{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T04:28:47Z","timestamp":1775276927916,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T00:00:00Z","timestamp":1687478400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T00:00:00Z","timestamp":1687478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2020-05363"],"award-info":[{"award-number":["RGPIN-2020-05363"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10586-023-04088-6","type":"journal-article","created":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T23:28:44Z","timestamp":1687562924000},"page":"3389-3403","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A BERT-based recommender system for secure blockchain-based cyber physical drug supply chain management"],"prefix":"10.1007","volume":"26","author":[{"given":"Abbas","family":"Yazdinejad","sequence":"first","affiliation":[]},{"given":"Elnaz","family":"Rabieinejad","sequence":"additional","affiliation":[]},{"given":"Tahereh","family":"Hasani","sequence":"additional","affiliation":[]},{"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,23]]},"reference":[{"issue":"3","key":"4088_CR1","first-page":"63","volume":"3","author":"A Yusuf","year":"2022","unstructured":"Yusuf, A., Soediantono, D.: Supply chain management and recommendations for implementation in the defense industry: A literature review. Int. J. Soc. Manag. Stud. 3(3), 63\u201377 (2022)","journal-title":"Int. J. Soc. Manag. Stud."},{"key":"4088_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2021.105100","volume":"140","author":"D Agrawal","year":"2022","unstructured":"Agrawal, D., Minocha, S., Namasudra, S., Gandomi, A.H.: A robust drug recall supply chain management system using hyperledger blockchain ecosystem. Comput. Biol. Med. 140, 105100 (2022)","journal-title":"Comput. Biol. Med."},{"key":"4088_CR3","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1007\/s10586-022-03722-z","volume":"26","author":"AU Khan","year":"2022","unstructured":"Khan, A.U., Javaid, N., Khan, M.A., Ullah, I.: A blockchain scheme for authentication, data sharing and nonrepudiation to secure internet of wireless sensor things. Clust. Comput. 26, 945\u2013960 (2022)","journal-title":"Clust. Comput."},{"issue":"6","key":"4088_CR4","first-page":"44","volume":"39","author":"L Williams","year":"2014","unstructured":"Williams, L., McKnight, E.: The real impact of counterfeit medications. US Pharm. 39(6), 44\u201346 (2014)","journal-title":"US Pharm."},{"key":"4088_CR5","volume-title":"Counterfeit medicines and criminal organisations","author":"E Przyswa","year":"2013","unstructured":"Przyswa, E.: Counterfeit medicines and criminal organisations. IRCAM, Paris (2013)"},{"key":"4088_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03662-8","author":"I Priyadarshini","year":"2022","unstructured":"Priyadarshini, I., Sharma, R., Bhatt, D., Al-Numay, M.: Human activity recognition in cyber-physical systems using optimized machine learning techniques. Clust. Comput. (2022). https:\/\/doi.org\/10.1007\/s10586-022-03662-8","journal-title":"Clust. Comput."},{"key":"4088_CR7","doi-asserted-by":"publisher","first-page":"224532","DOI":"10.1109\/ACCESS.2020.3036832","volume":"8","author":"C-L Chen","year":"2020","unstructured":"Chen, C.-L., Deng, Y.-Y., Li, C.-T., Zhu, S., Chiu, Y.-J., Chen, P.-Z.: An iot-based traceable drug anti-counterfeiting management system. IEEE Access 8, 224532\u2013224548 (2020)","journal-title":"IEEE Access"},{"key":"4088_CR8","doi-asserted-by":"publisher","first-page":"8919","DOI":"10.1007\/s10586-018-2021-6","volume":"22","author":"Kaijun Leng","year":"2019","unstructured":"Leng, Kaijun, Linbo Jin, Wen Shi, and Inneke Van Nieuwenhuyse. \u201cResearch on agricultural products supply chain inspection system based on internet of things.\u201d Cluster Comput. 