{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:05:32Z","timestamp":1776096332072,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T00:00:00Z","timestamp":1766361600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T00:00:00Z","timestamp":1766361600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s40860-025-00264-0","type":"journal-article","created":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T15:35:24Z","timestamp":1766417724000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing industry\u00a04.0: a systematic review of AI-driven intrusion detection approaches and emerging trends"],"prefix":"10.1007","volume":"12","author":[{"given":"Nethma","family":"Kalpani","sequence":"first","affiliation":[]},{"given":"Nureka","family":"Rodrigo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,22]]},"reference":[{"issue":"6","key":"264_CR1","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","volume":"4","author":"A Humayed","year":"2017","unstructured":"Humayed A, Lin J, Li F, Luo B (2017) Cyber-physical systems security\u2013 survey. IEEE Internet Things J 4(6):1802\u20131831. https:\/\/doi.org\/10.1109\/JIOT.2017.2703172","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"264_CR2","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","volume":"5","author":"A Mosenia","year":"2017","unstructured":"Mosenia A, Jha NK (2017) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput 5(4):586\u2013602. https:\/\/doi.org\/10.1109\/TETC.2016.2606384","journal-title":"IEEE Trans Emerg Top Comput"},{"issue":"2","key":"264_CR3","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak AL, Guven E (2016) IEEE Communications Surveys amp. Tutorials 18(2):1153\u20131176. https:\/\/doi.org\/10.1109\/COMST.2015.2494502","journal-title":"Tutorials"},{"issue":"8","key":"264_CR4","doi-asserted-by":"publisher","first-page":"2941","DOI":"10.1080\/00207543.2018.1444806","volume":"56","author":"LD Xu","year":"2018","unstructured":"Xu LD, Xu EL, Li L (2018) Industry 4.0: state of the art and future trends. Int J Prod Res 56(8):2941\u20132962. https:\/\/doi.org\/10.1080\/00207543.2018.1444806","journal-title":"Int J Prod Res"},{"key":"264_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2019.101837","volume":"61","author":"Y Lu","year":"2020","unstructured":"Lu Y, Liu C, Wang KIK, Huang H, Xu X (2020) Digital Twin-driven smart manufacturing: Connotation, reference model, applications and research issues. Robot Comput-Integr Manufact 61:101837. https:\/\/doi.org\/10.1016\/j.rcim.2019.101837","journal-title":"Robot Comput-Integr Manufact"},{"key":"264_CR6","doi-asserted-by":"publisher","unstructured":"Alani MM, Alloghani M (2019)Security Challenges in the Industry 4.0 Era (Springer International Publishing, 2019), p. 117\u2013136. https:\/\/doi.org\/10.1007\/978-3-030-12953-8_8","DOI":"10.1007\/978-3-030-12953-8_8"},{"issue":"4","key":"264_CR7","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1109\/TSMCC.2010.2045373","volume":"40","author":"C Alcaraz","year":"2010","unstructured":"Alcaraz C, Lopez J (2010) IEEE Transactions on Systems, Man, and Cybernetics. Part C App Rev 40(4):419\u2013428. https:\/\/doi.org\/10.1109\/TSMCC.2010.2045373","journal-title":"Part C App Rev"},{"issue":"8","key":"264_CR8","doi-asserted-by":"publisher","first-page":"1738","DOI":"10.1109\/JPROC.2019.2918951","volume":"107","author":"Z Zhou","year":"2019","unstructured":"Zhou Z, Chen X, Li E, Zeng L, Luo K, Zhang J (2019) Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing. Proc IEEE 