{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T09:58:42Z","timestamp":1776074322905,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"DOI":"10.1007\/s10207-025-01195-w","type":"journal-article","created":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:03:29Z","timestamp":1770915809000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CTDMF-SC: cybersecurity threat detection and mitigation framework for smart cities"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7637-7870","authenticated-orcid":false,"given":"Shahzad","family":"Ashraf","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2276-2378","authenticated-orcid":false,"given":"Chang","family":"Choi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1283-7970","authenticated-orcid":false,"given":"Ahmad","family":"Bilal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,12]]},"reference":[{"issue":"8","key":"1195_CR1","doi-asserted-by":"publisher","first-page":"6969","DOI":"10.1007\/s10115-025-02429-y","volume":"67","author":"N Mohamed","year":"2025","unstructured":"Mohamed, N.: Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms. Knowl. Inf. Syst. 67(8), 6969\u20137055 (2025). https:\/\/doi.org\/10.1007\/s10115-025-02429-y","journal-title":"Knowl. Inf. Syst."},{"issue":"01","key":"1195_CR2","doi-asserted-by":"publisher","first-page":"6","DOI":"10.21917\/ijivp.2020.0317","volume":"11","author":"MK Basit","year":"2020","unstructured":"Basit, M.K.: CMBA\u2014a candid multi-purpose biometric approach. ICTACT J. Image Video Process. 11(01), 6 (2020). https:\/\/doi.org\/10.21917\/ijivp.2020.0317","journal-title":"ICTACT J. Image Video Process."},{"key":"1195_CR3","doi-asserted-by":"publisher","unstructured":"Kettani, H., Cannistra, R.M.: On cyber threats to smart digital environments. In: Proceedings of the 2nd International Conference on Smart Digital Environment, pp. 183\u2013188. ACM, Rabat Morocco (2018). https:\/\/doi.org\/10.1145\/3289100.3289130","DOI":"10.1145\/3289100.3289130"},{"issue":"1","key":"1195_CR4","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/s11277-022-09561-w","volume":"125","author":"M Gao","year":"2022","unstructured":"Gao, M., Chen, Z., Naeem, H., Ahmed, T.: CED-OR based opportunistic routing mechanism for underwater wireless sensor networks. Wirel. Pers. Commun. 125(1), 487\u2013511 (2022). https:\/\/doi.org\/10.1007\/s11277-022-09561-w","journal-title":"Wirel. Pers. Commun."},{"key":"1195_CR5","doi-asserted-by":"publisher","unstructured":"Coppolino, L. et al.: Exploiting digital twin technology for cybersecurity monitoring in smart grids. In: Proceedings of the 18th International Conference on Availability, Reliability and Security, in ACM Other Conferences, pp. 1\u201310 (2023). https:\/\/doi.org\/10.1145\/3600160.3605043","DOI":"10.1145\/3600160.3605043"},{"issue":"3","key":"1195_CR6","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1504\/IJCSM.2022.10049407","volume":"15","author":"S Saleem","year":"2022","unstructured":"Saleem, S., Ahmed, T., Arfeen, Z.A.: Succulent link selection strategy for underwater sensor network. IJCSM 15(3), 224 (2022). https:\/\/doi.org\/10.1504\/IJCSM.2022.10049407","journal-title":"IJCSM"},{"issue":"3","key":"1195_CR7","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.tele.2008.11.009","volume":"26","author":"C Feij\u00f3o","year":"2009","unstructured":"Feij\u00f3o, C., Maghiros, I., Abadie, F., G\u00f3mez-Barroso, J.-L.: Exploring a heterogeneous and fragmented digital ecosystem: mobile content. Telemat. Inform. 