{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T17:06:30Z","timestamp":1775495190818,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T00:00:00Z","timestamp":1698883200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T00:00:00Z","timestamp":1698883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17576-z","type":"journal-article","created":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T05:07:00Z","timestamp":1698901620000},"page":"48119-48140","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Intrusion detection in cyber-physical system using rsa blockchain technology"],"prefix":"10.1007","volume":"83","author":[{"given":"Ahmed","family":"Aljabri","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7511-1221","authenticated-orcid":false,"given":"Farah","family":"Jemili","sequence":"additional","affiliation":[]},{"given":"Ouajdi","family":"Korbaa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,2]]},"reference":[{"issue":"3","key":"17576_CR1","doi-asserted-by":"publisher","first-page":"1959","DOI":"10.3390\/app13031959","volume":"13","author":"R Khan","year":"2023","unstructured":"Khan R, Mehmood A, Iqbal Z, Maple C, Epiphaniou G (2023) Security and privacy in connected vehicle cyber-physical system using zero-knowledge succinct non-interactive argument of knowledge over blockchain. Appl Sci 13(3):1959","journal-title":"Appl Sci"},{"key":"17576_CR2","doi-asserted-by":"crossref","unstructured":"Kariri E (2022) IoT powered agricultural cyber-physical system: Security issue assessment. IETE J Res 1\u201311","DOI":"10.1080\/03772063.2022.2032848"},{"key":"17576_CR3","doi-asserted-by":"crossref","unstructured":"Lakhan A, Mohammed MA, Nedoma J, Martinek R, Tiwari P, Kumar N (2022) Blockchain-Enabled cybersecurity efficient iioht cyber-physical system for medical applications. IEEE Trans Network Sci Eng","DOI":"10.1109\/TNSE.2022.3213651"},{"key":"17576_CR4","doi-asserted-by":"crossref","unstructured":"Khalil AA, Franco J, Parvez I, Uluagac S, Shahriar H, Rahman MA (2022). A literature review on blockchain-enabled security and operation of cyber-physical systems. In: 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (1774\u20131779). IEEE","DOI":"10.1109\/COMPSAC54236.2022.00282"},{"issue":"3","key":"17576_CR5","first-page":"261","volume":"10","author":"R Almajed","year":"2022","unstructured":"Almajed R, Ibrahim A, Abualkishik AZ, Mourad N, Almansour FA (2022) Using machine learning algorithm for detection of cyber-attacks in cyber-physical systems. Period Eng Nat Sci 10(3):261\u2013275","journal-title":"Period Eng Nat Sci"},{"key":"17576_CR6","doi-asserted-by":"crossref","unstructured":"Evsutin O, Melman A, Abd El-Latif AA (2022) Overview of information hiding algorithms for ensuring security in IoT-based cyber-physical systems. Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions, 81\u2013115","DOI":"10.1007\/978-3-030-85428-7_5"},{"key":"17576_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6644652","volume":"2021","author":"N Yuvaraj","year":"2021","unstructured":"Yuvaraj N, Srihari K, Dhiman G, Somasundaram K, Sharma A, Rajeskannan SMGSMA, Masud M (2021) Nature-inspired-based approach for automated cyberbullying classification on multimedia social networking. Math Probl Eng 2021:1\u201312","journal-title":"Math Probl Eng"},{"key":"17576_CR8","doi-asserted-by":"crossref","unstructured":"Trivedi RS, Patel SJ (2022) Security and privacy aspects in the internet of things (IoT) and cyber-physical systems (CPS). In: Handbook of Research of Internet of Things and Cyber-Physical Systems (453\u2013490). Apple Academic Press","DOI":"10.1201\/9781003277323-23"},{"key":"17576_CR9","doi-asserted-by":"publisher","first-page":"169142","DOI":"10.1109\/ACCESS.2019.2948266","volume":"7","author":"MJJ Ghrabat","year":"2019","unstructured":"Ghrabat MJJ, Ma G, Abduljabbar ZA, Al Sibahee MA, Jassim SJ (2019) Greedy learning of deep boltzmann machine (GDBM)\u2019s variance and search algorithm for efficient image retrieval. IEEE Access 7:169142\u2013169159","journal-title":"IEEE Access"},{"key":"17576_CR10","doi-asserted-by":"crossref","unstructured":"Hannah