{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:01:49Z","timestamp":1773511309153,"version":"3.50.1"},"reference-count":110,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T00:00:00Z","timestamp":1758240000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T00:00:00Z","timestamp":1758240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100032397","name":"Atlantic Technological University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100032397","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>This work proposes a robust convergence-based approach that integrates blockchain and edge computing, supporting a proactive and adaptive secure-optimized framework to fortify security measures and mitigate unauthorized access in IoT systems. In the developed framework the blockchain technology enforces proactive security by ensuring data integrity, decentralized authentication, and resilient threat prevention. While the fusion of an Artificial Neural Network\u00a0(ANN) and Aquila Optimizer\u00a0(AO), enables the framework to enhance the accuracy of threat detection by fine-tuning parameters and optimizing the network\u2019s architecture. The ANN adeptly captures intricate patterns and features from input data, while the AO intelligently adjusts critical hyperparameters to foster swift convergence and achieve peak network performance. This integration empowers a robust and accurate security detection system, enabling effective identification of complex and multifaceted security threats. Through extensive experimental analyses, we validate the effectiveness of the proposed ANN-AO framework, demonstrating a reduction in latency by 587 ms, 1187 ms, 1079 ms, and 460 ms, while improving security detection by 17.00%, 41.00%, 11.00%, and 8.00%, when compared to cutting-edge security methods. Moreover, the results are further verified and validated through statistical and computational analyses.<\/jats:p>","DOI":"10.1007\/s10586-025-05518-3","type":"journal-article","created":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T17:02:10Z","timestamp":1758301330000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A blockchain-enabled edge computing framework leveraging artificial neural network and aquila optimization to enhance security and scalability of cloud-based IoT platforms"],"prefix":"10.1007","volume":"28","author":[{"given":"Mohamed A. G.","family":"Hazber","sequence":"first","affiliation":[]},{"given":"Abdulrahman","family":"Albarrak","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Altamimi","sequence":"additional","affiliation":[]},{"given":"Anandhavalli","family":"Muniasamy","sequence":"additional","affiliation":[]},{"given":"Asharul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Mohammed Altaf","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Khaled M.","family":"Alalayah","sequence":"additional","affiliation":[]},{"given":"Shahid","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Reyazur Rashid","family":"Irshad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,19]]},"reference":[{"key":"5518_CR1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.jii.2019.05.002","volume":"15","author":"W Viriyasitavat","year":"2019","unstructured":"Viriyasitavat, W., Anuphaptrirong, T., Hoonsopon, D.: When blockchain meets internet of things: Characteristics, challenges, and business opportunities. Journal of industrial information integration 15, 21\u201328 (2019)","journal-title":"Journal of industrial information integration"},{"issue":"5","key":"5518_CR2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MNET.011.1900536","volume":"34","author":"B Cao","year":"2020","unstructured":"Cao, B., Wang, X., Zhang, W., Song, H., Lv, Z.: A many-objective optimization model of industrial internet of things based on private blockchain. IEEE Network 34(5), 78\u201383 (2020)","journal-title":"IEEE Network"},{"issue":"12","key":"5518_CR3","doi-asserted-by":"crossref","first-page":"4618","DOI":"10.1002\/ett.4618","volume":"33","author":"S Mukherjee","year":"2022","unstructured":"Mukherjee, S., Gupta, S., Rawlley, O., Jain, S.: Leveraging big data analytics in 5g-enabled iot and industrial iot for the development of sustainable smart cities. Transactions on Emerging Telecommunications Technologies 33(12), 4618 (2022)","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"5","key":"5518_CR4","doi-asserted-by":"crossref","first-page":"3460","DOI":"10.1109\/TII.2020.2993586","volume":"17","author":"J Zheng","year":"2020","unstructured":"Zheng, J., Yang, T., Liu, H., Su, T.: Efficient data transmission strategy for iiots with arbitrary geometrical array. IEEE Transactions on Industrial Informatics 17(5), 3460\u20133468 (2020)","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"5518_CR5","doi-asserted-by":"crossref","DOI":"10.1016\/j.telpol.2020.102086","volume":"45","author":"W Lehr","year":"2021","unstructured":"Lehr, W., Queder, F., Haucap, J.: 5g: A new future for mobile network operators, or not? Telecommunications Policy 45(3), 102086 (2021)","journal-title":"Telecommunications Policy"},{"key":"5518_CR6","doi-asserted-by":"crossref","first-page":"957","DOI":"10.1109\/OJCOMS.2020.3010270","volume":"1","author":"MZ Chowdhury","year":"2020","unstructured":"Chowdhury, M.Z., Shahjalal, M., Ahmed, S., Jang, Y.M.: 6g wireless communication systems: Applications, requirements, technologies, challenges, and research directions. IEEE Open Journal of the Communications Society 1, 957\u2013975 (2020)","journal-title":"IEEE Open Journal of the Communications Society"},{"key":"5518_CR7","doi-asserted-by":"crossref","first-page":"1667","DOI":"10.1007\/s11277-020-07649-9","volume":"115","author":"PM Chanal","year":"2020","unstructured":"Chanal, P.M., Kakkasageri, M.S.: Security and privacy in iot: a survey. Wireless Personal Communications 115, 1667\u20131693 (2020)","journal-title":"Wireless Personal Communications"},{"key":"5518_CR8","unstructured":"Singh, R., Juneja, D.: Internet of things (iot): Applications, challenges and future scope. In: 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1\u20137 (2018). IEEE"},{"key":"5518_CR9","doi-asserted-by":"crossref","unstructured":"Naik, N.: Choice of effective messaging protocols for iot systems: Mqtt, coap, amqp and http. In: 2017 IEEE International Systems Engineering Symposium (ISSE), pp. 1\u20137 (2017). IEEE","DOI":"10.1109\/SysEng.2017.8088251"},{"issue":"6","key":"5518_CR10","doi-asserted-by":"crossref","first-page":"1094","DOI":"10.1016\/j.dcan.2022.03.013","volume":"8","author":"C Bay\u0131lm\u0131\u015f","year":"2022","unstructured":"Bay\u0131lm\u0131\u015f, C., Ebleme, M.A., \u00c7avu\u015fo\u011flu, \u00dc., K\u00fc\u00e7\u00fck, K., Sevin, A.: A survey on communication protocols and performance evaluations for internet of things. Digital Communications and Networks 8(6), 1094\u20131104 (2022)","journal-title":"Digital Communications and Networks"},{"key":"5518_CR11","doi-asserted-by":"crossref","first-page":"16693","DOI":"10.1109\/ACCESS.2017.2737528","volume":"5","author":"VY Li","year":"2017","unstructured":"Li, V.Y., Qiu, M., Huang, Z., Hou, Y.T., Lou, W.: Edge-assisted IoT: A novel paradigm for next generation IoT systems. IEEE Access 5, 16693\u201316702 (2017)","journal-title":"IEEE Access"},{"key":"5518_CR12","first-page":"12933","volume":"6","author":"S Liang","year":"2018","unstructured":"Liang, S., Lu, C., Zeng, Z., Xiong, Z., Li, M.: Toward adaptive security and privacy management for IoT-based medical emergency systems. IEEE Access 6, 12933\u201312941 (2018)","journal-title":"IEEE Access"},{"issue":"15","key":"5518_CR13","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: A survey. Computer networks 54(15), 2787\u20132805 (2010)","journal-title":"Computer networks"},{"issue":"4","key":"5518_CR14","doi-asserted-by":"crossref","first-page":"2341","DOI":"10.1109\/TWC.2020.3041471","volume":"20","author":"B Liang","year":"2020","unstructured":"Liang, B., Liu, X., Zhou, H., Leung, V.C.M., Liu, A., Chi, K.: Channel resource scheduling for stringent demand of emergency data transmission in wbans. IEEE Transactions on Wireless Communications 20(4), 2341\u20132352 (2020)","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"5","key":"5518_CR15","doi-asserted-by":"crossref","first-page":"4142","DOI":"10.1109\/JIOT.2018.2852003","volume":"5","author":"H Wang","year":"2018","unstructured":"Wang, H., Zhang, D., Huang, Z., Chen, H.: Data analytics of iot devices: A survey. IEEE Internet of Things Journal 5(5), 4142\u20134153 (2018)","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"5518_CR16","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"1","key":"5518_CR17","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MIC.2012.14","volume":"16","author":"K Ren","year":"2012","unstructured":"Ren, K., Li, Q., Lou, W., Zhang, Y.: Security challenges for the public cloud. IEEE Internet Computing 16(1), 69\u201373 (2012)","journal-title":"IEEE Internet Computing"},{"key":"5518_CR18","unstructured":"Al-Sakran, B.M., Vasilakos, A.V., Zhang, Y.: Internet of things (iot) security: Current status, challenges and prospective measures. In: Proceedings of the 2015 IEEE 4th International Conference on Cloud Networking (CloudNet), pp. 198\u2013203 (2015)"},{"issue":"5","key":"5518_CR19","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","volume":"80","author":"Y Sun","year":"2014","unstructured":"Sun, Y., Zhu, Q., Liu, M., Garg, S.: A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences 80(5), 973\u2013993 (2014)","journal-title":"Journal of Computer and System Sciences"},{"key":"5518_CR20","first-page":"261","volume":"95","author":"G Wang","year":"2019","unstructured":"Wang, G., Li, K., Wang, A., Yang, L., Zhang, M.: Mitigating dos attacks in sdn-based fog computing. Future Generation Computer Systems 95, 261\u2013271 (2019)","journal-title":"Future Generation Computer Systems"},{"issue":"10","key":"5518_CR21","doi-asserted-by":"crossref","first-page":"3669","DOI":"10.3390\/su10103669","volume":"10","author":"JI Hong","year":"2018","unstructured":"Hong, J.I., Jung, K.H., Han, W.J.: An insider threat detection model in cloud computing environments using multiple big data sources. Sustainability 10(10), 3669 (2018)","journal-title":"Sustainability"},{"issue":"6","key":"5518_CR22","first-page":"122","volume":"52","author":"X Li","year":"2020","unstructured":"Li, X., Zhao, Y., Li, J.: Fog computing for sustainable smart cities: A survey. ACM Computing Surveys (CSUR) 52(6), 122 (2020)","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"3","key":"5518_CR23","first-page":"1631","volume":"17","author":"Y Zhao","year":"2021","unstructured":"Zhao, Y., Liu, D., Li, P., Guo, C., Zheng, L.: Scalability analysis and deployment strategies for edge computing in industrial internet of things. IEEE Transactions on Industrial Informatics 17(3), 1631\u20131641 (2021)","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"5518_CR24","first-page":"973","volume":"78","author":"MM