{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T23:24:58Z","timestamp":1773876298530,"version":"3.50.1"},"reference-count":135,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.054007","type":"journal-article","created":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T06:53:10Z","timestamp":1726210390000},"page":"393-441","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":20,"title":["Cyber Security within Smart Cities: A Comprehensive Study and a Novel Intrusion Detection-Based Approach"],"prefix":"10.32604","volume":"81","author":[{"given":"Mehdi","family":"Houichi","sequence":"first","affiliation":[]},{"given":"Faouzi","family":"Jaidi","sequence":"additional","affiliation":[]},{"given":"Adel","family":"Bouhoula","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.ijinfomgt.2019.01.004","article-title":"Smart cities: Advances in research\u2014An information systems perspective","volume":"47","author":"Ismagilova","year":"2019","journal-title":"Int. J. Inf. Manag."},{"key":"ref2","first-page":"26","article-title":"Security and privacy concerns over IoT devices attacks in smart cities (2022)","volume":"11","author":"Majid","year":"2023","journal-title":"J. Comput. Commun."},{"key":"ref3","first-page":"1","article-title":"Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework","volume":"23","author":"Ismagilova","year":"2020","journal-title":"Inf. Syst. Front."},{"key":"ref4","unstructured":"S. Praharaj, \u201cA comprehensive analysis of the challenges and opportunities of the 100 smart cities mission in India,\u201d 2019. Accessed: Jun. 18, 2024. [Online]. Available: https:\/\/unsworks.unsw.edu.au\/entities\/publication\/b83644bb-e925-4cfa-8c54-f85deabad9fd\/full"},{"key":"ref5","first-page":"73","author":"Barrett","year":"2021","journal-title":"Smart Cities for Technological and Social Innovation"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1111\/exsy.12753","article-title":"Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends","volume":"39","author":"Haque","year":"2022","journal-title":"Expert. Syst."},{"key":"ref7","article-title":"An overview of security and privacy in smart cities IoT communications","volume":"33","author":"Al-Turjman","year":"2022","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref8","first-page":"107","article-title":"China\u2019s conception of cyber sovereignty","author":"Creemers","year":"2020","journal-title":"Governing Cyberspace: Behavior, Power, and Diplomacy"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1016\/j.scs.2018.02.039","article-title":"Security and privacy challenges in smart cities","volume":"39","author":"Braun","year":"2018","journal-title":"Sustain. Cities Soc."},{"key":"ref10","first-page":"15","article-title":"Intelligent monitoring system for smart road environment","volume":"15","author":"Finogeev","year":"2019","journal-title":"J. Ind. Inf. Integr."},{"key":"ref11","article-title":"Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities","volume":"33","author":"Safa","year":"2022","journal-title":"Trans. Emerg. Telecomm. Technol."},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1016\/j.jclepro.2019.119926","article-title":"Governance and quality of life in smart cities: Towards sustainable development goals","volume":"253","author":"De Guimar\u00e3es","year":"2020","journal-title":"J. Clean. Prod."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"4067","DOI":"10.1002\/er.4883","article-title":"Energy management system for smart grid: An overview and key issues","volume":"44","author":"Rathor","year":"2020","journal-title":"Int. J. Energy Res."},{"key":"ref14","article-title":"Bibliometric analysis on smart cities research","volume":"11","author":"Guo","year":"2019","journal-title":"Sustainability"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"590","DOI":"10.1109\/TITS.2019.2896943","article-title":"Development and evaluation of an adaptive traffic signal control scheme under a mixed-automated traffic scenario","volume":"21","author":"Kamal","year":"2019","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"6222","DOI":"10.1109\/TITS.2021.3084907","article-title":"Smart urban mobility: When mobility systems meet smart data","volume":"23","author":"Mahrez","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref17","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1080\/01441647.2020.1798558","article-title":"Strava Metro data for bicycle monitoring: A literature review","volume":"41","author":"Lee","year":"2021","journal-title":"Transp. Rev."