{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T17:23:31Z","timestamp":1771262611150,"version":"3.50.1"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T00:00:00Z","timestamp":1744156800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T00:00:00Z","timestamp":1744156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s40860-025-00248-0","type":"journal-article","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T21:20:37Z","timestamp":1744233637000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["PETDA2C-EC: a privacy-enhancing technique to detect attacks against confidentiality in edge computing"],"prefix":"10.1007","volume":"11","author":[{"given":"Vipin","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Vivek","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,9]]},"reference":[{"key":"248_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-3668-7_11","volume-title":"5G and beyond. Springer tracts in electrical and electronics engineering","author":"AKM Bahalul Haque","year":"2023","unstructured":"Bahalul Haque AKM, Zihad MOM, Hasan MR (2023) 5G and internet of things\u2014integration trends, opportunities, and future research avenues. In: Bhushan B, Sharma SK, Kumar R, Priyadarshini I (eds) 5G and beyond. Springer tracts in electrical and electronics engineering. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-99-3668-7_11"},{"key":"248_CR2","unstructured":"Statista (2022) Size of the internet of things (IoT) security market worldwide from 2016 to 2025. https:\/\/www.statista.com\/statistics\/993789\/worldwide-internet-of-things-security-market-size"},{"key":"248_CR3","unstructured":"IoT Business News (2022) State of IoT 2022: number of connected IoT devices growing 18% to 14.4 billion globally. https:\/\/iotbusinessnews.com\/2022\/05\/19\/70343-state-of-iot-2022-number-of-connected-iot-devices-growing-18-to-14-4-billion-globally\/. Accessed 10 Jul 2024"},{"key":"248_CR4","unstructured":"Vailshery LS (2024) Number of IoT connected devices worldwide 2019\u20132030. https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide\/"},{"issue":"3","key":"248_CR5","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/TGCN.2024.3396454","volume":"8","author":"A Ayub Khan","year":"2024","unstructured":"Ayub Khan A et al (2024) ORAN-B5G: a next-generation open radio access network architecture with machine learning for beyond 5G in Industrial 5.0. IEEE Trans Green Commun Netw 8(3):1026\u20131036. https:\/\/doi.org\/10.1109\/TGCN.2024.3396454","journal-title":"IEEE Trans Green Commun Netw"},{"key":"248_CR6","doi-asserted-by":"publisher","unstructured":"V\u00e9gh J, Tisan A (2019) The need for modern computing paradigm: science applied to computing. In: 2019 International conference on computational science and computational intelligence (CSCI), Las Vegas, NV, USA, pp 1523\u20131532. https:\/\/doi.org\/10.1109\/CSCI49370.2019.00283","DOI":"10.1109\/CSCI49370.2019.00283"},{"key":"248_CR7","doi-asserted-by":"publisher","first-page":"150936","DOI":"10.1109\/ACCESS.2019.2947652","volume":"7","author":"M De Donno","year":"2019","unstructured":"De Donno M, Tange K, Dragoni N (2019) Foundations and evolution of modern computing paradigms: Cloud, IoT, Edge, and Fog. IEEE Access 7:150936\u2013150948. https:\/\/doi.org\/10.1109\/ACCESS.2019.2947652","journal-title":"IEEE Access"},{"issue":"8","key":"248_CR8","doi-asserted-by":"publisher","first-page":"1537","DOI":"10.1109\/JPROC.2019.2920341","volume":"107","author":"F Liu","year":"2019","unstructured":"Liu F, Tang G, Li Y, Cai Z, Zhang X, Zhou T (2019) A survey on edge computing systems and tools. Proc IEEE 107(8):1537\u20131562. https:\/\/doi.org\/10.1109\/JPROC.2019.2920341","journal-title":"Proc IEEE"},{"issue":"3","key":"248_CR9","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.3390\/s23031639","volume":"23","author":"A Bourechak","year":"2023","unstructured":"Bourechak A, Zedadra O, Kouahla