Hassan","year":"2018","unstructured":"Hassan, M.M., Alshamrani, M.H., Alamri, A.: A survey of techniques and challenges in securing iot systems for healthcare. Future Generation Computer Systems 78, 973\u2013984 (2018)","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"5518_CR25","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s11036-013-0489-0","volume":"19","author":"L Chen","year":"2014","unstructured":"Chen, L., Xu, S., Mao, M.: Big data: A survey. Mobile Networks and Applications 19(2), 171\u2013209 (2014)","journal-title":"Mobile Networks and Applications"},{"key":"5518_CR26","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","volume":"78","author":"R Roman","year":"2018","unstructured":"Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems 78, 680\u2013698 (2018)","journal-title":"Future Generation Computer Systems"},{"key":"5518_CR27","doi-asserted-by":"crossref","first-page":"5247","DOI":"10.1109\/ACCESS.2017.2689040","volume":"5","author":"A Razaque","year":"2017","unstructured":"Razaque, A., et al.: Fog computing architecture for big data analytics in iot environments. IEEE Access 5, 5247\u20135261 (2017)","journal-title":"IEEE Access"},{"issue":"10","key":"5518_CR28","doi-asserted-by":"crossref","first-page":"3377","DOI":"10.3390\/s18103377","volume":"18","author":"TM Fern\u00e1ndez-Caram\u00e9s","year":"2018","unstructured":"Fern\u00e1ndez-Caram\u00e9s, T.M., Fraga-Lamas, P.: A review on the security challenges in the iot framework: Security threats, privacy preserving, and security solutions. Sensors 18(10), 3377 (2018)","journal-title":"Sensors"},{"issue":"1","key":"5518_CR29","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MC.2017.9","volume":"50","author":"M Satyanarayanan","year":"2017","unstructured":"Satyanarayanan, M.: The emergence of edge computing. Computer 50(1), 30\u201339 (2017)","journal-title":"Computer"},{"key":"5518_CR30","first-page":"311","volume":"115","author":"M Elhoseny","year":"2021","unstructured":"Elhoseny, M., Ramadass, A., Krishnan, S., Muhammad, F.: Anomaly detection for internet of things using deep learning. Future Generation Computer Systems 115, 311\u2013322 (2021)","journal-title":"Future Generation Computer Systems"},{"issue":"4","key":"5518_CR31","first-page":"2873","volume":"20","author":"L Li","year":"2018","unstructured":"Li, L., Chen, X., Liang, X., Shen, X.S.: A survey on blockchain-based internet of things. IEEE Communications Surveys & Tutorials 20(4), 2873\u20132904 (2018)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"5518_CR32","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101335","volume":"28","author":"K Fiaz","year":"2024","unstructured":"Fiaz, K., Zeb, A., Hussain, S., Khurshid, K., Irshad, R.R., Alharby, M., Rahman, T., Alwayle, I.M., Pallonetto, F.: A two-phase blockchain-enabled framework for securing internet of medical things systems. Internet of Things 28, 101335 (2024)","journal-title":"Internet of Things"},{"key":"5518_CR33","doi-asserted-by":"crossref","unstructured":"Khan, I.A., Pi, D., Kamal, S., Alsuhaibani, M., Alshammari, B.M.: Federated-boosting: A distributed and dynamic boosting-powered cyber-attack detection scheme for security and privacy of consumer iot. IEEE Transactions on Consumer Electronics (2024)","DOI":"10.1109\/TCE.2024.3499942"},{"issue":"13","key":"5518_CR34","doi-asserted-by":"crossref","first-page":"11604","DOI":"10.1109\/JIOT.2021.3130156","volume":"9","author":"IA Khan","year":"2021","unstructured":"Khan, I.A., Moustafa, N., Pi, D., Sallam, K.M., Zomaya, A.Y., Li, B.: A new explainable deep learning framework for cyber threat discovery in industrial iot networks. IEEE Internet of Things Journal 9(13), 11604\u201311613 (2021)","journal-title":"IEEE Internet of Things Journal"},{"key":"5518_CR35","volume":"101","author":"IA Khan","year":"2024","unstructured":"Khan, I.A., Razzak, I., Pi, D., Khan, N., Hussain, Y., Li, B., Kousar, T.: Fed-inforce-fusion: A federated reinforcement-based fusion model for security and privacy protection of iomt networks against cyber-attacks. Information Fusion 101, 102002 (2024)","journal-title":"Information Fusion"},{"issue":"2","key":"5518_CR36","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1108\/IJICC-06-2021-0101","volume":"15","author":"S Kailasam","year":"2022","unstructured":"Kailasam, S., Achanta, S.D.M., Rama, Koteswara\u00a0Rao P., Vatambeti, R., Kayam, S.: An iot-based agriculture maintenance using pervasive computing with machine learning technique. International Journal of Intelligent Computing and Cybernetics 15(2), 184\u2013197 (2022)","journal-title":"International Journal of Intelligent Computing and Cybernetics"},{"issue":"1","key":"5518_CR37","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1007\/s10586-023-03970-7","volume":"27","author":"R Vatambeti","year":"2024","unstructured":"Vatambeti, R., Mantena, S.V., Kiran, K., Manohar, M., Manjunath, C.: Twitter sentiment analysis on online food services based on elephant herd optimization with hybrid deep learning technique. Cluster Computing 27(1), 655\u2013671 (2024)","journal-title":"Cluster Computing"},{"issue":"4","key":"5518_CR38","doi-asserted-by":"crossref","first-page":"2141","DOI":"10.1007\/s11277-020-07316-z","volume":"113","author":"R Vatambeti","year":"2020","unstructured":"Vatambeti, R.: A novel wolf based trust accumulation approach for preventing the malicious activities in mobile ad hoc network. Wireless Personal Communications 113(4), 2141\u20132166 (2020)","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"5518_CR39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11227-024-06558-z","volume":"81","author":"AA Khan","year":"2025","unstructured":"Khan, A.A., Laghari, A.A., Baqasah, A.M., Bacarra, R., Alroobaea, R., Alsafyani, M., Alsayaydeh, J.A.J.: Bdlt-iomt-a novel architecture: Svm machine learning for robust and secure data processing in internet of medical things with blockchain cybersecurity. The Journal of Supercomputing 81(1), 1\u201322 (2025)","journal-title":"The Journal of Supercomputing"},{"key":"5518_CR40","volume":"141","author":"AA Khan","year":"2025","unstructured":"Khan, A.A., Yang, J., Laghari, A.A., Baqasah, A.M., Alroobaea, R., Ku, C.S., Alizadehsani, R., Acharya, U.R., Por, L.Y.: Baiot-ems: Consortium network for small-medium enterprises management system with blockchain and augmented intelligence of things. Engineering Applications of Artificial Intelligence 141, 109838 (2025)","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"5518_CR41","first-page":"1933","volume":"10","author":"AA Khan","year":"2024","unstructured":"Khan, A.A., Laghari, A.A., Baqasah, A.M., Alroobaea, R., Almadhor, A., Sampedro, G.A., Kryvinska, N.: Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing. PeerJ Computer Science 10, 1933 (2024)","journal-title":"PeerJ Computer Science"},{"key":"5518_CR42","volume":"27","author":"AA Khan","year":"2024","unstructured":"Khan, A.A., Chen, Y.-L., Hajjej, F., Shaikh, A.A., Yang, J., Ku, C.S., Por, L.Y.: Digital forensics for the socio-cyber world (df-scw): A novel framework for deepfake multimedia investigation on social media platforms. Egyptian Informatics Journal 27, 100502 (2024)","journal-title":"Egyptian Informatics Journal"},{"key":"5518_CR43","unstructured":"Khan, A.A., Laghari, A.A., Baqasah, A.M., Alroobaea, R., Gadekallu, T.R., Sampedro, G.A., Zhu, Y.: Oran-b5g: a next generation open radio access network architecture with machine learning for beyond 5g in industrial 5.0. IEEE Transactions on Green Communications and Networking (2024)"},{"key":"5518_CR44","doi-asserted-by":"crossref","DOI":"10.4018\/979-8-3693-1168-4","volume":"118","author":"AA Khan","year":"2024","unstructured":"Khan, A.A., Dhabi, S., Yang, J., Alhakami, W., Bourouis, S., Yee, L.: B-lpoet: A middleware lightweight proof-of-elapsed time (poet) for efficient distributed transaction execution and security on blockchain using multithreading technology. Computers and Electrical Engineering 118, 109343 (2024)","journal-title":"Computers and Electrical Engineering"},{"key":"5518_CR45","doi-asserted-by":"crossref","unstructured":"Khan, A.A., Laghari, A.A., Alroobaea, R., Baqasah, A.M., Alsafyani, M., Bacarra, R., Alsayaydeh, J.A.J.: Secure remote sensing data with blockchain distributed ledger technology: a solution for smart cities. Ieee Access (2024)","DOI":"10.1109\/ACCESS.2024.3401591"},{"issue":"6","key":"5518_CR46","doi-asserted-by":"crossref","first-page":"4900","DOI":"10.1109\/JIOT.2018.2877690","volume":"5","author":"AK Das","year":"2018","unstructured":"Das, A.K., Wazid, M., Kumar, N., Vasilakos, A.V., Rodrigues, J.J.: Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment. IEEE Internet of Things Journal 5(6), 4900\u20134913 (2018)","journal-title":"IEEE Internet of Things Journal"},{"key":"5518_CR47","doi-asserted-by":"crossref","first-page":"26139","DOI":"10.1109\/ACCESS.2020.2971260","volume":"8","author":"X Qiu","year":"2020","unstructured":"Qiu, X., Dai, J., Hayes, M.A.: A learning approach for physical layer authentication using adaptive neural network. IEEE Access 8, 26139\u201326149 (2020)","journal-title":"IEEE Access"},{"issue":"1","key":"5518_CR48","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1007\/s12083-020-00973-8","volume":"14","author":"P Kumar","year":"2021","unstructured":"Kumar, P., Chouhan, L.: A secure authentication scheme for iot application in smart home. Peer-to-Peer Networking and Applications 14(1), 420\u2013438 (2021)","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"5518_CR49","doi-asserted-by":"crossref","first-page":"77880","DOI":"10.1109\/ACCESS.2023.3297957","volume":"11","author":"RR Irshad","year":"2023","unstructured":"Irshad, R.R., Hussain, S., Hussain, I., Alattab, A.A., Yousif, A., Alsaiari, O.A.S., Ibrahim, E.I.I.: A novel artificial spider monkey based random forest hybrid framework for monitoring and predictive diagnoses of patients healthcare. IEEE Access 11, 77880\u201377894 (2023)","journal-title":"IEEE Access"},{"issue":"9","key":"5518_CR50","doi-asserted-by":"crossref","first-page":"7727","DOI":"10.1109\/JIOT.2020.3040938","volume":"8","author":"J Srinivas","year":"2020","unstructured":"Srinivas, J., Das, A.K., Wazid, M., Vasilakos, A.V.: Designing secure user authentication protocol for big data collection in iot-based intelligent transportation system. IEEE Internet of Things Journal 8(9), 7727\u20137744 (2020)","journal-title":"IEEE Internet of Things Journal"},{"key":"5518_CR51","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.future.2020.11.010","volume":"116","author":"BD Deebak","year":"2021","unstructured":"Deebak, B.D., Fadi, A.T.: Lightweight authentication for iot\/cloud-based forensics in intelligent data computing. Future Generation Computer Systems 116, 406\u2013425 (2021)","journal-title":"Future Generation Computer Systems"},{"key":"5518_CR52","doi-asserted-by":"crossref","DOI":"10.1016\/j.apenergy.2023.121939","volume":"352","author":"S Hussain","year":"2023","unstructured":"Hussain, S., Irshad, R.R., Pallonetto, F., Hussain, I., Hussain, Z., Tahir, M., Abimannan, S., Shukla, S., Yousif, A., Kim, Y.