26(3), 282\u2013292 (2009). https:\/\/doi.org\/10.1016\/j.tele.2008.11.009","journal-title":"Telemat. Inform."},{"key":"1195_CR8","doi-asserted-by":"publisher","DOI":"10.17352\/tcsit.000030","author":"A Shahzad","year":"2020","unstructured":"Shahzad, A.: Towards shrewd object visualization mechanism. Trends Comput. Sci. Inf. Technol. (2020). https:\/\/doi.org\/10.17352\/tcsit.000030","journal-title":"Trends Comput. Sci. Inf. Technol."},{"key":"1195_CR9","first-page":"39","volume-title":"Industrial internet of things: an introduction","author":"G Bakshi","year":"2024","unstructured":"Bakshi, G., Kumar, R.: A suggested framework for the prevention of physical attacks on IoT devices. In: Kumar, S., Goel, S., Bakshi, G., Gupta, S., El-kenawy, S.M. (eds.) Industrial internet of things: an introduction, pp. 39\u201354. Bentham Science Publishers, UAE (2024)"},{"key":"1195_CR10","doi-asserted-by":"publisher","DOI":"10.5121\/acii.2020.7401","author":"S Afnan","year":"2020","unstructured":"Afnan, S.: FTMCP: fuzzy based test metrics for cosmetology paradigm. Adv Comput Intell Int J (ACII) (2020). https:\/\/doi.org\/10.5121\/acii.2020.7401","journal-title":"Adv Comput Intell Int J (ACII)"},{"issue":"4","key":"1195_CR11","doi-asserted-by":"publisher","first-page":"490","DOI":"10.2174\/0123520965284240240118074556","volume":"18","author":"M Chen","year":"2025","unstructured":"Chen, M., et al.: Detection of false data injection attacks on distributed energy resources integration into distribution networks. Recent Adv. Electr. Electron. Eng. (formerly Recent Pat. Electr. Electron. Eng.) 18(4), 490\u2013500 (2025). https:\/\/doi.org\/10.2174\/0123520965284240240118074556","journal-title":"Recent Adv. Electr. Electron. Eng. (formerly Recent Pat. Electr. Electron. Eng.)"},{"issue":"3","key":"1195_CR12","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.3390\/smartcities5030056","volume":"5","author":"NA Ibupoto","year":"2022","unstructured":"Ibupoto, N.A., Butt, P.K., Sadiq, E.H.: SDS: scrumptious dataflow strategy for IoT devices in heterogeneous network environment. Smart Cities 5(3), 1115\u20131128 (2022). https:\/\/doi.org\/10.3390\/smartcities5030056","journal-title":"Smart Cities"},{"key":"1195_CR13","doi-asserted-by":"publisher","unstructured":"El Jaouhari, S., Etiabi, Y.: FedCTI: federated learning and cyber threat intelligence on the edge for secure IoT networks. In: Proceedings of the 13th International Conference on the Internet of Things, in ACM Other conferences, pp. 98\u2013104 (2023). https:\/\/doi.org\/10.1145\/3627050.3627064","DOI":"10.1145\/3627050.3627064"},{"issue":"2","key":"1195_CR14","doi-asserted-by":"publisher","first-page":"9","DOI":"10.32474\/ARME.2021.03.00015","volume":"3","author":"S Ashraf","year":"2021","unstructured":"Ashraf, S.: Avoiding vulnerabilities and attacks with a proactive strategy for web applications. Adv. Robot. Mech. Eng. 3(2), 9 (2021). https:\/\/doi.org\/10.32474\/ARME.2021.03.00015","journal-title":"Adv. Robot. Mech. Eng."},{"key":"1195_CR15","doi-asserted-by":"publisher","unstructured":"Kuntsman, A., Xin, L.: Smart cities, digitisation, and the environment. In: Digital Technologies, Smart Cities, and the Environment: In the Ruins of Broken Promises, pp. 21\u201345. Bristol University Press (2024). https:\/\/doi.org\/10.46692\/9781529237160.002","DOI":"10.46692\/9781529237160.002"},{"key":"1195_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2024.105384","volume":"108","author":"J Wu","year":"2024","unstructured":"Wu, J., Wang, H., Yao, J.: Computer-aided urban energy systems cyber attach detection and mitigation: intelligence hybrid machine learning technique for security enhancement of smart cities. Sustain. Cities Soc. 108, 105384 (2024). https:\/\/doi.org\/10.1016\/j.scs.2024.105384","journal-title":"Sustain. Cities Soc."