{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T14:25:24Z","timestamp":1774621524632,"version":"3.50.1"},"reference-count":150,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T00:00:00Z","timestamp":1771718400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T00:00:00Z","timestamp":1774569600000},"content-version":"vor","delay-in-days":33,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Artif Intell"],"DOI":"10.1007\/s44163-026-01029-1","type":"journal-article","created":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T06:22:15Z","timestamp":1771741335000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A systematic review of artificial intelligence applications in Internet of Things, blockchain, and quantum cryptography"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6079-9369","authenticated-orcid":false,"given":"Ketema","family":"Adere","sequence":"first","affiliation":[]},{"given":"Seble","family":"Hailu","sequence":"additional","affiliation":[]},{"given":"Mesfin","family":"Abebe","sequence":"additional","affiliation":[]},{"given":"Ararso","family":"Kemal","sequence":"additional","affiliation":[]},{"given":"Semere W.","family":"Silassie","sequence":"additional","affiliation":[]},{"given":"Alemybrah","family":"Tseghai","sequence":"additional","affiliation":[]},{"given":"Gizachew","family":"Haile","sequence":"additional","affiliation":[]},{"given":"Bereket","family":"Tamirat","sequence":"additional","affiliation":[]},{"given":"Wudu","family":"Bitew","sequence":"additional","affiliation":[]},{"given":"Dereje","family":"Regassa","sequence":"additional","affiliation":[]},{"given":"Zelalem","family":"Gizachew","sequence":"additional","affiliation":[]},{"given":"Wengelawit","family":"Alemu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,22]]},"reference":[{"key":"1029_CR1","doi-asserted-by":"publisher","first-page":"1704","DOI":"10.3390\/sym17101704","volume":"17","author":"HK Ofori","year":"2025","unstructured":"Ofori HK, Bell-Dzide K, Brown-Acquaye WL, Lempogo F, Frimpong SO, Agbehadji IE, Millham RC. Application of machine learning and deep learning techniques for enhanced insider threat detection in cybersecurity. Bibliometric Rev Symmetry. 2025;17:1704. https:\/\/doi.org\/10.3390\/sym17101704.","journal-title":"Bibliometric Rev Symmetry"},{"key":"1029_CR2","doi-asserted-by":"publisher","first-page":"1402745","DOI":"10.3389\/fdata.2024.1402745","volume":"7","author":"P Radanliev","year":"2024","unstructured":"Radanliev P, De Roure D, Maple C, Nurse JR, Nicolescu R, Ani U. AI security and cyber risk in IoT systems. Front Big Data. 2024;7:1402745. https:\/\/doi.org\/10.3389\/fdata.2024.1402745.","journal-title":"Front Big Data"},{"key":"1029_CR3","doi-asserted-by":"publisher","first-page":"100127","DOI":"10.1016\/j.jeconc.2025.100127","volume":"7","author":"OI Odufisan","year":"2025","unstructured":"Odufisan OI, Abhulimen OV, Ogunti EO Harnessing artificial intelligence and machine learning for fraud detection and prevention in Nigeria. J Econ Criminol. 2025;7:100127. . https:\/\/doi.org\/10.1016\/j.jeconc.2025.100127.","journal-title":"J Econ Criminol"},{"issue":"2","key":"1029_CR4","first-page":"86","volume":"4","author":"E Carter","year":"2024","unstructured":"Carter E. AI-Powered consensus mechanisms in blockchain: enhancing security and reducing energy consumption. J Artif Intell Res. 2024;4(2):86\u201393.","journal-title":"J Artif Intell Res"},{"key":"1029_CR5","volume-title":"The second machine age: work, progress, and prosperity in a time of brilliant technologies","author":"E Brynjolfsson","year":"2014","unstructured":"Brynjolfsson E, McAfee A. The second machine age: Work, progress, and prosperity in a time of brilliant technologies. New York: WW Norton & Company; 2014."},{"key":"1029_CR6","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/S1353-4858(20)30105-7","volume":"2020","author":"F Cavaliere","year":"2020","unstructured":"Cavaliere F, Mattsson J, Smeets B. The security implications of quantum cryptography and quantum computing. Netw Secur. 2020;2020:9\u201315. https:\/\/doi.org\/10.1016\/S1353-4858(20)30105-7.","journal-title":"Netw Secur"},{"key":"1029_CR7","doi-asserted-by":"publisher","first-page":"101019","DOI":"10.1016\/j.iot.2023.101019","volume":"25","author":"S Dhar","year":"2024","unstructured":"Dhar S, Khare A, Dwivedi AD, Singh R. Securing IoT devices: A novel approach using blockchain and quantum cryptography. Internet Things. 2024;25:101019. https:\/\/doi.org\/10.1016\/j.iot.2023.101019.","journal-title":"Internet Things"},{"key":"1029_CR8","doi-asserted-by":"publisher","first-page":"180048","DOI":"10.1109\/ACCESS.2024.3504815","volume":"12","author":"M Imran","year":"2024","unstructured":"Imran M, Altamimi AB, Khan W, Hussain S, Alsaffar M. Quantum cryptography for future networks security: A systematic review. IEEE Access. 2024;12:180048\u201378. https:\/\/doi.org\/10.1109\/ACCESS.2024.3504815.","journal-title":"IEEE Access"},{"key":"1029_CR9","doi-asserted-by":"publisher","first-page":"4512","DOI":"10.34218\/IJCET_13_02_023","volume":"2563","author":"N Gaddam","year":"2022","unstructured":"Gaddam N AI-based post-quantum cryptographic key exchange protocols. Int J Comput Eng Technol. 2022;2563:4512. https:\/\/doi.org\/10.34218\/IJCET_13_02_023","journal-title":"Int J Comput Eng Technol"},{"key":"1029_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3450306","author":"C N\u00e4ther","year":"2024","unstructured":"N\u00e4ther C, Herzinger D, Gazdag SL, Stegh\u00f6fer JP, Daum S, Loebenberger D. Migrating software systems towards post-quantum cryptography\u2013a systematic literature review. IEEE Access. 2024. https:\/\/doi.org\/10.1109\/ACCESS.2024.3450306.","journal-title":"IEEE Access"},{"key":"1029_CR11","doi-asserted-by":"publisher","unstructured":"Sharma B, Goel P, Grewal JK. Advances and challenges in cryptography using artificial intelligence. In: 2023 IEEE 8th international conference for convergence in technology (I2CT). 2023; pp 1\u20135. https:\/\/doi.org\/10.1109\/I2CT57861.2023.10126338","DOI":"10.1109\/I2CT57861.2023.10126338"},{"key":"1029_CR12","doi-asserted-by":"publisher","first-page":"19","DOI":"10.58496\/ADSA\/2025\/004","volume":"2025","author":"G Ali","year":"2025","unstructured":"Ali G, Samuel A, Kabiito SP, Morish Z, Thomas A, Robert W, Denis A, Sallam M, Mijwil MM, Ayad J, Salau AO. Integration of artificial intelligence, blockchain, and quantum cryptography for securing the Industrial Internet of Things (IIoT): recent advancements and future trends. Appl Data Sci Anal. 2025;2025:19\u201382.","journal-title":"Appl Data Sci Anal"},{"key":"1029_CR13","unstructured":"Fern\u00e1ndez-Caram\u00e9s TM, Fraga-Lamas P, editors. Advances in the convergence of blockchain and artificial intelligence. BoD\u2014Books on Demand; 2022."},{"key":"1029_CR14","doi-asserted-by":"publisher","first-page":"164908","DOI":"10.1109\/ACCESS.2019.2950872","volume":"7","author":"JB Bernabe","year":"2019","unstructured":"Bernabe JB, Canovas JL, Hernandez-Ramos JL, Moreno RT, Skarmeta A. Privacy-preserving solutions for blockchain: review and challenges. IEEE Access. 2019;7:164908\u201340. https:\/\/doi.org\/10.1109\/ACCESS.2019.2950872.","journal-title":"IEEE Access"},{"key":"1029_CR15","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.18280\/ijsse.140604","volume":"14","author":"SH Anbarkhan","year":"2024","unstructured":"Anbarkhan SH Securing IoT networks: A Post-Quantum blockchain and deep learning approach for enhanced cyber defense. Int J Saf Secur Eng. 2024;14:1689. . https:\/\/doi.org\/10.18280\/ijsse.140604.","journal-title":"Int J Saf Secur Eng"},{"key":"1029_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3453433","author":"P Surapaneni","year":"2024","unstructured":"Surapaneni P, Bojjagani S, Bharathi VC, Morampudi MK, Maurya AK, Khan MK. A systematic review on Blockchain-enabled internet of vehicles (biov): Challenges, defences and future research directions. IEEE Access. 