{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T13:07:54Z","timestamp":1777036074566,"version":"3.51.4"},"reference-count":191,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T00:00:00Z","timestamp":1771545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T00:00:00Z","timestamp":1771545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"IITP (Institute of Information & Communications Technology Planning & Evaluation)- ITRC (Information Technology Research Center) grant funded by the Korea government","award":["IITP- 2025-RS-2023-00259004"],"award-info":[{"award-number":["IITP- 2025-RS-2023-00259004"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cogn Comput"],"published-print":{"date-parts":[[2026,12]]},"DOI":"10.1007\/s12559-026-10559-w","type":"journal-article","created":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T09:38:19Z","timestamp":1771580299000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["XAI-driven Data Mining for Self-defending IoT Systems: Enhancing Cybersecurity Transparency in the Age of Smart Cities"],"prefix":"10.1007","volume":"18","author":[{"given":"Fida Muhammad","family":"Khan","sequence":"first","affiliation":[]},{"given":"Asim","family":"Zeb","sequence":"additional","affiliation":[]},{"given":"Taj","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Mahmoud Ahmad","family":"Al-Khasawneh","sequence":"additional","affiliation":[]},{"given":"Yousef Ibrahim","family":"Daradkeh","sequence":"additional","affiliation":[]},{"given":"Isma Farah","family":"Siddiqui","sequence":"additional","affiliation":[]},{"given":"Ali Kashif","family":"Bashir","sequence":"additional","affiliation":[]},{"given":"Inam","family":"Ullah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,20]]},"reference":[{"issue":"1","key":"10559_CR1","first-page":"1","volume":"5","author":"H Rehan","year":"2023","unstructured":"Rehan H. Internet of Things (IoT) in smart cities: enhancing urban living through technology. J Eng Technol. 2023;5(1):1\u201316.","journal-title":"J Eng Technol"},{"issue":"5","key":"10559_CR2","doi-asserted-by":"publisher","first-page":"1388","DOI":"10.3390\/su10051388","volume":"10","author":"E Park","year":"2018","unstructured":"Park E, Del Pobil AP, Kwon SJ. The role of Internet of Things (IoT) in smart cities: technology roadmap-oriented approaches. Sustainability. 2018;10(5):1388.","journal-title":"Sustainability"},{"key":"10559_CR3","doi-asserted-by":"crossref","unstructured":"Hamid B, Jhanjhi NZ, Humayun M, Khan A, Alsayat A. Cyber security issues and challenges for smart cities: A survey. In: 2019 13th International conference on mathematics, actuarial science, computer science and statistics (MACS). IEEE; 2019, p. 1\u20137.","DOI":"10.1109\/MACS48846.2019.9024768"},{"key":"10559_CR4","doi-asserted-by":"crossref","unstructured":"Kitchin R, Dodge M. The (in) security of smart cities: Vulnerabilities, risks, mitigation, and prevention. In: Smart cities and innovative Urban technologies. Routledge; 2020, p. 47\u201365.","DOI":"10.4324\/9781003132851-4"},{"issue":"11","key":"10559_CR5","doi-asserted-by":"publisher","first-page":"e4571","DOI":"10.1002\/ett.4571","volume":"34","author":"R Sharma","year":"2023","unstructured":"Sharma R, Arya R. Security threats and measures in the internet of things for smart city infrastructure: a state of art. Trans Emerging Telecommun Technol. 2023;34(11):e4571.","journal-title":"Trans Emerging Telecommun Technol"},{"issue":"4","key":"10559_CR6","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1049\/wss2.12080","volume":"14","author":"AA Abba Ari","year":"2024","unstructured":"Abba Ari AA, Aziz HA, Njoya AN, Aboubakar M, Djedouboum AC, Thiare O, et al. Data collection in IoT networks: architecture, solutions, protocols and challenges. IET Wirel Sensor Syst. 2024;14(4):85\u2013110.","journal-title":"IET Wirel Sensor Syst"},{"issue":"1","key":"10559_CR7","doi-asserted-by":"publisher","first-page":"120","DOI":"10.3390\/s23010120","volume":"23","author":"A Clim","year":"2022","unstructured":"Clim A, Toma A, Zota RD, Constantinescu R. The need for cybersecurity in industrial revolution and smart cities. Sensors. 2022;23(1):120.","journal-title":"Sensors"},{"key":"10559_CR8","doi-asserted-by":"crossref","unstructured":"Benziane S. Exploring the synergy of intelligent systems: Cloud computing, industrial internet of things (IIoT), big data analytics, and neural networks. In: Applied neural networks in the AI era: From theory to real-world impact. IGI Global Scientific Publishing; 2025, p. 241\u201368.","DOI":"10.4018\/979-8-3373-4571-0.ch009"},{"key":"10559_CR9","unstructured":"Ahmad K, Maabreh M, Ghaly M, Khan K, Qadir J, Al-Fuqaha A. Developing future human-centered smart cities: critical analysis of smart city security, interpretability, and ethical challenges, 2020."},{"key":"10559_CR10","doi-asserted-by":"publisher","first-page":"6","DOI":"10.61356\/SMIJ.2024.77106","volume":"7","author":"I Alrashdi","year":"2024","unstructured":"Alrashdi I, Alqazzaz A. Synergizing AI, IoT, and blockchain for diagnosing pandemic diseases in smart cities: challenges and opportunities. Sustain Mach Intell J. 2024;7:6\u20131.","journal-title":"Sustain Mach Intell J."},{"key":"10559_CR11","doi-asserted-by":"crossref","unstructured":"Ghonge MM, Pradeep N, Jhanjhi NZ, Kulkarni PM (Eds). Advances in explainable AI applications for smart cities. IGI Global, 2024.","DOI":"10.4018\/978-1-6684-6361-1"},{"issue":"5","key":"10559_CR12","doi-asserted-by":"publisher","first-page":"5870","DOI":"10.1007\/s11227-023-05685-3","volume":"80","author":"I Ullah","year":"2024","unstructured":"Ullah I, Noor A, Nazir S, Ali F, Ghadi YY, Aslam N. Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features. J Supercomput. 2024;80(5):5870\u201399.","journal-title":"J Supercomput"},{"key":"10559_CR13","doi-asserted-by":"publisher","first-page":"63","DOI":"10.58496\/BJML\/2024\/006","volume":"2024","author":"MA Khalaf","year":"2024","unstructured":"Khalaf MA, Steiti A. Artificial intelligence predictions in cyber security: analysis and early detection of cyber attacks. Babylonian J Mach Learn. 2024;2024:63\u20138.","journal-title":"Babylonian J Mach Learn"},{"key":"10559_CR14","doi-asserted-by":"crossref","unstructured":"Mohamed N. Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms. Knowl Inf Syst; 2025:1\u201387.","DOI":"10.1007\/s10115-025-02429-y"},{"key":"10559_CR15","doi-asserted-by":"crossref","unstructured":"Samia N, Saha S, Haque A. Advancing network resilience through data mining and machine learning in cybersecurity. In: 2024 20th International conference on the design of reliable communication networks (DRCN). IEEE; 2024, p. 100\u2013106.","DOI":"10.1109\/DRCN60692.2024.10539157"},{"issue":"2","key":"10559_CR16","first-page":"318","volume":"13","author":"A Saudagar","year":"2025","unstructured":"Saudagar A, Patil S. Advanced data mining techniques for strengthening cyber and information security: A comprehensive analytical study. Int J Res Technol. 2025;13(2):318\u201326.","journal-title":"Int J Res Technol"},{"key":"10559_CR17","doi-asserted-by":"crossref","unstructured":"Guo Z. Big data mining algorithm for malicious behavior feature extraction and application in network security. In: Second international conference on big data, computational intelligence, and applications (BDCIA 2024). SPIE; 2025, vol. 13550, p. 270\u20137.","DOI":"10.1117\/12.3059926"},{"key":"10559_CR18","doi-asserted-by":"crossref","unstructured":"Zhao X. Network security situational awareness and early warning architecture based on big data. Int J Syst Assur Eng Manag; 2024, 1\u20137.","DOI":"10.1007\/s13198-024-02522-5"},{"issue":"14","key":"10559_CR19","doi-asserted-by":"publisher","first-page":"7984","DOI":"10.3390\/app15147984","volume":"15","author":"A Alabdulatif","year":"2025","unstructured":"Alabdulatif A. A novel ensemble of deep learning approach for cybersecurity intrusion detection with explainable artificial intelligence. Appl Sci. 2025;15(14):7984.","journal-title":"Appl Sci"},{"issue":"1","key":"10559_CR20","doi-asserted-by":"publisher","first-page":"17","DOI":"10.56038\/ejrnd.v5i1.630","volume":"5","author":"AB K\u00fct\u00fck","year":"2025","unstructured":"K\u00fct\u00fck AB, \u00c7o\u015fkun \u00d6, K\u00fct\u00fck H, K\u00f6k \u0130. Machine learning models and explainable artificial intelligence approaches for intrusion detection in IoT networks. Eur J Res Dev. 2025;5(1):17\u201333.","journal-title":"Eur J Res Dev"},{"issue":"1","key":"10559_CR21","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1186\/s42400-025-00369-2","volume":"8","author":"F Ebrahimi","year":"2025","unstructured":"Ebrahimi F, Javidan R, Akbari R, Hosseini Y. Intrusion detection in the internet of things using convolutional neural networks: an explainable ai approach. Cybersecurity. 