},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.3390\/su14148622","article-title":"Logical analysis on the strategy for a sustainable transition of the world to green energy\u20142050. Smart cities and villages coupled to renewable energy sources with low carbon footprint","volume":"14","author":"Chenic","year":"2022","journal-title":"Sustainability"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"47047","DOI":"10.1109\/ACCESS.2020.2979051","article-title":"A blockchain-based load balancing in decentralized hybrid P2P energy trading market in smart grid","volume":"8","author":"Khalid","year":"2020","journal-title":"IEEE Access"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.comcom.2021.06.003","article-title":"Secure and energy-efficient smart building architecture with emerging technology IoT","volume":"176","author":"Kumar","year":"2021","journal-title":"Comput. Commun."},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.3390\/s21113784","article-title":"An IoT-based smart home automation system","volume":"21","author":"Stolojescu-Crisan","year":"2021","journal-title":"Sensors"},{"key":"ref22","series-title":"2021 Innov. Power Adv. Comput. Technol. (i-PACT)","first-page":"1","article-title":"Smart home: A new way to life","author":"Kakar","year":"Nov. 2021"},{"key":"ref23","series-title":"Comput. Vis.\u2014ECCV 2020: 16th Eur. Conf., Glasgow, UK","first-page":"331","article-title":"Detecting natural disasters, damage, and incidents in the wild","author":"Weber","year":"2020"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1016\/j.jclepro.2020.122263","article-title":"Industry 4.0 based sustainable circular economy approach for smart waste management system to achieve sustainable development goals: A case study of Indonesia","volume":"269","author":"Fatimah","year":"2020","journal-title":"J. Clean. Prod."},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1007\/s12053-021-09957-w","article-title":"A model for the assessment of energy-efficient smart street lighting\u2014A case study","volume":"14","author":"Viswanathan","year":"2021","journal-title":"Energy Effic."},{"key":"ref26","unstructured":"M. Ncamphalala, \u201cThe role of ICT to promote smart governance in local governments,\u201d Doctoral dissertation, Univ. of Johannesburg, South Africa, 2019."},{"key":"ref27","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1111\/cag.12607","article-title":"Public engagement in smart city development: Lessons from communities in Canada\u2019s smart city challenge","volume":"64","author":"Goodman","year":"2020","journal-title":"Canadian Geographer\/Le G\u00e9ographe Canadien"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1626","DOI":"10.3390\/smartcities7040065","article-title":"Business models used in smart cities\u2014theoretical approach with examples of smart cities","volume":"7","author":"Wolniak","year":"2024","journal-title":"Smart Cities"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.future.2019.06.004","article-title":"Smart healthcare framework for ambient assisted living using IoMT and big data analytics techniques","volume":"101","author":"Syed","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref30","doi-asserted-by":"crossref","first-page":"18615","DOI":"10.1109\/ACCESS.2020.2967777","article-title":"TCitySmartF: A comprehensive systematic framework for transforming cities into smart cities","volume":"8","author":"Kuru","year":"2020","journal-title":"IEEE Access"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"50","DOI":"10.3390\/jsan10030050","article-title":"A novel energy-efficient clustering algorithm for more sustainable wireless sensor networks enabled smart cities applications","volume":"10","author":"Yousif","year":"2021","journal-title":"J. Sens. Actuator Netw."},{"key":"ref32","first-page":"39","article-title":"An efficient solar energy harvesting system for wireless sensor network nodes","volume":"41","author":"Antony","year":"2020","journal-title":"J. Inf. Optim. Sci."},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.3390\/su12166469","article-title":"The role of 5G technologies: Challenges in smart cities and intelligent transportation systems","volume":"12","author":"Guevara","year":"2020","journal-title":"Sustainability"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1016\/j.trf.2020.07.004","article-title":"Mobility as a service and sustainable travel behaviour: A thematic analysis study","volume":"73","author":"Alyavina","year":"2020","journal-title":"Transp. Res. F: Traffic Psychol. Behav."