., Sharma, R., Turcanu, F.-E., Raboaca, M.S.: Eism-cps: An enhanced intelligent security methodology for cyber-physical systems through hyper-parameter optimization. Mathematics 11(1), 189 (2022)","journal-title":"Mathematics"},{"key":"1107_CR3","doi-asserted-by":"crossref","unstructured":"Humayun, M., Tariq, N., Alfayad, M., Zakwan, M., Alwakid, G., Assiri, M.: Securing the internet of things in artificial intelligence era: A comprehensive survey. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3365634"},{"issue":"6","key":"1107_CR4","doi-asserted-by":"publisher","first-page":"2409","DOI":"10.1109\/TITS.2019.2918255","volume":"21","author":"G Sun","year":"2019","unstructured":"Sun, G., Zhang, Y., Yu, H., Du, X., Guizani, M.: Intersection fog-based distributed routing for v2v communication in urban vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 21(6), 2409\u20132426 (2019)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"9","key":"1107_CR5","doi-asserted-by":"publisher","first-page":"4265","DOI":"10.3390\/s23094265","volume":"23","author":"SE Ali","year":"2023","unstructured":"Ali, S.E., Tariq, N., Khan, F.A., Ashraf, M., Abdul, W., Saleem, K.: Bft-iomt: A blockchain-based trust mechanism to mitigate sybil attack using fuzzy logic in the internet of medical things. Sensors 23(9), 4265 (2023)","journal-title":"Sensors"},{"issue":"3","key":"1107_CR6","doi-asserted-by":"publisher","first-page":"679","DOI":"10.3390\/math11030679","volume":"11","author":"AS Rajawat","year":"2023","unstructured":"Rajawat, A.S., Goyal, S., Bedi, P., Verma, C., Ionete, E.I., Raboaca, M.S.: 5g-enabled cyber-physical systems for smart transportation using blockchain technology. Mathematics 11(3), 679 (2023)","journal-title":"Mathematics"},{"key":"1107_CR7","doi-asserted-by":"crossref","unstructured":"Inayatullah, S.: Investigating the futures triangle with chatgpt. World Futures Review, 19467567231170833 (2023)","DOI":"10.1177\/19467567231170833"},{"key":"1107_CR8","doi-asserted-by":"crossref","unstructured":"Deepa, J., Jayashree, J., Vijayashree, J., Yousuff, M.: Iot cps interpretation for healthcare systems. In: Cyber-Physical Systems for Industrial Transformation, pp. 283\u2013296. CRC Press (2023)","DOI":"10.1201\/9781003262527-15"},{"key":"1107_CR9","doi-asserted-by":"crossref","unstructured":"Cai, Q., Chen, J., Luo, D., Sun, G., Yu, H., Guizani, M.: Deter-pay: A deterministic routing protocol in concurrent payment channel network. IEEE Internet of Things Journal (2024)","DOI":"10.1109\/JIOT.2024.3416086"},{"issue":"5","key":"1107_CR10","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.3390\/math11051197","volume":"11","author":"HU Khan","year":"2023","unstructured":"Khan, H.U., Ali, Y., Khan, F.: A features-based privacy preserving assessment model for authentication of internet of medical things (iomt) devices in healthcare. Mathematics 11(5), 1197 (2023)","journal-title":"Mathematics"},{"key":"1107_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0033-1","volume":"38","author":"A Ali","year":"2014","unstructured":"Ali, A., Khan, F.A.: A broadcast-based key agreement scheme using set reconciliation for wireless body area networks. J. Med. Syst. 38, 1\u201312 (2014)","journal-title":"J. Med. Syst."},{"key":"1107_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104155","volume":"148","author":"W Zhou","year":"2025","unstructured":"Zhou, W., Xia, C., Wang, T., Liang, X., Lin, W., Li, X., Zhang, S.: Hidim: A novel framework of network intrusion detection for hierarchical dependency and class imbalance. Computers & Security 148, 104155 (2025)","journal-title":"Computers & Security"},{"issue":"5","key":"1107_CR13","doi-asserted-by":"publisher","first-page":"3220","DOI":"10.1109\/TSMC.2024.3357497","volume":"54","author":"H Zhang","year":"2024","unstructured":"Zhang, H., Chen, Z., Yu, C., Yue, D., Xie, X., Hancke, G.P.: Event-trigger-based resilient distributed energy management against fdi and dos attack of cyber-physical system of smart grid. IEEE Transactions on Systems, Man, and Cybernetics: Systems 54(5), 3220\u20133230 (2024)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"issue":"12","key":"1107_CR14","doi-asserted-by":"publisher","first-page":"4539","DOI":"10.3390\/s22124539","volume":"22","author":"U Farooq","year":"2022","unstructured":"Farooq, U., Asim, M., Tariq, N., Baker, T., Awad, A.I.: Multi-mobile agent trust framework for mitigating internal attacks and augmenting rpl security. Sensors 22(12), 4539 (2022)","journal-title":"Sensors"},{"key":"1107_CR15","doi-asserted-by":"crossref","unstructured":"Hemalatha, T., Bhuvaneswari, A., Poornima, N., Shubha, B., Santhi, K., Lawanyashri, M., Mara, G.C.: Secure and private data sharing in cps e-health systems based on cb-smo techniques. Measurement: Sensors 27, 100787 (2023)","DOI":"10.1016\/j.measen.2023.100787"},{"issue":"6","key":"1107_CR16","doi-asserted-by":"publisher","first-page":"1353","DOI":"10.3390\/math11061353","volume":"11","author":"MNA Khalid","year":"2023","unstructured":"Khalid, M.N.A., Al-Kadhimi, A.A., Singh, M.M.: Recent developments in game-theory approaches for the detection and defense against advanced persistent threats (apts): a systematic review. Mathematics 11(6), 1353 (2023)","journal-title":"Mathematics"},{"key":"1107_CR17","doi-asserted-by":"publisher","first-page":"65988","DOI":"10.1109\/ACCESS.2021.3074953","volume":"9","author":"A Derhab","year":"2021","unstructured":"Derhab, A., Alawwad, R., Dehwah, K., Tariq, N., Khan, F.A., Al-Muhtadi, J.: Tweet-based bot detection using big data analytics. IEEE Access 9, 65988\u201366005 (2021)","journal-title":"IEEE Access"},{"key":"1107_CR18","doi-asserted-by":"crossref","unstructured":"Li, X., Lu, Z., Yuan, M., Liu, W., Wang, F., Yu, Y., Liu, P.: Tradeoff of code estimation error rate and terminal gain in scer attack. IEEE Transactions on Instrumentation and Measurement (2024)","DOI":"10.1109\/TIM.2024.3406807"},{"key":"1107_CR19","doi-asserted-by":"crossref","unstructured":"Hu, J., Jiang, H., Chen, S., Zhang, Q., Xiao, Z., Liu, D., Liu, J., Li, B.: Wishield: Privacy against wi-fi human tracking. IEEE Journal on Selected Areas in Communications (2024)","DOI":"10.1109\/JSAC.2024.3414597"},{"issue":"1","key":"1107_CR20","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1186\/s13677-024-00609-9","volume":"13","author":"N Tariq","year":"2024","unstructured":"Tariq, N., Alsirhani, A., Humayun, M., Alserhani, F., Shaheen, M.: A fog-edge-enabled intrusion detection system for smart grids. Journal of Cloud Computing 13(1), 43 (2024)","journal-title":"Journal of Cloud Computing"},{"key":"1107_CR21","doi-asserted-by":"crossref","unstructured":"Li, Q., Li, L., Liu, Z., Sun, W., Li, W., Li, J., Zhao, W.: Cloud-edge collaboration for industrial internet of things: Scalable neurocomputing and rolling-horizon optimization. IEEE Internet of Things Journal (2025)","DOI":"10.1109\/JIOT.2025.3542428"},{"issue":"23","key":"1107_CR22","doi-asserted-by":"publisher","first-page":"9372","DOI":"10.3390\/s23239372","volume":"23","author":"M Javed","year":"2023","unstructured":"Javed, M., Tariq, N., Ashraf, M., Khan, F.A., Asim, M., Imran, M.: Securing smart healthcare cyber-physical systems against blackhole and greyhole attacks using a blockchain-enabled gini index framework. Sensors 23(23), 9372 (2023)","journal-title":"Sensors"},{"issue":"1","key":"1107_CR23","doi-asserted-by":"publisher","first-page":"13467","DOI":"10.1111\/exsy.13467","volume":"41","author":"Z Rehman","year":"2024","unstructured":"Rehman, Z., Tariq, N., Moqurrab, S.A., Yoo, J., Srivastava, G.: Machine learning and internet of things applications in enterprise architectures: Solutions, challenges, and open issues. Expert. Syst. 41(1), 13467 (2024)","journal-title":"Expert. Syst."},{"issue":"2","key":"1107_CR24","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1007\/s10586-022-03614-2","volume":"26","author":"A Singh","year":"2023","unstructured":"Singh, A., Chatterjee, K., Satapathy, S.C.: Trids: an intelligent behavioural trust based ids for smart healthcare system. Clust. Comput. 26(2), 903\u2013925 (2023)","journal-title":"Clust. Comput."