2025;8(1):66.","journal-title":"Cybersecurity"},{"issue":"1","key":"10559_CR22","first-page":"14","volume":"2","author":"M Miftah","year":"2025","unstructured":"Miftah M, Desrianti DI, Septiani N, Fauzi AY, Williams C. Big data analytics for smart cities: Optimizing urban traffic management using real-time data processing. J Comput Sci Technol Appl. 2025;2(1):14\u201323.","journal-title":"J Comput Sci Technol Appl"},{"key":"10559_CR23","doi-asserted-by":"crossref","unstructured":"Lakshmi D, Jeyarani J, Suguna R, Muneeshwari P, Valantina GM, Jayaraman S. Impact of IoT data integration on real-time analytics for smart city management. In: 2024 10th International conference on communication and signal processing (ICCSP). IEEE; 2024, p 772\u20137.","DOI":"10.1109\/ICCSP60870.2024.10543926"},{"issue":"1","key":"10559_CR24","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/s41019-024-00261-y","volume":"10","author":"P Chen","year":"2025","unstructured":"Chen P, Xu B, Li H, Wang W, Peng Y, Bhowmick SS, et al. An efficient framework for secure dynamic skyline query processing in the cloud. Data Sci Eng. 2025;10(1):54\u201374.","journal-title":"Data Sci Eng"},{"key":"10559_CR25","doi-asserted-by":"crossref","unstructured":"Sheelavant K, KV C, Supriya BY, Assudani PJ, Mahato CB, Suman SK. Ensemble learning-based intrusion detection and classification for securing IoT networks: An optimized strategy for threat detection and prevention. J Intell Syst Int Things. 2025:17(2).","DOI":"10.54216\/JISIoT.170208"},{"issue":"6","key":"10559_CR26","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/s11227-025-07255-1","volume":"81","author":"A Nazir","year":"2025","unstructured":"Nazir A, He J, Zhu N, Wajahat A, Ullah F, Qureshi S, et al. Empirical evaluation of ensemble learning and hybrid CNN-LSTM for IoT threat detection on heterogeneous datasets. J Supercomput. 2025;81(6):775.","journal-title":"J Supercomput"},{"issue":"2","key":"10559_CR27","doi-asserted-by":"publisher","first-page":"101939","DOI":"10.1016\/j.jksuci.2024.101939","volume":"36","author":"A Nazir","year":"2024","unstructured":"Nazir A, He J, Zhu N, Wajahat A, Ullah F, Qureshi S, et al. Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration. J King Saud Univ-Comput Inf Sci. 2024;36(2):101939.","journal-title":"J King Saud Univ-Comput Inf Sci"},{"issue":"6","key":"10559_CR28","doi-asserted-by":"publisher","first-page":"8367","DOI":"10.1007\/s10586-024-04436-0","volume":"27","author":"A Nazir","year":"2024","unstructured":"Nazir A, He J, Zhu N, Anwar MS, Pathan MS. Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain. Cluster Comput. 2024;27(6):8367\u201392.","journal-title":"Cluster Comput"},{"key":"10559_CR29","doi-asserted-by":"crossref","unstructured":"Zhu F, Wu K, Ding J. Modeling and performance evaluation of streaming data processing system in IoT architecture. Comput Mater Contin. 2025:83(2).","DOI":"10.32604\/cmc.2025.062007"},{"issue":"3","key":"10559_CR30","first-page":"161","volume":"2","author":"N Qadiri","year":"2025","unstructured":"Qadiri N, Kaviani F. Efficient processing of IoT data streams: Architectures, algorithms, and future directions. Metaversalize. 2025;2(3):161\u201374.","journal-title":"Metaversalize"},{"key":"10559_CR31","doi-asserted-by":"publisher","first-page":"71 024","DOI":"10.1109\/ACCESS.2024.3402446","volume":"12","author":"AN Gummadi","year":"2024","unstructured":"Gummadi AN, Napier JC, Abdallah M. \"XAI-IoT: an explainable AI framework for enhancing anomaly detection in IoT systems. IEEE Access. 2024;12:71 024-71 054.","journal-title":"IEEE Access"},{"key":"10559_CR32","doi-asserted-by":"crossref","unstructured":"Moustafa N. A systemic IoT-fog-cloud architecture for big-data analytics and cyber security systems: A review of fog computing. Secure Edge Comput. 2021:41\u201350.","DOI":"10.1201\/9781003028635-4"},{"issue":"3","key":"10559_CR33","first-page":"167","volume":"11","author":"G Vojkovi\u0107","year":"2020","unstructured":"Vojkovi\u0107 G, Milenkovi\u0107 M, Katuli\u0107 T. IoT and smart home data breach risks from the perspective of data protection and information security law. Bus Syst Res Int J Soc Adv Innov Res Econ. 2020;11(3):167\u201385.","journal-title":"Bus Syst Res Int J Soc Adv Innov Res Econ"},{"key":"10559_CR34","doi-asserted-by":"crossref","unstructured":"Aswathy SU, Tyagi AK. Privacy breaches through cyber vulnerabilities: critical issues, open challenges, and possible countermeasures for the future. In: Security and privacy-preserving techniques in wireless robotics. CRC Press; 2022, p. 163\u2013210.","DOI":"10.1201\/9781003156406-14"},{"issue":"2","key":"10559_CR35","first-page":"1","volume":"4","author":"AA Soofi","year":"2024","unstructured":"Soofi AA, Tahir M, Raza N. Securing the internet of things: A comprehensive review of security challenges and artificial intelligence solutions. Found Univ J Eng Appl Sci. 2024;4(2):1\u201320.","journal-title":"Found Univ J Eng Appl Sci"},{"issue":"1","key":"10559_CR36","doi-asserted-by":"publisher","first-page":"5","DOI":"10.3390\/cryptography8010005","volume":"8","author":"Y Jiang","year":"2024","unstructured":"Jiang Y, Rezazadeh Baee MA, Simpson LR, Gauravaram P, Pieprzyk J, Zia T, et al. Pervasive user data collection from cyberspace: Privacy concerns and countermeasures. Cryptography. 2024;8(1):5.","journal-title":"Cryptography"},{"key":"10559_CR37","doi-asserted-by":"crossref","unstructured":"Williams M, Nurse JR, Creese S. The perfect storm: The privacy paradox and the internet-of-Things. In: 2016 11th International conference on availability, reliability and security (ARES). IEEE; 2016, p. 644\u201352.","DOI":"10.1109\/ARES.2016.25"},{"key":"10559_CR38","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.future.2017.04.045","volume":"75","author":"J Lopez","year":"2017","unstructured":"Lopez J, Rios R, Bao F, Wang G. Evolving privacy: from sensors to the internet of things. Future Gener Comput Syst. 2017;75:46\u201357.","journal-title":"Future Gener Comput Syst"},{"key":"10559_CR39","doi-asserted-by":"publisher","first-page":"2840","DOI":"10.1109\/ACCESS.2016.2575863","volume":"4","author":"Q Xu","year":"2016","unstructured":"Xu Q, Ren P, Song H, Du Q. Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations. IEEE Access. 2016;4:2840\u201353.","journal-title":"IEEE Access"},{"issue":"1","key":"10559_CR40","doi-asserted-by":"publisher","first-page":"20882","DOI":"10.1038\/s41598-025-05257-w","volume":"15","author":"YY Ghadi","year":"2025","unstructured":"Ghadi YY, Mazhar T, Shahzad T, Jaghdam IH, Khan S, Khan MA, et al. A hybrid AI-blockchain security framework for smart grids. Sci Rep. 2025;15(1):20882.","journal-title":"Sci Rep"},{"key":"10559_CR41","doi-asserted-by":"publisher","first-page":"103096","DOI":"10.1016\/j.cose.2023.103096","volume":"127","author":"P Kumari","year":"2023","unstructured":"Kumari P, Jain AK. A comprehensive study of DDoS attacks over IoT network and their countermeasures. Comput Secur. 2023;127:103096.","journal-title":"Comput Secur"},{"key":"10559_CR42","doi-asserted-by":"publisher","first-page":"5320","DOI":"10.1007\/s11227-019-02945-z","volume":"76","author":"MM Salim","year":"2020","unstructured":"Salim MM, Rathore S, Park JH. Distributed denial of service attacks and its defenses in IoT: a survey. J Supercomput. 2020;76:5320\u201363.","journal-title":"J Supercomput"},{"key":"10559_CR43","doi-asserted-by":"publisher","first-page":"1420680","DOI":"10.3389\/fcomp.2024.1420680","volume":"6","author":"K Kaur","year":"2024","unstructured":"Kaur K, Kaur A, Gulzar Y, Gandhi V. Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies. Front Comput Sci. 2024;6:1420680.","journal-title":"Front Comput Sci"},{"key":"10559_CR44","doi-asserted-by":"crossref","unstructured":"Abdalrahman GA, Varol H. Defending against cyber-attacks on the internet of things. In: 2019 7th International symposium on digital forensics and security (ISDFS). IEEE; 2019, p. 1\u20136.","DOI":"10.1109\/ISDFS.2019.8757478"},{"key":"10559_CR45","doi-asserted-by":"crossref","unstructured":"Kumar S, Chandavarkar BR. DDoS prevention in IoT. In: 2021 12th International conference on computing communication and networking technologies (ICCCNT). IEEE; 2021, p. 1\u20136.","DOI":"10.1109\/ICCCNT51525.2021.9579765"},{"key":"10559_CR46","doi-asserted-by":"publisher","first-page":"103096","DOI":"10.1016\/j.cose.2023.103096","volume":"127","author":"P Kumari","year":"2023","unstructured":"Kumari P, Jain AK. A comprehensive study of DDoS attacks over IoT network and their countermeasures. Comput Secur. 