},{"key":"ref35","unstructured":"W. I. R. A. J. Gunasinghe, \u201cCloud based secure element implementation for android host card emulation,\u201d Accessed: Apr. 5, 2024. [Online]. Available: https:\/\/dl.ucsc.cmb.ac.lk\/jspui\/handle\/123456789\/4261"},{"key":"ref36","series-title":"2022 14th Int. Congress Ultra Modern Telecommun. Control Syst. Workshops (ICUMT)","first-page":"90","article-title":"Integrating smart card authentication to web applications","author":"Muzikant","year":"Oct. 2022"},{"key":"ref37","series-title":"IEEE Int. Smart Cities Conf. (ISC2)","first-page":"1","article-title":"Assessment of open data portals: A Brazilian case study","author":"Kozievitch","year":"Sep. 2022"},{"key":"ref38","first-page":"1","article-title":"Automated real-time intelligent traffic control system for smart cities using wireless sensor networks","volume":"2020","author":"Hilmani","year":"2020","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref39","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1016\/j.scs.2017.12.034","article-title":"The IoT for smart sustainable cities of the future: An analytical framework for sensor-based big data applications for environmental sustainability","volume":"38","author":"Bibri","year":"2018","journal-title":"Sustain. Cities Soc."},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.1002\/9781119617570","author":"Raad","year":"2020","journal-title":"Fundamentals of IoT and Wearable Technology Design"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1109\/JSAC.2020.3042421","article-title":"Internet of Things for in-home health monitoring systems: Current advances, challenges and future directions","volume":"39","author":"Philip","year":"2021","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.3390\/app13042156","article-title":"Design of a smart factory based on cyber-physical systems and Internet of Things towards Industry 4.0","volume":"13","author":"Ryalat","year":"2023","journal-title":"Appl. Sci."},{"key":"ref43","series-title":"Smart Cities: 5th Ibero-American Congress, ICSC-CITIES 2022, Cuenca, Ecuador","first-page":"233","article-title":"Detecting air conditioning usage in households using unsupervised machine learning on smart meter data","author":"Porteiro","year":"Mar. 2023"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"56611","DOI":"10.1109\/ACCESS.2022.3177904","article-title":"Involvement of surveillance drones in smart cities: A systematic review","volume":"10","author":"Gohari","year":"2022","journal-title":"IEEE Access"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2020\/8846955","article-title":"A study on public adoption of robo-taxis in China","volume":"2020","author":"Liu","year":"2020","journal-title":"J. Adv. Transp."},{"key":"ref46","doi-asserted-by":"crossref","first-page":"6116","DOI":"10.1109\/JIOT.2020.2970995","article-title":"Energy-efficient provisioning for service function chains to support delay-sensitive applications in network function virtualization","volume":"7","author":"Sun","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref47","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1016\/j.future.2020.06.016","article-title":"Design and application of fog computing and Internet of Things service platform for smart city","volume":"112","author":"Zhang","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref48","doi-asserted-by":"crossref","first-page":"393","DOI":"10.3390\/s130100393","article-title":"The role of advanced sensing in smart cities","volume":"13","author":"Hancke","year":"2013","journal-title":"Sensors"},{"key":"ref49","series-title":"Int. Conf. Adv. Inf. Netw. Appl.","first-page":"215","article-title":"A systematic approach for IoT cyber-attacks detection in smart cities using machine learning techniques","author":"Houichi","year":"Apr. 2021"},{"key":"ref50","first-page":"1","author":"Sandhya Devi","year":"2021","journal-title":"Cases on Edge Computing and Analytics"},{"key":"ref51","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2021.103663","article-title":"Federated learning enabled digital twins for smart cities: Concepts, recent advances, and future directions","volume":"79","author":"Ramu","year":"2022","journal-title":"Sustain. Cities Soc."