2024. https:\/\/doi.org\/10.1109\/ACCESS.2024.3453433.","journal-title":"IEEE Access"},{"key":"1029_CR17","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/s10791-025-09852-3","volume":"28","author":"WB Alemayew","year":"2025","unstructured":"Alemayew WB, Gemeda KA. Federated hybrid deep learning for multi-attack detection and classification in RPL-based 6LoWPAN networks. Discov Comput. 2025;28:316. https:\/\/doi.org\/10.1007\/s10791-025-09852-3.","journal-title":"Discov Comput"},{"key":"1029_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3560816","volume":"55","author":"W Issa","year":"2023","unstructured":"Issa W, Moustafa N, Turnbull B, Sohrabi N, Tari Z. Blockchain-based federated learning for Securing internet of things: A comprehensive survey. ACM Comput Surv. 2023;55:1\u201343. https:\/\/doi.org\/10.1145\/3560816.","journal-title":"ACM Comput Surv"},{"key":"1029_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3372136","volume":"53","author":"L Lao","year":"2020","unstructured":"Lao L, Li Z, Hou S, Xiao B, Guo S, Yang Y. A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling. ACM Comput Surv. 2020;53:1\u201332. https:\/\/doi.org\/10.1145\/3372136.","journal-title":"ACM Comput Surv"},{"key":"1029_CR20","doi-asserted-by":"publisher","first-page":"642","DOI":"10.17762\/ijritcc.v11i11s.8300","volume":"11","author":"PR Chandre","year":"2023","unstructured":"Chandre PR, Shendkar BD, Deshmukh S, Kakade S, Potdukhe S. Machine learning-enhanced advancements in quantum cryptography: a comprehensive review and future prospects. Int J Recent Innov Trends Comput Commun. 2023;11:642\u201355. https:\/\/doi.org\/10.17762\/ijritcc.v11i11s.8300.","journal-title":"Int J Recent Innov Trends Comput Commun"},{"key":"1029_CR21","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1186\/s40543-024-00416-6","volume":"15","author":"P Radanliev","year":"2024","unstructured":"Radanliev P. Artificial intelligence and quantum cryptography. J Anal Sci Technol. 2024;15:4. https:\/\/doi.org\/10.1186\/s40543-024-00416-6.","journal-title":"J Anal Sci Technol"},{"key":"1029_CR22","doi-asserted-by":"publisher","unstructured":"Aydeger A, Zeydan E, Yadav AK, Hemachandra KT, Liyanage M. Towards a quantum-resilient future: strategies for transitioning to post-quantum cryptography. In: 2024 15th International conference on network of the future (NoF). 2024. pp. 195\u2013203. https:\/\/doi.org\/10.1109\/NoF62948.2024.10741441","DOI":"10.1109\/NoF62948.2024.10741441"},{"key":"1029_CR23","doi-asserted-by":"publisher","first-page":"100880","DOI":"10.1016\/j.vehcom.2025.100880","volume":"52","author":"AM Aslam","year":"2025","unstructured":"Aslam AM, Bhardwaj A, Chaudhary R. Quantum-resilient Blockchain-enabled secure communication framework for connected autonomous vehicles using post-quantum cryptography. Veh Commun. 2025;52:100880. https:\/\/doi.org\/10.1016\/j.vehcom.2025.100880.","journal-title":"Veh Commun"},{"key":"1029_CR24","doi-asserted-by":"publisher","first-page":"4153","DOI":"10.3390\/electronics13214153","volume":"13","author":"IA Sikiru","year":"2024","unstructured":"Sikiru IA, Kora AD, Ezin EC, Imoize AL, Li CT. Hybridization of learning techniques and quantum mechanism for IIoT security: Applications, challenges, and prospects. Electronics. 2024;13:4153. https:\/\/doi.org\/10.3390\/electronics13214153.","journal-title":"Electronics"},{"key":"1029_CR25","doi-asserted-by":"publisher","first-page":"2047","DOI":"10.1002\/spe.3121","volume":"52","author":"S Kumari","year":"2022","unstructured":"Kumari S, Singh M, Singh R, Tewari H. Post-quantum cryptography techniques for secure communication in resource-constrained internet of things devices: A comprehensive survey. Softw Pract Exp. 2022;52:2047\u201376. https:\/\/doi.org\/10.1002\/spe.3121.","journal-title":"Softw Pract Exp"},{"key":"1029_CR26","first-page":"49","volume-title":"Deep learning for security and privacy preservation in IoT","author":"KK Mondal","year":"2022","unstructured":"Mondal KK, Guha Roy D. Iot data security with machine learning blockchain: risks and countermeasures. Deep learning for security and privacy preservation in IoT. Singapore: Springer; 2022. pp. 49\u201381."},{"key":"1029_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3417987","volume":"53","author":"N Waheed","year":"2020","unstructured":"Waheed N, He X, Ikram M, Usman M, Hashmi SS, Usman M. Security and privacy in IoT using machine learning and blockchain: threats and countermeasures. ACM Comput Surv. 2020;53:1\u201337. https:\/\/doi.org\/10.1145\/3417987.","journal-title":"ACM Comput Surv"},{"key":"1029_CR28","doi-asserted-by":"publisher","first-page":"246","DOI":"10.3390\/cryptography7030039","volume":"17","author":"M Elkhodr","year":"2025","unstructured":"Elkhodr M. An AI-Driven framework for integrated security and privacy in internet of things using Quantum-Resistant blockchain. Future Internet. 2025;17:246. https:\/\/doi.org\/10.3390\/cryptography7030039.","journal-title":"Future Internet"},{"key":"1029_CR29","doi-asserted-by":"publisher","first-page":"39149","DOI":"10.1038\/s41598-025-23055-2","volume":"15","author":"G Alandjani","year":"2025","unstructured":"Alandjani G. A MARL-federated Blockchain-based quantum secure framework for trust management in industrial internet of things. Sci Rep. 2025;15:39149. https:\/\/doi.org\/10.1038\/s41598-025-23055-2.","journal-title":"Sci Rep"},{"key":"1029_CR30","doi-asserted-by":"publisher","first-page":"3881","DOI":"10.1109\/ACCESS.2023.3349019","volume":"12","author":"O Kuznetsov","year":"2024","unstructured":"Kuznetsov O, Sernani P, Romeo L, Frontoni E, Mancini A. On the integration of artificial intelligence and blockchain technology: a perspective about security. IEEE Access. 2024;12:3881\u201397. https:\/\/doi.org\/10.1109\/ACCESS.2023.3349019.","journal-title":"IEEE Access"},{"key":"1029_CR31","doi-asserted-by":"publisher","first-page":"103858","DOI":"10.1016\/j.jnca.2024.103858","volume":"225","author":"D Ressi","year":"2024","unstructured":"Ressi D, Romanello R, Piazza C, Rossi S. AI-enhanced blockchain technology: a review of advancements and opportunities. J Netw Comput Appl. 2024;225:103858. https:\/\/doi.org\/10.1016\/j.jnca.2024.103858.","journal-title":"J Netw Comput Appl"},{"key":"1029_CR32","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3390\/bdcc4040028","volume":"4","author":"HF Atlam","year":"2020","unstructured":"Atlam HF, Azad MA, Alzahrani AG, Wills G. A review of blockchain in the internet of things and artificial intelligence. Big Data Cogn Comput. 2020;4:28. https:\/\/doi.org\/10.3390\/bdcc4040028.","journal-title":"Big Data Cogn Comput"},{"key":"1029_CR33","doi-asserted-by":"publisher","first-page":"100118","DOI":"10.1016\/j.iot.2019.100118","volume":"8","author":"SS Gill","year":"2019","unstructured":"Gill SS, Tuli S, Xu M, Singh I, Singh KV, Lindsay D, Tuli S, Smirnova D, Singh M, Jain U, Pervaiz H, Sehgal B, Kaila SS, Misra S, Aslanpour MS, Mehta H, Stankovski V, Garraghan P. Transformative effects of IoT, Blockchain, and artificial intelligence on cloud computing: evolution, vision, trends, and open challenges. Internet Things. 2019;8:100118. https:\/\/doi.org\/10.1016\/j.iot.2019.100118.","journal-title":"Internet Things"},{"key":"1029_CR34","doi-asserted-by":"publisher","first-page":"20729","DOI":"10.1038\/s41598-023-47331-1","volume":"13","author":"NK Parida","year":"2023","unstructured":"Parida NK, Jatoth C, Reddy VD, Hussain MM, Faizi J. Post-quantum distributed Ledger technology: a systematic survey. Sci Rep. 2023;13:20729. https:\/\/doi.org\/10.1038\/s41598-023-47331-1.","journal-title":"Sci Rep"},{"key":"1029_CR35","doi-asserted-by":"publisher","first-page":"16002","DOI":"10.3390\/su142316002","volume":"14","author":"S Alharbi","year":"2022","unstructured":"Alharbi S, Attiah A, Alghazzawi D. Integrating blockchain with artificial intelligence to secure IoT networks: future trends. Sustainability. 