S, Deepa AJ, Chooralil VS, BrillySangeetha S, Arshad Raja R, Alene A (2022) Blockchain-based deep learning to process IoT data acquisition in cognitive data. BioMed Res Int 2022","DOI":"10.1155\/2022\/5038851"},{"key":"17576_CR11","doi-asserted-by":"publisher","first-page":"107186","DOI":"10.1016\/j.compeleceng.2021.107186","volume":"92","author":"V Chang","year":"2021","unstructured":"Chang V, Gobinathan B, Pinagapani A, Kannan S, Dhiman G, Rajan AR (2021) Automatic detection of cyberbullying using multi-feature-based artificial intelligence with deep decision tree classification. Comput Electr Eng 92:107186","journal-title":"Comput Electr Eng"},{"key":"17576_CR12","doi-asserted-by":"crossref","unstructured":"Afanasev MY, Fedosov YV, Krylova AA, Shorokhov SA (2018). An application of blockchain and smart contracts for machine-to-machine communications in cyber-physical production systems In: 2018 IEEE Industrial Cyber-Physical Systems (ICPS) (13\u201319). IEEE","DOI":"10.1109\/ICPHYS.2018.8387630"},{"key":"17576_CR13","doi-asserted-by":"publisher","first-page":"41309","DOI":"10.1109\/ACCESS.2019.2907599","volume":"7","author":"P Lv","year":"2019","unstructured":"Lv P, Wang L, Zhu H, Deng W, Gu L (2019) An IoT-oriented privacy-preserving publish\/subscribe model over blockchains. IEEE Access 7:41309\u201341314","journal-title":"IEEE Access"},{"key":"17576_CR14","doi-asserted-by":"crossref","unstructured":"Koumidis K, Kolios P, Ellinas G, Panayiotou CG (2019) Secure event logging using a blockchain of heterogeneous computing resources. In\u00a02019 IEEE Global Communications Conference (GLOBECOM) (1\u20136). IEEE","DOI":"10.1109\/GLOBECOM38437.2019.9013452"},{"issue":"9","key":"17576_CR15","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MC.2020.2996212","volume":"53","author":"O Boucher","year":"2020","unstructured":"Boucher O, Aloqaily M, Tseng L, Boukerche A (2020) Blockchain and fog computing for cyber-physical systems: The case of smart industry. Computer 53(9):36\u201345","journal-title":"Computer"},{"issue":"11","key":"17576_CR16","doi-asserted-by":"publisher","first-page":"9294","DOI":"10.1109\/JIOT.2021.3057594","volume":"8","author":"D Wang","year":"2021","unstructured":"Wang D, Zhao N, Song B, Lin P, Yu FR (2021) Resource management for secure computation offloading in software cyber\u2013physical systems. IEEE Internet Things J 8(11):9294\u20139304","journal-title":"IEEE Internet Things J"},{"key":"17576_CR17","doi-asserted-by":"publisher","first-page":"12295","DOI":"10.1109\/ACCESS.2018.2799205","volume":"6","author":"Y Zhao","year":"2018","unstructured":"Zhao Y, Li Y, Mu Q, Yang B, Yu Y (2018) Secure pub-sub: Blockchain-based fair payment with a reputation for reliable cyber-physical systems. IEEE Access 6:12295\u201312303","journal-title":"IEEE Access"},{"key":"17576_CR18","doi-asserted-by":"crossref","unstructured":"Teslya N, Smirnov A (2018) Blockchain-based framework for ontology-oriented robots' coalition formation in cyber-physical systems. In MATEC Web of Conferences 161:03018. EDP Sciences.","DOI":"10.1051\/matecconf\/201816103018"},{"key":"17576_CR19","doi-asserted-by":"publisher","unstructured":"Tyagi AK, Sreenath N (2021) Cyber-physical systems: analyses, challenges and possible solutions, internet of things and cyber-physical systems. 1;22\u201333 ISSN 2667\u20133452, https:\/\/doi.org\/10.1016\/j.iotcps.2021.12.002","DOI":"10.1016\/j.iotcps.2021.12.002"},{"key":"17576_CR20","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1016\/j.procs.2020.01.059,ISSN1877-0509","volume":"165","author":"MM Nair","year":"2019","unstructured":"Nair MM, Tyagi AK, Goyal R (2019) Medical cyber-physical systems and its issues. Procedia Comput Sci 165:647\u2013655. https:\/\/doi.org\/10.1016\/j.procs.2020.01.059,ISSN1877-0509","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"17576_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.54623\/fue.fcij.6.1.1","volume":"6","author":"E Ahmed","year":"2021","unstructured":"Ahmed E (2021) Intelligent intrusion detection system based on deep learning algorithms. Future Comput Inf J 6(1):1\u201311","journal-title":"Future