107(8):1738\u20131762. https:\/\/doi.org\/10.1109\/JPROC.2019.2918951","journal-title":"Proc IEEE"},{"issue":"4","key":"264_CR9","doi-asserted-by":"publisher","first-page":"6822","DOI":"10.1109\/JIOT.2019.2912022","volume":"6","author":"M Zolanvari","year":"2019","unstructured":"Zolanvari M, Teixeira MA, Gupta L, Khan KM, Jain R (2019) Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things. IEEE Internet Things J 6(4):6822\u20136834. https:\/\/doi.org\/10.1109\/JIOT.2019.2912022","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"264_CR10","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1186\/s40537-020-00318-5","volume":"7","author":"IH Sarker","year":"2020","unstructured":"Sarker IH, Kayes ASM, Badsha S, Alqahtani H, Watters P, Ng A (2020) Cybersecurity data science: an overview from machine learning perspective. J Big Data 7(1):41. https:\/\/doi.org\/10.1186\/s40537-020-00318-5","journal-title":"J Big Data"},{"key":"264_CR11","doi-asserted-by":"publisher","unstructured":"Truex S, Baracaldo N, Anwar A, Steinke T, Ludwig H, Zhang R, Zhou Y (2019) in Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security (ACM, 2019), CCS \u201919, p. 1\u201311. https:\/\/doi.org\/10.1145\/3338501.3357370","DOI":"10.1145\/3338501.3357370"},{"key":"264_CR12","doi-asserted-by":"publisher","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) in 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (IEEE, 2009), p. 1\u20136. https:\/\/doi.org\/10.1109\/CISDA.2009.5356528","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"264_CR13","unstructured":"Salvatore\u00a0Stolfo WF (1999) KDD Cup 1999 Data. https:\/\/archive.ics.uci.edu\/dataset\/130"},{"key":"264_CR14","doi-asserted-by":"publisher","unstructured":"Goebel R, Chander A, Holzinger K, Lecue F, Akata Z, Stumpf S, Kieseberg P, Holzinger A (2018) Explainable AI: The New 42? (Springer International Publishing, 2018), p. 295\u2013303. https:\/\/doi.org\/10.1007\/978-3-319-99740-7_21","DOI":"10.1007\/978-3-319-99740-7_21"},{"key":"264_CR15","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1016\/j.promfg.2017.09.047","volume":"13","author":"T Pereira","year":"2017","unstructured":"Pereira T, Barreto L, Amaral A (2017) Network and information security challenges within Industry 4.0 paradigm. Proc Manufact 13:1253\u20131260. https:\/\/doi.org\/10.1016\/j.promfg.2017.09.047","journal-title":"Proc Manufact"},{"key":"264_CR16","doi-asserted-by":"publisher","unstructured":"Ahmad Z, Shahid\u00a0Khan A, Wai\u00a0Shiang C, Abdullah J, Ahmad F (2020) Transactions on Emerging Telecommunications Technologies 32(1) . https:\/\/doi.org\/10.1002\/ett.4150","DOI":"10.1002\/ett.4150"},{"issue":"5","key":"264_CR17","doi-asserted-by":"publisher","first-page":"3849","DOI":"10.1007\/s10462-020-09942-2","volume":"54","author":"A B\u00e9cue","year":"2021","unstructured":"B\u00e9cue A, Pra\u00e7a I, Gama J (2021) Artificial intelligence, cyber-threats and Industry 4.0: challenges and opportunities. Artif Intell Rev 54(5):3849\u20133886. https:\/\/doi.org\/10.1007\/s10462-020-09942-2","journal-title":"Artif Intell Rev"},{"key":"264_CR18","doi-asserted-by":"publisher","unstructured":"M.J. Page, J.E. McKenzie, P.M. Bossuyt, I.\u00a0Boutron, T.C. Hoffmann, C.D. Mulrow, L.\u00a0Shamseer, J.M. Tetzlaff, E.A. Akl, S.E. Brennan, R.\u00a0Chou, J.\u00a0Glanville, J.M. Grimshaw, A.\u00a0Hr\u00f3bjartsson, M.M. Lalu, T.\u00a0Li, E.W. Loder, E.\u00a0Mayo-Wilson, S.\u00a0McDonald, L.A. McGuinness, L.A. Stewart, J.\u00a0Thomas, A.C. Tricco, V.A. Welch, P.\u00a0Whiting, D.