2023;127:103096.","journal-title":"Comput Secur"},{"key":"10559_CR47","doi-asserted-by":"crossref","unstructured":"salman Qasim S, NSAIF SM. Advancements in time series-based detection systems for distributed denial-of-service (DDoS) attacks: a comprehensive review. Babylonian J Netw. 2024; 2024:9\u201317.","DOI":"10.58496\/BJN\/2024\/002"},{"key":"10559_CR48","doi-asserted-by":"crossref","unstructured":"Ahmed Z, Danish SM, Qureshi HK, Lestas M. Protecting IoTs from Mirai Botnet attacks using blockchains. In: 2019 IEEE 24th international workshop on computer aided modeling and design of communication links and networks (CAMAD). IEEE; 2019, p. 1\u20136.","DOI":"10.1109\/CAMAD.2019.8858484"},{"key":"10559_CR49","unstructured":"Munir A, Sumra IA, Naveed R, Javed MA. Techniques for authentication and defense strategies to mitigate IoT security risks. J Comput Biomed Inf. 2024:7(01)."},{"issue":"2","key":"10559_CR50","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.dcan.2024.02.007","volume":"11","author":"I Ullah","year":"2025","unstructured":"Ullah I, Adhikari D, Su X, Palmieri F, Wu C, Choi C. Integration of data science with the intelligent IoT (IIoT): current challenges and future perspectives. Digit Commun Netw. 2025;11(2):280\u201398.","journal-title":"Digit Commun Netw"},{"key":"10559_CR51","doi-asserted-by":"crossref","unstructured":"Tyagi V, Saraswat A, Bansal S. An analysis of securing internet of things (IoT) devices from man-in-the-middle (MIMA) and denial of service (DoS). In Smart cities. CRC Press; 2023, p. 337\u201357.","DOI":"10.1201\/9781003376064-18"},{"issue":"2","key":"10559_CR52","doi-asserted-by":"publisher","first-page":"15","DOI":"10.12709\/mest.05.05.02.03","volume":"5","author":"Z Cekerevac","year":"2017","unstructured":"Cekerevac Z, Dvorak Z, Prigoda L, Cekerevac P. Internet of things and the man-in-the-middle attacks-security and economic risks. MEST J. 2017;5(2):15\u201325.","journal-title":"MEST J"},{"issue":"11","key":"10559_CR53","doi-asserted-by":"publisher","first-page":"3654","DOI":"10.3390\/s21113654","volume":"21","author":"N Abosata","year":"2021","unstructured":"Abosata N, Al-Rubaye S, Inalhan G, Emmanouilidis C. Internet of things for system integrity: a comprehensive survey on security, attacks and countermeasures for industrial applications. Sensors. 2021;21(11):3654.","journal-title":"Sensors"},{"key":"10559_CR54","doi-asserted-by":"crossref","unstructured":"Mishra A, Dixit A. Resolving threats in IoT: ID spoofing to DDoS. In: 2018 9Th international conference on computing, communication and networking technologies (ICCCNT). IEEE; 2018, p. 1\u20137.","DOI":"10.1109\/ICCCNT.2018.8493729"},{"key":"10559_CR55","doi-asserted-by":"publisher","first-page":"100050","DOI":"10.1016\/j.iot.2019.100050","volume":"6","author":"M Aly","year":"2019","unstructured":"Aly M, Khomh F, Haoues M, Quintero A, Yacout S. Enforcing security in internet of things frameworks: a systematic literature review. Internet of Things. 2019;6:100050.","journal-title":"Internet of Things"},{"key":"10559_CR56","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1016\/j.future.2020.09.035","volume":"115","author":"T McIntosh","year":"2021","unstructured":"McIntosh T, Watters P, Kayes ASM, Ng A, Chen YPP. Enforcing situation-aware access control to build malware-resilient file systems. Future Gener Comput Syst. 2021;115:568\u201382.","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"10559_CR57","doi-asserted-by":"publisher","first-page":"7137","DOI":"10.1109\/JIOT.2019.2914390","volume":"6","author":"M Al-Hawawreh","year":"2019","unstructured":"Al-Hawawreh M, Den Hartog F, Sitnikova E. Targeted ransomware: a new cyber threat to edge system of brownfield industrial internet of things. IEEE Internet Things J. 2019;6(4):7137\u201351.","journal-title":"IEEE Internet Things J"},{"key":"10559_CR58","doi-asserted-by":"crossref","unstructured":"Benmalek M. Ransomware on cyber-physical systems: taxonomies, case studies, security gaps, and open challenges. Int Things Cyber-Phys Syst. 2024.","DOI":"10.1016\/j.iotcps.2023.12.001"},{"issue":"2","key":"10559_CR59","first-page":"906","volume":"12","author":"SK Choi","year":"2018","unstructured":"Choi SK, Yang CH, Kwak J. System hardening and security monitoring for IoT devices to mitigate IoT security vulnerabilities and threats. KSII Trans Int Inf Syst (TIIS). 2018;12(2):906\u201318.","journal-title":"KSII Trans Int Inf Syst (TIIS)"},{"key":"10559_CR60","doi-asserted-by":"crossref","unstructured":"Srihith I, Donald A, Srinivas T, Anjali D, Chandana A. Firmware attacks: the silent threat to your IoT connected devices. Int J Adv Res Sci Commun Technol (IJARSCT). 2023;3:145\u201354.","DOI":"10.48175\/IJARSCT-9104"},{"key":"10559_CR61","doi-asserted-by":"crossref","unstructured":"Azzedin F, Suwad H, Rahman MM. An asset-based approach to mitigate zero-day ransomware attacks. Comput Mater Contin. 2022;73(2).","DOI":"10.32604\/cmc.2022.028646"},{"key":"10559_CR62","unstructured":"Miller MG. Are we protected yet? developing a machine learning detection system to combat zero-day malware attacks. Master\u2019s thesis, Utica College, 2018."},{"issue":"3","key":"10559_CR63","doi-asserted-by":"publisher","first-page":"12","DOI":"10.63278\/1315","volume":"31","author":"BH Kumar","year":"2025","unstructured":"Kumar BH, Nuka ST, Malempati M, Sriram HK, Mashetty S, Kannan S. Big data in cybersecurity: enhancing threat detection with AI and ML. Metallurg Mater Eng. 2025;31(3):12\u201320.","journal-title":"Metallurg. Mater. Eng."},{"issue":"3","key":"10559_CR64","doi-asserted-by":"publisher","first-page":"817","DOI":"10.3390\/s18030817","volume":"18","author":"B Ali","year":"2018","unstructured":"Ali B, Awad AI. Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors. 2018;18(3):817.","journal-title":"Sensors"},{"issue":"4","key":"10559_CR65","doi-asserted-by":"publisher","first-page":"3559","DOI":"10.1007\/s40747-022-00667-z","volume":"8","author":"A Attkan","year":"2022","unstructured":"Attkan A, Ranga V. Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security. Complex Intell Syst. 2022;8(4):3559\u201391.","journal-title":"Complex Intell Syst"},{"issue":"11","key":"10559_CR66","doi-asserted-by":"publisher","first-page":"1864","DOI":"10.3390\/electronics9111864","volume":"9","author":"T Sobb","year":"2020","unstructured":"Sobb T, Turnbull B, Moustafa N. Supply chain 4.0: A survey of cyber security challenges, solutions and future directions. Electronics. 2020;9(11):1864.","journal-title":"Electronics"},{"issue":"01","key":"10559_CR67","first-page":"178","volume":"11","author":"EO Udeh","year":"2024","unstructured":"Udeh EO, Amajuoyi P, Adeusi KB, Scott AO. The role of IoT in boosting supply chain transparency and efficiency. Magna Sci Adv Res Rev. 2024;11(01):178\u201397.","journal-title":"Magna Sci Adv Res Rev"},{"issue":"13","key":"10559_CR68","doi-asserted-by":"publisher","first-page":"3625","DOI":"10.3390\/s20133625","volume":"20","author":"H Mrabet","year":"2020","unstructured":"Mrabet H, Belguith S, Alhomoud A, Jemai A. A survey of IoT security based on a layered architecture of sensing and data analysis. Sensors. 2020;20(13):3625.","journal-title":"Sensors"},{"key":"10559_CR69","doi-asserted-by":"publisher","first-page":"108487","DOI":"10.1016\/j.compeleceng.2022.108487","volume":"105","author":"SNG Aryavalli","year":"2023","unstructured":"Aryavalli SNG, Kumar H. Top 12 layer-wise security challenges and a secure architectural solution for internet of things. Comput Electr Eng. 2023;105:108487.","journal-title":"Comput Electr Eng"},{"issue":"7","key":"10559_CR70","doi-asserted-by":"publisher","first-page":"5794","DOI":"10.1109\/JIOT.2020.3033265","volume":"8","author":"J Singh","year":"2020","unstructured":"Singh J, Bello Y, Hussein AR, Erbad A, Mohamed A. Hierarchical security paradigm for IoT multiaccess edge computing. IEEE Internet Things J. 2020;8(7):5794\u2013805.","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"10559_CR71","first-page":"36","volume":"9","author":"S Rangaraju","year":"2023","unstructured":"Rangaraju S. Secure by intelligence: enhancing products with AI-driven security measures. EPH-Int J Sci Eng. 2023;9(3):36\u201341.","journal-title":"EPH-Int J Sci Eng"},{"issue":"4","key":"10559_CR72","doi-asserted-by":"publisher","first-page":"2462","DOI":"10.1109\/COMST.2020.3009103","volume":"22","author":"T Qiu","year":"2020","unstructured":"Qiu T, Chi J, Zhou X, Ning Z, Atiquzzaman M, Wu DO. Edge computing in industrial internet of things: architecture, advances and challenges. IEEE Commun Surv Tutor. 