},{"key":"1107_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Wang, X., Gang, Y., Wang, J., Wu, S., Zhang, P., Shi, Y.: 6g sagin information transmission model. IEEE Communications Magazine (2025)","DOI":"10.1109\/MCOM.001.2400351"},{"key":"1107_CR26","doi-asserted-by":"crossref","unstructured":"Arshad, D., Asim, M., Tariq, N., Baker, T., Tawfik, H., Al-Jumeily\u00a0OBE, D.: Thc-rpl: A lightweight trust-enabled routing in rpl-based iot networks against sybil attack. PloS one 17(7), 0271277 (2022)","DOI":"10.1371\/journal.pone.0271277"},{"key":"1107_CR27","doi-asserted-by":"crossref","unstructured":"Hassan, M., Tariq, N., Alsirhani, A., Alomari, A., Khan, F.A., Alshahrani, M.M., Ashraf, M., Humayun, M.: Gitm: A gini index-based trust mechanism to mitigate and isolate sybil attack in rpl-enabled smart grid advanced metering infrastructures. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3286536"},{"issue":"22","key":"1107_CR28","doi-asserted-by":"publisher","first-page":"4373","DOI":"10.3390\/math10224373","volume":"10","author":"Y Du","year":"2022","unstructured":"Du, Y., Huang, Y., Wan, G., He, P.: Deep learning-based cyber-physical feature fusion for anomaly detection in industrial control systems. Mathematics 10(22), 4373 (2022)","journal-title":"Mathematics"},{"key":"1107_CR29","doi-asserted-by":"crossref","unstructured":"Groves, B., Pu, C.: A gini index-based countermeasure against sybil attack in the internet of things. In: MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM). IEEE, (2019)","DOI":"10.1109\/MILCOM47813.2019.9021050"},{"key":"1107_CR30","doi-asserted-by":"crossref","unstructured":"Tandon, A., Srivastava, P.: Trust-based enhanced secure routing against rank and sybil attacks in IoT. In: 2019 Twelfth International Conference on Contemporary Computing (IC3). IEEE, (2019)","DOI":"10.1109\/IC3.2019.8844935"},{"issue":"1","key":"1107_CR31","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1109\/JIOT.2019.2948149","volume":"7","author":"S Murali","year":"2020","unstructured":"Murali, S., Jamalipour, A.: A lightweight intrusion detection for sybil attack under mobile RPL in the internet of things. IEEE Internet Things J. 7(1), 379\u2013388 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"1107_CR32","doi-asserted-by":"publisher","first-page":"4937","DOI":"10.1109\/JIOT.2020.2971463","volume":"7","author":"C Pu","year":"2020","unstructured":"Pu, C.: Sybil attack in RPL-based internet of things: Analysis and defenses. IEEE Internet Things J. 7(6), 4937\u20134949 (2020)","journal-title":"IEEE Internet Things J."},{"key":"1107_CR33","doi-asserted-by":"crossref","unstructured":"Vinothini, C., Priya, J., Anitha, P., Reshmi, T.S.: Detection of sybil attack in internet of things. In: International Conference on Artificial Intelligence for Smart Community. Lecture notes in electrical engineering, pp. 581\u2013587. Springer, Singapore (2022)","DOI":"10.1007\/978-981-16-2183-3_55"},{"key":"1107_CR34","doi-asserted-by":"crossref","unstructured":"Sahni, P., Kumar, P., Kaur, S., Arora, D.: Improvement in sybil attack detection and mitigation using diffie-hellman method in wsn. In: AIP Conference Proceedings, vol. 2576 (2022). AIP Publishing","DOI":"10.1063\/5.0106286"},{"issue":"12","key":"1107_CR35","doi-asserted-by":"publisher","first-page":"13703","DOI":"10.1007\/s11227-021-03816-2","volume":"77","author":"AO Bang","year":"2021","unstructured":"Bang, A.O., Rao, U.P.: A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case. J. Supercomput. 77(12), 13703\u201313738 (2021)","journal-title":"J. Supercomput."},{"issue":"4","key":"1107_CR36","doi-asserted-by":"publisher","first-page":"1361","DOI":"10.1007\/s11276-021-02871-0","volume":"28","author":"R Almesaeed","year":"2022","unstructured":"Almesaeed, R., Al-Salem, E.: Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks. Wirel. Netw. 28(4), 1361\u20131374 (2022)","journal-title":"Wirel. Netw."},{"issue":"2","key":"1107_CR37","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/s10922-025-09913-4","volume":"33","author":"C Prajisha","year":"2025","unstructured":"Prajisha, C., Vasudevan, A.: Msectrust: A mobility-aware secure trust-based routing protocol for rpl based internet of things. J. Netw. Syst. Manage. 33(2), 40 (2025)","journal-title":"J. Netw. Syst. Manage."