{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T21:21:23Z","timestamp":1775856083964,"version":"3.50.1"},"reference-count":225,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"vor","delay-in-days":363,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.057877","type":"journal-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T02:32:05Z","timestamp":1733970725000},"page":"3499-3559","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":16,"title":["Navigating IoT Security: Insights into Architecture, Key Security Features, Attacks, Current Challenges and AI-Driven Solutions Shaping the Future of Connectivity"],"prefix":"10.32604","volume":"81","author":[{"given":"Ali","family":"Hassan","sequence":"first","affiliation":[]},{"given":"N.","family":"Nizam-Uddin","sequence":"additional","affiliation":[]},{"given":"Asim","family":"Quddus","sequence":"additional","affiliation":[]},{"given":"Syed Rizwan","family":"Hassan","sequence":"additional","affiliation":[]},{"given":"Ateeq Ur","family":"Rehman","sequence":"additional","affiliation":[]},{"given":"Salil","family":"Bharany","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"11117","DOI":"10.1109\/JIOT.2023.3247594","article-title":"Internet of behaviors: A survey","volume":"10","author":"Sun","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1016\/j.dcan.2022.04.027","article-title":"Internet of things: Conceptual network structure, main challenges and future directions","volume":"9","author":"Furstenau","year":"2023","journal-title":"Digit. Commun. Netw."},{"key":"ref3","article-title":"Study of integration of wireless sensor network and Internet of Things (IoT)","volume":"15","author":"Najim","year":"2023","journal-title":"Wireless Pers. Commun."},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.3390\/s23083876","article-title":"Utilization of 5G technologies in IoT applications: Current limitations by interference and network optimization difficulties\u2014A review","volume":"23","author":"Pons","year":"2023","journal-title":"Sensors"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.3390\/s21041174","article-title":"Next-generation Internet of Things (IoT): Opportunities, challenges, and solutions","volume":"21","author":"Zikria","year":"2021","journal-title":"Sensors"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"19","DOI":"10.32628\/IJSRSET196657","article-title":"The cloud computing and internet of things (IoT)","volume":"7","author":"Kaur","year":"2020","journal-title":"Int. J. Sci. Res. Sci. Eng. Technol."},{"key":"ref7","series-title":"Internet of Things-Global Technological and Societal Trends from Smart Environments and Spaces to Green Ict","first-page":"9","article-title":"Internet of things strategic research roadmap","author":"Vermesan","year":"2022"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.comnet.2018.07.017","article-title":"Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues","volume":"144","author":"\u010colakovi\u0107","year":"2018","journal-title":"Comput. Netw."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"529","DOI":"10.3390\/iot1020029","article-title":"A study on industrial IoT for the mining industry: Synthesized architecture and open research directions","volume":"1","author":"Aziz","year":"2020","journal-title":"IoT"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.tcs.2018.12.002","article-title":"Measuring security in IoT communications","volume":"764","author":"Bodei","year":"2019","journal-title":"Theor Comput. Sci."},{"key":"ref11","first-page":"1","article-title":"Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments","volume":"190","author":"Mallick","year":"2024","journal-title":"World Sci. News."},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2022.100467","article-title":"Landscape of IoT security","volume":"44","author":"Schiller","year":"2022","journal-title":"Comput. Sci. Rev."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3588999","article-title":"Security threats, countermeasures, and challenges of digital supply chains","volume":"55","author":"Hammi","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"ref14","article-title":"Securing the Internet of Things in artificial intelligence era: A comprehensive survey","volume":"12","author":"Humayun","year":"2024","journal-title":"IEEE Access"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10586-024-04509-0","article-title":"Securing internet of things using machine and deep learning methods: A survey","volume":"27","author":"Ghaffari","year":"2024","journal-title":"Clust. Comput."