2022;14:16002. https:\/\/doi.org\/10.3390\/su142316002.","journal-title":"Sustainability"},{"key":"1029_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3625094","volume":"56","author":"W Fei","year":"2023","unstructured":"Fei W, Ohno H, Sampalli S. A systematic review of Iot security: research potential, challenges, and future directions. ACM Comput Surv. 2023;56:1\u201340. https:\/\/doi.org\/10.1145\/3625094.","journal-title":"ACM Comput Surv"},{"key":"1029_CR37","doi-asserted-by":"publisher","first-page":"31235","DOI":"10.1038\/s41598-024-82585-3","volume":"14","author":"HA Ahmed","year":"2024","unstructured":"Ahmed HA, Jasim HM, Gatea AN, Al-Asadi AA, Al-Asadi HA. A secure and efficient blockchain enabled federated Q-learning model for vehicular Ad-hoc networks. Sci Rep. 2024;14:31235. https:\/\/doi.org\/10.1038\/s41598-024-82585-3.","journal-title":"Sci Rep"},{"key":"1029_CR38","doi-asserted-by":"publisher","DOI":"10.54489\/ijcim.v1i1.48","author":"S Guergov","year":"2021","unstructured":"Guergov S, Radwan N Blockchain convergence: analysis of issues affecting IoT, AI and blockchain. Int J Comput Inf Manuf. 2021. https:\/\/doi.org\/10.54489\/ijcim.v1i1.48.","journal-title":"Int J Comput Inf Manuf"},{"key":"1029_CR39","doi-asserted-by":"publisher","first-page":"6719","DOI":"10.1016\/j.jksuci.2022.03.007","volume":"34","author":"AG Gad","year":"2022","unstructured":"Gad AG, Mosa DT, Abualigah L, Abohany AA. Emerging trends in blockchain technology and applications: A review and outlook. J King Saud Univ Comput Inf Sci. 2022;34:6719\u201342. https:\/\/doi.org\/10.1016\/j.jksuci.2022.03.007.","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"1029_CR40","doi-asserted-by":"publisher","first-page":"3738","DOI":"10.1007\/s11227-023-05616-2","volume":"80","author":"S Cherbal","year":"2024","unstructured":"Cherbal S, Zier A, Hebal S, Louail L, Annane B. Security in internet of things: a review on approaches based on Blockchain, machine learning, cryptography, and quantum computing. J Supercomput. 2024;80:3738\u2013816. https:\/\/doi.org\/10.1007\/s11227-023-05616-2.","journal-title":"J Supercomput"},{"key":"1029_CR41","doi-asserted-by":"publisher","unstructured":"Vubangsi M, Nyuga G, Al-Turjman F. Exploring the intersection of artificial intelligence and blockchain technology in complex systems: a systematic review. In: International conference on artificial intelligence of things for smart societies. Cham: Springer; 2024. pp. 235\u2013245. https:\/\/doi.org\/10.1007\/978-3-031-63103-0_25","DOI":"10.1007\/978-3-031-63103-0_25"},{"key":"1029_CR42","doi-asserted-by":"publisher","unstructured":"Hinderks A, Mayo FJ, Thomaschewski J, Escalona MJ. An SLR-tool: search process in practice: a tool to conduct and manage systematic literature review (SLR). In: Proceedings of the ACM\/IEEE 42nd international conference on software engineering: companion proceedings. 2020. pp. 81\u201384. https:\/\/doi.org\/10.1145\/3377812.3382137","DOI":"10.1145\/3377812.3382137"},{"key":"1029_CR43","doi-asserted-by":"publisher","unstructured":"Saied M, Adjogble F, Guirguis S, Hemmji M, Warschat J. A framework for systematic scientific research management. In: 2023 Portland international conference on management of engineering and technology (PICMET). 2023. pp. 1\u201316. https:\/\/doi.org\/10.23919\/PICMET59654.2023.10216819","DOI":"10.23919\/PICMET59654.2023.10216819"},{"key":"1029_CR44","doi-asserted-by":"publisher","first-page":"6927","DOI":"10.1007\/s00521-021-06823-9","volume":"34","author":"SR Zahra","year":"2022","unstructured":"Zahra SR, Chishti MA. A generic and lightweight security mechanism for detecting malicious behavior in the uncertain internet of things using fuzzy logic-and fog-based approach. Neural Comput Appl. 2022;34:6927\u201352. https:\/\/doi.org\/10.1007\/s00521-021-06823-9.","journal-title":"Neural Comput Appl"},{"key":"1029_CR45","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/s43926-025-00099-4","volume":"5","author":"SK Mallidi","year":"2025","unstructured":"Mallidi SK, Ramisetty RR. Advancements in training and deployment strategies for AI-based intrusion detection systems in iot: A systematic literature review. Discov Internet Things. 2025;5:8. https:\/\/doi.org\/10.1007\/s43926-025-00099-4.","journal-title":"Discov Internet Things"},{"key":"1029_CR46","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/978-3-030-68534-8_23","volume-title":"Cybersecurity, privacy and freedom protection in the connected world","author":"E Pimenidis","year":"2021","unstructured":"Pimenidis E, Patsavellas J, Tonkin M. Blockchain and artificial intelligence managing a secure and sustainable supply chain. Cybersecurity, privacy and freedom protection in the connected world. Cham: Springer; 2021. pp. 367\u201377. https:\/\/doi.org\/10.1007\/978-3-030-68534-8_23."},{"key":"1029_CR47","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/s10462-024-10873-5","volume":"57","author":"A Bathula","year":"2024","unstructured":"Bathula A, Gupta SK, Merugu S, Saba L, Khanna NN, Laird JR, Sanagala SS, Singh R, Garg D, Fouda MM, Suri JS. Blockchain, artificial intelligence, and healthcare: the tripod of future\u2014a narrative review. Artif Intell Rev. 2024;57:238. https:\/\/doi.org\/10.1007\/s10462-024-10873-5.","journal-title":"Artif Intell Rev"},{"key":"1029_CR48","doi-asserted-by":"publisher","first-page":"17829","DOI":"10.1007\/s00521-024-10197-z","volume":"36","author":"HS Saad","year":"2024","unstructured":"Saad HS, Zaki JF, Abdelsalam MM. Employing of machine learning and wearable devices in healthcare system: tasks and challenges. Neural Comput Appl. 2024;36:17829\u201349. https:\/\/doi.org\/10.1007\/s00521-024-10197-z.","journal-title":"Neural Comput Appl"},{"key":"1029_CR49","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.pmcj.2017.07.008","volume":"42","author":"KA Gemeda","year":"2017","unstructured":"Gemeda KA, Gianini G, Libsie M. An evolutionary cluster-game approach for wireless sensor networks in non-collaborative settings. Pervasive Mob Comput. 2017;42:209\u201325. https:\/\/doi.org\/10.1016\/j.pmcj.2017.07.008.","journal-title":"Pervasive Mob Comput"},{"key":"1029_CR50","doi-asserted-by":"publisher","first-page":"58603","DOI":"10.1109\/ACCESS.2022.3179047","volume":"10","author":"G Kornaros","year":"2022","unstructured":"Kornaros G. Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective. IEEE Access. 2022;10:58603\u201322. https:\/\/doi.org\/10.1109\/ACCESS.2022.3179047.","journal-title":"IEEE Access"},{"key":"1029_CR51","doi-asserted-by":"publisher","first-page":"18009","DOI":"10.1007\/s00521-024-10306-y","volume":"36","author":"RA AL-Syouf","year":"2024","unstructured":"AL-Syouf RA, Bani-Hani RM, AL-Jarrah OY. Machine learning approaches to intrusion detection in unmanned aerial vehicles (UAVs). Neural Comput Appl. 2024;36:18009\u201341. https:\/\/doi.org\/10.1007\/s00521-024-10306-y.","journal-title":"Neural Comput Appl"},{"key":"1029_CR52","doi-asserted-by":"publisher","first-page":"136994","DOI":"10.1109\/ACCESS.2021.3117405","volume":"9","author":"HA Al-Mohammed","year":"2021","unstructured":"Al-Mohammed HA, Al-Ali A, Yaacoub E, Qidwai U, Abualsaud K, Rzewuski S, Flizikowski A. Machine learning techniques for detecting attackers during quantum key distribution in IoT networks with application to railway scenarios. IEEE Access. 2021;9:136994\u20137004. https:\/\/doi.org\/10.1109\/ACCESS.2021.3117405.","journal-title":"IEEE Access"},{"key":"1029_CR53","doi-asserted-by":"publisher","first-page":"94668","DOI":"10.1109\/access.2021.3089681","volume":"9","author":"S Zaman","year":"2021","unstructured":"Zaman S, Alhazmi K, Aseeri MA, Ahmed MR, Khan RT, Kaiser MS, Mahmud M. Security threats and artificial intelligence based countermeasures for internet of things networks: A comprehensive survey. IEEE Access. 2021;9:94668\u201390. https:\/\/doi.org\/10.1109\/access.2021.3089681.","journal-title":"IEEE Access"},{"key":"1029_CR54","doi-asserted-by":"publisher","first-page":"2971","DOI":"10.1007\/s00607-024-01314-w","volume":"106","author":"S El Haddouti","year":"2024","unstructured":"El Haddouti S, Khaldoune M, Ayache M, Ech-Cherif El Kettani MD. Smart contracts auditing and multi-classification using machine learning algorithms: an efficient vulnerability detection in Ethereum blockchain. Computing. 