},{"key":"ref52","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2023.100549","article-title":"Fog computing for next-generation internet of things: Fundamental, state-of-the-art and research challenges","volume":"48","author":"Hazra","year":"2023","journal-title":"Comput. Sci. Rev."},{"key":"ref53","doi-asserted-by":"crossref","DOI":"10.3390\/su11205791","article-title":"Algorithmic decision-making in AVs: Understanding ethical and technical concerns for smart cities","volume":"11","author":"Lim","year":"2019","journal-title":"Sustainability"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/978-3-319-98923-5_3","author":"Amini","year":"2019","journal-title":"Sustainable Interdependent Networks II: From Smart Power Grids to Intelligent Transportation Networks"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1016\/j.trpro.2014.10.028","article-title":"A new taxonomy of smart city projects","volume":"3","author":"Perboli","year":"2014","journal-title":"Transp. Res. Procedia"},{"key":"ref56","series-title":"Proc. 16th ACM Conf. Comput. Commun. Secur.","first-page":"400","article-title":"On the difficulty of software-based attestation of embedded devices","author":"Castelluccia","year":"Nov. 2009"},{"key":"ref57","series-title":"2016 Smart Cities Symp. Prague (SCSP)","first-page":"1","article-title":"Industry 4.0 as a part of smart cities","author":"Lom","year":"May 2016"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1080\/10630732.2017.1348884","article-title":"Smart city pilot projects: Exploring the dimensions and conditions of scaling up","volume":"24","author":"Van Winden","year":"2017","journal-title":"J. Urban Technol."},{"key":"ref59","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1177\/0042098015597162","article-title":"Competitive urbanism and the limits to smart city innovation: The UK Future Cities initiative","volume":"54","author":"Taylor Buck","year":"2017","journal-title":"Urban Stud."},{"key":"ref60","doi-asserted-by":"crossref","DOI":"10.3390\/urbansci2040096","article-title":"Ethical analyses of smart city applications","volume":"2","author":"Clever","year":"2018","journal-title":"Urban Sci."},{"key":"ref61","article-title":"Cybersecurity challenges in vehicular communications","volume":"23","author":"El-Rewini","year":"2020","journal-title":"Veh. Commun."},{"key":"ref62","doi-asserted-by":"crossref","first-page":"1190","DOI":"10.1109\/TSMCC.2012.2189204","article-title":"A review of smart homes\u2014Past, present, and future","volume":"42","author":"Alam","year":"2012","journal-title":"IEEE Trans. Syst., Man, Cybernetics, C (Appl. Rev.)"},{"key":"ref63","series-title":"MILCOM 2017\u20142017 IEEE Military Commun. Conf. (MILCOM)","first-page":"267","article-title":"The mirai botnet and the iot zombie armies","author":"Kambourakis","year":"Oct. 2017"},{"key":"ref64","first-page":"171","article-title":"The costs of self-driving cars: Reconciling freedom and privacy with tort liability in autonomous vehicle regulation","volume":"17","author":"Boeglin","year":"2015","journal-title":"Yale JL Tech."},{"key":"ref65","article-title":"Car hacking: Accessing and exploiting the can bus protocol","volume":"2019","author":"Payne","year":"2019","journal-title":"J. Cybersecur. Edu., Res. Practice"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1109\/COMST.2021.3064507","article-title":"A survey on sensor-based threats and attacks to smart devices and applications","volume":"23","author":"Sikder","year":"2021","journal-title":"IEEE Commun. Surveys Tutorials"},{"key":"ref67","series-title":"2020 IEEE 6th Int. Conf. Big Data Security Cloud (BigDataSecurity), IEEE Int. Conf. High Perform. Smart Comput.,(HPSC) and IEEE Int. Conf. Intell. Data Security (IDS)","first-page":"49","article-title":"NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion","author":"Piplai","year":"May 2020"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"10517","DOI":"10.1007\/s12652-022-03707-1","article-title":"Security and privacy issues in smart cities\/industries:technologies, applications, and challenges","volume":"14","author":"Rao","year":"2023","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref69","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/MCOM.2017.1600267CM","article-title":"Security and privacy in smart city applications: Challenges and solutions","volume":"55","author":"Zhang","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref70","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.jmsy.2018.04.007","article-title":"Security of smart manufacturing systems","volume":"47","author":"Tuptuk","year":"2018","journal-title":"J. Manuf. Syst."