{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T09:08:04Z","timestamp":1767431284258,"version":"3.48.0"},"reference-count":34,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Industrial Information Integration"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1016\/j.jii.2025.101007","type":"journal-article","created":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T00:37:30Z","timestamp":1762389450000},"page":"101007","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A Novel graph-embedded musical chairs optimization with secure elliptic encryption framework for intelligent edge computing in healthcare iot networks"],"prefix":"10.1016","volume":"49","author":[{"given":"R.","family":"Gowthamani","sequence":"first","affiliation":[]},{"given":"S.","family":"Oswalt Manoj","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jii.2025.101007_bib0001","first-page":"39","article-title":"Implementation of sustainable development goals in India: progress & challenges","author":"Singh","year":"2024","journal-title":"Reg. Dimens. Hum. Dev. India S. Afr.: Through Sustain. Dev. Goals"},{"key":"10.1016\/j.jii.2025.101007_bib0002","series-title":"Implementation of Smart Healthcare Systems Using AI, IoT, & Blockchain","first-page":"243","article-title":"Security & privacy concerns in smart healthcare system","author":"AbdulRaheem","year":"2023"},{"key":"10.1016\/j.jii.2025.101007_bib0003","series-title":"Digital Healthcare in Asia & Gulf Region for Healthy Aging & More Inclusive Societies","first-page":"241","article-title":"Healthcare travel resilience through digital healthcare adoption: lessons from Malaysia during the COVID-19 p&emic","author":"Wong","year":"2024"},{"issue":"4","key":"10.1016\/j.jii.2025.101007_bib0004","doi-asserted-by":"crossref","first-page":"3533","DOI":"10.1007\/s11277-022-09932-3","article-title":"Evolution & adoption of next generation IoT-driven health care 4.0 systems","volume":"127","author":"Arora","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"10.1016\/j.jii.2025.101007_bib0005","series-title":"Artificial Intelligence For Cloud & Edge Computing","first-page":"181","article-title":"Big data analytics of iot-based cloud system framework: smart healthcare monitoring systems","author":"Awotunde","year":"2022"},{"key":"10.1016\/j.jii.2025.101007_bib0006","series-title":"Computer Vision & AI-Integrated IoT Technologies in the Medical Ecosystem","first-page":"87","article-title":"Artificial intelligence (AI)-enabled technology in medicine-advancing holistic healthcare monitoring & control systems","author":"Rath","year":"2024"},{"key":"10.1016\/j.jii.2025.101007_bib0007","first-page":"1","article-title":"A hybrid optimization approach for securing cloud-based e-health systems","author":"Altherwi","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.jii.2025.101007_bib0008","doi-asserted-by":"crossref","first-page":"2621","DOI":"10.1109\/ACCESS.2023.3234632","article-title":"Statistical analysis of remote health monitoring based IoT security models & deployments from a pragmatic perspective","volume":"11","author":"Ashok","year":"2023","journal-title":"IEEe Access."},{"issue":"9","key":"10.1016\/j.jii.2025.101007_bib0009","doi-asserted-by":"crossref","first-page":"1782","DOI":"10.3390\/pr10091782","article-title":"A framework for service-oriented architecture (SOA)-based IoT application development","volume":"10","author":"Giao","year":"2022","journal-title":"Processes"},{"issue":"2","key":"10.1016\/j.jii.2025.101007_bib0010","doi-asserted-by":"crossref","first-page":"1004","DOI":"10.3390\/s23021004","article-title":"Technological transformation of telco operators towards seamless iot edge-cloud continuum","volume":"23","author":"Oztoprak","year":"2023","journal-title":"Sensors"},{"key":"10.1016\/j.jii.2025.101007_bib0011","doi-asserted-by":"crossref","first-page":"2621","DOI":"10.1109\/ACCESS.2023.3234632","article-title":"Statistical analysis of remote health monitoring based IoT security models & deployments from a pragmatic perspective","volume":"11","author":"Ashok","year":"2023","journal-title":"IEEe Access"},{"key":"10.1016\/j.jii.2025.101007_bib0012","series-title":"Improving Security Performance of Internet of Medical Things Using Hybrid Metaheuristic Model","first-page":"1","author":"Kanneboina","year":"2024"},{"key":"10.1016\/j.jii.2025.101007_bib0013","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2024.109095","article-title":"Public cloud networks oriented deep neural networks for effective intrusion detection in online music education","volume":"115","author":"Zhang","year":"2024","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"10.1016\/j.jii.2025.101007_bib0014","first-page":"555","article-title":"Employing deep reinforcement learning to Cyber-attack simulation for enhancing cybersecurity","volume":"13","author":"Oh","year":"2024","journal-title":"Electron. (Basel)"},{"key":"10.1016\/j.jii.2025.101007_bib0015","doi-asserted-by":"crossref","DOI":"10.1016\/j.artmed.2024.102779","article-title":"Opportunities & challenges of artificial intelligence & distributed systems to improve the quality of healthcare service","volume":"149","author":"Aminizadeh","year":"2024","journal-title":"Artif. Intell. Med."},{"issue":"11","key":"10.1016\/j.jii.2025.101007_bib0016","doi-asserted-by":"crossref","first-page":"8065","DOI":"10.1109\/TII.2022.3161631","article-title":"Permissioned blockchain & deep learning for secure & efficient data sharing in industrial healthcare systems","volume":"18","author":"Kumar","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.jii.2025.101007_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.120772","article-title":"LSO-CSL: light spectrum optimizer-based convolutional stacked long short term memory for attack detection in IoT-based healthcare applications","volume":"232","author":"Thulasi","year":"2023","journal-title":"Expert. Syst. Appl."