{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T17:55:54Z","timestamp":1768586154418,"version":"3.49.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T00:00:00Z","timestamp":1737763200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T00:00:00Z","timestamp":1737763200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s12083-024-01838-0","type":"journal-article","created":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T06:40:55Z","timestamp":1737787255000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Strengthening security in IoT-based smart cities utilizing cycle-consistent generative adversarial networks for attack detection and secure data transmission"],"prefix":"10.1007","volume":"18","author":[{"given":"Agitha","family":"W","sequence":"first","affiliation":[]},{"given":"D. R. Denslin","family":"Brabin","sequence":"additional","affiliation":[]},{"given":"K. Kalai","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"T.","family":"Sunitha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,25]]},"reference":[{"issue":"12","key":"1838_CR1","doi-asserted-by":"publisher","first-page":"e4618","DOI":"10.1002\/ett.4618","volume":"33","author":"S Mukherjee","year":"2022","unstructured":"Mukherjee S, Gupta S, Rawlley O, Jain S (2022) Leveraging big data analytics in 5G-enabled IoT and industrial IoT for the development of sustainable smart cities. Trans Emerg Telecommun Technol 33(12):e4618","journal-title":"Trans Emerg Telecommun Technol"},{"key":"1838_CR2","doi-asserted-by":"publisher","first-page":"29696","DOI":"10.1109\/ACCESS.2021.3058528","volume":"9","author":"TT Huong","year":"2021","unstructured":"Huong TT, Bac TP, Long DM, Thang BD, Binh NT, Luong TD, Phuc TK (2021) Lockedge: low-complexity cyberattack detection in iot edge computing. IEEE Access 9:29696\u201329710","journal-title":"IEEE Access"},{"key":"1838_CR3","doi-asserted-by":"crossref","unstructured":"Ghosh S, Chandra V, Adhya A (2022) Machine Learning for Fog Computing-Based IoT Networks in Smart City Environment. In\u00a0Intelligent Internet of Things for Healthcare and Industry. Springer, Cham, pp 267\u2013285","DOI":"10.1007\/978-3-030-81473-1_13"},{"issue":"3","key":"1838_CR4","doi-asserted-by":"publisher","first-page":"2326","DOI":"10.1109\/TNSE.2021.3089435","volume":"8","author":"P Kumar","year":"2021","unstructured":"Kumar P, Kumar R, Srivastava G, Gupta GP, Tripathi R, Gadekallu TR, Xiong NN (2021) PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans Netw Sci Eng 8(3):2326\u20132341","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"9","key":"1838_CR5","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.3390\/electronics11091502","volume":"11","author":"U Inayat","year":"2022","unstructured":"Inayat U, Zia MF, Mahmood S, Khalid HM, Benbouzid M (2022) Learning-based methods for cyber attacks detection in IoT systems: a survey on methods, analysis, and future prospects. Electronics 11(9):1502","journal-title":"Electronics"},{"key":"1838_CR6","doi-asserted-by":"crossref","unstructured":"Khoa TV, Saputra YM, Hoang DT, Trung NL, Nguyen D, Ha NV, Dutkiewicz E (2020) Collaborative learning model for cyberattack detection systems in iot industry 4.0. In: 2020 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, pp 1\u20136","DOI":"10.1109\/WCNC45663.2020.9120761"},{"issue":"3","key":"1838_CR7","doi-asserted-by":"publisher","first-page":"1751","DOI":"10.1007\/s00034-021-01850-2","volume":"41","author":"FH Shajin","year":"2022","unstructured":"Shajin FH, Rajesh P, Raja MR (2022) An efficient VLSI architecture for fast motion estimation exploiting zero motion prejudgment technique and a new quadrant-based search algorithm in HEVC. Circuits Systems Signal Process 41(3):1751\u20131774","journal-title":"Circuits Systems Signal Process"},{"key":"1838_CR8","doi-asserted-by":"crossref","unstructured":"Shajin FH, Rajesh P, Nagoji Rao VK (2022) Efficient framework for brain tumour classification using hierarchical deep learning neural network classifier. Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, pp 1\u20138","DOI":"10.1080\/21681163.2022.2111719"},{"issue":"3","key":"1838_CR9","first-page":"5514","volume":"15","author":"P Rajesh","year":"2022","unstructured":"Rajesh P, Shajin FH, Kumaran GK (2022) An Efficient IWOLRS Control Technique of Brushless DC Motor for Torque Ripple Minimization. Appl Sci Eng Prog 15(3):5514\u20135514","journal-title":"Appl Sci Eng Prog"},{"key":"1838_CR10","doi-asserted-by":"publisher","first-page":"109442","DOI":"10.1016\/j.asoc.2022.109442","volume":"128","author":"P Rajesh","year":"2022","unstructured":"Rajesh P, Shajin FH, Kannayeram G (2022) A novel intelligent technique for energy management in smart home using internet of things. Appl Soft Comput 128:109442","journal-title":"Appl Soft Comput"},{"issue":"5","key":"1838_CR11","doi-asserted-by":"publisher","first-page":"e12753","DOI":"10.1111\/exsy.12753","volume":"39","author":"AB Haque","year":"2022","unstructured":"Haque AB, Bhushan B, Dhiman G (2022) Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends. Expert Syst 39(5):e12753","journal-title":"Expert Syst"},{"key":"1838_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8828591","volume":"2020","author":"B Alotaibi","year":"2020","unstructured":"Alotaibi B, Alotaibi M (2020) A stacked deep learning approach for IoT cyberattack detection. J Sens 2020:1","journal-title":"J Sens"},{"issue":"1","key":"1838_CR13","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1080\/23080477.2022.2117889","volume":"11","author":"MP Kantipudi","year":"2023","unstructured":"Kantipudi MP, Aluvalu R, Velamuri S (2023) An Intelligent Approach of Intrusion Detection in Mobile Crowd Sourcing Systems in the Context of IoT Based SMART City. Smart Science 11(1):234\u2013240","journal-title":"Smart Science"},{"key":"1838_CR14","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.ins.2023.03.052","volume":"634","author":"W Ding","year":"2023","unstructured":"Ding W, Abdel-Basset M, Mohamed R (2023) DeepAK-IoT: an effective deep learning model for cyberattack detection in IoT networks. Inf Sci 634:157\u2013171","journal-title":"Inf Sci"},{"key":"1838_CR15","doi-asserted-by":"publisher","first-page":"102783","DOI":"10.1016\/j.cose.2022.102783","volume":"120","author":"MM Rashid","year":"2022","unstructured":"Rashid MM, Kamruzzaman J, Hassan MM, Imam T, Wibowo S, Gordon S, Fortino G (2022) adversarial training for deep learning-based cyberattack detection in iot-based smart city applications. Comput Secur 120:102783","journal-title":"Comput Secur"},{"issue":"16","key":"1838_CR16","doi-asserted-by":"publisher","first-page":"9476","DOI":"10.3390\/app13169476","volume":"13","author":"M Alhanaya","year":"2023","unstructured":"Alhanaya M, Al-Shqeerat K (2023) Developing an integrated framework for securing internet of things traffic in smart cities using machine learning techniques. Appl Sci 13(16):9476","journal-title":"Appl Sci"},{"issue":"4","key":"1838_CR17","doi-asserted-by":"publisher","first-page":"929","DOI":"10.26599\/TST.2023.9010033","volume":"29","author":"C Hazman","year":"2024","unstructured":"Hazman C, Guezzaz A, Benkirane S, Azrour M (2024) Enhanced IDS with deep learning for IoT-based smart cities security. Tsinghua Science and Technology 29(4):929\u2013947","journal-title":"Tsinghua Science and Technology"},{"key":"1838_CR18","first-page":"3171334","volume":"1","author":"LH Al-Farhani","year":"2023","unstructured":"Al-Farhani LH, Alqahtani Y, Alshehri HA, Martin RJ, Lalar S (2023) Jain