MN, Guerrieri A, Seridi H, Fortino G (2023) At the confluence of artificial intelligence and edge computing in IoT-based applications: a review and new perspectives. Sensors 23(3):1639. https:\/\/doi.org\/10.3390\/s23031639","journal-title":"Sensors"},{"key":"248_CR10","first-page":"e1933","volume":"10","author":"A Ayub Khan","year":"2024","unstructured":"Ayub Khan A, Laghari AA, Baqasah AM, Alroobaea R, Almadhor A, Sampedro GA, Kryvinska N (2024) Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing. PeerJ Comput Sci 10:e1933","journal-title":"PeerJ Comput Sci"},{"key":"248_CR11","doi-asserted-by":"publisher","first-page":"205340","DOI":"10.1109\/ACCESS.2020.3037108","volume":"8","author":"SA Bhat","year":"2020","unstructured":"Bhat SA, Sofi IB, Chi C-Y (2020) Edge computing and its convergence with blockchain in 5G and beyond: security, challenges, and opportunities. IEEE Access 8:205340\u2013205373. https:\/\/doi.org\/10.1109\/ACCESS.2020.3037108","journal-title":"IEEE Access"},{"key":"248_CR12","unstructured":"O\u2019Donnell L (2024) More than half of IoT devices vulnerable to severe attacks. https:\/\/threatpost.com\/half-iot-devices-vulnerable-severe-attacks\/153609\/"},{"key":"248_CR13","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1016\/j.procs.2019.11.018","volume":"160","author":"S Parikli","year":"2019","unstructured":"Parikli S, Dave D, Patel R, Doshi N (2019) Security and privacy issues in cloud, fog, and edge computing. Procedia Comput Sci 160:734\u2013739","journal-title":"Procedia Comput Sci"},{"key":"248_CR14","unstructured":"Mohanakrishnan R (2022) Top 10 applications of IoT in 2022. https:\/\/www.spiceworks.com\/tech\/iot\/articles\/top-applications-internet-of-things\/. Accessed 10 Jul 2024"},{"issue":"8","key":"248_CR15","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.1109\/JPROC.2019.2918437","volume":"107","author":"Y Xiao","year":"2019","unstructured":"Xiao Y, Jia Y, Liu C, Cheng X, Yu J, Lv W (2019) Edge computing security: State of the art and challenges. Proc IEEE 107(8):1608\u20131631. https:\/\/doi.org\/10.1109\/JPROC.2019.2918437","journal-title":"Proc IEEE"},{"key":"248_CR16","series-title":"Lecture notes in computer science","volume-title":"Edge computing\u2014EDGE 2019","author":"S Raponi","year":"2019","unstructured":"Raponi S, Caprolu M, Di Pietro R (2019) Intrusion detection at the network edge: solutions, limitations, and future directions. In: Zhang T, Wei J, Zhang LJ (eds) Edge computing\u2014EDGE 2019, vol 11520. Lecture notes in computer science. Springer, Cham"},{"key":"248_CR17","doi-asserted-by":"publisher","first-page":"157727","DOI":"10.1109\/ACCESS.2021.3129336","volume":"9","author":"M Ozkan-Okay","year":"2021","unstructured":"Ozkan-Okay M, Samet R, Aslan \u00d6, Gupta D (2021) A comprehensive systematic literature review on intrusion detection systems. IEEE Access 9:157727\u2013157760. https:\/\/doi.org\/10.1109\/ACCESS.2021.3129336","journal-title":"IEEE Access"},{"key":"248_CR18","unstructured":"Boubertakh O, Maamri R, Sahnoun A (2023) An overview of machine and deep learning-based intrusion detection systems in the internet of things. RIF. https:\/\/api.semanticscholar.org\/CorpusID:267020550"},{"issue":"2","key":"248_CR19","doi-asserted-by":"publisher","first-page":"30","DOI":"10.9734\/ajrcos\/2021\/v9i230218","volume":"9","author":"SH Haji","year":"2021","unstructured":"Haji SH, Ameen SY (2021) Attack and anomaly detection in IoT networks using machine learning techniques: a review. Asian J Res Comput Sci 9(2):30\u201346. https:\/\/doi.org\/10.9734\/ajrcos\/2021\/v9i230218","journal-title":"Asian J Res Comput Sci"},{"issue":"4","key":"248_CR20","doi-asserted-by":"publisher","first-page":"14","DOI":"10.9734\/ajrcos\/2021\/v7i430185","volume":"7","author":"M Ghurab","year":"2021","unstructured":"Ghurab M, Gaphari G, Alshami F, Alshamy R, Othman S (2021) A detailed analysis of benchmark datasets for network intrusion