},{"key":"1195_CR17","doi-asserted-by":"publisher","first-page":"10966","DOI":"10.1109\/ACCESS.2024.3522078","volume":"13","author":"Q Lyu","year":"2025","unstructured":"Lyu, Q., Liu, S., Shang, Z.: Securing urban landscape: cybersecurity mechanisms for resilient smart cities. IEEE Access 13, 10966\u201310977 (2025). https:\/\/doi.org\/10.1109\/ACCESS.2024.3522078","journal-title":"IEEE Access"},{"key":"1195_CR18","first-page":"190","volume-title":"Cutting-Edge Solutions for Advancing Sustainable Development: Exploring Technological Horizons for Sustainability\u2014Part 1","author":"S Yalamati","year":"2025","unstructured":"Yalamati, S.: \u201cFortifying cybersecurity: harnessing AI for advanced threat detection and predictive analytics. In: Whig, P., Sharma, P., Yathiraju, N. (eds.) Cutting-Edge Solutions for Advancing Sustainable Development: Exploring Technological Horizons for Sustainability\u2014Part 1, pp. 190\u2013207. Bentham Science Publishers, UAE (2025)"},{"key":"1195_CR19","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2024.1402745","volume":"7","author":"P Radanliev","year":"2024","unstructured":"Radanliev, P., De Roure, D., Maple, C., Nurse, J.R.C., Nicolescu, R., Ani, U.: AI security and cyber risk in IoT systems. Front. Big Data 7, 1402745 (2024). https:\/\/doi.org\/10.3389\/fdata.2024.1402745","journal-title":"Front. Big Data"},{"key":"1195_CR20","doi-asserted-by":"publisher","unstructured":"Petihakis, G., Farao, A., Bountakas, P., Sabazioti, A., Polley, J., Xenakis, C.: AIAS: AI-assisted cybersecurity platform to defend against adversarial AI attacks. In: Proceedings of the 19th International Conference on Availability, Reliability and Security, Vienna Austria, pp. 1\u20137. ACM (2024). https:\/\/doi.org\/10.1145\/3664476.3669920.","DOI":"10.1145\/3664476.3669920"},{"key":"1195_CR21","unstructured":"E. Team: CoAP Protocol: Features, Use Cases, Pros & Cons for IoT. www.emqx.com. Accessed Nov. 05, 2025"},{"key":"1195_CR22","doi-asserted-by":"publisher","first-page":"513","DOI":"10.14741\/ijmcr\/v.8.4.3","volume":"8","author":"D Muhammad","year":"2020","unstructured":"Muhammad, D., Khan, M.A.: Fuzzy based efficient cosmetology paradigm. Int. J. Multidiscip. Curr. Res\/ 8, 513\u2013520 (2020). https:\/\/doi.org\/10.14741\/ijmcr\/v.8.4.3","journal-title":"Int. J. Multidiscip. Curr. Res\/"},{"key":"1195_CR23","unstructured":"\u201cEffects of 5G Mobile Phone Network Electromagnetic Field Exposure on Testicular Endoplasmic Reticulum Stress and the Protective Role of Coenzyme Q10\u2014ClinicalKey.\u201d https:\/\/www-clinicalkey-com-ssl.glibproxy.gachon.ac.kr\/#!