2024;106:2971\u20133003. https:\/\/doi.org\/10.1007\/s00607-024-01314-w.","journal-title":"Computing"},{"key":"1029_CR55","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s10462-024-10774-7","volume":"57","author":"H Li","year":"2024","unstructured":"Li H, Ge L, Tian L. Survey: federated learning data security and privacy-preserving in edge-Internet of things. Artif Intell Rev. 2024;57:95. https:\/\/doi.org\/10.1007\/s10462-024-10774-7.","journal-title":"Artif Intell Rev"},{"key":"1029_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-024-06615-7","volume":"81","author":"S Tripathi","year":"2024","unstructured":"Tripathi S, Upadhyay H, Soni J. A quantum LSTM-based approach to cyber threat detection in virtual environment. J Supercomput. 2024;81:1. https:\/\/doi.org\/10.1007\/s11227-024-06615-7.","journal-title":"J Supercomput"},{"key":"1029_CR57","doi-asserted-by":"publisher","first-page":"16109","DOI":"10.1007\/s00521-020-04763-4","volume":"32","author":"A Mukherjee","year":"2020","unstructured":"Mukherjee A, Goswami P, Yang L, Sah Tyagi SK, Samal UC, Mohapatra SK. Deep neural network-based clustering technique for secure IIoT. Neural Comput Appl. 2020;32:16109\u201317. https:\/\/doi.org\/10.1007\/s00521-020-04763-4.","journal-title":"Neural Comput Appl"},{"key":"1029_CR58","doi-asserted-by":"publisher","first-page":"3113","DOI":"10.1007\/s00607-024-01317-7","volume":"106","author":"DN Sachin","year":"2024","unstructured":"Sachin DN, Annappa B, Ambesange S. Federated learning for digital healthcare: concepts, applications, frameworks, and challenges. Computing. 2024;106:3113\u201350. https:\/\/doi.org\/10.1007\/s00607-024-01317-7.","journal-title":"Computing"},{"key":"1029_CR59","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s43926-021-00009-4","volume":"1","author":"E Bertino","year":"2021","unstructured":"Bertino E, Jahanshahi MR, Singla A, Wu RT. Intelligent IoT systems for civil infrastructure health monitoring: a research roadmap. Discov Internet Things. 2021;1:1. https:\/\/doi.org\/10.1007\/s43926-021-00009-4.","journal-title":"Discov Internet Things"},{"key":"1029_CR60","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s10462-024-11036-2","volume":"58","author":"G Nguyen","year":"2024","unstructured":"Nguyen G, Sainz-Pardo Diaz J, Calatrava A, Berberi L, Lytvyn O, Kozlov V, Tran V, Molt\u00f3 G, Lopez Garcia A. Landscape of machine learning evolution: privacy-preserving federated learning frameworks and tools. Artif Intell Rev. 2024;58:24. https:\/\/doi.org\/10.1007\/s10462-024-11036-2.","journal-title":"Artif Intell Rev"},{"key":"1029_CR61","doi-asserted-by":"publisher","first-page":"e1515","DOI":"10.1002\/widm.1515","volume":"14","author":"J Ahmad","year":"2024","unstructured":"Ahmad J, Zia MU, Naqvi IH, Chattha JN, Butt FA, Huang T, Xiang W. Machine learning and blockchain technologies for cybersecurity in connected vehicles. Wiley Interdiscip Rev Data Min Knowl Discov. 2024;14:e1515. https:\/\/doi.org\/10.1002\/widm.1515.","journal-title":"Wiley Interdiscip Rev Data Min Knowl Discov"},{"key":"1029_CR62","doi-asserted-by":"publisher","unstructured":"Po\u0142ap D, Srivastava G, Wo\u017aniak M. Multi-agent architecture for internet of medical things. Lecture Notes in Computer Science. 2020; pp. 49\u201358. https:\/\/doi.org\/10.1007\/978-3-030-61534-5_5.","DOI":"10.1007\/978-3-030-61534-5_5"},{"key":"1029_CR63","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s10462-024-10766-7","volume":"57","author":"S Saha","year":"2024","unstructured":"Saha S, Hota A, Chattopadhyay AK, Nag A, Nandi S. A multifaceted survey on privacy preservation of federated learning: progress, challenges, and opportunities. Artif Intell Rev. 2024;57:137. https:\/\/doi.org\/10.1007\/s10462-024-10766-7.","journal-title":"Artif Intell Rev"},{"key":"1029_CR64","doi-asserted-by":"publisher","first-page":"21942","DOI":"10.1109\/jiot.2023.3313055","volume":"10","author":"E Moore","year":"2023","unstructured":"Moore E, Imteaj A, Rezapour S, Amini MH. A survey on secure and private federated learning using blockchain: theory and application in Resource-Constrained computing. IEEE Internet Things J. 2023;10:21942\u201358. https:\/\/doi.org\/10.1109\/jiot.2023.3313055.","journal-title":"IEEE Internet Things J"},{"key":"1029_CR65","doi-asserted-by":"publisher","unstructured":"Ferenczi A, B\u0103dic\u0103 C. A fully decentralized privacy-enabled federated learning system. Lecture Notes in Computer Science. 2023; pp. 444\u201356. https:\/\/doi.org\/10.1007\/978-3-031-41456-5_34.","DOI":"10.1007\/978-3-031-41456-5_34"},{"key":"1029_CR66","doi-asserted-by":"publisher","unstructured":"Wang Z, Liu Q, Liu X, PFL-LDG. Privacy-preserving federated learning via lightweight device grouping. In: 2023 IEEE smart world congress (SWC). 2023. pp. 1\u20138. https:\/\/doi.org\/10.1109\/SWC57546.2023.10449141","DOI":"10.1109\/SWC57546.2023.10449141"},{"key":"1029_CR67","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1016\/j.future.2024.06.023","volume":"160","author":"D Javeed","year":"2024","unstructured":"Javeed D, Saeed MS, Ahmad I, Adil M, Kumar P, Islam AN. Quantum-empowered federated learning and 6G wireless networks for IoT security: Concept, challenges and future directions. Future Gener Comput Syst. 2024;160:577\u201397. https:\/\/doi.org\/10.1016\/j.future.2024.06.023.","journal-title":"Future Gener Comput Syst"},{"key":"1029_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s43926-020-00001-4","volume":"1","author":"M Kuzlu","year":"2021","unstructured":"Kuzlu M, Fair C, Guler O. Role of artificial intelligence in the internet of things (IoT) cybersecurity. Discov Internet Things. 2021;1:1. https:\/\/doi.org\/10.1007\/s43926-020-00001-4.","journal-title":"Discov Internet Things"},{"key":"1029_CR69","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/s44196-023-00355-x","volume":"16","author":"M Saied","year":"2023","unstructured":"Saied M, Guirguis S, Madbouly M. A comparative study of using Boosting-Based machine learning algorithms for IoT network intrusion detection. Int J Comput Intell Syst. 2023;16:186. https:\/\/doi.org\/10.1007\/s44196-023-00355-x.","journal-title":"Int J Comput Intell Syst"},{"key":"1029_CR70","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MITP.2023.3303919","volume":"25","author":"ME Saied","year":"2023","unstructured":"Saied ME, Guirguis SK. Evaluation of Tree-Based machine learning algorithms for network intrusion detection in the internet of things. IT Prof. 2023;25:45\u201356. https:\/\/doi.org\/10.1109\/MITP.2023.3303919.","journal-title":"IT Prof"},{"key":"1029_CR71","doi-asserted-by":"publisher","first-page":"21632","DOI":"10.1038\/s41598-023-48681-6","volume":"13","author":"M Saied","year":"2023","unstructured":"Saied M, Guirguis S, Madbouly M. A comparative analysis of using ensemble trees for botnet detection and classification in IoT. Sci Rep. 2023;13:21632. https:\/\/doi.org\/10.1038\/s41598-023-48681-6.","journal-title":"Sci Rep"},{"key":"1029_CR72","doi-asserted-by":"publisher","first-page":"126","DOI":"10.3390\/quantum2010010","volume":"2","author":"AY Bykovsky","year":"2020","unstructured":"Bykovsky AY. Heterogeneous network architecture for integration of AI and quantum optics by means of Multiple-Valued logic. Quantum Rep. 2020;2:126\u201365. https:\/\/doi.org\/10.3390\/quantum2010010.","journal-title":"Quantum Rep"},{"key":"1029_CR73","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-025-07255-1","volume":"81","author":"A Nazir","year":"2025","unstructured":"Nazir A, He J, Zhu N, Wajahat A, Ullah F, Qureshi S, Pathan MS. Empirical evaluation of ensemble learning and hybrid CNN-LSTM for IoT threat detection on heterogeneous datasets. J Supercomput. 2025;81:1. https:\/\/doi.org\/10.1007\/s11227-025-07255-1.","journal-title":"J Supercomput"},{"key":"1029_CR74","doi-asserted-by":"publisher","first-page":"101939","DOI":"10.1016\/j.jksuci.2024.101939","volume":"36","author":"A Nazir","year":"2024","unstructured":"Nazir A, He J, Zhu N, Wajahat A, Ullah F, Qureshi S, Ma X, Pathan MS. Collaborative threat intelligence: enhancing IoT security through blockchain and machine learning integration. J King Saud Univ Comput Inf Sci. 2024;36:101939. https:\/\/doi.org\/10.1016\/j.jksuci.2024.101939.","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"1029_CR75","doi-asserted-by":"publisher","first-page":"8367","DOI":"10.1007\/s10586-024-04436-0","volume":"27","author":"A Nazir","year":"2024","unstructured":"Nazir A, He J, Zhu N, Anwar MS, Pathan MS. Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain. Cluster Comput. 2024;27:8367\u201392. https:\/\/doi.org\/10.1007\/s10586-024-04436-0.","journal-title":"Cluster Comput"},{"key":"1029_CR76","doi-asserted-by":"publisher","unstructured":"Joshi P, Goyal SB, Rajawat AS, Solanki RK, Chen C. Adaptive quantum learning frameworks for real-time IIoT attack identification. Lecture Notes in Networks and Systems. 2024; pp. 316\u201325. https:\/\/doi.org\/10.1007\/978-3-031-73318-5_32.","DOI":"10.1007\/978-3-031-73318-5_32"},{"key":"1029_CR77","doi-asserted-by":"publisher","unstructured":"Li X, Xing X, Wang G, Li P, Liu X. Detecting unknown vulnerabilities in smart contracts with binary classification model using machine learning. Communications in Computer and Information Science. 2023; pp. 179\u201392. https:\/\/doi.org\/10.1007\/978-981-99-0272-9_12.","DOI":"10.1007\/978-981-99-0272-9_12"},{"key":"1029_CR78","doi-asserted-by":"publisher","first-page":"7209","DOI":"10.3390\/s24227209","volume":"24","author":"R Mustafa","year":"2024","unstructured":"Mustafa R, Sarkar NI, Mohaghegh M, Pervez S. A Cross-Layer secure and Energy-Efficient framework for the internet of things: A comprehensive survey. Sensors. 2024;24:7209. https:\/\/doi.org\/10.3390\/s24227209.","journal-title":"Sensors"},{"key":"1029_CR79","doi-asserted-by":"publisher","first-page":"3111","DOI":"10.3390\/s24103111","volume":"24","author":"LAC Ahakonye","year":"2024","unstructured":"Ahakonye LAC, Nwakanma CI, Kim DS. Tides of blockchain in IoT cybersecurity. Sensors. 2024;24:3111. https:\/\/doi.org\/10.3390\/s24103111.","journal-title":"Sensors"},{"key":"1029_CR80","doi-asserted-by":"publisher","first-page":"e463","DOI":"10.1002\/spy2.463","volume":"8","author":"N Rathore","year":"2024","unstructured":"Rathore N, Kumari A, Patel M, Chudasama A, Bhalani D. Synergy of AI and blockchain to secure electronic healthcare records. Secur Priv. 2024;8:e463. https:\/\/doi.org\/10.1002\/spy2.463.","journal-title":"Secur Priv"},{"key":"1029_CR81","doi-asserted-by":"publisher","first-page":"21255","DOI":"10.1038\/s41598-023-46640-9","volume":"13","author":"H Meziane","year":"2023","unstructured":"Meziane H, Ouerdi N. A survey on performance evaluation of artificial intelligence algorithms for improving IoT security systems. Sci Rep. 2023;13:21255. https:\/\/doi.org\/10.1038\/s41598-023-46640-9.","journal-title":"Sci Rep"},{"key":"1029_CR82","doi-asserted-by":"publisher","first-page":"e8327","DOI":"10.1002\/cpe.8327","volume":"37","author":"M Dubey","year":"2024","unstructured":"Dubey M, Singh AK, Mishra R. AI based resource management for 5G network slicing: history, use cases, and research directions. Concurr Comput Pract Exp. 2024;37:e8327. https:\/\/doi.org\/10.1002\/cpe.8327.","journal-title":"Concurr Comput Pract Exp"},{"key":"1029_CR83","doi-asserted-by":"publisher","unstructured":"Huang Z, Qian L, Cai D. Analysis on the recent development of quantum computer and quantum neural network technology. In: 2022 IEEE international conference on artificial intelligence and computer applications (ICAICA). 2022. https:\/\/doi.org\/10.1109\/icaica54878.2022.9844614","DOI":"10.1109\/icaica54878.2022.9844614"},{"key":"1029_CR84","doi-asserted-by":"publisher","first-page":"4806","DOI":"10.3390\/electronics12234806","volume":"12","author":"BM Alshammari","year":"2023","unstructured":"Alshammari BM. AIBPSF-IOMT: artificial intelligence and Blockchain-Based predictive security framework for IOMT technologies. Electronics. 2023;12:4806. https:\/\/doi.org\/10.3390\/electronics12234806.","journal-title":"Electronics"},{"key":"1029_CR85","doi-asserted-by":"publisher","first-page":"1969","DOI":"10.3390\/s22051969","volume":"22","author":"SA Abdel Hakeem","year":"2022","unstructured":"Abdel Hakeem SA, Hussein HH, Kim H. Security requirements and challenges of 6G technologies and applications. Sensors. 2022;22:1969. https:\/\/doi.org\/10.3390\/s22051969.","journal-title":"Sensors"},{"key":"1029_CR86","doi-asserted-by":"publisher","first-page":"26068","DOI":"10.1038\/s41598-024-77196-x","volume":"14","author":"R Khan","year":"2024","unstructured":"Khan R, Taj S, Ma X, Noor A, Zhu H, Khan J, Khan ZU, Khan SU. Advanced federated ensemble internet of learning approach for cloud based medical healthcare monitoring system. Sci Rep. 2024;14:26068. https:\/\/doi.org\/10.1038\/s41598-024-77196-x.","journal-title":"Sci Rep"},{"key":"1029_CR87","doi-asserted-by":"publisher","first-page":"67","DOI":"10.3390\/fi16030067","volume":"16","author":"P Scalise","year":"2024","unstructured":"Scalise P, Boeding M, Hempel M, Sharif H, Delloiacovo J, Reed J. A systematic survey on 5G and 6G security considerations, challenges, trends, and research areas. Future Internet. 2024;16:67. https:\/\/doi.org\/10.3390\/fi16030067.","journal-title":"Future Internet"},{"key":"1029_CR88","doi-asserted-by":"publisher","first-page":"31780","DOI":"10.1038\/s41598-024-82313-x","volume":"14","author":"TK Venkatasamy","year":"2024","unstructured":"Venkatasamy TK, Hossen MJ, Ramasamy G, Aziz NHBA. Intrusion detection system for V2X communication in VANET networks using machine learning-based cryptographic protocols. Sci Rep. 2024;14:31780. https:\/\/doi.org\/10.1038\/s41598-024-82313-x.","journal-title":"Sci Rep"},{"key":"1029_CR89","doi-asserted-by":"publisher","first-page":"104097","DOI":"10.1016\/j.cose.2024.104097","volume":"148","author":"P Sun","year":"2025","unstructured":"Sun P, Wan Y, Wu Z, Fang Z, Li Q. A survey on privacy and security issues in IoT-based environments: Technologies, protection measures and future directions. Comput Secur. 2025;148:104097. https:\/\/doi.org\/10.1016\/j.cose.2024.104097.","journal-title":"Comput Secur"},{"key":"1029_CR90","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.5023415","author":"M de la Roche","year":"2024","unstructured":"de la Roche M, Voloder E, Banerjee A, Guerra C, Cataldo Dell\u2019Accio D, Budris F, Arantes GM Jr, Khattak J, Wu KT, Kajtazi L, Giudici P. Report on artificial intelligence and blockchain convergences. Soc Sci Res Netw. 2024. https:\/\/doi.org\/10.2139\/ssrn.5023415.","journal-title":"Soc Sci Res Netw"},{"key":"1029_CR91","doi-asserted-by":"publisher","unstructured":"Adjei J, Heywood NZ, Nandy B, Seddigh N. Identifying IoT devices: a machine learning analysis using traffic flow metadata. In: NOMS 2024\u20132024 IEEE network operations and management symposium. 2024. pp. 1\u20137. https:\/\/doi.org\/10.1109\/NOMS59830.2024.10575442","DOI":"10.1109\/NOMS59830.2024.10575442"},{"key":"1029_CR92","doi-asserted-by":"publisher","unstructured":"Gangwar A, Upadhyay A, Azad AS. Optimised smart AI surveillance in quantum computing age. In: 2022 IEEE 7th international conference for convergence in technology (I2CT). 2022. pp. 1\u20136. https:\/\/doi.org\/10.1109\/I2CT54291.2022.9824610","DOI":"10.1109\/I2CT54291.2022.9824610"},{"key":"1029_CR93","doi-asserted-by":"publisher","first-page":"110227","DOI":"10.1016\/j.asoc.2023.110227","volume":"140","author":"A Si-Ahmed","year":"2023","unstructured":"Si-Ahmed A, Al-Garadi MA, Boustia N. Survey of machine learning based intrusion detection methods for internet of medical things. Appl Soft Comput. 2023;140:110227. https:\/\/doi.org\/10.1016\/j.asoc.2023.110227.","journal-title":"Appl Soft Comput"},{"key":"1029_CR94","doi-asserted-by":"publisher","unstructured":"Loretta GI, Kasireddy I, Prameela M, Rao DNM, Kalaiyarasi M, Saravanan S. Enhancing network security with multifused cryptography: integrating IoT and AI. In: 2024 international conference on data science and network security (ICDSNS). 2024. pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICDSNS62112.2024.10690933","DOI":"10.1109\/ICDSNS62112.2024.10690933"},{"key":"1029_CR95","doi-asserted-by":"publisher","unstructured":"Mahdi MA. Secure and efficient IoT networks: an AI and ML-based intrusion detection system. In: 2024 3rd international conference on artificial intelligence for internet of things (AIIoT). 