{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:26:44Z","timestamp":1771957604232,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T00:00:00Z","timestamp":1752883200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T00:00:00Z","timestamp":1752883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-02054-0","type":"journal-article","created":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T07:05:40Z","timestamp":1752908740000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cyber Attack Detection in Internet of Things using Verifiable Convolutional Neural Network based Blockchain technology"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1099-2336","authenticated-orcid":false,"given":"R.","family":"Deepa","sequence":"first","affiliation":[]},{"given":"Jayaraj","family":"Velusamy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1216-4403","authenticated-orcid":false,"given":"N. K.","family":"Sakthivel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3250-8680","authenticated-orcid":false,"given":"S.","family":"Subasree","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,19]]},"reference":[{"key":"2054_CR1","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.jpdc.2022.01.002","volume":"163","author":"S He","year":"2022","unstructured":"He S, Ficke E, Pritom MMA, Chen H, Tang Q, Chen Q, Pendleton M, Njilla L, Xu S (2022) Blockchain-based automated and robust cyber security management. J Parallel Distrib Comput 163:62\u201382","journal-title":"J Parallel Distrib Comput"},{"key":"2054_CR2","first-page":"102470","volume":"68","author":"V Schlatt","year":"2023","unstructured":"Schlatt V, Guggenberger T, Schmid J, Urbach N (2023) Attacking the trust machine: Developing an information systems research agenda for blockchain cybersecurity. Int J Inf Manage 68:102470","journal-title":"Int J Inf Manage"},{"issue":"1","key":"2054_CR3","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/MCE.2022.3141068","volume":"13","author":"A Hazra","year":"2022","unstructured":"Hazra A, Alkhayyat A, Adhikari M (2022) Blockchain for cybersecurity in edge networks. IEEE Consum Electron Mag 13(1):97\u2013102","journal-title":"IEEE Consum Electron Mag"},{"issue":"5","key":"2054_CR4","doi-asserted-by":"publisher","first-page":"2466","DOI":"10.1109\/TNSE.2022.3213651","volume":"10","author":"A Lakhan","year":"2022","unstructured":"Lakhan A, Mohammed MA, Nedoma J, Martinek R, Tiwari P, Kumar N (2022) Blockchain-enabled cybersecurity efficient IIOHT cyber-physical system for medical applications. IEEE Trans Network Sci Eng 10(5):2466\u20132479","journal-title":"IEEE Trans Network Sci Eng"},{"issue":"2","key":"2054_CR5","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1109\/RITA.2022.3166857","volume":"17","author":"YIL Lucio","year":"2022","unstructured":"Lucio YIL, Villalba KM, Donado SA (2022) Adaptive blockchain technology for a cybersecurity framework in IIoT. IEEE RevistaIberoamericana de Tecnologias del Aprendizaje 17(2):178\u2013184","journal-title":"IEEE RevistaIberoamericana de Tecnologias del Aprendizaje"},{"issue":"3","key":"2054_CR6","doi-asserted-by":"publisher","first-page":"e406","DOI":"10.1002\/itl2.406","volume":"6","author":"G Sharma","year":"2023","unstructured":"Sharma G, Sharma DK, Kumar A (2023) Role of cybersecurity and blockchain in battlefield of things. Internet Technol Lett 6(3):e406","journal-title":"Internet Technol Lett"},{"key":"2054_CR7","doi-asserted-by":"crossref","unstructured":"Tibrewal I, Srivastava M, Tyagi AK (2022) Blockchain technology for securing cyber-infrastructure and internet of things networks. Intelligent Interactive Multimedia Systems for e-Healthcare Applications, pp.337\u2013350","DOI":"10.1007\/978-981-16-6542-4_17"},{"key":"2054_CR8","doi-asserted-by":"crossref","unstructured":"El Bekkali A, Essaaidi M, Boulmalf M (2023) A blockchain-based architecture and framework for cybersecure smart cities. IEEE Access","DOI":"10.1109\/ACCESS.2023.3296482"},{"key":"2054_CR9","first-page":"682","volume":"51","author":"R Saxena","year":"2022","unstructured":"Saxena R, Gayathri E (2022) Cyber threat intelligence challenges: Leveraging blockchain intelligence