2020;22(4):2462\u201388.","journal-title":"IEEE Commun Surv Tutor"},{"key":"10559_CR73","doi-asserted-by":"publisher","first-page":"2385","DOI":"10.1016\/j.procs.2021.09.007","volume":"192","author":"M Driss","year":"2021","unstructured":"Driss M, Hasan D, Boulila W, Ahmad J. Microservices in IoT security: current solutions, research challenges, and future directions. Procedia Comput Sci. 2021;192:2385\u201395.","journal-title":"Procedia Comput Sci"},{"key":"10559_CR74","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1016\/j.procs.2024.05.148","volume":"237","author":"M Matias","year":"2024","unstructured":"Matias M, Ferreira E, Mateus-Coelho N, Ribeiro O, Ferreira L. Evaluating effectiveness and security in microservices architecture. Procedia Comput Sci. 2024;237:626\u201336.","journal-title":"Procedia Comput Sci"},{"key":"10559_CR75","doi-asserted-by":"crossref","unstructured":"Rasheedh JA, Saradha S. Reactive microservices architecture using a framework of fault tolerance mechanisms. In 2021 Second international conference on electronics and sustainable communication systems (ICESC). IEEE; 2021, p. 146\u201350.","DOI":"10.1109\/ICESC51422.2021.9532893"},{"key":"10559_CR76","doi-asserted-by":"crossref","unstructured":"Radanliev P, De Roure D, Nurse JR, Nicolescu R, Huth M, Cannady S, Montalvo RM. Integration of cyber security frameworks, models and approaches for building design principles for the internet-of-things in industry 4.0. Living in the Internet of Things: Cybersecurity of the, vol. IoT-2018. IET; 2018, pp. 1\u20136.","DOI":"10.1049\/cp.2018.0041"},{"issue":"1","key":"10559_CR77","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3437537","volume":"2","author":"N Alhirabi","year":"2021","unstructured":"Alhirabi N, Rana O, Perera C. Security and privacy requirements for the internet of things: A survey. ACM Trans Internet Things. 2021;2(1):1\u201337.","journal-title":"ACM Trans Internet Things"},{"key":"10559_CR78","doi-asserted-by":"crossref","unstructured":"Antao L, Pinto R, Reis J, Gon\u00e7alves G. Requirements for testing and validating the industrial internet of things. In 2018 IEEE International conference on software testing, verification and validation workshops (ICSTW). IEEE; 2018, p. 110\u20135.","DOI":"10.1109\/ICSTW.2018.00036"},{"key":"10559_CR79","doi-asserted-by":"crossref","unstructured":"Alauthman M, Aldweesh A, Al-Qerem A. IoT security challenges in modern smart cities. In 2024 2nd International conference on cyber resilience (ICCR). IEEE; 2024, p. 1\u20136.","DOI":"10.1109\/ICCR61006.2024.10533174"},{"issue":"2","key":"10559_CR80","first-page":"1","volume":"18","author":"S Salim","year":"2022","unstructured":"Salim S, Moustafa N, Turnbull B, Razzak I. Perturbation-enabled deep federated learning for preserving internet of things-based social networks. ACM Trans Multimed Comput Commun Appl (TOMM). 2022;18(2):1\u201319.","journal-title":"ACM Trans Multimed Comput Commun Appl (TOMM)"},{"key":"10559_CR81","unstructured":"Demertzis K. Blockchained federated learning for threat defense. 2021."},{"issue":"2","key":"10559_CR82","doi-asserted-by":"publisher","first-page":"988","DOI":"10.1109\/TDSC.2022.3146448","volume":"20","author":"Y Zheng","year":"2022","unstructured":"Zheng Y, Lai S, Liu Y, Yuan X, Yi X, Wang C. Aggregation service for federated learning: an efficient, secure, and more resilient realization. IEEE Trans Depend Secure Comput. 2022;20(2):988\u20131001.","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"4","key":"10559_CR83","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.3390\/electronics12041020","volume":"12","author":"AR Javed","year":"2023","unstructured":"Javed AR, Ahmed W, Pandya S, Maddikunta PKR, Alazab M, Gadekallu TR. A survey of explainable artificial intelligence for smart cities. Electronics. 2023;12(4):1020.","journal-title":"Electronics"},{"issue":"11","key":"10559_CR84","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1007\/s12243-022-00926-7","volume":"77","author":"F Charmet","year":"2022","unstructured":"Charmet F, Tanuwidjaja HC, Ayoubi S, Gimenez PF, Han Y, Jmila H, et al. Explainable artificial intelligence for cybersecurity: a literature survey. Annals Telecommun. 2022;77(11):789\u2013812.","journal-title":"Annals Telecommun"},{"key":"10559_CR85","doi-asserted-by":"crossref","unstructured":"Chander B, John C, Warrier L, Gopalakrishnan K. Toward trustworthy artificial intelligence (TAI) in the context of explainability and robustness. ACM Comput Surv. 2024.","DOI":"10.1145\/3675392"},{"issue":"3","key":"10559_CR86","doi-asserted-by":"publisher","first-page":"358","DOI":"10.55730\/1300-0632.4075","volume":"32","author":"E Eren","year":"2024","unstructured":"Eren E, Yildirim Okay F, \u00d6zdemir S. Unveiling anomalies: a survey on XAI-based anomaly detection for IoT. Turkish J Electr Eng Comput Sci. 2024;32(3):358\u201381.","journal-title":"Turkish J Electr Eng Comput Sci"},{"key":"10559_CR87","doi-asserted-by":"publisher","first-page":"93 575","DOI":"10.1109\/ACCESS.2022.3204171","volume":"10","author":"N Capuano","year":"2022","unstructured":"Capuano N, Fenza G, Loia V, Stanzione C. Explainable artificial intelligence in cybersecurity: a survey. IEEE Access. 2022;10:93 575-93 600.","journal-title":"IEEE Access"},{"issue":"14","key":"10559_CR88","doi-asserted-by":"publisher","first-page":"7984","DOI":"10.3390\/app15147984","volume":"15","author":"A Alabdulatif","year":"2025","unstructured":"Alabdulatif A. A novel ensemble of deep learning approach for cybersecurity intrusion detection with explainable artificial intelligence. Appl Sci. 2025;15(14):7984.","journal-title":"Appl Sci"},{"issue":"6","key":"10559_CR89","first-page":"1","volume":"10","author":"MN Alam","year":"2023","unstructured":"Alam MN, Kaur M, Kabir MS. Explainable AI in healthcare: enhancing transparency and trust upon legal and ethical consideration. Int Res J Eng Technol. 2023;10(6):1\u20139.","journal-title":"Int Res J Eng Technol"},{"issue":"1","key":"10559_CR90","doi-asserted-by":"publisher","first-page":"6634811","DOI":"10.1155\/2021\/6634811","volume":"2021","author":"B Mahbooba","year":"2021","unstructured":"Mahbooba B, Timilsina M, Sahal R, Serrano M. Explainable artificial intelligence (XAI) to enhance trust management in intrusion detection systems using decision tree model. Complexity. 2021;2021(1):6634811.","journal-title":"Complexity"},{"issue":"2","key":"10559_CR91","doi-asserted-by":"publisher","first-page":"376","DOI":"10.3390\/en17020376","volume":"17","author":"A Shahcheraghian","year":"2024","unstructured":"Shahcheraghian A, Madani H, Ilinca A. From white to black-box models: A review of simulation tools for building energy management and their application in consulting practices. Energies. 2024;17(2):376.","journal-title":"Energies"},{"key":"10559_CR92","doi-asserted-by":"publisher","first-page":"78 994","DOI":"10.1109\/ACCESS.2023.3294569","volume":"11","author":"V Chamola","year":"2023","unstructured":"Chamola V, Hassija V, Sulthana AR, Ghosh D, Dhingra D, Sikdar B. A review of trustworthy and explainable artificial intelligence (XAI). IEEE Access. 2023;11:78 994-79 015.","journal-title":"IEEE Access"},{"issue":"3","key":"10559_CR93","doi-asserted-by":"publisher","first-page":"1775","DOI":"10.1109\/COMST.2023.3280465","volume":"25","author":"N Moustafa","year":"2023","unstructured":"Moustafa N, Koroniotis N, Keshk M, Zomaya AY, Tari Z. Explainable intrusion detection for cyber defences in the internet of things: Opportunities and solutions. IEEE Commun Surv Tutor. 2023;25(3):1775\u2013807.","journal-title":"IEEE Commun Surv Tutor"},{"key":"10559_CR94","doi-asserted-by":"crossref","unstructured":"Ghonge MM, Pradeep N, Jhanjhi NZ, Kulkarni PM (Ed.) Advances in explainable AI applications for smart cities. IGI Global, 2024.","DOI":"10.4018\/978-1-6684-6361-1"},{"key":"10559_CR95","unstructured":"Liu W, Zhao F, Nkenyereye L, Rani S, Li K, Lv J. XAI driven intelligent IoMT secure data management framework. IEEE J Biomed Health Inf. 2024."},{"key":"10559_CR96","doi-asserted-by":"publisher","first-page":"101878","DOI":"10.1016\/j.swevo.2025.101878","volume":"94","author":"I Ullah","year":"2025","unstructured":"Ullah I, Singh SK, Adhikari D, Khan H, Jiang W, Bai X. Multi-agent reinforcement learning for task allocation in the internet of vehicles: exploring benefits and paving the future. Swarm Evol Comput. 