{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T16:51:57Z","timestamp":1770915117660,"version":"3.50.1"},"reference-count":267,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Research and Sponsored Projects Office at United Arab Emirates University"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/ojcoms.2025.3593311","type":"journal-article","created":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:52:03Z","timestamp":1753732323000},"page":"6517-6550","source":"Crossref","is-referenced-by-count":2,"title":["Securing AIoT Surveillance: Techniques, Challenges, and Solutions"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0262-3178","authenticated-orcid":false,"given":"Kiran","family":"Khurshid","sequence":"first","affiliation":[{"name":"Department of Computer and Software Engineering, National University of Sciences and Technology, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4897-2592","authenticated-orcid":false,"given":"Khawar","family":"Khurshid","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Namal University, Mianwali, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3363-2886","authenticated-orcid":false,"given":"Muhammad","family":"Usman Hadi","sequence":"additional","affiliation":[{"name":"School of Engineering, Ulster University (Belfast), Belfast, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0148-7618","authenticated-orcid":false,"given":"Mohammad","family":"Al Bataineh","sequence":"additional","affiliation":[{"name":"Department of Electrical and Communication Engineering, UAE University, Al-Ain, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5123-5139","authenticated-orcid":false,"given":"Nasir","family":"Saeed","sequence":"additional","affiliation":[{"name":"Department of Electrical and Communication Engineering, UAE University, Al-Ain, UAE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3095077"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ese.2023.100330"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/su15021275"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.54216\/JCIM.010101"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s42162-023-00259-2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12173567"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s21093222"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-7540-4_9"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-7540-4"},{"issue":"3","key":"ref10","first-page":"28","article-title":"Big data-9Vs, challenges and solutions","volume":"23","author":"Khurshid","year":"2018","journal-title":"Tech. J."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3268705"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2017.12.022"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2016.07.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2021.3121651"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03157-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-46817-0_73"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IOTA.2016.7562757"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/0361198118792751"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106671"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2925910"},{"issue":"12","key":"ref21","first-page":"19","article-title":"Object detection and tracking using deep learning and artificial intelligence for video surveillance applications","volume":"10","author":"Aradhya","year":"2019","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2023.102057"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3576935"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148684"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2953364"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2983983"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/en13184813"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102761"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100888"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2022.102137"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/pathogens10081048"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3074319"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/hast.1125"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/app12083890"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-821259-2.00022-3"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMra2119215"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3055618"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119456"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2021.3100622"},{"issue":"1","key":"ref41","first-page":"271","article-title":"Advanced artificial intelligence techniques for real-time predictive maintenance in industrial IoT systems: A comprehensive analysis and framework","volume":"3","author":"Abouelyazid","year":"2023","journal-title":"J. AI Assist. Sci. Disc."},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/s21175745"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.10.029"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3256323"},{"issue":"1","key":"ref45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.63876\/ijss.v1i1.1","article-title":"A review: Application of AIOT in smart cities in industry 4.0 and society 5.0","volume":"1","author":"Marine","year":"2023","journal-title":"Int. J. Smart Syst."},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.4018\/979-8-3693-0993-3.ch011"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/su132112295"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-53433-1_11"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1201\/9781003606307-2"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1201\/9781003430018-13"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.4018\/979-8-3693-1487-6.ch007"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt1wn0skw"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/su15075828"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.51519\/journalisi.v5i4.572"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-023-00646-y"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.52098\/acj.202364"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-9524-0_12"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103744"},{"key":"ref59","author":"Junaid","year":"2020","journal-title":"ISO 27001: Information security management systems"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.37394\/23203.2020.15.42"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.3390\/jsan12030041"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.018589"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-8711-5_4"},{"issue":"3","key":"ref64","first-page":"26","article-title":"Semantic analysis of ISO\/IEC 27000 standard series and NIST cybersecurity framework to outline differences and consistencies in the context of operational and strategic information security","volume":"2","author":"Koza","year":"2022","journal-title":"Med. Eng. Themes"},{"key":"ref65","volume-title":"The State of Consumer Data Privacy Laws in the U.S. (and Why it Matters)","author":"Klosowski","year":"2021"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.47405\/mjssh.v6i10.1087"},{"key":"ref67","volume-title":"Annex a.18: Compliance","year":"2012"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMTech50083.2020.9211275"},{"key":"ref69","author":"Kouassi","year":"2024","journal-title":"ISO\/IEC 27002: Strength and weakness"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2021.9010094"},{"key":"ref71","volume-title":"Exploring IoT security threats and forensic challenges: A literature review and survey study","author":"Allaf","year":"2023"},{"key":"ref72","author":"Verkada","year":"2024","journal-title":"Security update"},{"key":"ref73","author":"Wired","year":"2024","journal-title":"LendingTree, advanced auto parts hit in snowflake data breach"},{"key":"ref74","author":"Page","year":"2024","journal-title":"Snowflake customer passwords found online after infostealing malware attack"},{"key":"ref75","volume-title":"Detecting and preventing unauthorized user access","year":"2024"},{"key":"ref76","year":"2024","journal-title":"Prevent your doorbell camera from being hacked: Here\u2019s how"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3252594"},{"key":"ref78","year":"2023","journal-title":"Employee monitoring: CNIL fined AMAZON FRANCE LOGISTIQUE 32 million"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0494-4"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.4018\/979-8-3693-0786-1.ch003"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3035427"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2020920245"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.3390\/s23115074"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3162219"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006036"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2021.1912651"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.15.1.14-30"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3017227"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2993363"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.3390\/info12020087"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography7020030"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-022-00338-x"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.3390\/brainsci13040683"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3326066"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.3390\/iot3030019"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2883403"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1080\/23335777.2020.1716268"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015432"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2935189"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12214507"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-6198-6_20"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05450-6"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2939008"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57931-8_16"},{"key":"ref105","year":"2024","journal-title":"Attacks on edge devices surge: Multiple critical vulnerabilities identified"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2018.12.001"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3422211"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11101548"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.5220\/0011627700003405"},{"key":"ref111","article-title":"Are modern smart cameras vulnerable to yesterday\u2019s vulnerabilities? A security evaluation of a smart home camera","author":"Larsson","year":"2021"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.3390\/iot5010007"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.3390\/s20226441"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.3390\/s20174806"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-05928-6"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22809-4_6"},{"issue":"2","key":"ref117","first-page":"133","article-title":"A comprehensive taxonomy for AIoT video streaming systems: Components, connectivity, and applications","volume":"6","author":"Khan","year":"2023","journal-title":"Int. J. Multidiscipl. Res. Publications"},{"key":"ref118","volume-title":"Leveraging industrial IoT and advanced technologies for digital transformation","author":"Behrendt","year":"2021"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/3490237"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-021-00077-w"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.4337\/9781800887374.00023"},{"key":"ref122","article-title":"A study on image privacy protection in response to artificial intelligence technology","author":"Xue","year":"2023"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-020-2025-8"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01020-4"},{"key":"ref125","author":"Datanami","year":"2024","journal-title":"Data prep still dominates data scientists\u2019 time, survey finds"},{"issue":"4","key":"ref126","first-page":"3","article-title":"Machine learning and big data: What is important?","volume":"42","author":"Stonebraker","year":"2019","journal-title":"IEEE Data Eng. Bull."},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-022-00775-9"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/1282"},{"key":"ref129","volume-title":"Watch: Fake ELON musk zoom-bombs meeting using real-time deepfake AI.","author":"Greene","year":"2024"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED48828.2020.9137011"},{"key":"ref131","article-title":"TBT: Targeted neural network attack with bit trojan","author":"Rakin","year":"2019","journal-title":"arXiv:1909.05193"},{"key":"ref132","year":"2022","journal-title":"Supply chain attacks on AI."},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3263155"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2018.2866730"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging4020036"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.355"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-021-00475-2"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20893-6_23"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2018.02.006"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10570-3"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.3390\/app14010408"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-024-02824-w"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v14i1.pp993-1004"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/JTEHM.2023.3282245"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3021689"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.3390\/s21082811"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13954-1"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS51556.2021.9401614"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2990224"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.3390\/life13030691"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108213"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.3390\/math10060873"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2020.103465"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.3390\/s22062216"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2984093"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-023-01659-z"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-02260-8"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2023.3239219"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11220-4"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2017.04.015"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3951-x"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2950530"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107865"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3058532"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.14034"},{"key":"ref166","author":"Statsig","year":"2021","journal-title":"In defense of Zillow\u2019s besieged data scientists"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.3390\/a15050144"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i6.25896"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.3390\/fi16010032"},{"key":"ref170","article-title":"Robustness analysis against adversarial patch attacks in fully unmanned stores","author":"Na","year":"2025","journal-title":"arXiv:2505.08835"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2025.101654"},{"issue":"2","key":"ref172","first-page":"2417","article-title":"Defending against backdoor attacks in federated learning by using differential privacy and OOD data attributes","volume":"143","author":"Tan","year":"2025","journal-title":"Comput. Model. Eng. Sci."},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.59224\/bjlti.v1i1.38-57"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9942270"},{"issue":"1","key":"ref175","first-page":"1","article-title":"Facial recognition technology vs privacy: The case of Clearview AI","volume":"2022","author":"Dul","year":"2022","journal-title":"Queen Mary Law J."