},{"key":"1107_CR38","doi-asserted-by":"crossref","unstructured":"Berguiga, A., Harchay, A., Massaoudi, A.: Hids-rpl: A hybrid deep learning-based intrusion detection system for rpl in internet of medical thing networks. IEEE Access (2025)","DOI":"10.1109\/ACCESS.2025.3545918"},{"key":"1107_CR39","doi-asserted-by":"crossref","unstructured":"Rouissat, M., Alsukayti, I.S., Belkheir, M., Alreshoodi, M., Mokaddem, A., Ziani, D.: A simple approach for mitigating a new flooding attack in rpl-based iot networks. IEEE Access (2025)","DOI":"10.1109\/ACCESS.2025.3525798"},{"key":"1107_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110996","volume":"257","author":"H Albinali","year":"2025","unstructured":"Albinali, H., Azzedin, F.: Replay attacks in rpl-based internet of things: Comparative and empirical study. Comput. Netw. 257, 110996 (2025)","journal-title":"Comput. Netw."},{"issue":"9","key":"1107_CR41","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/s10462-024-10907-y","volume":"57","author":"N Alfriehat","year":"2024","unstructured":"Alfriehat, N., Anbar, M., Aladaileh, M., Hasbullah, I., Shurbaji, T.A., Karuppayah, S., Almomani, A.: Rpl-based attack detection approaches in iot networks: review and taxonomy. Artif. Intell. Rev. 57(9), 248 (2024)","journal-title":"Artif. Intell. Rev."},{"key":"1107_CR42","doi-asserted-by":"crossref","unstructured":"Al-Na\u2019amneh, Q., Dhifallah, W., Hazaymih, R., Almaiah, M.A., Alsheyab, A., Alshinwan, M., Qadoumi, B.: Dis flooding attack impact in rpl-based 6lowpan network. In: Machine Intelligence Applications in Cyber-Risk Management, pp. 69\u201384. IGI Global Scientific Publishing (2025)","DOI":"10.4018\/979-8-3693-7540-2.ch004"},{"key":"1107_CR43","doi-asserted-by":"crossref","unstructured":"Roy, V.: An effective fog computing based distributed forecasting of cyber-attacks in internet of things. Journal of Cybersecurity & Information Management 12(2) (2023)","DOI":"10.54216\/JCIM.120201"},{"issue":"4","key":"1107_CR44","doi-asserted-by":"publisher","first-page":"2213","DOI":"10.3390\/app15042213","volume":"15","author":"J-K Lee","year":"2025","unstructured":"Lee, J.-K., Choi, Y.-R., Suh, B.-K., Jung, S.-W., Kim, K.-I.: A survey on energy drainage attacks and countermeasures in wireless sensor networks. Appl. Sci. 15(4), 2213 (2025)","journal-title":"Appl. Sci."},{"key":"1107_CR45","doi-asserted-by":"crossref","unstructured":"Okporokpo, O., Olajide, F., Ajienka, N., Ma, X.: Detection of ddos cyberattack using a hybrid trust-based technique for smart home networks. International Journal of Advanced Computer Science & Applications 16(1) (2025)","DOI":"10.14569\/IJACSA.2025.0160103"},{"key":"1107_CR46","doi-asserted-by":"crossref","unstructured":"Rui, L.: Towards secure internet of things communication through trustworthy rpl routing protocols. International Journal of Advanced Computer Science & Applications 15(12) (2024)","DOI":"10.14569\/IJACSA.2024.0151248"},{"key":"1107_CR47","doi-asserted-by":"crossref","unstructured":"Adam, M., Hammoudeh, M., Alrawashdeh, R., Alsulaimy, B.: A survey on security, privacy, trust, and architectural challenges in iot systems. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3382709"},{"issue":"14","key":"1107_CR48","doi-asserted-by":"publisher","first-page":"16303","DOI":"10.1007\/s11227-022-04526-z","volume":"78","author":"M Ardakani","year":"2022","unstructured":"Ardakani, M., Mahdi, M.A., Tabarzad, M.A.: Detecting sybil attacks in vehicular ad hoc networks using fuzzy logic and arithmetic optimization algorithm. J. Supercomput. 78(14), 16303\u201316335 (2022)","journal-title":"J. Supercomput."},{"key":"1107_CR49","doi-asserted-by":"crossref","unstructured":"Menaga, S., Rathna, R., Anandkumar, A., Swaranambigai, R.: Deep learning and fuzzy logic system implementation in smart health care. In: Industry 5.0 for Smart Healthcare Technologies, pp. 161\u2013173. CRC Press","DOI":"10.1201\/9781032632223-14"},{"key":"1107_CR50","doi-asserted-by":"crossref","unstructured":"Quasim, M.T., Shaikh, A., Shuaib, M., Sulaiman, A., Alam, S., Asiri, Y.: Fuzzy decision-making method based evaluation of smart healthcare management (2023)","DOI":"10.21203\/rs.3.rs-1504815\/v1"},{"key":"1107_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103576","volume":"163","author":"J Hassan","year":"2024","unstructured":"Hassan, J., Sohail, A., Awad, A.I., Zaka, M.A.: Letm-iot: A lightweight and efficient trust mechanism for sybil attacks in internet of things networks. Ad Hoc Netw. 163, 103576 (2024)","journal-title":"Ad Hoc Netw."