2025;94:101878.","journal-title":"Swarm Evol Comput"},{"key":"10559_CR97","doi-asserted-by":"crossref","unstructured":"dos Santos CHM, de Lima SM. XAI-driven antivirus in pattern identification of citadel malware. J Comput Sci. 2024;102389.","DOI":"10.1016\/j.jocs.2024.102389"},{"key":"10559_CR98","doi-asserted-by":"crossref","unstructured":"Al-Fayoumi M, Alhijawi B, Al-Haija QA, Armoush R. XAI-PhD: Fortifying trust of phishing URL detection empowered by shapley additive explanations. Int J Online Biomed Eng. 2024:20(11).","DOI":"10.3991\/ijoe.v20i11.49533"},{"issue":"1","key":"10559_CR99","first-page":"242","volume":"3","author":"H Arif","year":"2024","unstructured":"Arif H, Kumar A, Fahad M, Hussain HK. Future horizons: AI-enhanced threat detection in cloud environments: unveiling opportunities for research. Int J Multidisc Sci Arts. 2024;3(1):242\u201351.","journal-title":"Int J Multidisc Sci Arts"},{"key":"10559_CR100","doi-asserted-by":"crossref","unstructured":"Atakishiyev S, Salameh M, Yao H, Goebel R. Explainable artificial intelligence for autonomous driving: a comprehensive overview and field guide for future research directions. IEEE Access. 2024.","DOI":"10.1109\/ACCESS.2024.3431437"},{"key":"10559_CR101","unstructured":"L\u00e9vy LN. Advanced clustering and AI-driven decision support systems for smart energy management. Ph.D. dissertation, Universit\u00e9 Paris-Saclay; 2024."},{"key":"10559_CR102","doi-asserted-by":"crossref","unstructured":"Hussain A, Obaid AJ, Tyagi G, Sharma A, (Eds.) The next generation innovation in IoT and cloud computing with applications. CRC Press; 2024.","DOI":"10.1201\/9781003406723"},{"key":"10559_CR103","doi-asserted-by":"crossref","unstructured":"Okada S, Jmila H, Akashi K, Mitsunaga T, Sekiya Y, Takase H, Nakamura H, et al. XAI-driven adversarial attacks on network intrusion detectors. In European interdisciplinary cybersecurity conference; 2024, p. 65\u201373.","DOI":"10.1145\/3655693.3655714"},{"key":"10559_CR104","doi-asserted-by":"crossref","unstructured":"Wali S, Farrukh YA, Khan I. Explainable AI and random forest based reliable intrusion detection system. Comput Secur. 2025:104542.","DOI":"10.1016\/j.cose.2025.104542"},{"issue":"2","key":"10559_CR105","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s11416-022-00441-2","volume":"19","author":"S Hariharan","year":"2023","unstructured":"Hariharan S, Rejimol Robinson RR, Prasad RR, Thomas C, Balakrishnan N. XAI for intrusion detection system: comparing explanations based on global and local scope. J Comput Virol Hacking Techn. 2023;19(2):217\u201339.","journal-title":"J Comput Virol Hacking Techn"},{"key":"10559_CR106","doi-asserted-by":"crossref","unstructured":"Sun H, Liu Y, Al-Tahmeesschi A, Nag A, Soleimanpour-Moghadam M, Canberk B, Arslan H, Ahmadi H. Advancing 6G: Survey for explainable AI on communications and network slicing. IEEE Open J Commun Soc. 2025.","DOI":"10.1109\/OJCOMS.2025.3534626"},{"key":"10559_CR107","doi-asserted-by":"publisher","first-page":"83 949","DOI":"10.1109\/ACCESS.2022.3197299","volume":"10","author":"I Vaccari","year":"2022","unstructured":"Vaccari I, Carlevaro A, Narteni S, Cambiaso E, Mongelli M. Explainable and reliable against adversarial machine learning in data analytics. IEEE Access. 2022;10:83 949-83 970.","journal-title":"IEEE Access"},{"key":"10559_CR108","doi-asserted-by":"crossref","unstructured":"Sruthi CK, Ravikumar A, Sriraman H. Enhancing zero-day attack detection with XAI-driven ml models and smote analysis. In 2024 3rd International conference on artificial intelligence for internet of things (AIIoT). IEE; 2024, p. 1\u20135.","DOI":"10.1109\/AIIoT58432.2024.10574566"},{"issue":"2","key":"10559_CR109","first-page":"19","volume":"1","author":"L Gudala","year":"2021","unstructured":"Gudala L, Shaik M, Venkataramanan S. Leveraging machine learning for enhanced threat detection and response in zero trust security frameworks: an exploration of real-time anomaly identification and adaptive mitigation strategies. J Artif Intell Res. 2021;1(2):19\u201345.","journal-title":"J Artif Intell Res"},{"issue":"14","key":"10559_CR110","doi-asserted-by":"publisher","first-page":"884","DOI":"10.1007\/s10586-025-05617-1","volume":"28","author":"J Akshya","year":"2025","unstructured":"Akshya J, Sundarrajan M, Vijayakumar R, Dhanaraj RK, Nayyar A. Explainable AI-driven intrusion detection for securing IoT-enabled autonomous transportation systems. Cluster Comput. 2025;28(14):884.","journal-title":"Cluster Comput"},{"key":"10559_CR111","doi-asserted-by":"crossref","unstructured":"Masud MT, Keshk M, Moustafa N, Linkov I, Emge DK. Explainable artificial intelligence for resilient security applications in the internet of things. IEEE Open J Commun Soc. 2024.","DOI":"10.1109\/OJCOMS.2024.3413790"},{"key":"10559_CR112","doi-asserted-by":"publisher","first-page":"2106","DOI":"10.1109\/OJCOMS.2022.3215676","volume":"3","author":"SK Jagatheesaperumal","year":"2022","unstructured":"Jagatheesaperumal SK, Pham QV, Ruby R, Yang Z, Xu C, Zhang Z. Explainable AI over the internet of things (IoT): Overview, state-of-the-art and future directions. IEEE Open J Commun Soc. 2022;3:2106\u201336.","journal-title":"IEEE Open J Commun Soc"},{"key":"10559_CR113","doi-asserted-by":"crossref","unstructured":"Senevirathna T, La VH, Marchal S, Siniarski B, Liyanage M, Wang S. A Survey on XAI for 5G and beyond security: technical aspects, challenges and research directions. IEEE Commun Surv Tutor. 2024.","DOI":"10.1109\/COMST.2024.3437248"},{"issue":"6","key":"10559_CR114","first-page":"1","volume":"10","author":"MN Alam","year":"2023","unstructured":"Alam MN, Kaur M, Kabir MS. Explainable AI in healthcare: enhancing transparency and trust upon legal and ethical consideration. Int Res J Eng Technol. 2023;10(6):1\u20139.","journal-title":"Int Res J Eng Technol"},{"key":"10559_CR115","doi-asserted-by":"crossref","unstructured":"Rasheed Z, Ma Y-K, Ullah I, Tao Y, Khan I, Khan H, Shafiq M. Edge computing in the digital era: The nexus of 5G, IoT and a seamless digital future. In Future communication systems using artificial intelligence, internet of things and data science. CRC Press; 2024, p. 213\u20134.","DOI":"10.1201\/9781032648309-15"},{"key":"10559_CR116","doi-asserted-by":"publisher","first-page":"100452","DOI":"10.1016\/j.cosrev.2021.100452","volume":"43","author":"K Ahmad","year":"2022","unstructured":"Ahmad K, Maabreh M, Ghaly M, Khan K, Qadir J, Al-Fuqaha A. Developing future human-centered smart cities: critical analysis of smart city security, data management, and ethical challenges. Comput Sci Rev. 2022;43:100452.","journal-title":"Comput Sci Rev"},{"key":"10559_CR117","doi-asserted-by":"crossref","unstructured":"Aslan E, Ozupak Y, Alpsalaz F, Elbarbary ZM. A hybrid machine learning approach for predicting power transformer failures using internet of things based monitoring and explainable artificial intelligence. IEEE Access. 2025.","DOI":"10.1109\/ACCESS.2025.3583773"},{"key":"10559_CR118","doi-asserted-by":"publisher","first-page":"104358","DOI":"10.1016\/j.trc.2023.104358","volume":"156","author":"J Dong","year":"2023","unstructured":"Dong J, Chen S, Miralinaghi M, Chen T, Li P, Labi S. Why did the AI make that decision? towards an explainable artificial intelligence (XAI) for autonomous driving systems. Trans Res Part C: Emerging Technol. 2023;156:104358.","journal-title":"Trans Res Part C: Emerging Technol"},{"key":"10559_CR119","doi-asserted-by":"crossref","unstructured":"Ullah S, Li J, Ullah F, Chen J, Ali I, Khan S, Leung VC, et al. The revolution and vision of explainable AI for Android malware detection and protection. Internet Things. 2024;101320.","DOI":"10.1016\/j.iot.2024.101320"},{"issue":"6","key":"10559_CR120","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1109\/TLA.2023.10172140","volume":"21","author":"R da Silveira Lopes","year":"2023","unstructured":"da Silveira Lopes R, Duarte JC, Goldschmidt RR. False positive identification in intrusion detection using XAI. IEEE Latin Am Trans. 2023;21(6):745\u201351.","journal-title":"IEEE Latin Am Trans"},{"issue":"6","key":"10559_CR121","first-page":"455","volume":"2","author":"T Sasi","year":"2024","unstructured":"Sasi T, Lashkari AH, Lu R, Xiong P, Iqbal S. A comprehensive survey on IoT attacks: taxonomy, detection mechanisms and challenges. J Inf intell. 