},{"issue":"1","key":"ref176","first-page":"195","article-title":"Clearview AI, TikTok, and the collection of facial images in international law","volume":"23","author":"Kohn","year":"2022","journal-title":"Chicago J. Int. Law"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1017\/err.2023.61"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.4018\/979-8-3693-1487-6.ch001"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.3390\/s24124008"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.3390\/s23229172"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11071083"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02535-5"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101314"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2023.10.054"},{"key":"ref185","volume-title":"Hybrid encryption approaches and key management","year":"2024"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.32628\/CSEIT25111260"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3191881"},{"key":"ref188","article-title":"Evaluation of privacy-aware support vector machine (SVM) learning using homomorphic encryption","author":"Buchanan","year":"2025","journal-title":"arXiv:2503.04652"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.17148\/ijarcce.2022.11704"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-024-06251-1"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10060762"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3355222"},{"key":"ref193","article-title":"Performance analysis and industry deployment of post-quantum cryptography algorithms","author":"Demir","year":"2025","journal-title":"arXiv:2503.12952"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.029"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100264"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2986485"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.101005"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-024-09803-1"},{"key":"ref199","volume-title":"How does the new IoT standard matter? Innovation through Standardization in smart home ecosystems","author":"Loreck","year":"2024"},{"key":"ref200","volume-title":"More than 5.5 billion smart home matter-compliant devices will ship between 2022 and 2030","author":"Newswire","year":"2024"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.2999479"},{"key":"ref202","volume-title":"Deep learning for anomaly detection: A survey","author":"Chalapathy","year":"2019"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00444-8"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.119.2200076"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103733"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010185"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v10i5.2361"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.36548\/jscp.2021.2.001"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-024-00529-z"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.07.045"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09816-7"},{"key":"ref212","first-page":"1","article-title":"Pruning vs. quantization: Which is better?","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"36","author":"Kuzmin"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1145\/3578938"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1080\/01431161.2023.2255349"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-022-01808-w"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-023-10032-z"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-022-01647-y"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1145\/3625558"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3394528"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3287678"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1145\/3561048"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3282740"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1900654116"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO48935.2020.9245153"},{"issue":"1","key":"ref225","first-page":"12","article-title":"A secure communication framework for smart city infrastructure leveraging encryption, intrusion detection, and blockchain technology","volume":"7","author":"Desai","year":"2024","journal-title":"Adv. Comput. Sci."},{"issue":"2","key":"ref226","first-page":"125","article-title":"A review on feasibility of web technology and cloud computing for sustainable ES: Leveraging AI, IoT, and security for green operations","volume":"3","author":"Mallo","year":"2024","journal-title":"J. Inf. Technol. Inform."},{"issue":"2","key":"ref227","first-page":"21","article-title":"A study on latest developments in artificial intelligence (AI) and Internet of Things (IoT) in current context","volume":"11","author":"Jayadatta","year":"2023","journal-title":"J. Appl. Inf. Sci."},{"key":"ref228","doi-asserted-by":"crossref","DOI":"10.20517\/ces.2024.41","volume-title":"Zero trust implementation in the emerging technologies era: Survey","author":"Weinberg","year":"2024"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-023-01640-1"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1201\/9781003430018-10"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3122147"},{"issue":"1","key":"ref232","first-page":"40","article-title":"Enhancing cybersecurity: Protecting data in the digital age","volume":"1","author":"Isakov","year":"2024","journal-title":"Innov. Sci. Technol."},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1145\/3690639"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2022.3158565"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.53555\/ephijse.v9i3.211"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.9734\/ajrcos\/2024\/v17i3424"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900107"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2883344"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2970501"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.3390\/s22103744"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.3390\/app14167104"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0140498"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1007\/s12647-023-00716-z"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3506604"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC61514.2024.10592352"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.18280\/ijsse.140522"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100936"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3784406"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00482-7"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/SCEECS61402.2024.10482305"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.03.060"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.269"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.17323\/10.17323\/2713-2749.2023.2.78.121"},{"issue":"1","key":"ref254","first-page":"15","article-title":"Data privacy and the law: Balancing security and individual rights","volume":"1","author":"Agustina","year":"2024","journal-title":"Law Stud. Justice J."},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.002.2200373"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-53433-1_4"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.4018\/979-8-3693-0993-3.ch005"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2022.102334"},{"key":"ref259","volume-title":"Internet of healthcare (LAW): Privacy and data protection aspects in an Internet of Everything","author":"Rak","year":"2023"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.3390\/app14010120"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1201\/9781032642789-13"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1016\/j.cities.2024.105198"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.3390\/fi16080276"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3372518"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.4103\/jimr.jimr_30_23"},{"key":"ref266","volume-title":"Horizon Europe: The EU\u2019s research and innovation program","author":"Strauss","year":"2024"},{"key":"ref267","volume-title":"What Is Horizon Europe","year":"2022"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10829557\/11098733.pdf?arnumber=11098733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T17:48:55Z","timestamp":1761760135000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11098733\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":267,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2025.3593311","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}