with possible solution. Mater Today: Proc 51:682\u2013689","journal-title":"Mater Today: Proc"},{"key":"2054_CR10","doi-asserted-by":"crossref","unstructured":"Bhandari A, Cherukuri AK, Kamalov F (2023) Machine learning and blockchain integration for security applications. In Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence (pp. 129\u2013173). River Publishers","DOI":"10.1201\/9781003373384-8"},{"key":"2054_CR11","doi-asserted-by":"publisher","first-page":"114253","DOI":"10.1016\/j.dss.2024.114253","volume":"182","author":"K Zkik","year":"2024","unstructured":"Zkik K, Belhadi A, Kamble S, Venkatesh M, Oudani M, Sebbar A (2024) Cyber resilience framework for online retail using explainable deep learning approaches and blockchain-based consensus protocol. Decis Support Syst 182:114253","journal-title":"Decis Support Syst"},{"key":"2054_CR12","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.comcom.2021.09.029","volume":"181","author":"SA Latif","year":"2022","unstructured":"Latif SA, Wen FBX, Iwendi C, Li-Li FW, Mohsin SM, Han Z, Band SS (2022) AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems. Comput Commun 181:274\u2013283","journal-title":"Comput Commun"},{"issue":"2","key":"2054_CR13","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1007\/s00202-022-01688-0","volume":"106","author":"U Cali","year":"2024","unstructured":"Cali U, Kuzlu M, Sebastian-Cardenas DJ, Elma O, Pipattanasomporn M, Reddi R (2024) Cybersecure and scalable, token-based renewable energy certificate framework using blockchain-enabled trading platform. Electr Eng 106(2):1841\u20131852","journal-title":"Electr Eng"},{"key":"2054_CR14","doi-asserted-by":"crossref","unstructured":"Mounir S, Maleh Y (2023) Cybersecurity management in cyber-physical systems using blockchain. in computational intelligence for cybersecurity management and applications (pp. 209\u2013234). CRC Press","DOI":"10.1201\/9781003319917-14"},{"key":"2054_CR15","doi-asserted-by":"publisher","first-page":"102953","DOI":"10.1016\/j.cose.2022.102953","volume":"124","author":"X Liang","year":"2023","unstructured":"Liang X, Konstantinou C, Shetty S, Bandara E, Sun R (2023) Decentralizing cyber physical systems for resilience: An innovative case study from a cybersecurity perspective. Comput Secur 124:102953","journal-title":"Comput Secur"},{"key":"2054_CR16","doi-asserted-by":"publisher","first-page":"109604","DOI":"10.1016\/j.comnet.2023.109604","volume":"224","author":"T Jiang","year":"2023","unstructured":"Jiang T, Shen G, Guo C, Cui Y, Xie B (2023) BFLS: blockchain and federated learning for sharing threat detection models as cyber threat intelligence. Comput Netw 224:109604","journal-title":"Comput Netw"},{"issue":"5","key":"2054_CR17","doi-asserted-by":"publisher","first-page":"e13103","DOI":"10.1111\/exsy.13103","volume":"40","author":"T Moulahi","year":"2023","unstructured":"Moulahi T, Jabbar R, Alabdulatif A, Abbas S, El Khediri S, Zidi S, Rizwan M (2023) Privacy-preserving federated learning cyber-threat detection for intelligent transport systems with blockchain-based security. Expert Syst 40(5):e13103","journal-title":"Expert Syst"},{"key":"2054_CR18","doi-asserted-by":"crossref","unstructured":"Aliahmadi A, Nozari, January H (2023) Evaluation of security metrics in AIoT and blockchain-based supply chain by Neutrosophic decision-making method. In Supply chain forum: an International Journal 24(1) 31\u201342. Taylor & Francis","DOI":"10.1080\/16258312.2022.2101898"},{"issue":"1","key":"2054_CR19","first-page":"8542876","volume":"2022","author":"X Lu","year":"2022","unstructured":"Lu X, Wu Z (2022) ATM chain: blockchain-based security framework for cyber-physics system in air traffic management. Secur Commun Networks 2022(1):8542876","journal-title":"Secur Commun Networks"},{"issue":"2","key":"2054_CR20","doi-asserted-by":"publisher","first-page":"129","DOI":"10.5005\/jp-journals-10024-3472","volume":"24","author":"S Lampl","year":"2023","unstructured":"Lampl S, Gurunathan D, Krithikadatta J, Mehta D, Moodley D (2023) Reasons for failure of CAD\/CAM restorations in clinical studies: a systematic review and meta-analysis. J Contemp Dent Pract 