2024;2(6):455\u2013513.","journal-title":"J Inf intell"},{"key":"10559_CR122","doi-asserted-by":"publisher","first-page":"101344","DOI":"10.1016\/j.iot.2024.101344","volume":"28","author":"X Kong","year":"2024","unstructured":"Kong X, Lu L, Xiong K. Privacy-preserving estimation of electric vehicle charging behavior: a federated learning approach based on differential privacy. Internet Things. 2024;28:101344.","journal-title":"Internet Things"},{"issue":"10","key":"10559_CR123","doi-asserted-by":"publisher","first-page":"4170","DOI":"10.3390\/app14104170","volume":"14","author":"O Arreche","year":"2024","unstructured":"Arreche O, Guntur T, Abdallah M. XAI-IDS: toward proposing an explainable artificial intelligence framework for enhancing network intrusion detection systems. Appl Sci. 2024;14(10):4170.","journal-title":"Appl Sci"},{"key":"10559_CR124","unstructured":"Rajput RS, Dhoni PS, Patel R, Karangara R, Shende A, Kathiriya S. AI-Driven Innovations. Cari journals USA LLC, 2024."},{"key":"10559_CR125","doi-asserted-by":"crossref","unstructured":"Srivastava G, Jhaveri RH, Bhattacharya S, Pandya S, Maddikunta PKR, Yenduri G, Gadekallu TR, et al. XAI for cybersecurity: state of the art, challenges, open issues and future directions, 2022.","DOI":"10.3390\/bdcc6020047"},{"key":"10559_CR126","doi-asserted-by":"publisher","DOI":"10.1002\/spe.3319","volume-title":"Blockchain and explainable AI for enhanced decision making in cyber threat detection","author":"P Kumar","year":"2024","unstructured":"Kumar P, Javeed D, Kumar R, Islam AN. Blockchain and explainable AI for enhanced decision making in cyber threat detection. Software: Practice and Experience; 2024."},{"key":"10559_CR127","doi-asserted-by":"crossref","unstructured":"Karie NM, Sahri NMB, Yang W, Johnstone MN. Leveraging artificial intelligence capabilities for real-time monitoring of cybersecurity threats, in Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence. Cham: Springer International Publishing; 2022. p. 141\u201369.","DOI":"10.1007\/978-3-030-96630-0_7"},{"key":"10559_CR128","doi-asserted-by":"crossref","unstructured":"Albuquerque C, Neto PC, Gon\u00e7alves T, Sequeira AF. An integrated and user-friendly platform for the deployment of explainable artificial intelligence methods applied to face recognition. In International conference on human-computer interaction. Springer; 2025, p. 3\u201322.","DOI":"10.1007\/978-3-031-92840-6_1"},{"key":"10559_CR129","doi-asserted-by":"crossref","unstructured":"Kalutharage CS, Liu X, Chrysoulas C, Bamgboye O. Utilizing the ensemble learning and XAI for performance improvements in IoT network attack detection, in European Symposium on Research in Computer Security. Cham: Springer Nature Switzerland; 2023. p. 125\u201339.","DOI":"10.1007\/978-3-031-54129-2_8"},{"issue":"5","key":"10559_CR130","doi-asserted-by":"publisher","first-page":"4059","DOI":"10.1109\/JIOT.2022.3203249","volume":"10","author":"S Arisdakessian","year":"2022","unstructured":"Arisdakessian S, Wahab OA, Mourad A, Otrok H, Guizani M. A survey on IoT intrusion detection: federated learning, game theory, social psychology, and explainable AI as future directions. IEEE Internet Things J. 2022;10(5):4059\u201392.","journal-title":"IEEE Internet Things J"},{"key":"10559_CR131","unstructured":"Senevirathna T, La VH, Marchal S, Siniarski B, Liyanage M, Wang S. A survey on XAI for beyond 5G security: technical aspects, use cases, challenges and research directions, 2022."},{"issue":"1","key":"10559_CR132","doi-asserted-by":"publisher","first-page":"32","DOI":"10.62762\/TACS.2024.521915","volume":"1","author":"IU Khan","year":"2025","unstructured":"Khan IU, Zeb A, Rahman T, Khan FM, Haider ZA, Bilal H. ViTDroid and hybrid models for effective android and IoT malware detection. ICCK Trans Adv Comput Syst. 2025;1(1):32\u201347.","journal-title":"ICCK Trans Adv Comput Syst"},{"issue":"3","key":"10559_CR133","doi-asserted-by":"publisher","first-page":"1775","DOI":"10.1109\/COMST.2023.3280465","volume":"25","author":"N Moustafa","year":"2023","unstructured":"Moustafa N, Koroniotis N, Keshk M, Zomaya AY, Tari Z. Explainable intrusion detection for cyber defences in the internet of things: Opportunities and solutions. IEEE Commun Surv Tutor. 2023;25(3):1775\u2013807.","journal-title":"IEEE Commun Surv Tutor"},{"issue":"10","key":"10559_CR134","doi-asserted-by":"publisher","first-page":"10 733","DOI":"10.1007\/s10462-023-10437-z","volume":"56","author":"R Ahmad","year":"2023","unstructured":"Ahmad R, Alsmadi I, Alhamdani W, Tawalbeh L. Zero-day attack detection: a systematic literature review. Artif Intell Rev. 2023;56(10):10 733-10 811.","journal-title":"Artif Intell Rev"},{"issue":"1","key":"10559_CR135","first-page":"1","volume":"16","author":"M Al Garni","year":"2024","unstructured":"Al Garni M, Mishra S. A secure and reliable framework for explainable artificial intelligence (XAI) in smart city applications. Int J Comput Digit Syst. 2024;16(1):1\u201310.","journal-title":"Int J Comput Digit Syst"},{"key":"10559_CR136","doi-asserted-by":"publisher","first-page":"35 796","DOI":"10.1109\/ACCESS.2024.3373195","volume":"12","author":"R Alizadehsani","year":"2024","unstructured":"Alizadehsani R, Oyelere SS, Hussain S, Jagatheesaperumal SK, Calixto RR, Rahouti M, et al. Explainable artificial intelligence for drug discovery and development: a comprehensive survey. IEEE Access. 2024;12:35 796-35 812.","journal-title":"IEEE Access"},{"key":"10559_CR137","doi-asserted-by":"publisher","first-page":"105164","DOI":"10.1016\/j.imavis.2024.105164","volume":"149","author":"AN Patel","year":"2024","unstructured":"Patel AN, Murugan R, Maddikunta PKR, Yenduri G, Jhaveri RH, Zhu Y, et al. AI-powered trustable and explainable fall detection system using transfer learning. Image Vis Comput. 2024;149:105164.","journal-title":"Image Vis Comput"},{"key":"10559_CR138","doi-asserted-by":"crossref","unstructured":"Hussain A, Obaid AJ, Tyagi G, Sharma A, (Eds.) The next generation innovation in IoT and cloud computing with applications. CRC Press, 2024.","DOI":"10.1201\/9781003406723"},{"issue":"2","key":"10559_CR139","doi-asserted-by":"publisher","first-page":"2343","DOI":"10.52783\/jes.2000","volume":"20","author":"A Sanwar","year":"2024","unstructured":"Sanwar A. Explainable artificial intelligence into cyber-physical system architecture of smart cities: technologies, challenges, and opportunities. J Electr Syst. 2024;20(2):2343\u201362.","journal-title":"J Electr Syst"},{"key":"10559_CR140","doi-asserted-by":"crossref","unstructured":"Sindiramutty SR, Tan CE, Tee WJ, Lau SP, Balakrishnan S, Kaur S, Aslam MFA, et al. Modern smart cities and open research challenges and issues of explainable artificial intelligence. Adv Explain AI Appl Smart Cities. 2024;389\u2013424.","DOI":"10.4018\/978-1-6684-6361-1.ch015"},{"issue":"4","key":"10559_CR141","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.3390\/electronics12041020","volume":"12","author":"AR Javed","year":"2023","unstructured":"Javed AR, Ahmed W, Pandya S, Maddikunta PKR, Alazab M, Gadekallu TR. A survey of explainable artificial intelligence for smart cities. Electronics. 2023;12(4):1020.","journal-title":"Electronics"},{"key":"10559_CR142","unstructured":"Zhang T, Xue C, Wang J, Yun Z, Lin N, Han S. A survey on industrial Internet of Things (IIoT) testbeds for connectivity research, 2024. arXiv:2404.17485."},{"key":"10559_CR143","unstructured":"Liu W, Zhao F, Nkenyereye L, Rani S, Li K, Lv J. XAI driven intelligent iomt secure data management framework. IEEE J Biomed Health Inf. 2024."},{"issue":"1","key":"10559_CR144","first-page":"8167821","volume":"2022","author":"PN Srinivasu","year":"2022","unstructured":"Srinivasu PN, Sandhya N, Jhaveri RH, Raut R. From blackbox to explainable AI in healthcare: existing tools and case studies. Mobile Inf Syst. 2022;2022(1):8167821.","journal-title":"Mobile Inf Syst"},{"key":"10559_CR145","doi-asserted-by":"crossref","unstructured":"Alizadehsani R, Oyelere SS, Hussain S, Jagatheesaperumal SK, Calixto RR, Rahouti M, De Albuquerque VHC, et al. Explainable artificial intelligence for drug discovery and development-a comprehensive survey. IEEE Access. 2024.","DOI":"10.1109\/ACCESS.2024.3373195"},{"issue":"1","key":"10559_CR146","doi-asserted-by":"publisher","first-page":"48","DOI":"10.62762\/TACS.2025.835144","volume":"1","author":"MHA Haider","year":"2025","unstructured":"Haider MHA, Fayaz M, Zhang Y, Noureen H, Haider ZA, Khan FM, et al. Enhancing authentication security in internet of vehicles: a blockchain-driven approach for trustworthy communication. ICCK Trans Adv Comput Syst. 2025;1(1):48\u201362.","journal-title":"ICCK Trans Adv Comput Syst"},{"key":"10559_CR147","doi-asserted-by":"publisher","first-page":"117 761","DOI":"10.1109\/ACCESS.2024.3422999","volume":"12","author":"A Abdusalomov","year":"2024","unstructured":"Abdusalomov A, Kilichev D, Nasimov R, Rakhmatullayev I, Im Cho Y. Optimizing smart home intrusion detection with harmony-enhanced extra trees. IEEE Access. 