-S., et al.: Hybrid coordination scheme based on fuzzy inference mechanism for residential charging of electric vehicles. Applied Energy 352, 121939 (2023)","journal-title":"Applied Energy"},{"key":"5518_CR53","doi-asserted-by":"crossref","first-page":"25917","DOI":"10.1109\/ACCESS.2024.3367445","volume":"12","author":"RR Irshad","year":"2024","unstructured":"Irshad, R.R., Hussain, Z., Hussain, I., Hussain, S., Asghar, E., Alwayle, I.M., Alalayah, K.M., Yousif, A., Ali, A.: Enhancing cloud-based inventory management: A hybrid blockchain approach with generative adversarial network and elliptic curve diffie helman techniques. IEEE Access 12, 25917\u201325932 (2024)","journal-title":"IEEE Access"},{"key":"5518_CR54","doi-asserted-by":"crossref","first-page":"135632","DOI":"10.1109\/ACCESS.2019.2941575","volume":"7","author":"BD Deebak","year":"2019","unstructured":"Deebak, B.D., Al-Turjman, F., Aloqaily, M., Alfandi, O.: An authentic-based privacy preservation protocol for smart e-healthcare systems in iot. IEEE Access 7, 135632\u2013135649 (2019)","journal-title":"IEEE Access"},{"issue":"8","key":"5518_CR55","doi-asserted-by":"crossref","first-page":"2453","DOI":"10.3390\/s24082453","volume":"24","author":"JK Kakar","year":"2024","unstructured":"Kakar, J.K., Hussain, S., Kim, S.C., Kim, H.: Timetector: A twin-branch approach for unsupervised anomaly detection in livestock sensor noisy data (tt-tbad). Sensors 24(8), 2453 (2024)","journal-title":"Sensors"},{"key":"5518_CR56","doi-asserted-by":"crossref","first-page":"14757","DOI":"10.1109\/ACCESS.2019.2893918","volume":"7","author":"Y Zhou","year":"2019","unstructured":"Zhou, Y., Liu, T., Tang, F., Tinashe, M.: An unlinkable authentication scheme for distributed iot application. IEEE Access 7, 14757\u201314766 (2019)","journal-title":"IEEE Access"},{"key":"5518_CR57","doi-asserted-by":"crossref","unstructured":"Gotarane, V., Abimannan, S., Hussain, S., Irshad, R.R.: A hybrid framework leveraging whale optimization and deep learning with trust-index for attack identification in iot networks. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3374691"},{"key":"5518_CR58","doi-asserted-by":"crossref","unstructured":"Mohanta, B.K., Sahoo, A., Patel, S., Panda, S.S., Jena, D., Gountia, D.: Decauth: Decentralized authentication scheme for iot device using ethereum blockchain. In: TENCON 2019-2019 IEEE Region 10 Conference (TENCON), pp. 558\u2013563 (2019). IEEE","DOI":"10.1109\/TENCON.2019.8929720"},{"key":"5518_CR59","doi-asserted-by":"crossref","first-page":"69282","DOI":"10.1109\/ACCESS.2023.3288815","volume":"11","author":"RR Irshad","year":"2023","unstructured":"Irshad, R.R., Hussain, S., Hussain, I., Ahmad, I., Yousif, A., Alwayle, I.M., Alattab, A.A., Alalayah, K.M., Breslin, J.G., Badr, M.M., et al.: An intelligent buffalo-based secure edge-enabled computing platform for heterogeneous iot network in smart cities. IEEE Access 11, 69282\u201369294 (2023)","journal-title":"IEEE Access"},{"issue":"2","key":"5518_CR60","doi-asserted-by":"crossref","first-page":"1371","DOI":"10.1109\/TCOMM.2018.2878025","volume":"67","author":"A Ferdowsi","year":"2018","unstructured":"Ferdowsi, A., Saad, W.: Deep learning for signal authentication and security in massive internet-of-things systems. IEEE Transactions on Communications 67(2), 1371\u20131387 (2018)","journal-title":"IEEE Transactions on Communications"},{"key":"5518_CR61","doi-asserted-by":"crossref","first-page":"113410","DOI":"10.1109\/ACCESS.2023.3265954","volume":"11","author":"RR Irshad","year":"2023","unstructured":"Irshad, R.R., Sohail, S.S., Hussain, S., Madsen, D.\u00d8., Ahmed, M.A., Alattab, A.A., Alsaiari, O.A.S., Norain, K.A.A., Ahmed, A.A.A.: A multi-objective bee foraging learning-based particle swarm optimization algorithm for enhancing the security of healthcare data in cloud system. IEEE Access 11, 113410\u2013113421 (2023)","journal-title":"IEEE Access"},{"issue":"6","key":"5518_CR62","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.3390\/electronics12061333","volume":"12","author":"\u00d6 Aslan","year":"2023","unstructured":"Aslan, \u00d6., Aktu\u011f, S.S., Ozkan-Okay, M., Yilmaz, A.A., Akin, E.: A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics 12(6), 1333 (2023)","journal-title":"Electronics"},{"key":"5518_CR63","doi-asserted-by":"crossref","unstructured":"Jimmy, F.: Cyber security vulnerabilities and remediation through cloud security tools. Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023 2(1), 129\u2013171 (2024)","DOI":"10.60087\/jaigs.v2i1.102"},{"key":"5518_CR64","doi-asserted-by":"crossref","first-page":"3655","DOI":"10.1007\/s00521-016-2317-5","volume":"28","author":"BB Gupta","year":"2017","unstructured":"Gupta, B.B., Badve, O.P.: Taxonomy of dos and ddos attacks and desirable defense mechanism in a cloud computing environment. Neural Computing and Applications 28, 3655\u20133682 (2017)","journal-title":"Neural Computing and Applications"},{"issue":"13","key":"5518_CR65","doi-asserted-by":"crossref","first-page":"4685","DOI":"10.3390\/s22134685","volume":"22","author":"TH Aldhyani","year":"2022","unstructured":"Aldhyani, T.H., Alkahtani, H.: Artificial intelligence algorithm-based economic denial of sustainability attack detection systems: Cloud computing environments. Sensors 22(13), 4685 (2022)","journal-title":"Sensors"},{"key":"5518_CR66","doi-asserted-by":"crossref","unstructured":"Inayat, U., Farzan, M., Mahmood, S., Zia, M.F., Hussain, S., Pallonetto, F.: Insider threat mitigation: Systematic literature review. Ain Shams Engineering Journal, 103068 (2024)","DOI":"10.1016\/j.asej.2024.103068"},{"issue":"7","key":"5518_CR67","doi-asserted-by":"crossref","first-page":"9078","DOI":"10.1109\/TITS.2021.3090361","volume":"23","author":"C Zhao","year":"2021","unstructured":"Zhao, C., Gill, J.S., Pisu, P., Comert, G.: Detection of false data injection attack in connected and automated vehicles via cloud-based sandboxing. IEEE Transactions on Intelligent Transportation Systems 23(7), 9078\u20139088 (2021)","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"10","key":"5518_CR68","doi-asserted-by":"crossref","first-page":"7639","DOI":"10.1109\/JIOT.2021.3138073","volume":"9","author":"MT Ahvanooey","year":"2021","unstructured":"Ahvanooey, M.T., Zhu, M.X., Li, Q., Mazurczyk, W., Choo, K.-K.R., Gupta, B.B., Conti, M.: Modern authentication schemes in smartphones and iot devices: An empirical survey. IEEE Internet of Things Journal 9(10), 7639\u20137663 (2021)","journal-title":"IEEE Internet of Things Journal"},{"key":"5518_CR69","unstructured":"Sharif, M.H.U.: Web attacks analysis and mitigation techniques. International Journal of Engineering Research & Technology (IJERT), 10\u201312 (2022)"},{"issue":"2","key":"5518_CR70","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1109\/TIFS.2011.2169958","volume":"7","author":"H-M Sun","year":"2011","unstructured":"Sun, H.-M., Chen, Y.-H., Lin, Y.-H.: opass: A user authentication protocol resistant to password stealing and password reuse attacks. IEEE transactions on information forensics and security 7(2), 651\u2013663 (2011)","journal-title":"IEEE transactions on information forensics and security"},{"key":"5518_CR71","doi-asserted-by":"crossref","unstructured":"Nguyen, T., Nguyen, H., Gia, T.N.: Exploring the integration of edge computing and blockchain iot: Principles, architectures, security, and applications. Journal of Network and Computer Applications, 103884 (2024)","DOI":"10.1016\/j.jnca.2024.103884"},{"key":"5518_CR72","doi-asserted-by":"crossref","unstructured":"Mishra, R., Kshetri, N., Jha, S.K.: Leveraging blockchain technology for making secure iot networks. In: Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures, pp. 17\u201333. CRC Press, (2025)","DOI":"10.1201\/9781003449515-2"},{"issue":"10","key":"5518_CR73","doi-asserted-by":"crossref","first-page":"10200","DOI":"10.1109\/JIOT.2020.2987070","volume":"7","author":"LU Khan","year":"2020","unstructured":"Khan, L.U., Yaqoob, I., Tran, N.H., Kazmi, S.A., Dang, T.N., Hong, C.S.: Edge-computing-enabled smart cities: A comprehensive survey. IEEE Internet of Things journal 7(10), 10200\u201310232 (2020)","journal-title":"IEEE Internet of Things journal"},{"key":"5518_CR74","volume-title":"Blockchain: Blueprint for a New Economy","author":"M Swan","year":"2015","unstructured":"Swan, M.: Blockchain: Blueprint for a New Economy. O\u2019Reilly Media (2015)"},{"key":"5518_CR75","unstructured":"Tapscott, D., Tapscott, A.: Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World. Penguin, (2016)"},{"key":"5518_CR76","volume-title":"The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology","author":"W Mougayar","year":"2016","unstructured":"Mougayar, W.: The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology. Wiley (2016)"},{"key":"5518_CR77","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Xie, S., Dai, H.-N., Chen, X., Wang, H.: An overview of blockchain technology: Architecture, consensus, and future trends. In: IEEE International Congress on Big Data (BigData Congress), pp. 557\u2013564 (2017)","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"5518_CR78","volume-title":"Mastering Bitcoin: Unlocking Digital Cryptocurrencies","author":"AM Antonopoulos","year":"2018","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O\u2019Reilly Media (2018)"},{"issue":"3","key":"5518_CR79","first-page":"654","volume":"13","author":"C Ren","year":"2018","unstructured":"Ren, C., Liu, Y., Zhu, H., Zhang, Y., Yang, L.T.: Proof of activity: Extending bitcoin\u2019s proof of work via proof of stake. IEEE Transactions on Information Forensics and Security 13(3), 654\u2013667 (2018)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"5","key":"5518_CR80","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: Vision and challenges. IEEE Internet of Things Journal 3(5), 637\u2013646 (2016)","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"5518_CR81","doi-asserted-by":"crossref","first-page":"2322","DOI":"10.1109\/COMST.2017.2745201","volume":"19","author":"Y Mao","year":"2017","unstructured":"Mao, Y., You, C., Zhang, J., Huang, K., Letaief, K.B.: A survey on mobile edge computing: The communication perspective. IEEE Communications Surveys & Tutorials 19(4), 2322\u20132358 (2017)","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"1","key":"5518_CR82","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MC.2017.9","volume":"50","author":"M Satyanarayanan","year":"2017","unstructured":"Satyanarayanan, M.: The emergence of edge computing. IEEE Computer 50(1), 30\u201339 (2017)","journal-title":"IEEE Computer"},{"issue":"6","key":"5518_CR83","first-page":"184","volume":"33","author":"B Lin","year":"2019","unstructured":"Lin, B., Shen, X.S., Niu, J., Wang, S.: Blockchain for decentralized edge computing: A survey, use cases, and