\/content\/journal\/1-s2.0-S018844092400208X. Accessed: Sept. 18, 2025"},{"key":"1195_CR24","doi-asserted-by":"publisher","unstructured":"Yang, Y., Chen, H.: Construction of domain-specific knowledge graph for advanced persistent threat behaviour analysis and detection. In: Companion Proceedings of the ACM on Web Conference 2025, in ACM Conferences, pp. 1480\u20131484 (2025). https:\/\/doi.org\/10.1145\/3701716.3715454","DOI":"10.1145\/3701716.3715454"},{"issue":"2","key":"1195_CR25","doi-asserted-by":"publisher","first-page":"062","DOI":"10.17352\/2455-5479.000175","volume":"8","author":"R Zeeshan","year":"2022","unstructured":"Zeeshan, R., Muhammad, A.: Adopting proactive results by developing the shrewd model of pandemic COVID-19. Arch. Commun. Med. Public Health 8(2), 062\u2013067 (2022). https:\/\/doi.org\/10.17352\/2455-5479.000175","journal-title":"Arch. Commun. Med. Public Health"},{"key":"1195_CR26","doi-asserted-by":"publisher","unstructured":"Ike, M. et al.: Your control host intrusion left some physical breadcrumbs: physical evidence-guided post-mortem triage of SCADA attacks. In: Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, in ACM Conferences, pp. 1016\u20131031 (2025). https:\/\/doi.org\/10.1145\/3708821.3710817.","DOI":"10.1145\/3708821.3710817"},{"key":"1195_CR27","doi-asserted-by":"publisher","DOI":"10.53555\/ks.v12i5.3247","author":"SK Mehak","year":"2024","unstructured":"Mehak, S.K.: Machine learning algorithms for prediction of thyroid syndrome at initial stages in females. Kurdish Stud. (2024). https:\/\/doi.org\/10.53555\/ks.v12i5.3247","journal-title":"Kurdish Stud."},{"key":"1195_CR28","doi-asserted-by":"publisher","unstructured":"Freitas, A.V. et al.: MQTT-VET: exploring MQTT protocol vulnerabilities. In: Proceedings of the 13th Latin-American Symposium on Dependable and Secure Computing, in ACM Other conferences, pp. 111\u2013113 (2024). https:\/\/doi.org\/10.1145\/3697090.3699800","DOI":"10.1145\/3697090.3699800"},{"issue":"2","key":"1195_CR29","doi-asserted-by":"publisher","first-page":"52","DOI":"10.48168\/innosoft.s12.a108","volume":"4","author":"Z Aslam","year":"2023","unstructured":"Aslam, Z.: Data leakage analysis in wireless networks using super-vised and unsupervised testing. Innov. softw. 4(2), 52\u201362 (2023). https:\/\/doi.org\/10.48168\/innosoft.s12.a108","journal-title":"Innov. softw."},{"issue":"1","key":"1195_CR30","doi-asserted-by":"publisher","first-page":"136","DOI":"10.12928\/commicast.v5i1.10044","volume":"5","author":"D Muhammad","year":"2024","unstructured":"Muhammad, D.: Time based meticulous analysis of pandemic spreading ratio using Simpy framework. J. Commun. 5(1), 136\u2013147 (2024). https:\/\/doi.org\/10.12928\/commicast.v5i1.10044","journal-title":"J. Commun."},{"key":"1195_CR31","unstructured":"\u201cLong Short-Term Memory (LSTM)\u2014Dive into Deep Learning 1.0.3 documentation.\u201d https:\/\/d2l.ai\/chapter_recurrent-modern\/lstm.html. Accessed Nov. 05, 2025"},{"issue":"4","key":"1195_CR32","doi-asserted-by":"publisher","DOI":"10.55766\/sujst-2023-04-e0855","volume":"30","author":"MZ Zuhair","year":"2023","unstructured":"Zuhair, M.Z., Iqbal, M., Rizvi, S.Z.R., Khokhar, A., Nadeem, M.A.N.: Broaching uncouth water level snag in underground agriculture field through wireless sensors. Suranaree J. Sci. Technol. 30(4), 010248 (2023). https:\/\/doi.org\/10.55766\/sujst-2023-04-e0855","journal-title":"Suranaree J. Sci. Technol."},{"key":"1195_CR33","unstructured":"\u201cFalse Positive Rate\u2014an overview | ScienceDirect Topics.\u201d https:\/\/www.sciencedirect.com\/topics\/mathematics\/false-positive-rate. Accessed: Nov. 05, 2025"},{"key":"1195_CR34","first-page":"373","volume-title":"Blockchain and Digital Twin for Smart Healthcare","author":"F Memon","year":"2025","unstructured":"Memon, F., Akram, F., Siddique, T.A., Aziz, Y.: Modeling wireless sensors network using shrewd neural networks. In: Nguyen, T.A. (ed.) Blockchain and Digital Twin for Smart Healthcare, pp. 373\u2013393. Elsevier, Amsterdam (2025)"},{"key":"1195_CR35","unstructured":"\u201cTrusted Platform Modules: Why, when and how to use them (Computing and Networks): Segall, Ariel: 9781849198936: Amazon.com: Books.