22, 8919\u20138927 (2019)","journal-title":"Cluster Comput."},{"key":"4088_CR9","doi-asserted-by":"publisher","unstructured":"Alfandi, O., Otoum, S., Jararweh, Y.: Blockchain solution for iot-based critical infrastructures: Byzantine fault tolerance. In: NOMS 2020 - 2020 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20134 (2020). doi: https:\/\/doi.org\/10.1109\/NOMS47738.2020.9110312","DOI":"10.1109\/NOMS47738.2020.9110312"},{"key":"4088_CR10","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/j.procs.2018.07.278","volume":"126","author":"T Omitola","year":"2018","unstructured":"Omitola, T., Wills, G.: Towards mapping the security challenges of the internet of things (iot) supply chain. Procedia Comput. Sci. 126, 441\u2013450 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"4088_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.09.010","author":"A Yazdinejad","year":"2022","unstructured":"Yazdinejad, A., Zolfaghari, B., Dehghantanha, A., Karimipour, H., Srivastava, G., Parizi, R.M.: Accurate threat hunting in industrial internet of things edge devices. Digit. Commun. Netw. (2022). https:\/\/doi.org\/10.1016\/j.dcan.2022.09.010","journal-title":"Digit. Commun. Netw."},{"key":"4088_CR12","doi-asserted-by":"crossref","unstructured":"Nakhodchi, S., Zolfaghari, B., Yazdinejad, A., Dehghantanha, A.: Steeleye: An application-layer attack detection and attribution model in industrial control systems using semi-deep learning. In: 2021 18th International Conference on Privacy, Security and Trust (PST), pp. 1\u20138 (2021). IEEE","DOI":"10.1109\/PST52912.2021.9647777"},{"key":"4088_CR13","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.comcom.2022.04.031","volume":"191","author":"M Sreenu","year":"2022","unstructured":"Sreenu, M., Gupta, N., Jatoth, C., Saad, A., Alharbi, A., Nkenyereye, L.: Blockchain based secure and reliable cyber physical ecosystem for vaccine supply chain. Comput. Commun. 191, 173\u2013183 (2022). https:\/\/doi.org\/10.1016\/j.comcom.2022.04.031","journal-title":"Comput. Commun."},{"key":"4088_CR14","doi-asserted-by":"crossref","unstructured":"Rabieinejad, E., Yazdinejad, A., Parizi, R.M.: A deep learning model for threat hunting in ethereum blockchain. In: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1185\u20131190 (2021). IEEE","DOI":"10.1109\/TrustCom53373.2021.00160"},{"key":"4088_CR15","doi-asserted-by":"crossref","unstructured":"Wen, Q., Gao, Y., Chen, Z., Wu, D.: A blockchain-based data sharing scheme in the supply chain by iiot. In: 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS), pp. 695\u2013700 (2019). IEEE","DOI":"10.1109\/ICPHYS.2019.8780161"},{"key":"4088_CR16","doi-asserted-by":"crossref","unstructured":"Rabieinejad, E., Yazdinejad, A., Dehghantanha, A., Parizi, R.M., Srivastava, G.: Secure ai and blockchain-enabled framework in smart vehicular networks. In: 2021 IEEE Globecom Workshops (GC Wkshps), pp. 1\u20136 (2021). IEEE","DOI":"10.1109\/GCWkshps52748.2021.9682140"},{"key":"4088_CR17","doi-asserted-by":"publisher","first-page":"13938","DOI":"10.1109\/ACCESS.2021.3051602","volume":"9","author":"S Singh","year":"2021","unstructured":"Singh, S., Hosen, A.S., Yoon, B.: Blockchain security attacks, challenges, and solutions for the future distributed iot network. IEEE Access 9, 13938\u201313959 (2021)","journal-title":"IEEE Access"},{"key":"4088_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03776-z","author":"A Heidari","year":"2022","unstructured":"Heidari, A., Jabraeil Jamali, M.A.: Internet of things intrusion detection systems: A comprehensive review and future directions. Clust. Comput. (2022). https:\/\/doi.org\/10.1007\/s10586-022-03776-z","journal-title":"Clust. Comput."