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10586-024-04662-6","article-title":"DDoS attack detection techniques in IoT networks: A survey","volume":"27","author":"Pakmehr","year":"2024","journal-title":"Clust. Comput."},{"key":"ref17","doi-asserted-by":"crossref","first-page":"34567","DOI":"10.1109\/JIOT.2024.3372518","article-title":"A survey of IoT privacy security: Architecture, technology, challenges, and trends","volume":"11","author":"Sun","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.3390\/electronics12081901","article-title":"Security and internet of things: Benefits, challenges, and future perspectives","volume":"12","author":"Taherdoost","year":"2023","journal-title":"Electronics"},{"key":"ref19","first-page":"3554","article-title":"Study of security issues and solutions in Internet of Things (IoT)","volume":"80","author":"Rekha","year":"2023","journal-title":"Mater. Today: Proc."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1080\/19361610.2021.1962677","article-title":"A comprehensive review of the internet of things security","volume":"18","author":"Ahmid","year":"2023","journal-title":"J. Appl. Secur. Res."},{"key":"ref21","article-title":"Authentication technology in Internet of Things and privacy security issues in typical application scenarios","volume":"12","author":"Zhao","year":"2023","journal-title":"Electronics"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1080\/19361610.2022.2031841","article-title":"Internet-of-Things security and vulnerabilities: Case study","volume":"18","author":"Alqarawi","year":"2023","journal-title":"J. Appl. Secur. Res."},{"key":"ref23","article-title":"Review of security issues in Internet of Things and artificial intelligence-driven solutions","volume":"6","author":"Abed","year":"2023","journal-title":"Secur. Privacy"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"J. Mohanty, S. Mishra, S. Patra, B. Pati, and C. R. Panigrahi, \u201cIoT security, challenges, and solutions: A review,,\u201d presented at the Prog. Adv. Comput. Intell. Eng.: Proc ICACIE 2019, 2021.","DOI":"10.1007\/978-981-15-6353-9_46"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1177\/1059712321994686","article-title":"What is architecture for? Designing as enriching the landscape of affordances","volume":"30","author":"Jeli\u0107","year":"2022","journal-title":"Adapt. Behav."},{"key":"ref26","first-page":"1141","article-title":"An Internet of Things (IoT)-based collaborative framework for advanced manufacturing","volume":"84","author":"Lu","year":"2016","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"ref27","first-page":"9","author":"Jabraeil Jamali","year":"2020","journal-title":"Towards the Internet of Things"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.3390\/s20041090","article-title":"SNPL: One scheme of securing nodes in IoT perception layer","volume":"20","author":"Fan","year":"2020","journal-title":"Sensors"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1667","DOI":"10.1007\/s11277-020-07649-9","article-title":"Security and privacy in IoT: A survey","volume":"115","author":"Chanal","year":"2020","journal-title":"Wirel Pers. Commun."},{"key":"ref30","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1016\/j.future.2020.02.051","article-title":"Real time dataset generation framework for intrusion detection systems in IoT","volume":"108","author":"Al-Hadhrami","year":"2020","journal-title":"Futur Gener. Comput. Syst."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1117","DOI":"10.1109\/COMST.2022.3151028","article-title":"Cellular, wide-area, and non-terrestrial IoT: A survey on 5G advances and the road toward 6G","volume":"24","author":"Vaezi","year":"2022","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref32","unstructured":"J. Qadir, \u201cCybersecurity in LoRaWAN networks: Vulnerability analysis and enhancing security measures for IoT connectivity,\u201d Ph.D. dissertation, Naval, Elect. Eng., Univ. Studi Genova, Genova, Italy, 2024."},{"key":"ref33","first-page":"28","article-title":"Design a blockchain-based middleware layer in the Internet of Things architecture","volume":"4","author":"Alam","year":"2020","journal-title":"Int. J. Informat. Vis."