},{"key":"ref71","doi-asserted-by":"crossref","DOI":"10.3390\/s19020326","article-title":"A decentralized privacy-preserving healthcare blockchain for IoT","volume":"19","author":"Dwivedi","year":"2019","journal-title":"Sensors"},{"key":"ref72","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijcip.2022.100547","article-title":"Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects","volume":"38","author":"Berghout","year":"2022","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref73","first-page":"1","author":"Saini","year":"2023","journal-title":"Enabling Technologies for Effective Planning and Management in Sustainable Smart Cities"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1109\/ACCESS.2014.2362522","article-title":"Information security in big data: Privacy and data mining","volume":"2","author":"Xu","year":"2014","journal-title":"IEEE Access"},{"key":"ref75","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2019.101701","article-title":"A survey on intrusion detection and prevention in wireless ad-hoc networks","volume":"105","author":"Khan","year":"2020","journal-title":"J. Syst. Archit."},{"key":"ref76","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-019-0038-7","article-title":"Survey of intrusion detection systems: Techniques, datasets and challenges","volume":"2","author":"Khraisat","year":"2019","journal-title":"Cybersecurity"},{"key":"ref77","first-page":"281","article-title":"Investigation on Intrusion Detection Systems (IDSs) in IoT","volume":"10","author":"Vaigandla","year":"2022","journal-title":"Int. J.Emerg. Trends Eng, Res."},{"key":"ref78","article-title":"Statistic Approached dynamically detecting security threats and updating a signature-based intrusion detection system\u2019s database in NGN","volume":"13","author":"Abdiyeva-Aliyeva","year":"2022","journal-title":"J. Adv. Inf. Technol."},{"key":"ref79","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108322","article-title":"A comprehensive survey on DNS tunnel detection","volume":"197","author":"Wang","year":"2021","journal-title":"Comput. Netw."},{"key":"ref80","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1007\/s12243-021-00904-5","article-title":"A statistical analysis of intrinsic bias of network security datasets for training machine learning mechanisms","volume":"77","author":"Silva","year":"2022","journal-title":"Annals Telecommun."},{"key":"ref81","doi-asserted-by":"crossref","DOI":"10.3390\/rs11101168","article-title":"A survey on situational awareness of ransomware attacks\u2014detection and prevention parameters","volume":"11","author":"Herrera Silva","year":"2019","journal-title":"Remote Sens."},{"key":"ref82","doi-asserted-by":"crossref","first-page":"107678","DOI":"10.1109\/ACCESS.2019.2932438","article-title":"Search: A collaborative and intelligent nids architecture for sdn-based cloud IoT networks","volume":"7","author":"Nguyen","year":"2019","journal-title":"IEEE Access"},{"key":"ref83","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.1109\/TNSE.2021.3059881","article-title":"CANintelliIDS: Detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU","volume":"8","author":"Javed","year":"2021","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref84","first-page":"1","author":"Heidari","year":"2022","journal-title":"Internet of Things Intrusion Detection Systems: A Comprehensive Review and Future Directions"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"46134","DOI":"10.1109\/ACCESS.2018.2853985","article-title":"Security and privacy in smart cities: Challenges and opportunities","volume":"6","author":"Cui","year":"2018","journal-title":"IEEE Access"},{"key":"ref86","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2020.102301","article-title":"Enabling technologies and sustainable smart cities","volume":"61","author":"Ahad","year":"2020","journal-title":"Sustain. Cities Soc."