challenges. IEEE Network 33(6), 184\u2013192 (2019)","journal-title":"IEEE Network"},{"issue":"4","key":"5518_CR84","first-page":"2592","volume":"17","author":"L Zeng","year":"2020","unstructured":"Zeng, L., Fan, P., Liang, D., Zhang, J., Guan, X.: Blockchain meets edge computing: A decentralized solution for privacy-preserving data sharing in industrial iot. IEEE Transactions on Industrial Informatics 17(4), 2592\u20132602 (2020)","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"5518_CR85","first-page":"167237","volume":"8","author":"K Abouelmehdi","year":"2020","unstructured":"Abouelmehdi, K., Beni-Hessane, A., Khaloufi, H.: Blockchain-based edge computing: A systematic literature review, taxonomy, and open challenges. IEEE Access 8, 167237\u2013167259 (2020)","journal-title":"IEEE Access"},{"key":"5518_CR86","doi-asserted-by":"crossref","DOI":"10.1016\/j.sintl.2024.100297","volume":"6","author":"YK Saheed","year":"2025","unstructured":"Saheed, Y.K., Omole, A.I., Sabit, M.O.: Ga-madam-iiot: A new lightweight threats detection in the industrial iot via genetic algorithm with attention mechanism and lstm on multivariate time series sensor data. Sensors International 6, 100297 (2025)","journal-title":"Sensors International"},{"key":"5518_CR87","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.111434","volume":"155","author":"YK Saheed","year":"2024","unstructured":"Saheed, Y.K., Abdulganiyu, O.H., Tchakoucht, T.A.: Modified genetic algorithm and fine-tuned long short-term memory network for intrusion detection in the internet of things networks with edge capabilities. Applied Soft Computing 155, 111434 (2024)","journal-title":"Applied Soft Computing"},{"issue":"1","key":"5518_CR88","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11227-024-06552-5","volume":"81","author":"OH Abdulganiyu","year":"2025","unstructured":"Abdulganiyu, O.H., Tchakoucht, T.A., Saheed, Y.K., Ahmed, H.A.: Xidintfl-vae: Xgboost-based intrusion detection of imbalance network traffic via class-wise focal loss variational autoencoder. The Journal of Supercomputing 81(1), 1\u201338 (2025)","journal-title":"The Journal of Supercomputing"},{"key":"5518_CR89","doi-asserted-by":"crossref","DOI":"10.1016\/j.rineng.2024.103171","volume":"24","author":"YK Saheed","year":"2024","unstructured":"Saheed, Y.K., Chukwuere, J.E.: Xaiensembletl-iov: A new explainable artificial intelligence ensemble transfer learning for zero-day botnet attack detection in the internet of vehicles. Results in Engineering 24, 103171 (2024)","journal-title":"Results in Engineering"},{"key":"5518_CR90","doi-asserted-by":"crossref","unstructured":"Obayya, M., Haj\u00a0Hassine, S.B., Alazwari, S., K.\u00a0Nour, M., Mohamed, A., Motwakel, A., Yaseen, I., Sarwar\u00a0Zamani, A., Abdelmageed, A.A., Mohammed, G.P.: Aquila optimizer with bayesian neural network for breast cancer detection on ultrasound images. Applied Sciences 12(17), 8679 (2022)","DOI":"10.3390\/app12178679"},{"key":"5518_CR91","unstructured":"Fister\u00a0Jr, I., Yang, X.-S., Brest, J., Fister, D.: A brief review of nature-inspired algorithms for optimization. arXiv preprint arXiv:1708.07929 (2017)"},{"issue":"11","key":"5518_CR92","first-page":"6581","volume":"31","author":"S Salcedo-Sanz","year":"2019","unstructured":"Salcedo-Sanz, S., Del Ser, J., Landa-Torres, I., Gil-L\u00f3pez, S., Portilla-Figueras, A.: Nature-inspired optimization algorithms: A comprehensive review. Neural Computing and Applications 31(11), 6581\u20136609 (2019)","journal-title":"Neural Computing and Applications"},{"issue":"9","key":"5518_CR93","doi-asserted-by":"crossref","first-page":"3449","DOI":"10.3390\/s22093449","volume":"22","author":"NR Pradhan","year":"2022","unstructured":"Pradhan, N.R., Singh, A.P., Verma, S., Kavita, Kaur N., Roy, D.S., Shafi, J., Wozniak, M., Ijaz, M.F.: A novel blockchain-based healthcare system design and performance benchmarking on a multi-hosted testbed. Sensors 22(9), 3449 (2022)","journal-title":"Sensors"},{"key":"5518_CR94","doi-asserted-by":"crossref","unstructured":"Foschini, L., Gavagna, A., Martuscelli, G., Montanari, R.: Hyperledger fabric blockchain: Chaincode performance analysis. In: ICC 2020-2020 IEEE International Conference on Communications (ICC), pp. 1\u20136 (2020). IEEE","DOI":"10.1109\/ICC40277.2020.9149080"},{"key":"5518_CR95","doi-asserted-by":"crossref","unstructured":"Wutthikarn, R., Hui, Y.G.: Prototype of blockchain in dental care service application based on hyperledger composer in hyperledger fabric framework. In: 2018 22nd International Computer Science and Engineering Conference (ICSEC), pp. 1\u20134 (2018). IEEE","DOI":"10.1109\/ICSEC.2018.8712639"},{"issue":"4","key":"5518_CR96","doi-asserted-by":"crossref","first-page":"467","DOI":"10.3390\/electronics8040467","volume":"8","author":"L Hang","year":"2019","unstructured":"Hang, L., Choi, E., Kim, D.-H.: A novel emr integrity management based on a medical blockchain platform in hospital. Electronics 8(4), 467 (2019)","journal-title":"Electronics"},{"key":"5518_CR97","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Keshky, M., Debiez, E., Janicke, H.: Federated ton_iot windows datasets for evaluating ai-based security applications. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 848\u2013855 (2020). IEEE","DOI":"10.1109\/TrustCom50675.2020.00114"},{"key":"5518_CR98","doi-asserted-by":"crossref","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag, M.A., Friha, O., Hamouda, D., Maglaras, L., Janicke, H.: Edge-iiotset: A new comprehensive realistic cyber security dataset of iot and iiot applications for centralized and federated learning. IEEE Access 10, 40281\u201340306 (2022)","journal-title":"IEEE Access"},{"key":"5518_CR99","doi-asserted-by":"crossref","DOI":"10.3389\/fcomp.2023.997159","volume":"5","author":"YK Saheed","year":"2023","unstructured":"Saheed, Y.K., Usman, A.A., Sukat, F.D., Abdulrahman, M.: A novel hybrid autoencoder and modified particle swarm optimization feature selection for intrusion detection in the internet of things network. Frontiers in Computer Science 5, 997159 (2023)","journal-title":"Frontiers in Computer Science"},{"key":"5518_CR100","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3389\/fevo.2020.00035","volume":"8","author":"SR Lele","year":"2020","unstructured":"Lele, S.R.: How should we quantify uncertainty in statistical inference? Frontiers in Ecology and Evolution 8, 35 (2020)","journal-title":"Frontiers in Ecology and Evolution"},{"issue":"6","key":"5518_CR101","first-page":"125","volume":"14","author":"A Vasilopoulos","year":"2019","unstructured":"Vasilopoulos, A.: Non-parametric statistics: A set of statistical techniques to compare two or more independent populations. Journal of Strategic Innovation and Sustainability 14(6), 125\u2013140 (2019)","journal-title":"Journal of Strategic Innovation and Sustainability"},{"issue":"1","key":"5518_CR102","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1186\/s40537-023-00873-7","volume":"11","author":"M Aslam","year":"2024","unstructured":"Aslam, M.: Analysis of imprecise measurement data utilizing z-test for correlation. Journal of Big Data 11(1), 4 (2024)","journal-title":"Journal of Big Data"},{"key":"5518_CR103","doi-asserted-by":"crossref","first-page":"25623","DOI":"10.1109\/ACCESS.2024.3367357","volume":"12","author":"MF Saiyed","year":"2024","unstructured":"Saiyed, M.F., Al-Anbagi, I.: A genetic algorithm-and t-test-based system for ddos attack detection in iot networks. IEEE Access 12, 25623\u201325641 (2024)","journal-title":"IEEE Access"},{"key":"5518_CR104","doi-asserted-by":"crossref","unstructured":"Twisk, J.W.: The analysis of a dichotomous outcome variable. In: Basic Principles of Applied Medical Statistics: A Practical Guide, pp. 87\u2013132. Springer, (2025)","DOI":"10.1007\/978-3-031-86278-6_5"},{"key":"5518_CR105","volume":"183","author":"M Tahir","year":"2024","unstructured":"Tahir, M., Hussain, S., Alarfaj, F.K.: An integrated multi-model framework utilizing convolutional neural networks coupled with feature extraction for identification of 4mc sites in dna sequences. Computers in Biology and Medicine 183, 109281 (2024)","journal-title":"Computers in Biology and Medicine"},{"key":"5518_CR106","volume":"308","author":"S Hussain","year":"2024","unstructured":"Hussain, S., Teni, A.P., Hussain, I., Hussain, Z., Pallonetto, F., Eichman, J., Irshad, R.R., Alwayle, I.M., Alharby, M., Hussain, M.A., et al.: Enhancing electric vehicle charging efficiency at the aggregator level: A deep-weighted ensemble model for wholesale electricity price forecasting. Energy 308, 132823 (2024)","journal-title":"Energy"},{"key":"5518_CR107","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2022.105075","volume":"114","author":"S Zhao","year":"2022","unstructured":"Zhao, S., Zhang, T., Ma, S., Chen, M.: Dandelion optimizer: A nature-inspired metaheuristic algorithm for engineering applications. Engineering Applications of Artificial Intelligence 114, 105075 (2022)","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"10","key":"5518_CR108","doi-asserted-by":"crossref","first-page":"11833","DOI":"10.1007\/s10489-022-03994-3","volume":"53","author":"S Zhao","year":"2023","unstructured":"Zhao, S., Zhang, T., Ma, S., Wang, M.: Sea-horse optimizer: a novel nature-inspired meta-heuristic for global optimization problems. Applied Intelligence 53(10), 11833\u201311860 (2023)","journal-title":"Applied Intelligence"},{"key":"5518_CR109","doi-asserted-by":"crossref","unstructured":"Gu, X., Zheng, L., Yang, H., Liu, S., Cui, Z.: Oc-detector: Detecting smart contract vulnerabilities based on clustering opcode instructions. International Journal of Software Engineering and Knowledge Engineering 33(11n12), 1673\u20131700 (2023)","DOI":"10.1142\/S0218194023410061"},{"issue":"4","key":"5518_CR110","doi-asserted-by":"crossref","first-page":"2958","DOI":"10.1109\/TNSE.2020.3043262","volume":"8","author":"R Gupta","year":"2020","unstructured":"Gupta, R., Shukla, A., Tanwar, S.: Bats: A blockchain and ai-empowered drone-assisted telesurgery system towards 6g. IEEE Transactions on Network Science and Engineering 8(4), 2958\u20132967 (2020)","journal-title":"IEEE Transactions on Network Science and Engineering"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05518-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05518-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05518-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:18:45Z","timestamp":1762874325000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05518-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,19]]},"references-count":110,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["5518"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05518-3","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,19]]},"assertion":[{"value":"3 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest related to this study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"816"}}