\u201d https:\/\/www.amazon.com\/Trusted-Platform-Modules-Computing-Networks\/dp\/1849198934. Accessed: Nov. 05, 2025"},{"key":"1195_CR36","doi-asserted-by":"publisher","unstructured":"Nastiti, A.D., Wulandari, M., Agustiningtyas, S., Radhitya, R., Ahmad, I., Hermawan, W.: Risk management planning of certification authority termination based on ISO 31000:2018. In: 2023 7th International Conference on New Media Studies (CONMEDIA), pp. 127\u2013131 (2023). https:\/\/doi.org\/10.1109\/CONMEDIA60526.2023.10428241.","DOI":"10.1109\/CONMEDIA60526.2023.10428241"},{"issue":"6","key":"1195_CR37","doi-asserted-by":"publisher","first-page":"6879","DOI":"10.1109\/TIA.2022.3192424","volume":"58","author":"DC Mazur","year":"2022","unstructured":"Mazur, D.C., Entzminger, R.A., Kay, J.A., Peterson, C.A.: Analysis and overview of message queuing telemetry transport (MQTT) as applied to forest products applications. IEEE Trans. Ind. Appl. 58(6), 6879\u20136885 (2022). https:\/\/doi.org\/10.1109\/TIA.2022.3192424","journal-title":"IEEE Trans. Ind. Appl."},{"key":"1195_CR38","doi-asserted-by":"publisher","unstructured":"Dong, H., Zhang, Y., Lee, H., Du, K., Tu, G., Sun, Y.: Mutual TLS in practice: a deep dive into certificate configurations and privacy issues. In: Proceedings of the 2024 ACM on Internet Measurement Conference, in IMC \u201924, pp. 214\u2013229. Association for Computing Machinery, New York, NY, USA (2024). https:\/\/doi.org\/10.1145\/3646547.3688415","DOI":"10.1145\/3646547.3688415"},{"issue":"3","key":"1195_CR39","doi-asserted-by":"publisher","first-page":"649","DOI":"10.3724\/2096-7004.di.2024.0034","volume":"6","author":"F Akram","year":"2024","unstructured":"Akram, F., Rasheed, Z., Bhatti, S.S., Ullah, I.: Development of sustainable wireless resource model through shrewd neural network. DI 6(3), 649\u2013665 (2024). https:\/\/doi.org\/10.3724\/2096-7004.di.2024.0034","journal-title":"DI"},{"key":"1195_CR40","unstructured":"Building DMZs For Enterprise Networks (2003). https:\/\/shop.elsevier.com\/books\/building-dmzs-for-enterprise-networks\/syngress\/978-1-931836-88-3. Accessed: Nov. 05, 2025"},{"key":"1195_CR41","doi-asserted-by":"publisher","unstructured":"\u201cUnderstanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: A Security Perspective | ACM Transactions on Cyber-Physical Systems.\u201dhttps:\/\/doi.org\/10.1145\/3587255. Accessed: Sept. 18, 2025","DOI":"10.1145\/3587255"},{"key":"1195_CR42","doi-asserted-by":"publisher","DOI":"10.1108\/JCOM-01-2025-0006","author":"A Bj\u00f6rck","year":"2025","unstructured":"Bj\u00f6rck, A., Vogel, B., Pugnetti, C., Lopez, M.: Advancing cyber crisis readiness: context, microfoundations and the role of leadership. J. Commun. Manage. (2025). https:\/\/doi.org\/10.1108\/JCOM-01-2025-0006","journal-title":"J. Commun. Manage."},{"issue":"3","key":"1195_CR43","doi-asserted-by":"publisher","first-page":"4197","DOI":"10.32604\/cmc.2024.047117","volume":"79","author":"I Al-Hejri","year":"2024","unstructured":"Al-Hejri, I., et al.: Enabling efficient data transmission in wireless sensor networks-based IoT applications. Comput. Mater. Continua 79(3), 4197\u20134218 (2024). https:\/\/doi.org\/10.32604\/cmc.2024.047117","journal-title":"Comput. Mater. Continua"},{"issue":"9","key":"1195_CR44","doi-asserted-by":"publisher","first-page":"12919","DOI":"10.1007\/s13369-024-08884-z","volume":"49","author":"I Al-Hejri","year":"2024","unstructured":"Al-Hejri, I., Azzedin, F., Almuhammadi, S., Eltoweissy, M.: Lightweight secure and scalable scheme for data transmission in the internet of things. Arab. J. Sci. Eng. 49(9), 12919\u201312934 (2024). https:\/\/doi.org\/10.1007\/s13369-024-08884-z","journal-title":"Arab. J. Sci. Eng."