24(2):129\u201336","journal-title":"J Contemp Dent Pract"},{"issue":"3","key":"2054_CR21","doi-asserted-by":"publisher","first-page":"242","DOI":"10.4103\/jioh.jioh_171_22","volume":"15","author":"S Acharya","year":"2023","unstructured":"Acharya S, Gurunathan D, Singh B (2023) Evolution of mineral trioxide aggregate in pediatric dentistry: a narrative review. J Int Oral Health 15(3):242\u2013249","journal-title":"J Int Oral Health"},{"issue":"4","key":"2054_CR22","doi-asserted-by":"publisher","first-page":"410","DOI":"10.4103\/ijdr.ijdr_1142_21","volume":"34","author":"L Govindaraju","year":"2023","unstructured":"Govindaraju L, Gurunathan D (2023) Comparison of the oral hygiene status in children with and without juvenile diabetes-a comparative study. Indian\u00a0J Dent Res\u00a034(4):410\u2013412","journal-title":"Indian Journal of Dental Research"},{"key":"2054_CR23","doi-asserted-by":"crossref","unstructured":"Tran MQ, Elsisi M, Liu MK, Vu VQ, Mahmoud K, Darwish MM, Abdelaziz AY, Lehtonen M (2022) Reliable deep learning and IoT-based monitoring system for secure computer numerical control machines against cyber-attacks with experimental verification. IEEE Access, 10, pp.23186\u201323197","DOI":"10.1109\/ACCESS.2022.3153471"},{"key":"2054_CR24","doi-asserted-by":"publisher","first-page":"111921","DOI":"10.1016\/j.solener.2023.111921","volume":"263","author":"P Kumar","year":"2023","unstructured":"Kumar P, Kumar R, Aljuhani A, Javeed D, Jolfaei A, Islam AN (2023) Digital twin-driven SDN for smart grid: s deep learning integrated blockchain for cybersecurity. Sol Energy 263:111921","journal-title":"Sol Energy"},{"key":"2054_CR25","doi-asserted-by":"publisher","first-page":"107612","DOI":"10.1016\/j.engappai.2023.107612","volume":"129","author":"MA Mohammed","year":"2024","unstructured":"Mohammed MA, Lakhan A, Zebari DA, AbdGhani MK, Marhoon HA, Abdulkareem KH, Nedoma J, Martinek R (2024) Securing healthcare data in industrial cyber-physical systems using combining deep learning and blockchain technology. Eng Appl Artif Intell 129:107612","journal-title":"Eng Appl Artif Intell"},{"issue":"5","key":"2054_CR26","doi-asserted-by":"publisher","first-page":"2802","DOI":"10.1109\/TNSE.2022.3191601","volume":"10","author":"P Kumar","year":"2022","unstructured":"Kumar P, Kumar R, Kumar A, Franklin AA, Garg S, Singh S (2022) Blockchain and deep learning for secure communication in digital twin empowered industrial IoT network. IEEE Trans Network Sci Eng 10(5):2802\u20132813","journal-title":"IEEE Trans Network Sci Eng"},{"key":"2054_CR27","doi-asserted-by":"publisher","first-page":"100936","DOI":"10.1016\/j.iot.2023.100936","volume":"24","author":"SA Bakhsh","year":"2023","unstructured":"Bakhsh SA, Khan MA, Ahmed F, Alshehri MS, Ali H, Ahmad J (2023) Enhancing IoT network security through deep learning-powered intrusion detection system. Internet Things 24:100936","journal-title":"Internet Things"},{"key":"2054_CR28","doi-asserted-by":"crossref","unstructured":"Diaba, S.Y., Shafie-Khah, M., Elmusrati, M.: Cyber security in power systems using meta-heuristic and deep learning algorithms. IEEE Access, 11, pp.18660\u201318672.","DOI":"10.1109\/ACCESS.2023.3247193"},{"key":"2054_CR29","unstructured":"https:\/\/www.unb.ca\/cic\/datasets\/iotdataset-2023.html (2023)"},{"issue":"1","key":"2054_CR30","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1080\/17421772.2023.2237532","volume":"19","author":"M Krzy\u015bko","year":"2024","unstructured":"Krzy\u015bko M, Nijkamp P, Ratajczak W, Wo\u0142y\u0144ski W, Wenerska B (2024) Spatio-temporal principal component analysis. Spat Econ Anal 19(1):8\u201329","journal-title":"Spat Econ Anal"},{"issue":"12","key":"2054_CR31","doi-asserted-by":"publisher","first-page":"14918","DOI":"10.1007\/s10489-022-04224-6","volume":"53","author":"H Wang","year":"2023","unstructured":"Wang H, Zhao J (2023) A novel high-level target navigation pigeon-inspired optimization for global optimization problems. Appl Intell 53(12):14918\u201314960","journal-title":"Appl Intell"},{"issue":"1","key":"2054_CR32","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.icte.2022.11.007","volume":"9","author":"T