},{"key":"ref87","doi-asserted-by":"crossref","first-page":"29","DOI":"10.12948\/issn14531305\/20.1.2016.03","article-title":"Data security in smart cities: Challenges and solutions","volume":"20","author":"Popescul","year":"2016","journal-title":"Informatica Economic\u0103"},{"key":"ref88","doi-asserted-by":"crossref","first-page":"12083","DOI":"10.1109\/ACCESS.2020.3047996","article-title":"Secure software-defined networking communication systems for smart cities: Current status, challenges, and trends","volume":"9","author":"Rahouti","year":"2020","journal-title":"IEEE Access"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","article-title":"Security of the Internet of Things: Perspectives and challenges","volume":"20","author":"Jing","year":"2014","journal-title":"Wirel. Netw."},{"key":"ref90","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2023.104771","article-title":"A thorough examination of smart city applications: Exploring challenges and solutions throughout the life cycle with emphasis on safeguarding citizen privacy","volume":"98","author":"Xia","year":"2023","journal-title":"Sustain. Cities Soc."},{"key":"ref91","doi-asserted-by":"crossref","first-page":"28177","DOI":"10.1109\/ACCESS.2021.3052867","article-title":"Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities","volume":"9","author":"Thakor","year":"2021","journal-title":"IEEE Access"},{"key":"ref92","doi-asserted-by":"crossref","DOI":"10.3390\/su15065346","article-title":"Secure and lightweight authentication protocol for privacy preserving communications in smart city applications","volume":"15","author":"Gupta","year":"2023","journal-title":"Sustainability"},{"key":"ref93","doi-asserted-by":"crossref","first-page":"14542","DOI":"10.1109\/JIOT.2021.3066427","article-title":"Lightweight privacy-preserving scheme using homomorphic encryption in industrial Internet of Things","volume":"9","author":"Li","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref94","first-page":"1","article-title":"Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things","author":"Dwivedi","year":"2022","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref95","doi-asserted-by":"crossref","DOI":"10.3390\/s18082575","article-title":"Blockchain and IoT integration: A systematic survey","volume":"18","author":"Panarello","year":"2018","journal-title":"Sensors"},{"key":"ref96","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2021.103050","article-title":"Blockchain based solutions to secure IoT: Background, integration trends and a way forward","volume":"181","author":"Saxena","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref97","doi-asserted-by":"crossref","DOI":"10.3390\/su11143889","article-title":"Blockchain-based secure device management framework for an internet of things network in a smart city","volume":"11","author":"Gong","year":"2019","journal-title":"Sustainability"},{"key":"ref98","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2020.102482","article-title":"Customized blockchain-based architecture for secure smart home for lightweight IoT","volume":"58","author":"Ammi","year":"2021","journal-title":"Inf. Process. Manag."},{"key":"ref99","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2020.102761","article-title":"Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics","volume":"168","author":"Mahbub","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref100","doi-asserted-by":"crossref","first-page":"8304","DOI":"10.1109\/JIOT.2020.3044726","article-title":"MusicID: A brainwave-based user authentication system for internet of things","volume":"8","author":"Sooriyaarachchi","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref101","doi-asserted-by":"crossref","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","article-title":"A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things","volume":"14","author":"Li","year":"2017","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref102","unstructured":"K. Almulla, \u201cCyber-attack detection in network traffic using machine learning,\u201d  M.S. thesis, Grad. Prog. Res. Rochester Inst. Technol., Dubai, 2022. Accessed: Apr. 19, 2024. [Online]. Available: https:\/\/repository.rit.edu\/theses\/11320"},{"key":"ref103","doi-asserted-by":"crossref","first-page":"429","DOI":"10.3390\/smartcities4020024","article-title":"IoT in smart cities: A survey of technologies, practices and challenges","volume":"4","author":"Syed","year":"2021","journal-title":"Smart Cities"},{"key":"ref104","doi-asserted-by":"crossref","first-page":"31381","DOI":"10.1007\/s11042-021-10567-y","article-title":"Effective combining of feature selection techniques for machine learning-enabled IoT intrusion detection","volume":"80","author":"Rahman","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref105","doi-asserted-by":"crossref","DOI":"10.1186\/s13673-020-0212-7","article-title":"Identifying smartphone users based on how they interact with their phones","volume":"10","author":"Alqarni","year":"2020","journal-title":"Hum. Centric Comput. Inf. Sci."