},{"issue":"4","key":"1107_CR52","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/MNET.011.1900651","volume":"34","author":"MA Boudouaia","year":"2020","unstructured":"Boudouaia, M.A., Ali-Pacha, A., Abouaissa, A., Lorenz, P.: Security against rank attack in RPL protocol. IEEE Netw. 34(4), 133\u2013139 (2020)","journal-title":"IEEE Netw."},{"key":"1107_CR53","doi-asserted-by":"crossref","unstructured":"Fatima-tuz-Zahra, Jhanjhi, N.Z., Brohi, S.N., Malik, N.A.: Proposing a rank and wormhole attack detection framework using machine learning. In: 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS). IEEE, (2019)","DOI":"10.1109\/MACS48846.2019.9024821"},{"key":"1107_CR54","doi-asserted-by":"crossref","unstructured":"Tandon, A., Srivastava, P.: Trust-based enhanced secure routing against rank and sybil attacks in iot. In: 2019 Twelfth International Conference on Contemporary Computing (IC3), pp. 1\u20137 (2019). IEEE","DOI":"10.1109\/IC3.2019.8844935"},{"key":"1107_CR55","doi-asserted-by":"crossref","unstructured":"Nandhini, P.S., Kuppuswami, S., Malliga, S.: Energy efficient thwarting rank attack from RPL based IoT networks: A review. Mater. Today 81, 694\u2013699 (2023)","DOI":"10.1016\/j.matpr.2021.04.167"},{"key":"1107_CR56","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.adhoc.2018.10.022","volume":"85","author":"A Ar\u0131\u015f","year":"2019","unstructured":"Ar\u0131\u015f, A., \u00d6rs Yal\u00e7\u0131n, S.B., Oktu\u011f, S.F.: New lightweight mitigation techniques for RPL version number attacks. Ad Hoc Netw. 85, 81\u201391 (2019)","journal-title":"Ad Hoc Netw."},{"key":"1107_CR57","unstructured":"Neerugatti, V., Rama Mohan\u00a0Reddy, A.: Machine learning based technique for detection of rank attack in RPL based internet of things networks. International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN, 2278\u20133075 (2019)"},{"key":"1107_CR58","doi-asserted-by":"crossref","unstructured":"Said, A.M., Yahyaoui, A., Yaakoubi, F., Abdellatif, T.: Machine learning based rank attack detection for smart hospital infrastructure. In: Lecture Notes in Computer Science. Lecture notes in computer science, pp. 28\u201340. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-51517-1_3"},{"issue":"2","key":"1107_CR59","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1007\/s13369-017-2844-0","volume":"43","author":"N Bharot","year":"2018","unstructured":"Bharot, N., Verma, P., Sharma, S., Suraparaju, V.: Distributed denial-of-service attack detection and mitigation using feature selection and intensive care request processing unit. Arab. J. Sci. Eng. 43(2), 959\u2013967 (2018)","journal-title":"Arab. J. Sci. Eng."},{"issue":"12","key":"1107_CR60","first-page":"2783","volume":"19","author":"K Ma","year":"2019","unstructured":"Ma, K., Bagula, A., Nyirenda, C., Ajayi, O.: An IoT-based fog computing model. Sensors (Basel) 19(12), 2783 (2019)","journal-title":"An IoT-based fog computing model. Sensors (Basel)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01107-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01107-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01107-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T11:38:04Z","timestamp":1760614684000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01107-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,26]]},"references-count":60,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1107"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01107-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,26]]},"assertion":[{"value":"26 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors would like to announce no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any examinations with human members or creatures performed by any of the others.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"196"}}