},{"issue":"6","key":"4088_CR19","doi-asserted-by":"publisher","first-page":"4129","DOI":"10.1007\/s10586-022-03645-9","volume":"25","author":"SS Mathew","year":"2022","unstructured":"Mathew, S.S., Hayawi, K., Dawit, N.A., Taleb, I., Trabelsi, Z.: Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial iot: a survey. Clust. Comput. 25(6), 4129\u20134149 (2022)","journal-title":"Clust. Comput."},{"key":"4088_CR20","first-page":"1","volume-title":"Block hunter Federated learning for cyber threat hunting in blockchain-based iiot networks","author":"A Yazdinejad","year":"2022","unstructured":"Yazdinejad, A., Dehghantanha, A., Parizi, R.M., Hammoudeh, M., Karimipour, H., Srivastava, G.: Block hunter Federated learning for cyber threat hunting in blockchain-based iiot networks, pp. 1\u20131. IEEE Transactions on Industrial Informatics, New York (2022)"},{"issue":"4","key":"4088_CR21","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1002\/sres.2712","volume":"37","author":"Y Xie","year":"2020","unstructured":"Xie, Y., Yin, Y., Xue, W., Shi, H., Chong, D.: Intelligent supply chain performance measurement in industry 4.0. Syst. Res. Behav. Sci. 37(4), 711\u2013718 (2020)","journal-title":"Syst. Res. Behav. Sci."},{"issue":"9","key":"4088_CR22","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1016\/j.future.2018.04.051","volume":"86","author":"Mohamed Abdel-Basset","year":"2018","unstructured":"Abdel-Basset, Mohamed, Gunasekaran Manogaran, and Mai Mohamed. \u201cInternet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems.\u201d Future Gener. Comp. Sy. 86(9), 614\u2013628 (2018).","journal-title":"Future Gener. Comp. Sy."},{"key":"4088_CR23","first-page":"689","volume-title":"Token-based blockchain solutions for supply chain strategies Congress of the German Academic Association for Production Technology","author":"F Dietrich","year":"2020","unstructured":"Dietrich, F., Turgut, A., Palm, D., Louw, L.: Token-based blockchain solutions for supply chain strategies Congress of the German Academic Association for Production Technology, pp. 689\u2013698. Springer, New York (2020)"},{"key":"4088_CR24","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1016\/j.procir.2020.02.231","volume":"91","author":"M Al-Talib","year":"2020","unstructured":"Al-Talib, M., Melhem, W.Y., Anosike, A.I., Reyes, J.A.G., Nadeem, S.P., et al.: Achieving resilience in the supply chain by applying iot technology. Procedia Cirp 91, 752\u2013757 (2020)","journal-title":"Procedia Cirp"},{"key":"4088_CR25","doi-asserted-by":"publisher","unstructured":"W. Jiang, \u201cAn Intelligent Supply Chain Information Collaboration Model Based on Internet of Things and Big Data,\u201d in IEEE Access, 7, 58324\u201358335 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2913192","DOI":"10.1109\/ACCESS.2019.2913192"},{"key":"4088_CR26","doi-asserted-by":"crossref","unstructured":"Wang, Lixing, Yulin He, and Zhenning Wu. \u201cDesign of a blockchain-enabled traceability system framework for food supply chains.\u201d Foods 11(5), 744 (2022)","DOI":"10.3390\/foods11050744"},{"issue":"5","key":"4088_CR27","doi-asserted-by":"publisher","first-page":"852","DOI":"10.3390\/electronics9050852","volume":"9","author":"K Abbas","year":"2020","unstructured":"Abbas, K., Afaq, M., Ahmed Khan, T., Song, W.-C.: A blockchain and machine learning-based drug supply chain management and recommendation system for smart pharmaceutical industry. Electronics 9(5), 852 (2020)","journal-title":"Electronics"},{"key":"4088_CR28","doi-asserted-by":"publisher","unstructured":"Chen, S., Shi, R., Ren, Z., Yan, J., Shi, Y., Zhang, J.: A blockchain-based supply chain quality management framework. In: 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE), pp. 172\u2013176 (2017). doi: https:\/\/doi.org\/10.1109\/ICEBE.2017.34","DOI":"10.1109\/ICEBE.2017.34"},{"key":"4088_CR29","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1016\/j.cie.2019.06.042","volume":"135","author":"R Azzi","year":"2019","unstructured":"Azzi, R., Chamoun, R.K., Sokhn, M.: The power of a blockchain-based supply chain. Comput. Ind. Eng. 135, 582\u2013592 (2019). https:\/\/doi.org\/10.1016\/j.cie.2019.06.042","journal-title":"Comput. Ind. Eng."