detection system. Asian J Res Comput Sci 7(4):14\u201333. https:\/\/doi.org\/10.9734\/ajrcos\/2021\/v7i430185","journal-title":"Asian J Res Comput Sci"},{"key":"248_CR21","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.cose.2019.06.005","volume":"86","author":"M Ring","year":"2019","unstructured":"Ring M, Wunderlich S, Scheuring D, Landes D, Hotho A (2019) A survey of network-based intrusion detection data sets. Comput Secur 86:147\u2013167. https:\/\/doi.org\/10.1016\/j.cose.2019.06.005","journal-title":"Comput Secur"},{"key":"248_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100887","volume":"23","author":"ML Hernandez-Jaimes","year":"2023","unstructured":"Hernandez-Jaimes ML, Martinez-Cruz A, Ram\u00edrez-Guti\u00e9rrez KA, Feregrino-Uribe C (2023) Artificial intelligence for IoMT security: a review of intrusion detection systems, attacks, datasets and Cloud\u2013Fog\u2013Edge architectures. Internet Things 23:100887. https:\/\/doi.org\/10.1016\/j.iot.2023.100887","journal-title":"Internet Things"},{"issue":"19","key":"248_CR23","doi-asserted-by":"publisher","first-page":"9572","DOI":"10.3390\/app12199572","volume":"12","author":"I Tareq","year":"2022","unstructured":"Tareq I, Elbagoury BM, El-Regaily S, El-Horbaty E-SM (2022) Analysis of ToN-IoT, UNW-NB15, and Edge-IIoT datasets using DL in cybersecurity for IoT. Appl Sci 12(19):9572. https:\/\/doi.org\/10.3390\/app12199572","journal-title":"Appl Sci"},{"issue":"1","key":"248_CR24","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/JIOT.2021.3098051","volume":"9","author":"S Singh","year":"2022","unstructured":"Singh S, Sulthana R, Shewale T, Chamola V, Benslimane A, Sikdar B (2022) Machine-learning-assisted security and privacy provisioning for edge computing: a survey. IEEE Internet Things J 9(1):236\u2013260. https:\/\/doi.org\/10.1109\/JIOT.2021.3098051","journal-title":"IEEE Internet Things J"},{"key":"248_CR25","series-title":"Advances in information security","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57328-7_6","volume-title":"Fog\/edge computing for security, privacy, and applications","author":"Q Xia","year":"2021","unstructured":"Xia Q, Tao Z, Li Q (2021) Privacy issues in edge computing. In: Chang W, Wu J (eds) Fog\/edge computing for security, privacy, and applications, vol 83. Advances in information security. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-57328-7_6"},{"key":"248_CR26","doi-asserted-by":"publisher","first-page":"76541","DOI":"10.1109\/ACCESS.2020.2989456","volume":"8","author":"M Yahuza","year":"2020","unstructured":"Yahuza M et al (2020) Systematic review on security and privacy requirements in edge computing: state of the art and future research opportunities. IEEE Access 8:76541\u201376567. https:\/\/doi.org\/10.1109\/ACCESS.2020.2989456","journal-title":"IEEE Access"},{"issue":"6","key":"248_CR27","doi-asserted-by":"publisher","first-page":"Article 122","DOI":"10.1145\/3417987","volume":"53","author":"N Waheed","year":"2021","unstructured":"Waheed N, He X, Ikram M, Usman M, Hashmi SS, Usman M (2021) Security and privacy in IoT using machine learning and blockchain: threats and countermeasures. ACM Comput Surv 53(6):Article 122. https:\/\/doi.org\/10.1145\/3417987","journal-title":"ACM Comput Surv"},{"key":"248_CR28","doi-asserted-by":"publisher","unstructured":"Gao L, Luan TH, Gu B, Qu Y, Xiang Y (2021) Privacy issues in edge computing. In: privacy-preserving in edge computing. Wireless networks. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-16-2199-4_2","DOI":"10.1007\/978-981-16-2199-4_2"},{"issue":"2","key":"248_CR29","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1016\/j.gltp.2021.08.045","volume":"2","author":"M Keerthika","year":"2021","unstructured":"Keerthika M, Shanmugapriya D (2021) Wireless sensor networks: active and passive attacks\u2014vulnerabilities and countermeasures. Glob Transit Proc 2(2):362\u2013367. https:\/\/doi.org\/10.1016\/j.gltp.2021.08.045","journal-title":"Glob Transit Proc"},{"key":"248_CR30","doi-asserted-by":"publisher","first-page":"97","DOI":"10.14257\/ijfgcn.2013.6.5.10","volume":"6","author":"MA Chowdhury","year":"2013","unstructured":"Chowdhury MA, Kader MF (2013) Security Issues in wireless sensor networks: a survey. IFGN 6:97\u2013116. https:\/\/doi.org\/10.14257\/ijfgcn.2013.6.5.10","journal-title":"IFGN"},{"key":"248_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102481","author":"J Sengupta","year":"2019","unstructured":"Sengupta J, Ruj S, Dasbit S (2019) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J Netw Comput Appl. https:\/\/doi.org\/10.1016\/j.jnca.2019.102481","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"248_CR32","first-page":"30","volume":"8","author":"A Ullah Karimy","year":"2023","unstructured":"Ullah Karimy A, Reddy PC (2023) Securing the internet of things: a study on machine learning-based solutions for IoT security and privacy challenges. ZKG Int 8(2):30\u201365","journal-title":"ZKG Int"},{"key":"248_CR33","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1007\/s42979-023-02242-w","volume":"4","author":"V Kumar","year":"2023","unstructured":"Kumar V, Kumar V, Singh N et al (2023) Enhancing intrusion detection system performance to detect attacks on edge of things. SN Comput Sci 4:802. https:\/\/doi.org\/10.1007\/s42979-023-02242-w","journal-title":"SN Comput Sci"},{"key":"248_CR34","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s11036-021-01843-0","volume":"27","author":"M Sarhan","year":"2022","unstructured":"Sarhan M, Layeghy S, Portmann M (2022) Towards a standard feature set for network intrusion detection system datasets. Mob Netw Appl 27:357\u2013370. https:\/\/doi.org\/10.1007\/s11036-021-01843-0","journal-title":"Mob Netw Appl"},{"key":"248_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04270-4","author":"N Biyyapu","year":"2024","unstructured":"Biyyapu N, Veerapaneni EJ, Surapaneni PP et al (2024) Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection. Clust Comput. https:\/\/doi.org\/10.1007\/s10586-024-04270-4","journal-title":"Clust Comput"},{"key":"248_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100206","volume":"7","author":"AK Dey","year":"2023","unstructured":"Dey AK, Gupta GP, Sahu SP (2023) A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks. Decis Anal J 7:100206. https:\/\/doi.org\/10.1016\/j.dajour.2023.100206","journal-title":"Decis Anal J"},{"key":"248_CR37","doi-asserted-by":"publisher","first-page":"314","DOI":"10.3390\/info13070314","volume":"13","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Zhang H, Zhang B (2022) An effective ensemble automatic feature selection method for network intrusion detection. Information 13:314. https:\/\/doi.org\/10.3390\/info13070314","journal-title":"Information"},{"key":"248_CR38","doi-asserted-by":"publisher","first-page":"5568","DOI":"10.3390\/s23125568","volume":"23","author":"Y Alotaibi","year":"2023","unstructured":"Alotaibi Y, Ilyas M (2023) Ensemble-learning framework for intrusion detection to enhance internet of things\u2019 devices security. Sensors 23:5568. https:\/\/doi.org\/10.3390\/s23125568","journal-title":"Sensors"},{"key":"248_CR39","doi-asserted-by":"publisher","first-page":"9583","DOI":"10.3390\/s23239583","volume":"23","author":"S Chalichalamala","year":"2023","unstructured":"Chalichalamala S, Govindan N, Kasarapu R (2023) Logistic regression ensemble classifier for intrusion detection system in internet of things. Sensors 23:9583. https:\/\/doi.org\/10.3390\/s23239583","journal-title":"Sensors"},{"issue":"3","key":"248_CR40","doi-asserted-by":"publisher","first-page":"2010","DOI":"10.11591\/ijeecs.v35.i3.pp2010-2020","volume":"35","author":"S El Hajla","year":"2024","unstructured":"El Hajla S, Ennaji E, Maleh Y, Mounir S (2024) Enhancing IoT network defense: advanced intrusion detection via ensemble learning