\u00a0Moher, BMJ p. n71 (2021). https:\/\/doi.org\/10.1136\/bmj.n71","DOI":"10.1136\/bmj.n71"},{"key":"264_CR19","unstructured":"Zotero | Your personal research assistant. https:\/\/www.zotero.org\/. [Accessed 25-07-2024]"},{"issue":"4","key":"264_CR20","doi-asserted-by":"publisher","first-page":"2248","DOI":"10.1109\/COMST.2021.3094360","volume":"23","author":"M Conti","year":"2021","unstructured":"Conti M, Donadel D, Turrin F (2021) IEEE Communications Surveys amp. Tutorials 23(4):2248\u20132294. https:\/\/doi.org\/10.1109\/COMST.2021.3094360","journal-title":"Tutorials"},{"key":"264_CR21","doi-asserted-by":"publisher","first-page":"93911","DOI":"10.1109\/ACCESS.2024.3424488","volume":"12","author":"A Liso","year":"2024","unstructured":"Liso A, Cardellicchio A, Patruno C, Nitti M, Ardino P, Stella E, Ren\u00f2 V (2024) A Review of Deep Learning-Based Anomaly Detection Strategies in Industry 4.0 Focused on Application Fields, Sensing Equipment, and Algorithms. IEEE Access 12:93911\u201393923. https:\/\/doi.org\/10.1109\/ACCESS.2024.3424488","journal-title":"IEEE Access"},{"key":"264_CR22","doi-asserted-by":"publisher","unstructured":"Hussain A, Mar\u00edn\u00a0Tordera E, Masip-Bruin X, Leligou HC (2024) IEEE Access 12, 114894\u2013114911 . https:\/\/doi.org\/10.1109\/ACCESS.2024.3445261","DOI":"10.1109\/ACCESS.2024.3445261"},{"key":"264_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TICPS.2023.3336608","volume":"2","author":"S Guarino","year":"2024","unstructured":"Guarino S, Vitale F, Flammini F, Faramondi L, Mazzocca N, Setola R (2024) A Two-Level Fusion Framework for Cyber-Physical Anomaly Detection. IEEE Trans Indust Cyber-Phys Syst 2:1\u201313. https:\/\/doi.org\/10.1109\/TICPS.2023.3336608","journal-title":"IEEE Trans Indust Cyber-Phys Syst"},{"key":"264_CR24","doi-asserted-by":"publisher","first-page":"3788","DOI":"10.1109\/ACCESS.2025.3525520","volume":"13","author":"S Saeidlou","year":"2025","unstructured":"Saeidlou S, Ghadiminia N, Oti-Sarpong K (2025) Cyber-Physical System Security for Manufacturing Industry 4.0 Using LSTM-CNN Parallel Orchestration. IEEE Access 13:3788\u20133801. https:\/\/doi.org\/10.1109\/ACCESS.2025.3525520","journal-title":"IEEE Access"},{"issue":"18","key":"264_CR25","doi-asserted-by":"publisher","first-page":"7856","DOI":"10.3390\/s23187856","volume":"23","author":"UK Lilhore","year":"2023","unstructured":"Lilhore UK, Manoharan P, Simaiya S, Alroobaea R, Alsafyani M, Baqasah AM, Dalal S, Sharma A, Raahemifar K (2023) HIDM: Hybrid Intrusion Detection Model for Industry 4.0 Networks Using an Optimized CNN-LSTM with Transfer Learning. Sensors 23(18):7856. https:\/\/doi.org\/10.3390\/s23187856","journal-title":"Sensors"},{"key":"264_CR26","doi-asserted-by":"publisher","first-page":"165130","DOI":"10.1109\/ACCESS.2020.3022862","volume":"8","author":"A Alsaedi","year":"2020","unstructured":"Alsaedi A, Moustafa N, Tari Z, Mahmood A, Anwar A (2020) TON\u2014IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems. IEEE Access 8:165130\u2013165150. https:\/\/doi.org\/10.1109\/ACCESS.2020.3022862","journal-title":"IEEE Access"},{"key":"264_CR27","doi-asserted-by":"publisher","unstructured":"Moustafa N, Slay J in 2015 Military Communications and Information Systems Conference (MilCIS) (IEEE, 2015). https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"264_CR28","doi-asserted-by":"publisher","unstructured":"Chiriac BN, Anton FD, AIonit\u0103 D, Vasilic\u0103 BV (2024) Sensors 25(1), 130 . https:\/\/doi.org\/10.3390\/s25010130","DOI":"10.3390\/s25010130"},{"issue":"8","key":"264_CR29","doi-asserted-by":"publisher","first-page":"5790","DOI":"10.1109\/TII.2020.3047675","volume":"17","author":"X