Zhang","year":"2023","unstructured":"Zhang T, Huang Z (2023) FPoR: Fair proof-of-reputation consensus for blockchain. ICT Express 9(1):45\u201350","journal-title":"ICT Express"},{"key":"2054_CR33","doi-asserted-by":"crossref","unstructured":"Lee S, Ko H, Kim J, Oh H (2024) vcnn: Verifiable convolutional neural network based on zk-snarks. IEEE Transactions on Dependable and Secure Computing","DOI":"10.1109\/TDSC.2023.3348760"},{"key":"2054_CR34","doi-asserted-by":"crossref","unstructured":"Xu Y, Zhong R, Zhang C, Yu J (2024) Multiplayer battle game-inspired optimizer for complex optimization problems. Cluster Computing, pp.1\u201325","DOI":"10.1109\/SCISISIS61014.2024.10759958"},{"key":"2054_CR35","doi-asserted-by":"publisher","first-page":"110407","DOI":"10.1016\/j.epsr.2024.110407","volume":"232","author":"MJ Zideh","year":"2024","unstructured":"Zideh MJ, Khalghani MR, Solanki SK (2024) An unsupervised adversarial autoencoder for cyber attack detection in power distribution grids. Electric Power Syst Res 232:110407","journal-title":"Electric Power Syst Res"},{"key":"2054_CR36","doi-asserted-by":"publisher","first-page":"110157","DOI":"10.1016\/j.epsr.2024.110157","volume":"229","author":"AA Nassar","year":"2024","unstructured":"Nassar AA, Morsi WG (2024) Detection of cyber-attacks and power disturbances in smart digital substations using continuous wavelet transform and convolution neural networks. Electric Power Syst Res 229:110157","journal-title":"Electric Power Syst Res"},{"issue":"2","key":"2054_CR37","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10922-023-09722-7","volume":"31","author":"O Jullian","year":"2023","unstructured":"Jullian O, Otero B, Rodriguez E, Gutierrez N, Antona H, Canal R (2023) Deep-learning based detection for cyber-attacks in IoT networks: a distributed attack detection framework. J Netw Syst Manage 31(2):33","journal-title":"J Netw Syst Manage"},{"key":"2054_CR38","doi-asserted-by":"crossref","unstructured":"Al-Haija QA, Alnabhan M, Saleh E, Al-Omari M (2023) Applications of blockchain technology for improving security in the internet of things (IoT). In Blockchain Technology Solutions for the Security of Iot-Based Healthcare Systems. Academic Press,\u00a0pp 199\u2013221","DOI":"10.1016\/B978-0-323-99199-5.00003-3"},{"issue":"6","key":"2054_CR39","doi-asserted-by":"publisher","first-page":"493","DOI":"10.4103\/jispcd.JISPCD_68_23","volume":"13","author":"S Acharya","year":"2023","unstructured":"Acharya S, Gurunathan D, Sahoo D, Singh B, Sahoo A, Acharya S (2023) Comparative evaluation of the antimicrobial activity of NeoPutty MTA and modified NeoPutty MTA: an in vitro study. J Int Soc Prev Community Dent 13(6):493\u2013499","journal-title":"J Int Soc Prev Community Dent"},{"key":"2054_CR40","doi-asserted-by":"publisher","first-page":"9136","DOI":"10.1109\/ACCESS.2023.3238664","volume":"11","author":"IA Kandhro","year":"2023","unstructured":"Kandhro IA, Alanazi SM, Ali F, Kehar A, Fatima K, Uddin M, Karuppayah S (2023) Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures. IEEE Access 11:9136\u20139148","journal-title":"IEEE Access"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02054-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02054-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02054-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:38:42Z","timestamp":1760683122000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02054-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,19]]},"references-count":40,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2054"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02054-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,19]]},"assertion":[{"value":"5 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Not applicable.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal ethics"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Materials and eethods"}},{"value":"Not applicable.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Results and discussions"}},{"value":"Not applicable.","order":7,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest\/Competing interests"}}],"article-number":"248"}}