techniques. Indones J Electr Eng Comput Sci 35(3):2010\u20132020. https:\/\/doi.org\/10.11591\/ijeecs.v35.i3.pp2010-2020","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"248_CR41","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.aej.2023.09.023","volume":"81","author":"S Soliman","year":"2023","unstructured":"Soliman S, Oudah W, Aljuhani A (2023) Deep learning-based intrusion detection approach for securing industrial Internet of Things. Alex Eng J 81:371\u2013383. https:\/\/doi.org\/10.1016\/j.aej.2023.09.023","journal-title":"Alex Eng J"},{"key":"248_CR42","doi-asserted-by":"publisher","first-page":"10754","DOI":"10.1109\/ACCESS.2022.3145002","volume":"10","author":"T Kim","year":"2022","unstructured":"Kim T, Pak W (2022) Robust network intrusion detection system based on machine-learning with early classification. IEEE Access 10:10754\u201310767. https:\/\/doi.org\/10.1109\/ACCESS.2022.3145002","journal-title":"IEEE Access"},{"key":"248_CR43","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.3390\/sym14071461","volume":"14","author":"DN Mhawi","year":"2022","unstructured":"Mhawi DN, Aldallal A, Hassan S (2022) Advanced feature-selection-based hybrid ensemble learning algorithms for network intrusion detection systems. Symmetry 14:1461. https:\/\/doi.org\/10.3390\/sym14071461","journal-title":"Symmetry"},{"key":"248_CR44","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1007\/s10586-023-04102-x","volume":"27","author":"AV Hanafi","year":"2024","unstructured":"Hanafi AV, Ghaffari A, Rezaei H et al (2024) Intrusion detection in Internet of Things using improved binary golden jackal optimization algorithm and LSTM. Clust Comput 27:2673\u20132690. https:\/\/doi.org\/10.1007\/s10586-023-04102-x","journal-title":"Clust Comput"},{"key":"248_CR45","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/s10207-023-00767-y","volume":"23","author":"H Zouhri","year":"2024","unstructured":"Zouhri H, Idri A, Ratnani A (2024) Evaluating the impact of filter-based feature selection in intrusion detection systems. Int J Inf Secur 23:759\u2013785. https:\/\/doi.org\/10.1007\/s10207-023-00767-y","journal-title":"Int J Inf Secur"},{"key":"248_CR46","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-024-03152-1","author":"V Kumar","year":"2024","unstructured":"Kumar V, Kumar V, Singh N (2024) P3IDF-EC: PCA-based privacy-preserving intrusion detection framework for edge computing. SN Comput Sci. https:\/\/doi.org\/10.1007\/s42979-024-03152-1","journal-title":"SN Comput Sci"},{"key":"248_CR47","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1007\/s10207-023-00661-7","volume":"22","author":"J Kaur","year":"2023","unstructured":"Kaur J, Agrawal A, Khan RA (2023) P2ADF: a privacy-preserving attack detection framework in fog-IoT environment. Int J Inf Secur 22:749\u2013762. https:\/\/doi.org\/10.1007\/s10207-023-00661-7","journal-title":"Int J Inf Secur"},{"key":"248_CR48","doi-asserted-by":"publisher","first-page":"142206","DOI":"10.1109\/ACCESS.2021.3120626","volume":"9","author":"AR Gad","year":"2021","unstructured":"Gad AR, Nashat AA, Barkat TM (2021) Intrusion detection system using machine learning for vehicular ad hoc networks based on ToN-IoT dataset. IEEE Access 9:142206\u2013142217. https:\/\/doi.org\/10.1109\/ACCESS.2021.3120626","journal-title":"IEEE Access"},{"key":"248_CR49","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-024-10309-w","author":"S Islam","year":"2024","unstructured":"Islam S, Javeed D, Saeed MS et al (2024) Generative AI and cognitive computing-driven intrusion detection system in industrial CPS. Cogn Comput. https:\/\/doi.org\/10.1007\/s12559-024-10309-w","journal-title":"Cogn Comput"},{"key":"248_CR50","doi-asserted-by":"publisher","unstructured":"Moustafa N, Slay J (2015) UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military communications and information systems conference (MilCIS), Canberra, ACT, Australia, pp 