},{"key":"4088_CR30","doi-asserted-by":"crossref","unstructured":"Parizi, R.M., Homayoun, S., Yazdinejad, A., Dehghantanha, A., Choo, K.-K.R.: Integrating privacy enhancing techniques into blockchains using sidechains. In: 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE), pp. 1\u20134 (2019). IEEE","DOI":"10.1109\/CCECE.2019.8861821"},{"key":"4088_CR31","unstructured":"Scicchitano, F., Liguori, A., Guarascio, M., Ritacco, E., Manco, G.: A deep learning approach for detecting security attacks on blockchain. In: ITASEC, pp. 212\u2013222 (2020)"},{"key":"4088_CR32","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.neucom.2022.12.027","volume":"522","author":"A Yazdinejad","year":"2022","unstructured":"Yazdinejad, A., Dehghantanha, A., Parizi, R.M., Epiphaniou, G.: An optimized fuzzy deep learning model for data classification based on nsga-ii. Neurocomputing 522, 116\u2013128 (2022)","journal-title":"Neurocomputing"},{"key":"4088_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103801","volume":"144","author":"A Yazdinejad","year":"2023","unstructured":"Yazdinejad, A., Dehghantanha, A., Parizi, R.M., Srivastava, G., Karimipour, H.: Secure intelligent fuzzy blockchain framework: Effective threat detection in iot networks. Comput. Ind. 144, 103801 (2023). https:\/\/doi.org\/10.1016\/j.compind.2022.103801","journal-title":"Comput. Ind."},{"key":"4088_CR34","doi-asserted-by":"crossref","unstructured":"Al-E\u2019mari, S., Anbar, M., Sanjalawe, Y., Manickam, S.: A labeled transactions-based dataset on the ethereum network. In: International Conference on Advances in Cyber Security, pp. 61\u201379 (2020). Springer","DOI":"10.1007\/978-981-33-6835-4_5"},{"key":"4088_CR35","doi-asserted-by":"crossref","unstructured":"Komal\u00a0Kumar, N., Vigneswari, D.: A drug recommendation system for multi-disease in health care using machine learning. In: Advances in Communication and Computational Technology, pp. 1\u201312. Springer, (2021)","DOI":"10.1007\/978-981-15-5341-7_1"},{"key":"4088_CR36","doi-asserted-by":"crossref","unstructured":"Sayadi, S., Rejeb, S.B., Choukair, Z.: Anomaly detection model over blockchain electronic transactions. In: 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 895\u2013900 (2019). IEEE","DOI":"10.1109\/IWCMC.2019.8766765"}],"updated-by":[{"DOI":"10.1007\/s10586-023-04107-6","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T00:00:00Z","timestamp":1689724800000}}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04088-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-023-04088-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04088-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T20:14:27Z","timestamp":1697487267000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-023-04088-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,23]]},"references-count":36,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["4088"],"URL":"https:\/\/doi.org\/10.1007\/s10586-023-04088-6","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s10586-023-04107-6","asserted-by":"object"}]},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,23]]},"assertion":[{"value":"17 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2023","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s10586-023-04107-6","URL":"https:\/\/doi.org\/10.1007\/s10586-023-04107-6","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there are no conflicts of interest in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}