2024;12:117 761-117 786.","journal-title":"IEEE Access"},{"issue":"6","key":"10559_CR148","doi-asserted-by":"publisher","first-page":"7876","DOI":"10.1007\/s11227-023-05764-5","volume":"80","author":"BS Ali","year":"2024","unstructured":"Ali BS, Ullah I, Al Shloul T, Khan IA, Khan I, Ghadi YY, et al. ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ics networks. J Supercomput. 2024;80(6):7876\u2013905.","journal-title":"J Supercomput"},{"key":"10559_CR149","doi-asserted-by":"crossref","unstructured":"Lampathaki F, Agostinho C, Glikman Y, Sesana M. Moving from \u2018black box\u2019to \u2018glass box\u2019artificial intelligence in manufacturing with XMANAI. In 2021 IEEE international conference on engineering, technology and innovation (ICE\/ITMC). IEEE; 2021, p. 1\u20136.","DOI":"10.1109\/ICE\/ITMC52061.2021.9570236"},{"key":"10559_CR150","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.jmapro.2023.05.016","volume":"99","author":"A Hanchate","year":"2023","unstructured":"Hanchate A, Bukkapatnam ST, Lee KH, Srivastava A, Kumara S. Explainable AI (XAI)-driven vibration sensing scheme for surface quality monitoring in a smart surface grinding process. J Manuf Process. 2023;99:184\u201394.","journal-title":"J Manuf Process"},{"issue":"1","key":"10559_CR151","doi-asserted-by":"publisher","first-page":"132","DOI":"10.48175\/IJARSCT-23624","volume":"5","author":"G Agarwal","year":"2025","unstructured":"Agarwal G. Explainable AI (XAI) for cyber defense: enhancing transparency and trust in AI-driven security solutions. Int J Adv Res Sci Commun Technol. 2025;5(1):132\u20138.","journal-title":"Int J Adv Res Sci Commun Technol"},{"issue":"1","key":"10559_CR152","first-page":"7671967","volume":"2022","author":"H Naeem","year":"2022","unstructured":"Naeem H, Alshammari BM, Ullah F. Explainable artificial intelligence-based IoT device malware detection mechanism using image visualization and fine-tuned CNN-based transfer learning model. Comput Intell Neurosci. 2022;2022(1):7671967.","journal-title":"Comput Intell Neurosci"},{"key":"10559_CR153","doi-asserted-by":"publisher","first-page":"100651","DOI":"10.1016\/j.cosrev.2024.100651","volume":"53","author":"I Ullah","year":"2024","unstructured":"Ullah I, Adhikari D, Khan H, Anwar MS, Ahmad S, Bai X. Mobile robot localization: current challenges and future prospective. Comput Sci Rev. 2024;53:100651.","journal-title":"Comput Sci Rev"},{"key":"10559_CR154","doi-asserted-by":"crossref","unstructured":"Sindiramutty SR, Tan CE, Tee WJ, Lau SP, Balakrishnan S, Kaur S, Aslam MFA, et al. Modern smart cities and open research challenges and issues of explainable artificial intelligence. Adv Explain AI Appl Smart Cities. 2024;389\u2013424.","DOI":"10.4018\/978-1-6684-6361-1.ch015"},{"key":"10559_CR155","doi-asserted-by":"crossref","unstructured":"Dey S, Roy A, Das S. Home automation using internet of thing. In 2016 IEEE 7th annual ubiquitous computing, electronics & mobile communication conference (UEMCON). IEEE; 2016, p. 1\u20136.","DOI":"10.1109\/UEMCON.2016.7777826"},{"issue":"6","key":"10559_CR156","doi-asserted-by":"publisher","first-page":"2412","DOI":"10.1109\/TKDE.2019.2954510","volume":"33","author":"S Du","year":"2019","unstructured":"Du S, Li T, Yang Y, Horng SJ. Deep air quality forecasting using hybrid deep learning framework. IEEE Trans Knowl Data Eng. 2019;33(6):2412\u201324.","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"3","key":"10559_CR157","doi-asserted-by":"publisher","first-page":"180","DOI":"10.62762\/TACS.2025.952297","volume":"1","author":"FM Khan","year":"2025","unstructured":"Khan FM, Haider ZA, Khan MO, Ullah A, Khan MS, Fayaz M, et al. Intelligent cyber-attack detection for autonomous vehicles using advanced deep learning models. ICCK Trans Adv Comput Syst. 2025;1(3):180\u201392.","journal-title":"ICCK Trans Adv Comput Syst"},{"issue":"1","key":"10559_CR158","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3017678","volume":"50","author":"T Li","year":"2017","unstructured":"Li T, Xie N, Zeng C, Zhou W, Zheng L, Jiang Y, et al. Data-driven techniques in disaster information management. ACM Comput Surv (CSUR). 2017;50(1):1\u201345.","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"1","key":"10559_CR159","doi-asserted-by":"publisher","first-page":"8","DOI":"10.70267\/cai.25v2n1.0815","volume":"2","author":"Z Fu","year":"2025","unstructured":"Fu Z. The current development and future prospects of autonomous driving driven by artificial intelligence. Comput Artif Intell. 2025;2(1):8\u201315.","journal-title":"Comput Artif Intell"},{"issue":"1","key":"10559_CR160","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1080\/17480930.2017.1336607","volume":"33","author":"A Moradi Afrapoli","year":"2019","unstructured":"Moradi Afrapoli A, Askari-Nasab H. Mining fleet management systems: a review of models and algorithms. Int J Mining, Reclam Environ. 2019;33(1):42\u201360.","journal-title":"Int J Mining, Reclam Environ"},{"issue":"6","key":"10559_CR161","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.3390\/app15063121","volume":"15","author":"A Orman","year":"2025","unstructured":"Orman A. Cyberattack detection systems in industrial internet of things (IIoT) networks in big data environments. Appl Sci. 2025;15(6):3121.","journal-title":"Appl Sci"},{"key":"10559_CR162","doi-asserted-by":"crossref","unstructured":"Poupart P, Chen Z, Jaini P, Fung F, Susanto H, Geng Y, Jin H. Online flow size prediction for improved network routing. In 2016 IEEE 24th international conference on network protocols (ICNP). IEEE; 2016, p. 1\u20136.","DOI":"10.1109\/ICNP.2016.7785324"},{"issue":"1","key":"10559_CR163","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s40537-017-0077-4","volume":"4","author":"J Majumdar","year":"2017","unstructured":"Majumdar J, Naraseeyappa S, Ankalaki S. Analysis of agriculture data using data mining techniques: application of big data. J Big Data. 2017;4(1):20.","journal-title":"J Big Data"},{"key":"10559_CR164","doi-asserted-by":"publisher","first-page":"100408","DOI":"10.1016\/j.sbsr.2021.100408","volume":"32","author":"S Neethirajan","year":"2021","unstructured":"Neethirajan S, Kemp B. Digital livestock farming. Sens Bio-Sens Res. 2021;32:100408.","journal-title":"Sens Bio-Sens Res"},{"key":"10559_CR165","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.compag.2018.10.001","volume":"155","author":"R Sharma","year":"2018","unstructured":"Sharma R, Kamble SS, Gunasekaran A. Big GIS analytics framework for agriculture supply chains: a literature review identifying the current trends and future perspectives. Comput Electron Agri. 2018;155:103\u201320.","journal-title":"Comput Electron Agri"},{"issue":"4","key":"10559_CR166","doi-asserted-by":"publisher","first-page":"208","DOI":"10.62762\/TACS.2025.560376","volume":"1","author":"MH Nawaz","year":"2025","unstructured":"Nawaz MH, Ahsan A, Khan IU, Wang Y, Ahmad M, Akhtar MS. Mitigating message injection attacks in internet of vehicles using deep learning based intrusion detection system. ICCK Trans Adv Comput Syst. 2025;1(4):208\u201321.","journal-title":"ICCK Trans Adv Comput Syst"},{"issue":"1","key":"10559_CR167","doi-asserted-by":"publisher","first-page":"2393743","DOI":"10.1080\/23311975.2024.2393743","volume":"11","author":"HK Alhitmi","year":"2024","unstructured":"Alhitmi HK, Mardiah A, Al-Sulaiti KI, Abbas J. Data security and privacy concerns of AI-driven marketing in the context of economics and business field: an exploration into possible solutions. Cogent Bus Managx. 