2024. pp. 1\u20136. https:\/\/doi.org\/10.1109\/AIIoT58432.2024.10574789","DOI":"10.1109\/AIIoT58432.2024.10574789"},{"key":"1029_CR96","doi-asserted-by":"publisher","unstructured":"Maram B, Majji R, Gopisetty GKD, Garg A, Daniya T, Kumar BS. Lightweight cryptography based deep learning techniques for securing IoT Based E-Healthcare System. In: 2023 2nd international conference on automation, computing and renewable systems (ICACRS). 2023. pp. 1334\u20131341. https:\/\/doi.org\/10.1109\/ICACRS58579.2023.10404726","DOI":"10.1109\/ICACRS58579.2023.10404726"},{"key":"1029_CR97","doi-asserted-by":"publisher","first-page":"18477","DOI":"10.1109\/JIOT.2023.3280592","volume":"10","author":"KS Sankaran","year":"2023","unstructured":"Sankaran KS, Kim TH, Renjith PN, An Improved AI-B, Secure. M-Trust privacy protocol for medical internet of things in smart healthcare system. IEEE Internet Things J. 2023;10:18477\u201385. https:\/\/doi.org\/10.1109\/JIOT.2023.3280592.","journal-title":"IEEE Internet Things J"},{"key":"1029_CR98","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-031-03948-5_20","volume-title":"Intelligent information processing XI","author":"M Wang","year":"2022","unstructured":"Wang M, Wang T, Ji H. Research on blockchain privacy protection mechanism in financial transaction services based on Zero-Knowledge proof and federal learning. In: Shi Z, Zucker J-D, An B, editors. Intelligent information processing XI. Cham: Springer; 2022. pp. 245\u201359. https:\/\/doi.org\/10.1007\/978-3-031-03948-5_20."},{"key":"1029_CR99","doi-asserted-by":"publisher","first-page":"13931","DOI":"10.1038\/s41598-024-64895-8","volume":"14","author":"X Fang","year":"2024","unstructured":"Fang X, Zheng L, Fang X, Chen W, Fang K, Yin L, Zhu H. Pioneering advanced security solutions for reinforcement learning-based adaptive key rotation in zigbee networks. Sci Rep. 2024;14:13931. https:\/\/doi.org\/10.1038\/s41598-024-64895-8.","journal-title":"Sci Rep"},{"key":"1029_CR100","doi-asserted-by":"publisher","first-page":"100521","DOI":"10.1016\/j.vehcom.2022.100521","volume":"38","author":"P Singh","year":"2022","unstructured":"Singh P, Elmi Z, Lau YY, Borowska-Stefa\u0144ska M, Wi\u015bniewski S, Dulebenets MA. Blockchain and AI technology convergence: applications in transportation systems. Veh Commun. 2022;38:100521. https:\/\/doi.org\/10.1016\/j.vehcom.2022.100521.","journal-title":"Veh Commun"},{"key":"1029_CR101","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.icte.2022.05.005","volume":"9","author":"TB Ahammed","year":"2023","unstructured":"Ahammed TB, Patgiri R, Nayak S. A vision on the artificial intelligence for 6G communication. ICT Express. 2023;9:197\u2013210. https:\/\/doi.org\/10.1016\/j.icte.2022.05.005.","journal-title":"ICT Express"},{"key":"1029_CR102","doi-asserted-by":"publisher","first-page":"75","DOI":"10.3390\/asi5040075","volume":"5","author":"B Zolfaghari","year":"2022","unstructured":"Zolfaghari B, Koshiba TAI, Makes Crypto, Evolve. Appl Syst Innov. 2022;5:75. https:\/\/doi.org\/10.3390\/asi5040075.","journal-title":"Appl Syst Innov"},{"key":"1029_CR103","doi-asserted-by":"publisher","unstructured":"Gnatyuk S, Okhrimenko T, Proskurin D. AI-based encryption system for secure UAV communication. In: 2024 IEEE 7th international conference on actual problems of unmanned aerial vehicles development (APUAVD). 2024. pp. 93\u201398. https:\/\/doi.org\/10.1109\/APUAVD64488.2024.10765879","DOI":"10.1109\/APUAVD64488.2024.10765879"},{"key":"1029_CR104","doi-asserted-by":"publisher","unstructured":"Kumar DK, Reddy KK, Kathrine GJW. Smart grid protection with AI and cryptographic security. In: 2024 3rd international conference on applied artificial intelligence and computing (ICAAIC). 2024. pp. 246\u2013251. https:\/\/doi.org\/10.1109\/ICAAIC60222.2024.10574913","DOI":"10.1109\/ICAAIC60222.2024.10574913"},{"key":"1029_CR105","doi-asserted-by":"publisher","first-page":"100685","DOI":"10.1016\/j.cosrev.2024.100685","volume":"54","author":"M Gupta","year":"2024","unstructured":"Gupta M, Kumar M, Dhir R. Unleashing the prospective of Blockchain-federated learning fusion for IoT security: A comprehensive review. Comput Sci Rev. 2024;54:100685. https:\/\/doi.org\/10.1016\/j.cosrev.2024.100685.","journal-title":"Comput Sci Rev"},{"key":"1029_CR106","doi-asserted-by":"publisher","first-page":"3118","DOI":"10.1109\/JIOT.2024.3478208","volume":"12","author":"Z Liu","year":"2025","unstructured":"Liu Z, Yang C, Ding Y, Liang H, Wang Y. A lightweight and Accuracy-Lossless Privacy-Preserving method in federated learning. IEEE Internet Things J. 2025;12:3118\u201329. https:\/\/doi.org\/10.1109\/JIOT.2024.3478208.","journal-title":"IEEE Internet Things J"},{"key":"1029_CR107","doi-asserted-by":"publisher","unstructured":"Safari A, Ghavifekr AA. Quantum technology & quantum neural networks in smart grids control: premier perspectives. In: 2022 8th international conference on control, instrumentation and automation (ICCIA). 2022. pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICCIA54998.2022.9737203","DOI":"10.1109\/ICCIA54998.2022.9737203"},{"key":"1029_CR108","doi-asserted-by":"publisher","first-page":"27114","DOI":"10.1038\/s41598-024-78389-0","volume":"14","author":"TH Kim","year":"2024","unstructured":"Kim TH, Madhavi S. Quantum intrusion detection system using outlier analysis. Sci Rep. 2024;14:27114. https:\/\/doi.org\/10.1038\/s41598-024-78389-0.","journal-title":"Sci Rep"},{"key":"1029_CR109","doi-asserted-by":"publisher","first-page":"102761","DOI":"10.1016\/j.jnca.2020.102761","volume":"168","author":"M Mahbub","year":"2020","unstructured":"Mahbub M. Progressive researches on IoT security: an exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics. J Netw Comput Appl. 2020;168:102761. https:\/\/doi.org\/10.1016\/j.jnca.2020.102761.","journal-title":"J Netw Comput Appl"},{"key":"1029_CR110","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/s43926-024-00080-7","volume":"4","author":"A Kumar","year":"2024","unstructured":"Kumar A, Singh D. Adaptive epsilon greedy reinforcement learning method in Securing IoT devices in edge computing. Discov Internet Things. 2024;4:10. https:\/\/doi.org\/10.1007\/s43926-024-00080-7.","journal-title":"Discov Internet Things"},{"key":"1029_CR111","doi-asserted-by":"publisher","first-page":"103928","DOI":"10.1016\/j.ipm.2024.103928","volume":"62","author":"T Rathod","year":"2024","unstructured":"Rathod T, Jadav NK, Tanwar S, Alabdulatif A, Garg D, Singh A. A comprehensive survey on social engineering attacks, countermeasures, case study, and research challenges. Inf Process Manag. 2024;62:103928. https:\/\/doi.org\/10.1016\/j.ipm.2024.103928.","journal-title":"Inf Process Manag"},{"key":"1029_CR112","doi-asserted-by":"publisher","first-page":"4182","DOI":"10.3390\/s22114182","volume":"22","author":"T Rathod","year":"2022","unstructured":"Rathod T, Jadav NK, Alshehri MD, Tanwar S, Sharma R, Felseghi RA, Raboaca MS. Blockchain for future wireless networks: A decade survey. Sensors. 2022;22:4182. https:\/\/doi.org\/10.3390\/s22114182.","journal-title":"Sensors"},{"key":"1029_CR113","doi-asserted-by":"publisher","first-page":"268","DOI":"10.3390\/info15050268","volume":"15","author":"D Bhumichai","year":"2024","unstructured":"Bhumichai D, Smiliotopoulos C, Benton R, Kambourakis G, Damopoulos D. The convergence of artificial intelligence and blockchain: the state of play and the road ahead. Information. 