},{"key":"ref106","unstructured":"M. Zhu, A. H. Anwar, Z. Wan, J. H. Cho, C. Kamhoua and M. P. Singh, \u201cGame-theoretic and machine learning-based approaches for defensive deception: A survey,\u201d 2021, arXiv:2101.10121."},{"key":"ref107","first-page":"701","article-title":"Recent advances in adversarial machine learning: status, challenges and perspectives","volume":"11746","author":"Rawal","year":"2021","journal-title":"Artif. Intell. Mach. Learn. Multi-Domain Operat. Appl. III"},{"key":"ref108","first-page":"189","article-title":"A comprehensive insight into game theory in relevance to cyber security","volume":"8","author":"Anwar","year":"2020","journal-title":"Indones. J. Electr. Eng. Inform."},{"key":"ref109","doi-asserted-by":"crossref","first-page":"2460","DOI":"10.1109\/COMST.2021.3102874","article-title":"A survey of defensive deception: Approaches using game theory and machine learning","volume":"23","author":"Zhu","year":"2021","journal-title":"IEEE Commun. Surveys Tutorials"},{"key":"ref110","first-page":"1","article-title":"A systematic review on game-theoretic models and different types of security requirements in cloud environment: Challenges and opportunities","author":"Gill","year":"2024","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref111","unstructured":"Z. Li, \u201cDetecting malware with securedeep accelerator via processor side-channel fingerprinting for Internet of Things,\u201d Ph.D. dissertation, Comput. Sci., Old Dominion Univ., 2023. doi: 10.25777\/jhs5-db32."},{"key":"ref112","doi-asserted-by":"crossref","DOI":"10.3390\/math9080805","article-title":"Research on optimization of array honeypot defense strategies based on evolutionary game theory","volume":"9","author":"Shi","year":"2021","journal-title":"Mathematics"},{"key":"ref113","doi-asserted-by":"crossref","DOI":"10.3390\/info15050263","article-title":"Cybercrime intention recognition: A systematic literature review","volume":"15","author":"Kassa","year":"2024","journal-title":"Information"},{"key":"ref114","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1016\/j.future.2016.11.012","article-title":"Ontology-based data semantic management and application in IoT-and cloud-enabled smart homes","volume":"76","author":"Tao","year":"2017","journal-title":"Future Gener. Comput. Syst."},{"key":"ref115","doi-asserted-by":"crossref","DOI":"10.1016\/j.cmpb.2021.106146","article-title":"Ontology driven smart health service integration","volume":"207","author":"Shahzad","year":"2021","journal-title":"Comput. Methods Programs Biomed."},{"key":"ref116","unstructured":"E. Onu, \u201cPersonalized Privacy Preservation in IoT,\u201d Doctoral dissertation, Univ. of Calgary, Alberta, Canada, 2022."},{"key":"ref117","first-page":"25","article-title":"Semantic situation reporting mechanism based on 4W\u2019H ontology modeling in battlefield","volume":"1","author":"Iqbal","year":"2022","journal-title":"J. Intell. Pervasive Soft Comput."},{"key":"ref118","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1016\/j.telpol.2017.09.003","article-title":"Blockchain\u2019s roles in strengthening cybersecurity and protecting privacy","volume":"41","author":"Kshetri","year":"2017","journal-title":"Telecommun. Policy"},{"key":"ref119","unstructured":"A. Christofi, \u201cSmart cities and the data protection framework in context,\u201d 2021. Accessed: Apr. 25, 2024. [Online]. Available: https:\/\/scholar.google.com\/scholar?hl=zh-CN&as_sdt=0%2C5&q=%09Christofi%2C+A.+%282021%29.+Smart+cities+and+the+data+protection+framework+in+context.&btnG="},{"key":"ref120","doi-asserted-by":"crossref","first-page":"16","DOI":"10.3390\/ijgi5020016","article-title":"Opening up smart cities: Citizen-centric challenges and opportunities from GIScience","volume":"5","author":"Degbelo","year":"2016","journal-title":"ISPRS Int. J. Geo Inf."