Zhou","year":"2021","unstructured":"Zhou X, Liang W, Shimizu S, Ma J, Jin Q (2021) Siamese Neural Network Based Few-Shot Learning for Anomaly Detection in Industrial Cyber-Physical Systems. IEEE Trans Industr Inf 17(8):5790\u20135798. https:\/\/doi.org\/10.1109\/TII.2020.3047675","journal-title":"IEEE Trans Industr Inf"},{"issue":"5","key":"264_CR30","doi-asserted-by":"publisher","first-page":"3469","DOI":"10.1109\/TII.2020.3022432","volume":"17","author":"X Zhou","year":"2021","unstructured":"Zhou X, Hu Y, Liang W, Ma J, Jin Q (2021) Variational LSTM Enhanced Anomaly Detection for Industrial Big Data. IEEE Trans Industr Inf 17(5):3469\u20133477. https:\/\/doi.org\/10.1109\/TII.2020.3022432","journal-title":"IEEE Trans Industr Inf"},{"key":"264_CR31","doi-asserted-by":"publisher","first-page":"16933","DOI":"10.1109\/ACCESS.2025.3532800","volume":"13","author":"W Villegas-Ch","year":"2025","unstructured":"Villegas-Ch W, Govea J, Gutierrez R, Mera-Navarrete A (2025) Optimizing Security in IoT Ecosystems Using Hybrid Artificial Intelligence and Blockchain Models: A Scalable and Efficient Approach for Threat Detection. IEEE Access 13:16933\u201316958. https:\/\/doi.org\/10.1109\/ACCESS.2025.3532800","journal-title":"IEEE Access"},{"key":"264_CR32","doi-asserted-by":"publisher","first-page":"34800","DOI":"10.1109\/ACCESS.2024.3372187","volume":"12","author":"F Al-Quayed","year":"2024","unstructured":"Al-Quayed F, Ahmad Z, Humayun M (2024) A Situation Based Predictive Approach for Cybersecurity Intrusion Detection and Prevention Using Machine Learning and Deep Learning Algorithms in Wireless Sensor Networks of Industry 4.0. IEEE Access 12:34800\u201334819. https:\/\/doi.org\/10.1109\/ACCESS.2024.3372187","journal-title":"IEEE Access"},{"key":"264_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2023.3282662","volume":"72","author":"A Amodei","year":"2023","unstructured":"Amodei A, Capriglione D, Cerro G, Ferrigno L, Miele G, Tomasso G (2023) A Measurement Approach for Inline Intrusion Detection of Heartbleed-Like Attacks in IoT Frameworks. IEEE Trans Instrum Meas 72:1\u201310. https:\/\/doi.org\/10.1109\/TIM.2023.3282662","journal-title":"IEEE Trans Instrum Meas"},{"key":"264_CR34","doi-asserted-by":"publisher","unstructured":"Noorani M, Puthanveettil TV, Zoulkarni A, Mirenzi J, Grody CD, Baras JS Multimodal Anomaly Detection for Autonomous Cyber-Physical Systems Empowering Real-World Evaluation (Springer Nature Switzerland, 2024), p. 306\u2013325. https:\/\/doi.org\/10.1007\/978-3-031-74835-6_15","DOI":"10.1007\/978-3-031-74835-6_15"},{"key":"264_CR35","doi-asserted-by":"publisher","first-page":"25344","DOI":"10.1109\/ACCESS.2021.3057766","volume":"9","author":"P Jayalaxmi","year":"2021","unstructured":"Jayalaxmi P, Saha R, Kumar G, Kumar N, Kim TH (2021) A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges. IEEE Access 9:25344\u201325359. https:\/\/doi.org\/10.1109\/ACCESS.2021.3057766","journal-title":"IEEE Access"},{"issue":"11","key":"264_CR36","doi-asserted-by":"publisher","first-page":"3901","DOI":"10.3390\/s21113901","volume":"21","author":"LL Dhirani","year":"2021","unstructured":"Dhirani LL, Armstrong E, Newe T (2021) Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap. Sensors 21(11):3901. https:\/\/doi.org\/10.3390\/s21113901","journal-title":"Sensors"},{"issue":"15","key":"264_CR37","doi-asserted-by":"publisher","first-page":"5189","DOI":"10.3390\/s21155189","volume":"21","author":"V Pedreira","year":"2021","unstructured":"Pedreira V, Barros D, Pinto