},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1687","DOI":"10.1007\/s11277-020-07446-4","article-title":"Internet of things (IoT), applications and challenges: A comprehensive review","volume":"114","author":"Khanna","year":"2020","journal-title":"Wirel Pers. Commun."},{"key":"ref35","series-title":"2019 IEEE CAMAD","first-page":"1","article-title":"IoT for 5G\/B5G applications in smart homes, smart cities, wearables and connected cars","author":"Uddin","year":"2019"},{"key":"ref36","first-page":"153","author":"Ayd\u0131nocak","year":"2021","journal-title":"Logistics 4.0 and Future of Supply Chains"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"3170","DOI":"10.1109\/JIOT.2020.3013306","article-title":"An efficient deep learning framework for intelligent energy management in IoT networks","volume":"8","author":"Han","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref38","article-title":"An overview of security and privacy in smart cities","volume":"33","author":"Al-Turjman","year":"2022","journal-title":"IoT Commun., Trans. Emerg. Telecommun. Technol."},{"key":"ref39","doi-asserted-by":"crossref","first-page":"7566","DOI":"10.1109\/TII.2019.2957404","article-title":"A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT","volume":"16","author":"Zhang","year":"2019","journal-title":"IEEE Trans. Ind. Informat."},{"key":"ref40","doi-asserted-by":"crossref","first-page":"1199","DOI":"10.1109\/TLA.2021.9461849","article-title":"Towards blockchain for suitable efficiency and data integrity of IoT ecosystem transactions","volume":"19","author":"Rodrigues","year":"2021","journal-title":"IEEE Lat. Am. Trans."},{"key":"ref41","article-title":"Authentication, Access control and scalability models in Internet of Things security\u2013A review","volume":"3","author":"Kokila","year":"2024","journal-title":"Cyber Secur. Appl."},{"key":"ref42","first-page":"213","author":"Devi","year":"2021","journal-title":"Appl. Internet Things: Proc. ICCCIOT 2020"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-020-01665-w","article-title":"Digital signature scheme for information non-repudiation in blockchain: A state of the art review","volume":"2020","author":"Fang","year":"2020","journal-title":"EURASIP J. Wireless Commun. Netw."},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108040","article-title":"A survey on IoT platforms: Communication, security, and privacy perspectives","volume":"192","author":"Babun","year":"2021","journal-title":"Comput. Netw."},{"key":"ref45","doi-asserted-by":"crossref","DOI":"10.1002\/cpe.4946","article-title":"An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols","volume":"32","author":"Gupta","year":"2020","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref46","doi-asserted-by":"crossref","first-page":"119795","DOI":"10.1109\/ACCESS.2020.3004814","article-title":"Defenses against perception-layer attacks on IoT smart furniture for impaired people","volume":"8","author":"Nasralla","year":"2020","journal-title":"IEEE Access"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"4319","DOI":"10.1109\/TII.2022.3141408","article-title":"Physical security and safety of IoT equipment: A survey of recent advances and opportunities","volume":"18","author":"Yang","year":"2022","journal-title":"IEEE Trans. Ind. Informat."},{"key":"ref48","first-page":"153","author":"Ambika","year":"2020","journal-title":"Internet of Things (IoT)"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.future.2021.08.020","article-title":"Detection of weak electromagnetic interference attacks based on fingerprint in IIoT systems","volume":"126","author":"Fang","year":"2022","journal-title":"Futur Gener. Comput. Syst."},{"key":"ref50","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3471936","article-title":"A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in IoT\/IIoT devices, and their detection mechanisms","volume":"27","author":"Polychronou","year":"2021","journal-title":"ACM Trans. Des. Autom. Electron. Syst."},{"key":"ref51","series-title":"Appl. Internet Things: Proc. ICCCIOT 2020","first-page":"213","article-title":"Side-channel attack in Internet of Things: A survey","author":"Devi","year":"2021"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"23","DOI":"10.37868\/sei.v3i1.124","article-title":"Survey of DoS\/DDoS attacks in IoT","volume":"3","author":"Khader","year":"2021","journal-title":"Sustain. Eng. Innov."},{"key":"ref53","doi-asserted-by":"crossref","first-page":"3011","DOI":"10.1007\/s10586-021-03309-0","article-title":"A novel mechanism to handle address spoofing attacks in SDN based IoT","volume":"24","author":"Aldabbas","year":"2021","journal-title":"Clust. Comput."