2024;11(1):2393743.","journal-title":"Cogent Bus Managx"},{"issue":"12","key":"10559_CR168","doi-asserted-by":"publisher","first-page":"4102","DOI":"10.3390\/app10124102","volume":"10","author":"LA Tawalbeh","year":"2020","unstructured":"Tawalbeh LA, Muheidat F, Tawalbeh M, Quwaider M. IoT privacy and security: challenges and solutions. Appl Sci. 2020;10(12):4102.","journal-title":"Appl Sci"},{"issue":"5","key":"10559_CR169","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1109\/MNET.211.2000526","volume":"35","author":"S Garg","year":"2021","unstructured":"Garg S, Kaur K, Kaddoum G, Garigipati P, Aujla GS. Security in IoT-driven mobile edge computing: new paradigms, challenges, and opportunities. IEEE Netw. 2021;35(5):298\u2013305.","journal-title":"IEEE Netw"},{"key":"10559_CR170","doi-asserted-by":"publisher","first-page":"102324","DOI":"10.1016\/j.scs.2020.102324","volume":"61","author":"MA Rahman","year":"2020","unstructured":"Rahman MA, Asyhari AT, Leong LS, Satrya GB, Tao MH, Zolkipli MF. Scalable machine learning-based intrusion detection system for IoT-enabled smart cities. Sustain Cities Soc. 2020;61:102324.","journal-title":"Sustain Cities Soc"},{"issue":"16","key":"10559_CR171","doi-asserted-by":"publisher","first-page":"147 64","DOI":"10.1109\/JIOT.2023.3287678","volume":"10","author":"I K\u00f6k","year":"2023","unstructured":"K\u00f6k I, Okay FY, Muyanl\u0131 \u00d6, \u00d6zdemir S. Explainable artificial intelligence (xai) for internet of things: a survey. IEEE Internet Things J. 2023;10(16):147 64-147 79.","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"10559_CR172","doi-asserted-by":"publisher","first-page":"e70168","DOI":"10.1111\/exsy.70168","volume":"43","author":"FM Khan","year":"2026","unstructured":"Khan FM, Zeb A, Rahman T, Ullah I, Alturki N, Bashir AK, et al. Federated deep learning for collision avoidance in IoV with digital twin integration. Expert Syst. 2026;43(1):e70168.","journal-title":"Expert Syst"},{"key":"10559_CR173","doi-asserted-by":"crossref","unstructured":"Hoenig A, Roy K, Acquaah Y, Yi S, Desai S. Explainable AI for cyber-physical systems: issues and challenges. IEEE Access. 2024.","DOI":"10.1109\/ACCESS.2024.3395444"},{"issue":"16","key":"10559_CR174","doi-asserted-by":"publisher","first-page":"3218","DOI":"10.3390\/electronics14163218","volume":"14","author":"M Georgiades","year":"2025","unstructured":"Georgiades M, Hussain F. An explainable AI approach for interpretable cross-layer intrusion detection in internet of medical things. Electronics. 2025;14(16):3218.","journal-title":"Electronics"},{"issue":"3","key":"10559_CR175","first-page":"1","volume":"3","author":"BY Kasula","year":"2021","unstructured":"Kasula BY. Ethical and regulatory considerations in AI-driven healthcare solutions. Int Meridian J. 2021;3(3):1\u20138.","journal-title":"Int Meridian J"},{"key":"10559_CR176","doi-asserted-by":"crossref","unstructured":"Sehito N, Yang S, Larik RSA, Kamal MM, Alwabli A, Ullah I. Artificial intelligence (AI) and internet of things (IoT) applications in sustainable technology. In Artificial general intelligence (AGI) security: smart applications and sustainable technologies. Springer; 2024, p. 227\u201346.","DOI":"10.1007\/978-981-97-3222-7_11"},{"issue":"3","key":"10559_CR177","first-page":"4307","volume":"85","author":"IU Khan","year":"2025","unstructured":"Khan IU, Khan FM, Haider ZA, Alturise F. Integrating AI, blockchain, and edge computing for zero-trust IoT security: a comprehensive review of advanced cybersecurity framework. Comput Mater Contin. 2025;85(3):4307\u201344.","journal-title":"Comput Mater Contin"},{"issue":"8","key":"10559_CR178","first-page":"1","volume":"11","author":"A Nassar","year":"2021","unstructured":"Nassar A, Kamal M. Ethical dilemmas in AI-powered decision-making: a deep dive into big data-driven ethical considerations. Int J Respon Artif Intell. 2021;11(8):1\u201311.","journal-title":"Int J Respon Artif Intell"},{"issue":"2","key":"10559_CR179","doi-asserted-by":"publisher","first-page":"450","DOI":"10.3390\/s22020450","volume":"22","author":"HG Abreha","year":"2022","unstructured":"Abreha HG, Hayajneh M, Serhani MA. Federated learning in edge computing: a systematic survey. Sensors. 2022;22(2):450.","journal-title":"Sensors"},{"key":"10559_CR180","unstructured":"Usman MT, Khan H, Singh SK, Lee MY, Koo J. Efficient deepfake detection via layer-frozen assisted dual attention network for consumer imaging devices. IEEE Trans Consumer Electron. 2024."},{"issue":"16","key":"10559_CR181","doi-asserted-by":"publisher","first-page":"128 06","DOI":"10.1109\/JIOT.2021.3072611","volume":"8","author":"DC Nguyen","year":"2021","unstructured":"Nguyen DC, Ding M, Pham QV, Pathirana PN, Le LB, Seneviratne A, et al. Federated learning meets blockchain in edge computing: opportunities and challenges. IEEE Internet Things J. 2021;8(16):128 06-128 25.","journal-title":"IEEE Internet Things J"},{"key":"10559_CR182","doi-asserted-by":"crossref","unstructured":"Islam MU, Mozaharul Mottalib M, Hassan M, Alam ZI, Zobaed SM, Fazle Rabby M. The past, present, and prospective future of XAI: A comprehensive review. Explainable artificial intelligence for cyber security: Next generation artificial intelligence, 2022, p. 1\u201329.","DOI":"10.1007\/978-3-030-96630-0_1"},{"key":"10559_CR183","doi-asserted-by":"publisher","first-page":"110273","DOI":"10.1016\/j.knosys.2023.110273","volume":"263","author":"W Saeed","year":"2023","unstructured":"Saeed W, Omlin C. Explainable AI (XAI): A systematic meta-survey of current challenges and future opportunities. Knowl-Based Syst. 2023;263:110273.","journal-title":"Knowl-Based Syst"},{"key":"10559_CR184","doi-asserted-by":"publisher","first-page":"101805","DOI":"10.1016\/j.inffus.2023.101805","volume":"99","author":"S Ali","year":"2023","unstructured":"Ali S, Abuhmed T, El-Sappagh S, Muhammad K, Alonso-Moral JM, Confalonieri R, et al. Explainable artificial intelligence (XAI): What we know and what is left to attain trustworthy artificial intelligence. Inf fusion. 2023;99:101805.","journal-title":"Inf fusion"},{"issue":"4","key":"10559_CR185","first-page":"383","volume":"31","author":"M Benleulmi","year":"2025","unstructured":"Benleulmi M, Gasmi I, Azizi N, Dey N. Explainable AI and deep learning models for recommender systems: State of the art and challenges. J Univ Comput Sci. 2025;31(4):383.","journal-title":"J Univ Comput Sci"},{"key":"10559_CR186","doi-asserted-by":"crossref","unstructured":"Messinis S, Temenos N, Protonotarios NE, Rallis I, Kalogeras D, Doulamis N. Enhancing internet of medical things security with artificial intelligence: a comprehensive review. Comput Biol Med. 2024;108036.","DOI":"10.1016\/j.compbiomed.2024.108036"},{"issue":"1","key":"10559_CR187","doi-asserted-by":"publisher","first-page":"30","DOI":"10.36548\/jtcsst.2023.1.003","volume":"5","author":"B Sarker","year":"2023","unstructured":"Sarker B, Sharif NB, Rahman MA, Parvez AS. AI, IoMT and blockchain in healthcare. J Trends Comput Sci Smart Technol. 2023;5(1):30\u201350.","journal-title":"J Trends Comput Sci Smart Technol"},{"key":"10559_CR188","doi-asserted-by":"publisher","first-page":"101312","DOI":"10.1016\/j.iot.2024.101312","volume":"27","author":"MN Khan","year":"2024","unstructured":"Khan MN, Khalil I, Ullah I, Singh SK, Dhahbi S, Khan H, et al. Self-adaptive and content-based scheduling for reducing idle listening and overhearing in securing quantum IoT sensors. Internet Things. 2024;27:101312.","journal-title":"Internet Things"},{"issue":"8","key":"10559_CR189","first-page":"1","volume":"11","author":"A Nassar","year":"2021","unstructured":"Nassar A, Kamal M. Ethical dilemmas in AI-powered decision-making: a deep dive into big data-driven ethical considerations. Int J Respons Artif Intell. 2021;11(8):1\u201311.","journal-title":"Int J Respons Artif Intell"},{"key":"10559_CR190","doi-asserted-by":"crossref","unstructured":"Fares NY, Jammal M. I-driven IoT systems and corresponding ethical issues. In AI and Society. \/CRC: Chapman and Hall; 2023, p. 233\u201348.","DOI":"10.1201\/9781003261247-17"},{"issue":"1","key":"10559_CR191","first-page":"11","volume":"10","author":"S Tatineni","year":"2019","unstructured":"Tatineni S. Ethical considerations in AI and data science: Bias, fairness, and accountability. Int J Inf Technol Manag Inf Syst (IJITMIS). 2019;10(1):11\u201321.","journal-title":"Int J Inf Technol Manag Inf Syst (IJITMIS)"}],"container-title":["Cognitive Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-026-10559-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12559-026-10559-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-026-10559-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T10:03:36Z","timestamp":1771581816000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12559-026-10559-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,20]]},"references-count":191,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,12]]}},"alternative-id":["10559"],"URL":"https:\/\/doi.org\/10.1007\/s12559-026-10559-w","relation":{},"ISSN":["1866-9956","1866-9964"],"issn-type":[{"value":"1866-9956","type":"print"},{"value":"1866-9964","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,20]]},"assertion":[{"value":"16 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"16"}}