},{"key":"ref121","doi-asserted-by":"crossref","first-page":"1038","DOI":"10.1016\/j.tele.2017.04.013","article-title":"The privacy paradox-Investigating discrepancies between expressed privacy concerns and actual online behavior-A systematic literature review","volume":"34","author":"Barth","year":"2017","journal-title":"Telematics Inform."},{"key":"ref122","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s11036-022-02042-1","article-title":"A comprehensive study of security and cyber-security risk management within e-Health systems: Synthesis, analysis and a novel quantified approach","volume":"28","author":"Ksibi","year":"2023","journal-title":"Mob. Netw. Appl."},{"key":"ref123","series-title":"2023 Int. Wirel. Commun. Mobile Comput. (IWCMC)","first-page":"602","article-title":"Machine learning algorithms for enhancing intrusion detection within SDN\/NFV","author":"Sahbi","year":"2023"},{"key":"ref124","doi-asserted-by":"crossref","first-page":"1071","DOI":"10.1007\/s11831-019-09344-w","article-title":"A survey of deep learning and its applications: A new paradigm to machine learning","volume":"27","author":"Dargan","year":"2020","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref125","series-title":"2024 3rd Int. Conf. Cryptography, Netw. Secur. Commun. Technol.","first-page":"107","article-title":"Transferable intrusion detection model for industrial Internet based on deep learning: IIDS model combining hybrid deep learning model and transfer learning","author":"Cui","year":"Jan. 2024"},{"key":"ref126","doi-asserted-by":"crossref","DOI":"10.3390\/s21092985","article-title":"SMOTE-DRNN: A deep learning algorithm for botnet detection in the internet-of-things networks","volume":"21","author":"Popoola","year":"2021","journal-title":"Sensors"},{"key":"ref127","doi-asserted-by":"crossref","DOI":"10.1155\/2023\/5525675","article-title":"Two statistical approaches to justify the use of the logistic function in binary logistic regression","volume":"2023","author":"Zaidi","year":"2023","journal-title":"Math. Probl. Eng."},{"key":"ref128","doi-asserted-by":"crossref","first-page":"20","DOI":"10.38094\/jastt20165","article-title":"Classification based on decision tree algorithm for machine learning","volume":"2","author":"Charbuty","year":"2021","journal-title":"J. Appl. Sci. Technol. Trends"},{"key":"ref129","series-title":"Int. Conf. Intell. Data Commun. Technol. Internet Things (ICICI) 2018","first-page":"758","article-title":"A review on random forest: An ensemble classifier","author":"Parmar","year":"2019"},{"key":"ref130","series-title":"2019 Int. Conf. Intell. Comput. Control Syst. (ICCS)","article-title":"Machine learning classification with K-nearest neighbors","author":"Taunk","year":"2019"},{"key":"ref131","first-page":"1","article-title":"Survey on SVM and their application in image classification","volume":"13","author":"Chandra","year":"2021","journal-title":"Int. J. Inf. Technol."},{"key":"ref132","doi-asserted-by":"crossref","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","article-title":"Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning","volume":"10","author":"Ferrag","year":"2022","journal-title":"IEEE Access"},{"key":"ref133","doi-asserted-by":"crossref","first-page":"67910","DOI":"10.1109\/ACCESS.2022.3186026","article-title":"Design and testing novel one-class classifier based on polynomial interpolation with application to networking security","volume":"10","author":"Dini","year":"2022","journal-title":"IEEE Access"},{"key":"ref134","series-title":"2022 IEEE Latin-Am. Conf. Commun. (LATINCOM)","first-page":"1","article-title":"A hybrid CNN-LSTM model for IIoT edge privacy-aware intrusion detection","author":"de Elias","year":"Nov. 2022"},{"key":"ref135","doi-asserted-by":"crossref","unstructured":"C. Hazman, S. Benkirane, and M. Azrour, \u201cDEIGASe: Deep extraction and information gain for an optimal anomaly detection in IoT-based smart cities,\u201d 2022. doi: 10.21203\/rs.3.rs-2141835\/v1.","DOI":"10.21203\/rs.3.rs-2141835\/v1"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_54007\/TSP_CMC_54007.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:32:31Z","timestamp":1741314751000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58309"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":135,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.054007","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-05-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-15","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}