},{"issue":"5","key":"10.1016\/j.jii.2025.101007_bib0018","doi-asserted-by":"crossref","first-page":"7817","DOI":"10.1109\/JIOT.2023.3316669","article-title":"A deep-learning-integrated blockchain framework for securing industrial IoT","volume":"11","author":"Aljuhani","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.jii.2025.101007_bib0019","article-title":"A blockchain based federated deep learning model for secured data transmission in healthcare iot networks","volume":"33","author":"Ganapathy","year":"2024","journal-title":"Meas.: Sens."},{"issue":"4","key":"10.1016\/j.jii.2025.101007_bib0020","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s10586-024-04904-7","article-title":"Network intrusion detection system using convolutional neural networks: NIDS-DL-CNN for IoT security","volume":"28","author":"Kharoubi","year":"2025","journal-title":"Clust. Comput."},{"key":"10.1016\/j.jii.2025.101007_bib0021","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2025.3526883","article-title":"L2D2: a novel LSTM model for multi-class intrusion detection systems in the era of IoMT","author":"Akar","year":"2025","journal-title":"IEEe Access."},{"issue":"1","key":"10.1016\/j.jii.2025.101007_bib0022","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1186\/s13635-024-00184-1","article-title":"DCNN: a novel binary & multi-class network intrusion detection model via deep convolutional neural network","volume":"2024","author":"Shebl","year":"2024","journal-title":"EURASIP J. Inf. Secur."},{"year":"2025","series-title":"DDoSViT: IoT DDoS Attack Detection For Fortifying Firmware Over-The-Air (OTA) Updates Using Vision Transformer","author":"Ali","key":"10.1016\/j.jii.2025.101007_bib0023"},{"issue":"9","key":"10.1016\/j.jii.2025.101007_bib0024","doi-asserted-by":"crossref","first-page":"5669","DOI":"10.1007\/s10115-023-02030-1","article-title":"A deep learning-based disease diagnosis with intrusion detection for a secured healthcare system","volume":"66","author":"Kanna","year":"2024","journal-title":"Knowl. Inf. Syst."},{"issue":"12","key":"10.1016\/j.jii.2025.101007_bib0025","doi-asserted-by":"crossref","first-page":"5635","DOI":"10.1007\/s13042-024-02269-2","article-title":"Federated learning-guided intrusion detection and neural key exchange for safeguarding patient data on the internet of medical things","volume":"15","author":"Zhong","year":"2024","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"10.1016\/j.jii.2025.101007_bib0026","article-title":"Federated learning and resource-Aware graph neural network for intrusion detection in 6G-IoT driven healthcare system","author":"Ma","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.jii.2025.101007_bib0027","first-page":"1","article-title":"Enhancing network security in industrial IoT environments: a DeepCLG hybrid learning model for cyberattack detection","author":"Gulzar","year":"2025","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"10.1016\/j.jii.2025.101007_bib0028","series-title":"InInternational Conference on Computational Intelligence, Cyber Security, and Computational Models","first-page":"85","article-title":"DCNN-IDS: deep convolutional neural network based intrusion detection system","author":"Sriram","year":"2019"},{"key":"10.1016\/j.jii.2025.101007_bib0029","article-title":"A blockchain based federated deep learning model for secured data transmission in healthcare iot networks","volume":"33","author":"Ganapathy","year":"2024","journal-title":"Meas.: Sens."},{"key":"10.1016\/j.jii.2025.101007_bib0030","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2025.3526883","article-title":"L2D2: a novel LSTM model for multi-class intrusion detection systems in the era of IoMT","author":"Akar","year":"2025","journal-title":"IEEe Access"},{"issue":"1","key":"10.1016\/j.jii.2025.101007_bib0031","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s13721-024-00468-z","article-title":"A rule-based protein classification approach using normalized distance-based encoding method","volume":"13","author":"Saha","year":"2024","journal-title":"Netw. Model. Anal. Health Inform. Bioinform."},{"issue":"11","key":"10.1016\/j.jii.2025.101007_bib0032","doi-asserted-by":"crossref","first-page":"5030","DOI":"10.1109\/TCAD.2022.3140729","article-title":"Adaptive layout decomposition with graph embedding neural networks","volume":"41","author":"Li","year":"2022","journal-title":"IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."},{"issue":"8","key":"10.1016\/j.jii.2025.101007_bib0033","doi-asserted-by":"crossref","first-page":"10371","DOI":"10.1007\/s13369-023-07610-5","article-title":"A novel musical chairs optimization algorithm","volume":"48","author":"Eltamaly","year":"2023","journal-title":"Arab. J. Sci. Eng."},{"key":"10.1016\/j.jii.2025.101007_bib0034","series-title":"International Conference on Computing Science, Communication & Security","first-page":"193","article-title":"Design & implementation of light-weight dynamic elliptic curve cryptography using schoof\u2019s algorithm","author":"Tyagi","year":"2021"}],"container-title":["Journal of Industrial Information Integration"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2452414X25002304?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2452414X25002304?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T09:04:26Z","timestamp":1767431066000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2452414X25002304"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":34,"alternative-id":["S2452414X25002304"],"URL":"https:\/\/doi.org\/10.1016\/j.jii.2025.101007","relation":{},"ISSN":["2452-414X"],"issn-type":[{"type":"print","value":"2452-414X"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A Novel graph-embedded musical chairs optimization with secure elliptic encryption framework for intelligent edge computing in healthcare iot networks","name":"articletitle","label":"Article Title"},{"value":"Journal of Industrial Information Integration","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jii.2025.101007","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"101007"}}