1\u20136. https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"248_CR51","unstructured":"Moustafa N (2024) ToN_IoT and UNSW15 datasets. https:\/\/research.unsw.edu.au\/projects\/toniot-datasets. Accessed 3 Apr 2024"},{"key":"248_CR52","doi-asserted-by":"publisher","unstructured":"Moustafa N (2019) New generations of Internet of Things datasets for cybersecurity applications based on machine learning: TON_IoT datasets. In: eResearch Australasia Conference, Brisbane, Australia. https:\/\/doi.org\/10.26190\/5d7ac9bfe8487","DOI":"10.26190\/5d7ac9bfe8487"},{"key":"248_CR53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022862","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi A, Moustafa N, Tari Z, Mahmood A, Anwar A (2020) TON_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2020.3022862","journal-title":"IEEE Access"},{"key":"248_CR54","first-page":"479","volume":"7","author":"R Panigrahi","year":"2018","unstructured":"Panigrahi R, Borah S (2018) A detailed analysis of CICIDS2017 dataset for designing intrusion detection systems. Int J Eng Technol 7:479\u2013482","journal-title":"Int J Eng Technol"},{"key":"248_CR55","doi-asserted-by":"publisher","first-page":"45","DOI":"10.29207\/joseit.v2i2.5411","volume":"2","author":"A Oyelakin","year":"2023","unstructured":"Oyelakin A, Ameen AO, Ogundele T et al (2023) Overview and exploratory analyses of CICIDS 2017 intrusion detection dataset. J Syst Eng Inf Technol 2:45\u201352. https:\/\/doi.org\/10.29207\/joseit.v2i2.5411","journal-title":"J Syst Eng Inf Technol"},{"key":"248_CR56","unstructured":"UNB CIC Dataset Repository (2024) https:\/\/www.unb.ca\/cic\/datasets\/index.html. Accessed 3 Apr 2024"},{"key":"248_CR57","doi-asserted-by":"publisher","DOI":"10.1016\/j.iswa.2023.200298","volume":"20","author":"T Al Nuaimi","year":"2023","unstructured":"Al Nuaimi T, Al Zaabi S, Alyilieli M et al (2023) A comparative evaluation of intrusion detection systems on the Edge-IIoT-2022 dataset. Intell Syst Appl 20:200298. https:\/\/doi.org\/10.1016\/j.iswa.2023.200298","journal-title":"Intell Syst Appl"},{"key":"248_CR58","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag MA, Friha O, Hamouda D et al (2022) Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 10:40281\u201340306. https:\/\/doi.org\/10.1109\/ACCESS.2022.3165809","journal-title":"IEEE Access"},{"key":"248_CR59","unstructured":"Ferrag MA. EdgeIIoTset. https:\/\/www.kaggle.com\/datasets\/mohamedamineferrag\/edgeiiotset-cybersecurity-dataset-of-iot-iiot. Accessed 8 Apr 2024"},{"key":"248_CR60","doi-asserted-by":"publisher","first-page":"137293","DOI":"10.1109\/ACCESS.2020.3011259","volume":"8","author":"WA Al-Khater","year":"2020","unstructured":"Al-Khater WA, Al-Maadeed S, Ahmed AA, Sadiq AS, Khan MK (2020) Comprehensive review of cybercrime detection techniques. IEEE Access 8:137293\u2013137311. https:\/\/doi.org\/10.1109\/ACCESS.2020.3011259","journal-title":"IEEE Access"},{"issue":"6","key":"248_CR61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics12061333","volume":"12","author":"\u00d6 Aslan","year":"2023","unstructured":"Aslan \u00d6, Aktug S, Okay MO, Y\u0131lmaz A, Akin E (2023) A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics 12(6):1\u201342. https:\/\/doi.org\/10.3390\/electronics12061333","journal-title":"Electronics"},{"key":"248_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2024.3401591","volume":"13","author":"A Khan","year":"2024","unstructured":"Khan A, Abdullah D, Laghari A, Alroobaea R, Baqasah A, Alsafyani M, Bacarra R, Alsayaydeh J (2024) Secure remote sensing data with blockchain distributed ledger technology: a solution for smart cities. IEEE Access 13:1\u20131. https:\/\/doi.org\/10.1109\/ACCESS.2024.3401591","journal-title":"IEEE Access"},{"key":"248_CR63","doi-asserted-by":"publisher","unstructured":"Tsoutsos NG, Maniatakos M (2014) Trust no one: thwarting \u201cHeartbleed\u201d attacks using privacy-preserving computation. In: 