R (2023) IOT and blockchain-based cloud model for secure data transmission for smart city. Secur Commu Netw 1:3171334","journal-title":"Secur Commu Netw"},{"issue":"24","key":"1838_CR19","doi-asserted-by":"publisher","first-page":"9347","DOI":"10.3390\/ijerph17249347","volume":"17","author":"MM Rashid","year":"2020","unstructured":"Rashid MM, Kamruzzaman J, Hassan MM, Imam T, Gordon S (2020) Cyberattacks detection in iot-based smart city applications using machine learning techniques. Int J Environ Res Pub Health 17(24):9347","journal-title":"Int J Environ Res Pub Health"},{"issue":"2","key":"1838_CR20","first-page":"e4","volume":"7","author":"MN Chohan","year":"2023","unstructured":"Chohan MN, Haider U, Ayub MY, Shoukat H, Bhatia TK, Hassan MF (2023) Detection of cyber attacks using machine learning based intrusion detection system for IoT based smart cities. EAI Endorsed Trans Smart Cities 7(2):e4","journal-title":"EAI Endorsed Trans Smart Cities"},{"issue":"7","key":"1838_CR21","doi-asserted-by":"publisher","first-page":"6031","DOI":"10.3390\/su15076031","volume":"15","author":"D Prabakar","year":"2023","unstructured":"Prabakar D, Sundarrajan M, Manikandan R, Jhanjhi NZ, Masud M, Alqhatani A (2023) Energy Analysis-Based Cyber Attack Detection by IoT with Artificial Intelligence in a Sustainable Smart City. Sustainability 15(7):6031","journal-title":"Sustainability"},{"key":"1838_CR22","unstructured":"https:\/\/www.kaggle.com\/datasets\/hassan06\/nslkdd"},{"issue":"Suppl 4","key":"1838_CR23","doi-asserted-by":"publisher","first-page":"3025","DOI":"10.1007\/s00366-021-01438-z","volume":"38","author":"I Naruei","year":"2022","unstructured":"Naruei I, Keynia F (2022) Wild horse optimizer: a new meta-heuristic algorithm for solving engineering optimization problems. Eng Comput 38(Suppl 4):3025\u20133056. https:\/\/doi.org\/10.1007\/s00366-021-01438-z","journal-title":"Eng Comput"},{"issue":"9","key":"1838_CR24","doi-asserted-by":"publisher","first-page":"e4561","DOI":"10.1002\/ett.4561","volume":"33","author":"K Devi","year":"2022","unstructured":"Devi K, Muthusenthil B (2022) Intrusion detection framework for securing privacy attack in cloud computing environment using DCCGAN-RFOA. Trans Emerg Telecommun Technol 33(9):e4561","journal-title":"Trans Emerg Telecommun Technol"},{"key":"1838_CR25","doi-asserted-by":"publisher","first-page":"114685","DOI":"10.1016\/j.eswa.2021.114685","volume":"174","author":"MS Braik","year":"2021","unstructured":"Braik MS (2021) Chameleon swarm algorithm: A bio-inspired optimizer for solving engineering design problems. Expert Syst Appl 174:114685","journal-title":"Expert Syst Appl"},{"issue":"5","key":"1838_CR26","doi-asserted-by":"publisher","first-page":"e7552","DOI":"10.1002\/cpe.7552","volume":"35","author":"BC Preethi","year":"2023","unstructured":"Preethi BC, Sugitha G, Kavitha G (2023) Cycle-consistent generative adversarial network optimized with water strider optimization algorithm fostered intrusion detection framework for securing cloud computing environment. Concurr Comput: Pract Exp 35(5):e7552","journal-title":"Concurr Comput: Pract Exp"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01838-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01838-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01838-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:35:45Z","timestamp":1747474545000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01838-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,25]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1838"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01838-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,25]]},"assertion":[{"value":"6 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"79"}}