Comput Inf J"},{"key":"17576_CR22","doi-asserted-by":"crossref","first-page":"107137","DOI":"10.1016\/j.compeleceng.2021.107137","volume":"92","author":"S Jiang","year":"2021","unstructured":"Jiang S, Li Z, Yang M, Li Q, Li X, Zhao L (2021) An intrusion detection system based on GAN and LSTM for industrial IoT networks. Comput Electr Eng 92:107137","journal-title":"Comput Electr Eng"},{"key":"17576_CR23","first-page":"123372","volume":"9","author":"A Alhalafi","year":"2021","unstructured":"Alhalafi A, Alharthi N, Alabdulwahab A, Alshahrani A (2021) A Survey on Intrusion Detection Systems in Blockchain: Opportunities and Challenges. IEEE Access 9:123372\u2013123389","journal-title":"IEEE Access"},{"issue":"11","key":"17576_CR24","first-page":"7469","volume":"17","author":"Y Jia","year":"2021","unstructured":"Jia Y, Fan S, Xu J, Wang H (2021) Blockchain-based Intrusion Detection for Industrial Control Systems. IEEE Trans Industr Inf 17(11):7469\u20137478","journal-title":"IEEE Trans Industr Inf"},{"key":"17576_CR25","first-page":"122337","volume":"9","author":"T Ksiksi","year":"2021","unstructured":"Ksiksi T, Darwish A, Al-Mahasneh T, Gharaibeh A (2021) A lightweight blockchain-based intrusion detection system for industrial internet of things. IEEE Access 9:122337\u2013122348","journal-title":"IEEE Access"},{"key":"17576_CR26","first-page":"100866","volume":"61","author":"B Akay","year":"2021","unstructured":"Akay B, Karaboga D (2021) A comprehensive survey on differential evolution: algorithm, variants, and applications. Swarm Evol Comput 61:100866","journal-title":"Swarm Evol Comput"},{"key":"17576_CR27","first-page":"104202","volume":"105","author":"S Saleem","year":"2021","unstructured":"Saleem S, Saeed R, Shafique M, Riaz M (2021) A Hybrid differential evolution and modified harmony search algorithm for solving nonlinear optimization problems. Eng Appl Artif Intell 105:104202","journal-title":"Eng Appl Artif Intell"},{"key":"17576_CR28","doi-asserted-by":"crossref","unstructured":"Gontara S, Boufaied A, Korbaa O (2019) A unified approach for selecting probes and probing stations for fault detection and localization in computer networks. SMC 2071\u20132076","DOI":"10.1109\/SMC.2019.8914491"},{"key":"17576_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03769-y","author":"F Jemili","year":"2022","unstructured":"Jemili F (2022) Intelligent intrusion detection based on fuzzy big data classification. Cluster Comput. https:\/\/doi.org\/10.1007\/s10586-022-03769-y","journal-title":"Cluster Comput"},{"key":"17576_CR30","doi-asserted-by":"publisher","unstructured":"Zhang G, Chen X, Zhang L, Feng B, Guo X, Liang J, Zhang Y (2022) STAIBT: Blockchain and cp-abe empowered secure and trusted agricultural iot blockchain terminal. Int J Interact Multimed Artif Intell 7, issue Special Issue on Multimedia Streaming and Processing in Internet of Things with Edge Intelligence (5):66\u201375.\u00a0https:\/\/doi.org\/10.9781\/ijimai.2022.07.004","DOI":"10.9781\/ijimai.2022.07.004"},{"key":"17576_CR31","doi-asserted-by":"publisher","unstructured":"Zhu X, Deng H (2022) A security situation awareness approach for iot software chain based on markov game model. Int J Interact Multimed Artif Intell 7 issue Special Issue on Multimedia Streaming and Processing in Internet of Things with Edge Intelligence 5:59\u201365. https:\/\/doi.org\/10.9781\/ijimai.2022.08.002","DOI":"10.9781\/ijimai.2022.08.002"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17576-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17576-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17576-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T11:29:44Z","timestamp":1715081384000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17576-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,2]]},"references-count":31,"journal-issue":{"issue":"16","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["17576"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17576-z","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,2]]},"assertion":[{"value":"10 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}