2014 IEEE computer society annual symposium on VLSI, Tampa, FL, USA, pp 59\u201364. https:\/\/doi.org\/10.1109\/ISVLSI.2014.86","DOI":"10.1109\/ISVLSI.2014.86"},{"key":"248_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.109838","volume":"141","author":"A Khan","year":"2024","unstructured":"Khan A, Abdullah D, Yang J, Laghari A, Baqasah A, Alroobaea R, Ku C, Alizadehsani R, Acharya U, Por LY (2024) BAIoT-EMS: consortium network for small-medium enterprises management system with blockchain and augmented intelligence of things. Eng Appl Artif Intell 141:109838. https:\/\/doi.org\/10.1016\/j.engappai.2024.109838","journal-title":"Eng Appl Artif Intell"},{"key":"248_CR65","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-02550-9","author":"P Dhal","year":"2021","unstructured":"Dhal P, Azad C (2021) A comprehensive survey on feature selection in the various fields of machine learning. Appl Intell. https:\/\/doi.org\/10.1007\/s10489-021-02550-9","journal-title":"Appl Intell"},{"issue":"2","key":"248_CR66","doi-asserted-by":"publisher","first-page":"56","DOI":"10.38094\/jastt1224","volume":"1","author":"R Zebari","year":"2020","unstructured":"Zebari R, Abdulazeez A, Zeebaree D, Zebari D, Saeed J (2020) A comprehensive review of dimensionality reduction techniques for feature selection and feature extraction. J Appl Sci Technol Trends 1(2):56\u201370. https:\/\/doi.org\/10.38094\/jastt1224","journal-title":"J Appl Sci Technol Trends"},{"key":"248_CR67","unstructured":"Feature selection techniques in machine learning. https:\/\/www.analyticsvidhya.com\/blog\/2020\/10\/feature-selection-techniques-in-machine-learning\/"},{"key":"248_CR68","unstructured":"Understanding filter methods in machine learning: feature selection made smarter. https:\/\/arismuhandisin.medium.com\/understanding-filter-methods-in-machine-learning-feature-selection-made-smarter-bc9ac91cc145"},{"key":"248_CR69","unstructured":"Feature selection with embedded methods. https:\/\/www.blog.trainindata.com\/feature-selection-with-embedded-methods\/"},{"key":"248_CR70","doi-asserted-by":"publisher","first-page":"6086","DOI":"10.1038\/s41598-024-56706-x","volume":"14","author":"O Rainio","year":"2024","unstructured":"Rainio O, Teuho J, Kl\u00e9n R (2024) Evaluation metrics and statistical tests for machine learning. Sci Rep 14:6086. https:\/\/doi.org\/10.1038\/s41598-024-56706-x","journal-title":"Sci Rep"},{"key":"248_CR71","series-title":"Lecture notes in networks and systems","volume-title":"Artificial intelligence application in networks and systems. CSOC 2023","author":"G Naidu","year":"2023","unstructured":"Naidu G, Zuva T, Sibanda EM (2023) A review of evaluation metrics in machine learning algorithms. In: Silhavy R, Silhavy P (eds) Artificial intelligence application in networks and systems. CSOC 2023, vol 724. Lecture notes in networks and systems. Springer, Cham"},{"key":"248_CR72","doi-asserted-by":"publisher","unstructured":"Kumar M, Ali Khan S, Bhatia A, Sharma V, Jain P (2023) Machine learning algorithms: a conceptual review. In: 2023 1st International conference on intelligent computing and research trends (ICRT), Roorkee, India, pp 1\u20137. https:\/\/doi.org\/10.1109\/ICRT57042.2023.10146678","DOI":"10.1109\/ICRT57042.2023.10146678"},{"key":"248_CR73","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s11227-024-06782-7","volume":"81","author":"AA Khan","year":"2025","unstructured":"Khan AA, Laghari AA, Baqasah AM et al (2025) BDLT-IoMT\u2014a novel architecture: SVM machine learning for robust and secure data processing in Internet of Medical Things with blockchain cybersecurity. J Supercomput 81:271. https:\/\/doi.org\/10.1007\/s11227-024-06782-7","journal-title":"J Supercomput"},{"key":"248_CR74","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s40860-024-00229-9","volume":"10","author":"MJ Hornos","year":"2024","unstructured":"Hornos MJ, Quinde M (2024) Development methodologies