P (2021) A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead. Sensors 21(15):5189. https:\/\/doi.org\/10.3390\/s21155189","journal-title":"Sensors"},{"issue":"4","key":"264_CR38","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.3390\/app14041466","volume":"14","author":"MA Hassan","year":"2024","unstructured":"Hassan MA, Zardari S, Farooq MU, Alansari MM, Nagro SA (2024) Systematic Analysis of Risks in Industry 5.0 Architecture. Appl Sci 14(4):1466. https:\/\/doi.org\/10.3390\/app14041466","journal-title":"Appl Sci"},{"key":"264_CR39","doi-asserted-by":"publisher","unstructured":"R.\u00a0Kour, R.\u00a0Karim, P.\u00a0Dersin, N.\u00a0Venkatesh, Frontiers in Computer Science 6 (2024). https:\/\/doi.org\/10.3389\/fcomp.2024.1434436","DOI":"10.3389\/fcomp.2024.1434436"},{"key":"264_CR40","doi-asserted-by":"publisher","unstructured":"A.\u00a0Raja\u00a0Santhi, P.\u00a0Muthuswamy, International Journal on Interactive Design and Manufacturing (IJIDeM) 17(2), 947\u2013979 (2023). https:\/\/doi.org\/10.1007\/s12008-023-01217-8","DOI":"10.1007\/s12008-023-01217-8"},{"issue":"1","key":"264_CR41","doi-asserted-by":"publisher","first-page":"120","DOI":"10.3390\/s23010120","volume":"23","author":"A Clim","year":"2022","unstructured":"Clim A, Toma A, Zota RD, Constantinescu R (2022) The Need for Cybersecurity in Industrial Revolution and Smart Cities. Sensors 23(1):120. https:\/\/doi.org\/10.3390\/s23010120","journal-title":"Sensors"},{"issue":"1","key":"264_CR42","doi-asserted-by":"publisher","first-page":"109","DOI":"10.3390\/s20010109","volume":"20","author":"A Angelopoulos","year":"2019","unstructured":"Angelopoulos A, Michailidis ET, Nomikos N, Trakadas P, Hatziefremidis A, Voliotis S, Zahariadis T (2019) Tackling Faults in the Industry 4.0 Era\u2014A Survey of Machine-Learning Solutions and Key Aspects. Sensors 20(1):109. https:\/\/doi.org\/10.3390\/s20010109","journal-title":"Sensors"},{"issue":"9","key":"264_CR43","doi-asserted-by":"publisher","first-page":"4539","DOI":"10.3390\/s23094539","volume":"23","author":"A Alqudhaibi","year":"2023","unstructured":"Alqudhaibi A, Albarrak M, Aloseel A, Jagtap S, Salonitis K (2023) Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations. Sensors 23(9):4539. https:\/\/doi.org\/10.3390\/s23094539","journal-title":"Sensors"},{"key":"264_CR44","doi-asserted-by":"publisher","unstructured":"Avdibasic E, Toksanovna AS, Durakovic B (2022) Defense and Security Studies 3, 32\u201349 . https:\/\/doi.org\/10.37868\/dss.v3.id188","DOI":"10.37868\/dss.v3.id188"},{"key":"264_CR45","doi-asserted-by":"publisher","unstructured":"Yu J, Shvetsov AV, Hamood\u00a0Alsamhi S (2024) IEEE Access 12, 159579\u2013159596 . https:\/\/doi.org\/10.1109\/ACCESS.2024.3482987","DOI":"10.1109\/ACCESS.2024.3482987"},{"key":"264_CR46","doi-asserted-by":"publisher","unstructured":"Khan AA, Laghari AA, Almansour H, Jamel L, Hajjej F, Estrela VV, Mohamed MA, Ullah S (2025). Journal of Cloud Computing. https:\/\/doi.org\/10.1186\/s13677-025-00771-8","DOI":"10.1186\/s13677-025-00771-8"},{"key":"264_CR47","doi-asserted-by":"publisher","unstructured":"Laghari AA, Khan AA, Ksibi A, Hajjej F, Kryvinska N, Almadhor A, Mohamed MA, Alsubai S (2025) Scientific Reports 15(1) . https:\/\/doi.org\/10.1038\/s41598-025-11738-9","DOI":"10.1038\/s41598-025-11738-9"},{"issue":"7","key":"264_CR48","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pmed.1000097","volume":"6","author":"D Moher","year":"2009","unstructured":"Moher D, Liberati A, Tetzlaff J, Altman DG (2009) Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement. PLoS Med 6(7):e1000097. https:\/\/doi.org\/10.1371\/journal.pmed.1000097","journal-title":"PLoS Med"},{"key":"264_CR49","doi-asserted-by":"publisher","unstructured":"I.