},{"issue":"3","key":"1195_CR45","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1109\/LCOMM.2025.3526601","volume":"29","author":"J Shi","year":"2025","unstructured":"Shi, J., Zhang, Q., Zeng, W., Li, S., Qin, Z.: Secure transmission in wireless semantic communications with adversarial training. IEEE Commun. Lett. 29(3), 487\u2013491 (2025). https:\/\/doi.org\/10.1109\/LCOMM.2025.3526601","journal-title":"IEEE Commun. Lett."},{"key":"1195_CR46","doi-asserted-by":"publisher","unstructured":"Moustafa, N., Keshky, M., Debiez, E., Janicke, H.: Federated TON_IoT windows datasets for evaluating AI-based security applications. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 848\u2013855. IEEE, Guangzhou, China (2020) https:\/\/doi.org\/10.1109\/TrustCom50675.2020.00114.","DOI":"10.1109\/TrustCom50675.2020.00114"},{"key":"1195_CR47","unstructured":"N-able, \u201cIntrusion Detection System (IDS): Signature vs. Anomaly-Based,\u201d N-able. https:\/\/www.n-able.com\/blog\/intrusion-detection-system. Accessed: Nov. 05, 2025"},{"issue":"5","key":"1195_CR48","doi-asserted-by":"publisher","first-page":"162","DOI":"10.46501\/IJMTST060525","volume":"6","author":"ZA Arfeen","year":"2020","unstructured":"Arfeen, Z.A., Khan, M.A., Ahmed, T.: SLM-OJ: surrogate learning mechanism during outbreak juncture. IJMTST 6(5), 162\u2013167 (2020). https:\/\/doi.org\/10.46501\/IJMTST060525","journal-title":"IJMTST"},{"key":"1195_CR49","doi-asserted-by":"publisher","unstructured":"Klivan, S. et al.: \u2018We\u2019ve disabled MFA for you\u2019: an evaluation of the security and usability of multi-factor authentication recovery deployments. In: Proceedings of the 2023 ACM SIGSAC conference on computer and communications security, in ACM conferences, pp. 3138\u20133152 (2023). https:\/\/doi.org\/10.1145\/3576915.3623180","DOI":"10.1145\/3576915.3623180"},{"issue":"2","key":"1195_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.26438\/ijsrcse\/v8i2.19","volume":"8","author":"S Ashraf","year":"2020","unstructured":"Ashraf, S., et al.: Underwater routing protocols analysis of intrepid link selection mechanism, challenges and strategies. IJSRCSE 8(2), 1\u20139 (2020). https:\/\/doi.org\/10.26438\/ijsrcse\/v8i2.19","journal-title":"IJSRCSE"},{"issue":"4","key":"1195_CR51","doi-asserted-by":"publisher","first-page":"22","DOI":"10.5815\/ijwmt.2020.04.03","volume":"10","author":"T Ahmed","year":"2020","unstructured":"Ahmed, T.: Sagacious communication link selection mechanism for underwater wireless sensors network. IJWMT 10(4), 22\u201333 (2020). https:\/\/doi.org\/10.5815\/ijwmt.2020.04.03","journal-title":"IJWMT"},{"issue":"1","key":"1195_CR52","doi-asserted-by":"publisher","first-page":"008","DOI":"10.17352\/tcsit.000012","volume":"5","author":"A Tauqeer","year":"2020","unstructured":"Tauqeer, A.: Dual-nature biometric recognition epitome. Trends Comput. Sci. Inf. Technol. 5(1), 008\u2013014 (2020). https:\/\/doi.org\/10.17352\/tcsit.000012","journal-title":"Trends Comput. Sci. Inf. Technol."