2024;15:268. https:\/\/doi.org\/10.3390\/info15050268.","journal-title":"Information"},{"key":"1029_CR114","doi-asserted-by":"publisher","first-page":"103395","DOI":"10.1016\/j.jnca.2022.103395","volume":"203","author":"T Li","year":"2022","unstructured":"Li T, He X, Jiang S, Liu J. A survey of privacy-preserving offloading methods in mobile-edge computing. J Netw Comput Appl. 2022;203:103395. https:\/\/doi.org\/10.1016\/j.jnca.2022.103395.","journal-title":"J Netw Comput Appl"},{"key":"1029_CR115","doi-asserted-by":"publisher","first-page":"3057","DOI":"10.1109\/JIOT.2022.3151828","volume":"10","author":"Y Lu","year":"2023","unstructured":"Lu Y, Wang D, Obaidat MS, Vijayakumar P. Edge-Assisted intelligent device authentication in Cyber\u2013Physical systems. IEEE Internet Things J. 2023;10:3057\u201370. https:\/\/doi.org\/10.1109\/JIOT.2022.3151828.","journal-title":"IEEE Internet Things J"},{"key":"1029_CR116","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-031-53082-1_13","volume-title":"Recent trends in image processing and pattern recognition","author":"S Goyal","year":"2024","unstructured":"Goyal S, Goyal I, Ahmed T. A review on machine learning techniques in IoT-Based smart grid applications. In: Santosh K, Makkar A, Conway M, Singh AK, Vacavant A, el Abou A, Bouguelia M, Hegadi R, editors. Recent trends in image processing and pattern recognition. Cham: Springer; 2024. pp. 151\u201364. https:\/\/doi.org\/10.1007\/978-3-031-53082-1_13."},{"key":"1029_CR117","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3390\/cryptography7030039","volume":"7","author":"A Nitaj","year":"2023","unstructured":"Nitaj A, Rachidi T. Applications of neural Network-Based AI in cryptography. Cryptography. 2023;7:39. https:\/\/doi.org\/10.3390\/cryptography7030039.","journal-title":"Cryptography"},{"key":"1029_CR118","doi-asserted-by":"publisher","first-page":"47","DOI":"10.3390\/informatics11030047","volume":"11","author":"I Al Khatib","year":"2024","unstructured":"Al Khatib I, Shamayleh A, Ndiaye M. Healthcare and the internet of medical things: Applications, Trends, key Challenges, and proposed resolutions. Informatics. 2024;11:47. https:\/\/doi.org\/10.3390\/informatics11030047.","journal-title":"Informatics"},{"key":"1029_CR119","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.3390\/s23042091","volume":"23","author":"C Fathy","year":"2023","unstructured":"Fathy C, Ali HM. A secure IoT-Based irrigation system for precision agriculture using the expeditious cipher. Sensors. 2023;23:2091. https:\/\/doi.org\/10.3390\/s23042091.","journal-title":"Sensors"},{"key":"1029_CR120","doi-asserted-by":"publisher","first-page":"3203","DOI":"10.1038\/s41467-024-47479-y","volume":"15","author":"K Wang","year":"2024","unstructured":"Wang K, et al. All-silicon multidimensionally-encoded optical physical unclonable functions for integrated circuit anti-counterfeiting. Nat Commun. 2024;15:3203. https:\/\/doi.org\/10.1038\/s41467-024-47479-y.","journal-title":"Nat Commun"},{"key":"1029_CR121","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/s42452-024-05633-7","volume":"6","author":"AM Seba","year":"2024","unstructured":"Seba AM, Gemeda KA, Ramulu PJ. Prediction and classification of IoT sensor faults using hybrid deep learning model. Discov Appl Sci. 2024;6:108. https:\/\/doi.org\/10.1007\/s42452-024-05633-7.","journal-title":"Discov Appl Sci"},{"issue":"13","key":"1029_CR122","doi-asserted-by":"publisher","first-page":"5921","DOI":"10.3390\/s23135921","volume":"23","author":"S Shruti, Rani","year":"2023","unstructured":"Shruti, Rani S, Sah DK, Gianini G. Attribute-based encryption schemes for next generation wireless IoT networks: a comprehensive survey. Sensors. 2023;23(13):5921.","journal-title":"Sensors"},{"key":"1029_CR123","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/978-981-15-5959-4_108","volume-title":"Innovative computing","author":"SAI Wang","year":"2020","unstructured":"Wang SAI. Finance and blockchain combine medical finance. In: Yang C-T, Pei Y, Chang J-W, editors. Innovative computing. Singapore: Springer; 2020. pp. 885\u201391. https:\/\/doi.org\/10.1007\/978-981-15-5959-4_108."},{"key":"1029_CR124","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-031-72287-5_4","volume-title":"Science, engineering management and information technology","author":"Z Mir Mohammadzade Noudehi","year":"2024","unstructured":"Mir Mohammadzade Noudehi Z, Bagheri Khameneh F. The impact of internet of Things, Blockchain, and artificial intelligence on occupational health and safety. In: Mirzazadeh A, Molamohamadi Z, Erdebilli B, Babaee Tirkolaee E, Weber G-W, editors. Science, engineering management and information technology. Cham: Springer; 2024. pp. 52\u201376. https:\/\/doi.org\/10.1007\/978-3-031-72287-5_4."},{"key":"1029_CR125","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1007\/978-3-030-82153-1_41","volume-title":"Knowledge Science, engineering and management","author":"Y Li","year":"2021","unstructured":"Li Y, Yin H, Gai K, Zhu L, Wang Q. Blockchain-as-a-Service powered knowledge graph construction. In: Qiu H, Zhang C, Fei Z, Qiu M, Kung S-Y, editors. Knowledge Science, engineering and management. Cham: Springer; 2021. pp. 500\u201311. https:\/\/doi.org\/10.1007\/978-3-030-82153-1_41."},{"key":"1029_CR126","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1109\/tai.2022.3213531","volume":"4","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Zhao J, Jiang J, Zhu Y, Wang L, Xiang Y. Recording behaviors of artificial intelligence in blockchains. IEEE Trans Artif Intell. 2022;4:1437\u201348. https:\/\/doi.org\/10.1109\/tai.2022.3213531.","journal-title":"IEEE Trans Artif Intell"},{"key":"1029_CR127","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-031-23233-6_3","volume-title":"Innovations in intelligent computing and communication","author":"J Srivastava","year":"2022","unstructured":"Srivastava J, Routray S. AI enabled internet of medical things framework for smart healthcare. In: Panda M, Dehuri S, Patra MR, Behera PK, Tsihrintzis GA, Cho S-B, Coello Coello CA, editors. Innovations in intelligent computing and communication. Cham: Springer; 2022. pp. 30\u201346. https:\/\/doi.org\/10.1007\/978-3-031-23233-6_3."},{"key":"1029_CR128","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-031-07012-9_11","volume-title":"Emerging technologies in computer engineering: cognitive computing and intelligent IoT","author":"GS Raghavendra","year":"2022","unstructured":"Raghavendra GS, Mahesh S, Chandra Sekhara Rao MVP. Emerging role of artificial intelligence and internet of things on healthcare management in COVID-19 pandemic situation. In: Balas VE, Sinha GR, Agarwal B, Sharma TK, Dadheech P, Mahrishi M, editors. Emerging technologies in computer engineering: cognitive computing and intelligent IoT. Cham: Springer; 2022. pp. 129\u201337. https:\/\/doi.org\/10.1007\/978-3-031-07012-9_11."},{"key":"1029_CR129","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1111\/1467-923X.13426","volume":"95","author":"K Bowers","year":"2024","unstructured":"Bowers K, Johnson S. Facing the future of crime: A framework for Police use of technology. Polit Q. 2024;95:480\u20138. https:\/\/doi.org\/10.1111\/1467-923X.13426.","journal-title":"Polit Q"},{"key":"1029_CR130","doi-asserted-by":"publisher","first-page":"e70041","DOI":"10.1002\/ett.70041","volume":"36","author":"AE Ezugwu","year":"2025","unstructured":"Ezugwu AE, Taiwo O, Egwuche OS, Abualigah L, Van Der Merwe A, Pal J, Saha AK, Alzahrani AI, Alblehai F, Greeff J, Olusanya MO. Smart homes of the future. Trans Emerg Telecommun Technol. 2025;36:e70041. https:\/\/doi.org\/10.1002\/ett.70041.","journal-title":"Trans Emerg Telecommun Technol"},{"key":"1029_CR131","doi-asserted-by":"publisher","first-page":"755","DOI":"10.1002\/mar.21619","volume":"39","author":"MM Mariani","year":"2022","unstructured":"Mariani MM, Perez-Vega R, Wirtz J. AI in marketing, consumer research and psychology: A systematic literature review and research agenda. Psychol Mark. 2022;39:755\u201376. https:\/\/doi.org\/10.1002\/mar.21619.","journal-title":"Psychol Mark"},{"key":"1029_CR132","doi-asserted-by":"publisher","first-page":"6371","DOI":"10.3390\/rs14246371","volume":"14","author":"D Zhang","year":"2022","unstructured":"Zhang D, Ren L, Shafiq M, Gu Z. A lightweight Privacy-Preserving system for the security of remote sensing images on IoT. Remote Sens. 2022;14:6371. https:\/\/doi.org\/10.3390\/rs14246371.","journal-title":"Remote Sens"},{"key":"1029_CR133","doi-asserted-by":"publisher","first-page":"22351","DOI":"10.1038\/s41598-024-70544-x","volume":"14","author":"KR Kalphana","year":"2024","unstructured":"Kalphana KR, Aanjankumar S, Surya M, Ramadevi MS, Ramela KR, Anitha T, Nagaprasad N, Krishnaraj R. Prediction of android ransomware with deep learning model using hybrid cryptography. Sci Rep. 2024;14:22351. https:\/\/doi.org\/10.1038\/s41598-024-70544-x.","journal-title":"Sci Rep"},{"key":"1029_CR134","doi-asserted-by":"publisher","first-page":"e70039","DOI":"10.1111\/1541-4337.70039","volume":"23","author":"Q Li","year":"2024","unstructured":"Li Q, et al. Recent advances in fish cutting: from cutting schemes to automatic technologies and internet of things innovations. Compr Rev Food Sci Food Saf. 2024;23:e70039. https:\/\/doi.org\/10.1111\/1541-4337.70039.","journal-title":"Compr Rev Food Sci Food Saf"},{"key":"1029_CR135","doi-asserted-by":"publisher","unstructured":"Li M, Wang Q, Zhang W. Blockchain-Based distributed machine learning towards statistical challenges. Communications in Computer and Information Science. 