\u00a0Alrashdi, A.\u00a0Alqazzaz, E.\u00a0Aloufi, R.\u00a0Alharthi, M.\u00a0Zohdy, H.\u00a0Ming, in 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) (IEEE, 2019), p. 0305\u20130310. https:\/\/doi.org\/10.1109\/CCWC.2019.8666450","DOI":"10.1109\/CCWC.2019.8666450"},{"issue":"3","key":"264_CR50","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1515\/3\/032074","volume":"1515","author":"AU Mentsiev","year":"2020","unstructured":"Mentsiev AU, Guzueva ER, Magomaev TR (2020) Security challenges of the Industry 4.0. J Phys: Conf Ser 1515(3):032074. https:\/\/doi.org\/10.1088\/1742-6596\/1515\/3\/032074","journal-title":"J Phys: Conf Ser"},{"issue":"6","key":"264_CR51","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/MWC.001.2100102","volume":"28","author":"DC Nguyen","year":"2021","unstructured":"Nguyen DC, Ding M, Pathirana PN, Seneviratne A, Li J, Niyato D, Poor HV (2021) Federated Learning for Industrial Internet of Things in Future Industries. IEEE Wirel Commun 28(6):192\u2013199. https:\/\/doi.org\/10.1109\/MWC.001.2100102","journal-title":"IEEE Wirel Commun"},{"key":"264_CR52","doi-asserted-by":"publisher","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","volume":"6","author":"A Adadi","year":"2018","unstructured":"Adadi A, Berrada M (2018) Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI). IEEE Access 6:52138\u201352160. https:\/\/doi.org\/10.1109\/ACCESS.2018.2870052","journal-title":"IEEE Access"},{"key":"264_CR53","doi-asserted-by":"publisher","unstructured":"Wang Y, Pan Y, Su Z, Deng Y, Zhao Q, Du L, Luan TH, Kang J, Niyato D IEEE Communications Surveys & Tutorials p. 1\u20131 (2025). https:\/\/doi.org\/10.1109\/COMST.2025.3576176","DOI":"10.1109\/COMST.2025.3576176"},{"key":"264_CR54","doi-asserted-by":"publisher","unstructured":"R.\u00a0Shokri, V.\u00a0Shmatikov, in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (ACM, 2015), CCS\u201915, p. 1310\u20131321. https:\/\/doi.org\/10.1145\/2810103.2813687","DOI":"10.1145\/2810103.2813687"},{"issue":"6","key":"264_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3457607","volume":"54","author":"N Mehrabi","year":"2021","unstructured":"Mehrabi N, Morstatter F, Saxena N, Lerman K, Galstyan A (2021) A Survey on Bias and Fairness in Machine Learning. ACM Comput Surv 54(6):1\u201335. https:\/\/doi.org\/10.1145\/3457607","journal-title":"ACM Comput Surv"},{"key":"264_CR56","doi-asserted-by":"publisher","unstructured":"Kaushik K, Khan A, Kumari A, Sharma I, Dubey R (2024) Ethical Considerations in AI-Based Cybersecurity. Singapore, Springer Nature, pp 437\u2013470. https:\/\/doi.org\/10.1007\/978-981-97-1249-6_19","DOI":"10.1007\/978-981-97-1249-6_19"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-025-00264-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40860-025-00264-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-025-00264-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:24:53Z","timestamp":1776093893000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40860-025-00264-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,22]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["264"],"URL":"https:\/\/doi.org\/10.1007\/s40860-025-00264-0","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,22]]},"assertion":[{"value":"19 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare no Conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"1"}}