for IoT-based systems: challenges and research directions. J Reliab Intell Environ 10:215\u2013244. https:\/\/doi.org\/10.1007\/s40860-024-00229-9","journal-title":"J Reliab Intell Environ"},{"key":"248_CR75","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/s40860-024-00226-y","volume":"10","author":"Y El Yamani","year":"2024","unstructured":"El Yamani Y, Baddi Y, El Kamoun N (2024) A survey on the contribution of ML and DL to the detection and prevention of botnet attacks. J Reliab Intell Environ 10:431\u2013448. https:\/\/doi.org\/10.1007\/s40860-024-00226-y","journal-title":"J Reliab Intell Environ"},{"key":"248_CR76","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s40860-023-00202-y","volume":"10","author":"ZH Toman","year":"2024","unstructured":"Toman ZH, Hamel L, Toman SH et al (2024) Formal verification for security and attacks in IoT physical layer. J Reliab Intell Environ 10:73\u201391. https:\/\/doi.org\/10.1007\/s40860-023-00202-y","journal-title":"J Reliab Intell Environ"},{"key":"248_CR77","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2024.100502","volume":"27","author":"AA Khan","year":"2024","unstructured":"Khan AA, Chen YL, Hajjej F, Shaikh AA, Yang J, Ku CS, Por LY (2024) Digital forensics for the socio-cyber world (DF-SCW): a novel framework for deepfake multimedia investigation on social media platforms. Egypt Inform J 27:100502. https:\/\/doi.org\/10.1016\/j.eij.2024.100502","journal-title":"Egypt Inform J"},{"key":"248_CR78","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/s40860-024-00238-8","volume":"10","author":"J Talpini","year":"2024","unstructured":"Talpini J, Sartori F, Savi M (2024) Enhancing trustworthiness in ML-based network intrusion detection with uncertainty quantification. J Reliab Intell Environ 10:501\u2013520. https:\/\/doi.org\/10.1007\/s40860-024-00238-8","journal-title":"J Reliab Intell Environ"},{"key":"248_CR79","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s40860-021-00154-1","volume":"8","author":"P Maciel","year":"2022","unstructured":"Maciel P, Dantas J, Melo C et al (2022) A survey on reliability and availability modeling of edge, fog, and cloud computing. J Reliab Intell Environ 8:227\u2013245. https:\/\/doi.org\/10.1007\/s40860-021-00154-1","journal-title":"J Reliab Intell Environ"},{"key":"248_CR80","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s11416-02200456-9","volume":"19","author":"M Mohy-eddine","year":"2023","unstructured":"Mohy-eddine M, Guezzaz A, Benkirane S et al (2023) An effective intrusion detection approach based on ensemble learning for IIoT edge computing. J Comput Virol Hack Tech 19:469\u2013481. https:\/\/doi.org\/10.1007\/s11416-02200456-9","journal-title":"J Comput Virol Hack Tech"},{"key":"248_CR81","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109343","volume":"118","author":"AA Khan","year":"2024","unstructured":"Khan AA, Dhabi S, Yang J, Alhakami W, Bourouis S, Por LY (2024) B-LPoET: a middleware lightweight Proof-of-Elapsed Time (PoET) for efficient distributed transaction execution and security on Blockchain using multithreading technology. Comput Electr Eng 118:109343. https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109343","journal-title":"Comput Electr Eng"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-025-00248-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40860-025-00248-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-025-00248-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T05:02:00Z","timestamp":1750741320000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40860-025-00248-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,9]]},"references-count":81,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["248"],"URL":"https:\/\/doi.org\/10.1007\/s40860-025-00248-0","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,9]]},"assertion":[{"value":"1 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"8"}}