2020; pp. 549\u201364. https:\/\/doi.org\/10.1007\/978-981-15-9213-3_42.","DOI":"10.1007\/978-981-15-9213-3_42"},{"key":"1029_CR136","doi-asserted-by":"publisher","first-page":"61","DOI":"10.3390\/asi5040061","volume":"5","author":"B Zolfaghari","year":"2022","unstructured":"Zolfaghari B, Koshiba T. The dichotomy of neural networks and cryptography: war and peace. Appl Syst Innov. 2022;5:61. https:\/\/doi.org\/10.3390\/asi5040061.","journal-title":"Appl Syst Innov"},{"key":"1029_CR137","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1038\/s41598-024-83972-6","volume":"15","author":"SS Chowa","year":"2025","unstructured":"Chowa SS, Bhuiyan MRI, Tahosin MS, Karim A, Montaha S, Hassan MM, Shah MA, Azam S. An automated privacy-preserving self-supervised classification of COVID-19 from lung CT scan images minimizing the requirements of large data annotation. Sci Rep. 2025;15:226. https:\/\/doi.org\/10.1038\/s41598-024-83972-6.","journal-title":"Sci Rep"},{"key":"1029_CR138","doi-asserted-by":"publisher","first-page":"112962","DOI":"10.1109\/ACCESS.2025.3584473","volume":"13","author":"Y Wang","year":"2025","unstructured":"Wang Y, Shahril Ismail E. A review on the Advances, Applications, and future prospects of Post-Quantum cryptography in blockchain and IoT. IEEE Access. 2025;13:112962\u201377. https:\/\/doi.org\/10.1109\/ACCESS.2025.3584473.","journal-title":"IEEE Access"},{"key":"1029_CR139","doi-asserted-by":"publisher","first-page":"e10159","DOI":"10.1002\/amp2.10159","volume":"5","author":"SJ Plathottam","year":"2023","unstructured":"Plathottam SJ, Rzonca A, Lakhnori R, Iloeje CO. A review of artificial intelligence applications in manufacturing operations. J Adv Manuf Process. 2023;5:e10159. https:\/\/doi.org\/10.1002\/amp2.10159.","journal-title":"J Adv Manuf Process"},{"key":"1029_CR140","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1109\/TNSE.2020.3031179","volume":"8","author":"R Bosri","year":"2021","unstructured":"Bosri R, Rahman MS, Bhuiyan MZA, Al Omar A. Integrating blockchain with artificial intelligence for Privacy-Preserving recommender systems. IEEE Trans Netw Sci Eng. 2021;8:1009\u201318. https:\/\/doi.org\/10.1109\/TNSE.2020.3031179.","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"1029_CR141","doi-asserted-by":"publisher","first-page":"22755","DOI":"10.1007\/s11042-024-19993-0","volume":"84","author":"R Hajlaoui","year":"2025","unstructured":"Hajlaoui R, Dhahri S, Mahfoudhi S, Moulahi T, Alotibi G. Protecting machine learning systems using blockchain: solutions, challenges and future prospects. Multimed Tools Appl. 2025;84:22755\u201382. https:\/\/doi.org\/10.1007\/s11042-024-19993-0.","journal-title":"Multimed Tools Appl"},{"key":"1029_CR142","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/s41315-022-00227-1","volume":"6","author":"S Palekar","year":"2022","unstructured":"Palekar S, Radhika Y. IoT authentication model with optimized deep Q network for attack detection and mitigation. Int J Intell Robot Appl. 2022;6:350\u201364. https:\/\/doi.org\/10.1007\/s41315-022-00227-1.","journal-title":"Int J Intell Robot Appl"},{"key":"1029_CR143","doi-asserted-by":"publisher","first-page":"5161","DOI":"10.3390\/su12125161","volume":"12","author":"F Jameel","year":"2020","unstructured":"Jameel F, Javaid U, Khan WU, Aman MN, Pervaiz H, J\u00e4ntti R. Reinforcement learning in Blockchain-Enabled IIoT networks: A survey of recent advances and open challenges. Sustainability. 2020;12:5161. https:\/\/doi.org\/10.3390\/su12125161.","journal-title":"Sustainability"},{"key":"1029_CR144","doi-asserted-by":"publisher","unstructured":"Yavuz AA, Nouma SE, Hoang T, Earl D, Packard S. Distributed cyber-infrastructures and artificial intelligence in hybrid post-quantum era. In: 2022 IEEE 4th international conference on trust, privacy and security in intelligent systems, and applications (TPS-ISA). 2022. pp. 29\u201338. https:\/\/doi.org\/10.1109\/TPS-ISA56441.2022.00014","DOI":"10.1109\/TPS-ISA56441.2022.00014"},{"key":"1029_CR145","doi-asserted-by":"publisher","first-page":"e70018","DOI":"10.1002\/nem.70018","volume":"35","author":"D Abreu","year":"2025","unstructured":"Abreu D, Moura D, Esteve Rothenberg C, Abel\u00e9m A, QuantumNetSec. Quantum machine learning for network security. Int J Netw Manag. 2025;35:e70018. https:\/\/doi.org\/10.1002\/nem.70018.","journal-title":"Int J Netw Manag"},{"key":"1029_CR146","doi-asserted-by":"publisher","unstructured":"Tripathi SM, Upadhyay H, Soni J. Quantum neural network classification-based cyber threat detection in virtual environment. In: 2023 international conference on computational science and computational intelligence (CSCI). 2023. pp. 391\u2013396. https:\/\/doi.org\/10.1109\/CSCI62032.2023.00070","DOI":"10.1109\/CSCI62032.2023.00070"},{"key":"1029_CR147","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s42484-024-00163-2","volume":"6","author":"M Hdaib","year":"2024","unstructured":"Hdaib M, Rajasegarar S, Pan L. Quantum deep learning-based anomaly detection for enhanced network security. Quantum Mach Intell. 2024;6:26. https:\/\/doi.org\/10.1007\/s42484-024-00163-2.","journal-title":"Quantum Mach Intell"},{"key":"1029_CR148","doi-asserted-by":"publisher","first-page":"271","DOI":"10.3390\/fi15080271","volume":"15","author":"AS Rajawat","year":"2023","unstructured":"Rajawat AS, Goyal SB, Bedi P, Jan T, Whaiduzzaman M, Prasad M. Quantum machine learning for security assessment in the internet of medical things (IoMT). Future Internet. 2023;15:271. https:\/\/doi.org\/10.3390\/fi15080271.","journal-title":"Future Internet"},{"key":"1029_CR149","doi-asserted-by":"publisher","first-page":"107231","DOI":"10.1016\/j.engappai.2023.107231","volume":"127","author":"M Saied","year":"2024","unstructured":"Saied M, Guirguis S, Madbouly M. Review of artificial intelligence for enhancing intrusion detection in the internet of things. Eng Appl Artif Intell. 2024;127:107231. https:\/\/doi.org\/10.1016\/j.engappai.2023.107231.","journal-title":"Eng Appl Artif Intell"},{"key":"1029_CR150","doi-asserted-by":"publisher","first-page":"101820","DOI":"10.1016\/j.jksuci.2023.101820","volume":"35","author":"A Nazir","year":"2023","unstructured":"Nazir A, He J, Zhu N, Wajahat A, Ma X, Ullah F, Qureshi S, Pathan MS. Advancing Iot security: a systematic review of machine learning approaches for the detection of IoT Botnets. J King Saud Univ Comput Inf Sci. 2023;35:101820. https:\/\/doi.org\/10.1016\/j.jksuci.2023.101820.","journal-title":"J King Saud Univ Comput Inf Sci"}],"container-title":["Discover Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44163-026-01029-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-026-01029-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-026-01029-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T13:30:56Z","timestamp":1774618256000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44163-026-01029-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,22]]},"references-count":150,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["1029"],"URL":"https:\/\/doi.org\/10.1007\/s44163-026-01029-1","relation":{},"ISSN":["2731-0809"],"issn-type":[{"value":"2731-0809","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,22]]},"assertion":[{"value":"14 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Clinical trial"}},{"value":"The authors declare no competing interests.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"270"}}