},{"issue":"3","key":"1195_CR53","first-page":"146","volume":"06","author":"M Aamer","year":"2020","unstructured":"Aamer, M.: Multi-biometric sustainable approach for human appellative. CRPASE Trans. Electr. Electron. Comput. Eng. 06(3), 146\u2013152 (2020)","journal-title":"CRPASE Trans. Electr. Electron. Comput. Eng."},{"issue":"3","key":"1195_CR54","first-page":"9","volume":"8","author":"S Ashraf","year":"2019","unstructured":"Ashraf, S.: Culminate coverage for sensor network through bodacious-instance mechanism. i-manager\u2019s J. Wirel. Commun. Netw. 8(3), 9 (2019)","journal-title":"i-manager\u2019s J. Wirel. Commun. Netw."},{"issue":"5","key":"1195_CR55","doi-asserted-by":"publisher","DOI":"10.18196\/jrc.1535","volume":"1","author":"H Naeem","year":"2020","unstructured":"Naeem, H.: Underwater resurrection routing synergy using astucious energy pods. J. Robot. Control (JRC) 1(5), 5 (2020). https:\/\/doi.org\/10.18196\/jrc.1535","journal-title":"J. Robot. Control (JRC)"},{"key":"1195_CR56","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-540-31865-1_25","volume-title":"Advances in Information Retrieval","author":"C Goutte","year":"2005","unstructured":"Goutte, C., Gaussier, E.: A probabilistic interpretation of precision, recall and F-score, with implication for evaluation. In: Losada, D.E., Fern\u00e1ndez-Luna, J.M. (eds.) Advances in Information Retrieval, pp. 345\u2013359. Springer, Berlin, Heidelberg (2005)"},{"key":"1195_CR57","unstructured":"\u201cCapital Expenditure\u2014an overview | ScienceDirect Topics.\u201d https:\/\/www.sciencedirect.com\/topics\/engineering\/capital-expenditure. Accessed: Nov. 05, 2025"},{"issue":"2","key":"1195_CR58","doi-asserted-by":"publisher","first-page":"145","DOI":"10.22061\/jecei.2020.6874.344","volume":"8","author":"M Shuaeeb","year":"2020","unstructured":"Shuaeeb, M.: Depuration based efficient coverage mechanism for wireless sensor network. J. Electr. Comput. Eng. Innov. (JECEI) 8(2), 145\u2013160 (2020). https:\/\/doi.org\/10.22061\/jecei.2020.6874.344","journal-title":"J. Electr. Comput. Eng. Innov. (JECEI)"},{"key":"1195_CR59","unstructured":"\u201cCost of a data breach 2025 | IBM.\u201d https:\/\/www.ibm.com\/reports\/data-breach. Accessed Nov. 05, 2025."},{"issue":"3","key":"1195_CR60","doi-asserted-by":"publisher","first-page":"234","DOI":"10.3934\/ElectrEng.2020.3.234","volume":"4","author":"A Yahya","year":"2020","unstructured":"Yahya, A.: Underwater routing protocols: analysis of link selection challenges. AIMS Electron. Electr. Eng. 4(3), 234\u2013248 (2020). https:\/\/doi.org\/10.3934\/ElectrEng.2020.3.234","journal-title":"AIMS Electron. Electr. Eng."},{"key":"1195_CR61","unstructured":"nist. Guide to Protecting the Confidentiality of Personally Identifiable Information. CreateSpace Independent Publishing Platform."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01195-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01195-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01195-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T09:16:59Z","timestamp":1776071819000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01195-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,12]]},"references-count":61,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["1195"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01195-w","relation":{},"ISSN":["1615-5270"],"issn-type":[{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,12]]},"assertion":[{"value":"13 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}],"article-number":"54"}}