},{"key":"ref54","doi-asserted-by":"crossref","DOI":"10.3390\/s20051300","article-title":"Designing efficient sinkhole attack detection mechanism in edge-based IoT deployment","volume":"20","author":"Pundir","year":"2020","journal-title":"Sensors"},{"key":"ref55","doi-asserted-by":"crossref","DOI":"10.7717\/peerj-cs.673","article-title":"A survey of Sybil attack countermeasures in IoT-based wireless sensor networks","volume":"7","author":"Arshad","year":"2021","journal-title":"PeerJ Comput. Sci."},{"key":"ref56","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2019.106960","article-title":"Cross-site scripting (XSS) attacks and mitigation: A survey","volume":"166","author":"Rodr\u00edguez","year":"2020","journal-title":"Comput. Netw."},{"key":"ref57","series-title":"Proc. 13th ACM Int. Conf. Pervasive Technol. Assist. Environ.","first-page":"1","article-title":"Neural network architectures for the detection of SYN flood attacks in IoT systems","author":"Evmorfos","year":"2020"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"116475","DOI":"10.1109\/ACCESS.2021.3105517","article-title":"Ping flood attack pattern recognition using a K-means algorithm in an Internet of Things (IoT) network","volume":"9","author":"Stiawan","year":"2021","journal-title":"IEEE Access"},{"key":"ref59","first-page":"96","article-title":"A study on security issues and attacks, challenges and future improvements in cloud-based IoT","volume":"12","author":"Nuthakki","year":"2022","journal-title":"Int. J. Sens. Wireless Commun. Control"},{"key":"ref60","series-title":"Proc. Int. Conf. Front. Comput. Syst.: COMSYS 2020","first-page":"755","article-title":"Vulnerability of cloud: Analysis of XML signature wrapping attack and countermeasures","author":"Modak","year":"2021"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1007\/s11277-021-09420-0","article-title":"A survey on internet-of-things security: Threats and emerging countermeasures","volume":"124","author":"Swessi","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref62","first-page":"2128","article-title":"A review of IoT applications, attacks and its recent defense methods","volume":"7","author":"Alhammadi","year":"2022","journal-title":"J. Glob. Sci. Res."},{"key":"ref63","series-title":"2021 4th Int. Conf. Secur. Privacy (ISEA-ISAP)","first-page":"1","article-title":"The IoT supply chain attack trends-vulnerabilities and preventive measures","author":"Rao","year":"2021"},{"key":"ref64","doi-asserted-by":"crossref","DOI":"10.3390\/fi12030055","article-title":"Security of IoT application layer protocols: Challenges and findings","volume":"12","author":"Nebbione","year":"2020","journal-title":"Futur Internet"},{"key":"ref65","doi-asserted-by":"crossref","DOI":"10.3390\/s23136067","article-title":"Code injection attacks in wireless-based Internet of Things (IoT): A comprehensive review and practical implementations","volume":"23","author":"Noman","year":"2023","journal-title":"Sensors"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.comcom.2022.11.001","article-title":"A review of machine learning-based zero-day attack detection: Challenges and future directions","volume":"198","author":"Guo","year":"Jan. 15, 2023","journal-title":"Comput. Commun."},{"key":"ref67","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MITP.2017.3680960","article-title":"Authentication and authorization for the Internet of Things","volume":"19","author":"Kim","year":"2017","journal-title":"IT Prof."},{"key":"ref68","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0297312","article-title":"Mapping the global geography of cybercrime with the World Cybercrime Index","volume":"19","author":"Bruce","year":"2024","journal-title":"PLoS One"},{"key":"ref69","unstructured":"W. E. Forum, \u201cGlobal cybersecurity outlook 2024,\u201d Switzerland, 2024. Accessed: Sep. 15, 2024. [Online]. Available: https:\/\/www3.weforum.org\/docs\/WEF_Global_Cybersecurity_Outlook_2024.pdf"},{"key":"ref70","unstructured":"Verizon, \u201c2024 data breach investigations report,\u201d USA, 2024. Accessed: Sep. 15, 2024. [Online]. Available: https:\/\/www.verizon.com\/business\/resources\/Tf8\/reports\/2024-dbir-data-breach-investigations-report.pdf"},{"key":"ref71","unstructured":"N. A. Bitdefender, \u201cThe 2024 IoT security landscape report,\u201d Romania, 2024. Accessed: Sep. 15, 2024. [Online]. Available: https:\/\/blogapp.bitdefender.com\/hotforsecurity\/content\/files\/2024\/06\/2024-IoT-Security-Landscape-Report_consumer.pdf"},{"key":"ref72","unstructured":"SOCRadar, \u201cFRANCE threat landscape report,\u201d USA, 2024. Accessed: Aug. 10, 2024. [Online]. Available: https:\/\/socradar.io\/wp-content\/uploads\/2024\/07\/SOCRadar-France-Threat-Landscape-Report-2024.pdf"},{"key":"ref73","unstructured":"U. Group, \u201cUNH-Q1-2024-release,\u201d USA, 2024. Accessed: Aug. 2, 2024. [Online]. Available: https:\/\/www.unitedhealthgroup.com\/content\/dam\/UHG\/PDF\/investors\/2024\/UNH-Q1-2024-Release.pdf"},{"key":"ref74","doi-asserted-by":"crossref","DOI":"10.12968\/S1361-3723(24)70022-0","article-title":"Rethinking how you safeguard data","volume":"2024","author":"Grindey","year":"2024","journal-title":"Comput. Fraud Secur."},{"key":"ref75","unstructured":"Roku, \u201cNotice of data breach,\u201d USA, 2024. Accessed: Aug. 3, 2024. [Online]. Available: https:\/\/thenationaldesk.com\/resources\/pdf\/85786bd1-fb34-49ea-8ab2-53270b82d6a4-TemplateNotification3820241.pdf"},{"key":"ref76","author":"Ilanbey","year":"2024","journal-title":"Internet Provider Tangerine Suffers Cyberattack"},{"key":"ref77","unstructured":"SOCRadar, \u201cMID-YEAR CYBER SECURITY review report,\u201d USA, 2024. Accessed: Aug. 4, 2024. [Online]. Available: https:\/\/socradar.io\/wp-content\/uploads\/2024\/07\/SOCRadar-2024-Mid-Year-Cybersecurity-Report.pdf"},{"key":"ref78","author":"AG","year":"2024","journal-title":"VARTA Affected by Cyber ATtack"},{"key":"ref79","unstructured":"T. R. B. A. Y. Cherrat, \u201cCyber threats and engagements in 2022,\u201d USA, 2023. Accessed: Aug. 4, 2024. [Online]. Available: https:\/\/apps.dtic.mil\/sti\/trecms\/pdf\/AD1208002.pdf"},{"key":"ref80","unstructured":"L. Einler Larsson and K. Qollakaj, \u201cCybersecurity of remote work migration: A study on the VPN security landscape post COVID-19 outbreak,\u201d M.S. thesis, Dept. of Comp. Sci., Karlskrona, Sweden, 2023. Accessed: Nov. 11, 2024. [Online]. Available: https:\/\/www.diva-portal.org\/smash\/get\/diva2:1778036\/FULLTEXT03"},{"key":"ref81","article-title":"Cyber security risks and opportunities of artificial intelligence: A qualitative study: How AI would form the future of cyber security","author":"Kirov","year":"2023","journal-title":"Sch. of Inf. Technol.,"},{"key":"ref82","unstructured":"Socradar, \u201cEducation threat landscape report,\u201d USA, 2023. Accessed: Aug. 10, 2024. [Online]. Available: https:\/\/socradar.io\/wp-content\/uploads\/2023\/02\/Education-Threat-Landscape-Report-v3.pdf"},{"key":"ref83","unstructured":"A. D. H. Agency, \u201cCyber security report 2022,\u201d Australia, 2023. Accessed: Aug. 10, 2024. [Online]. Available: https:\/\/www.digitalhealth.gov.au\/sites\/default\/files\/documents\/cyber-security-report-2022.pdf"},{"key":"ref84","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-1-4842-4255-1_1","author":"Hassan","year":"2019","journal-title":"Ransomware Revealed: A Beginner\u2019s Guide to Protecting and Recovering from Ransomware Attacks"},{"key":"ref85","article-title":"The law and politics of ransomware","author":"Lubin","year":"2022","journal-title":"55 Vanderbilt J. Trans. Law 1177"},{"key":"ref86","series-title":"2018 4th Int. Conf. Comput. Commun. Control Autom. (ICCUBEA)","first-page":"1","article-title":"Threat modelling of smart light bulb","author":"Dalvi","year":"2018"},{"key":"ref87","article-title":"Malware detection and mitigation techniques: Lessons learned from Mirai DDOS attack","volume":"3","author":"Jaramillo","year":"2018","journal-title":"J. Inf. Syst. Eng. Manag."},{"key":"ref88","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S1353-4858(18)30069-2","article-title":"DDoS attacks: Past, present and future","volume":"2018","author":"Chadd","year":"2018","journal-title":"Netw. Secur."},{"key":"ref89","series-title":"Proc. 2020 ACM SIGSAC Conf. Comput. Commun. Secur.","first-page":"743","article-title":"Examining mirai\u2019s battle over the internet of things","author":"Griffioen","year":"2020"},{"key":"ref90","unstructured":"Integrity360, \u201cThe biggest cyber attacks of 2023,\u201d 2023. Accessed: Aug. 10, 2024. [Online]. Available: https:\/\/insights.integrity360.com\/the-biggest-cyber-attacks-of-2023-so-far-part-2"},{"key":"ref91","doi-asserted-by":"crossref","DOI":"10.12968\/S1353-4858(23)70033-0","article-title":"How SMBs can defeat the threat of ransomware","volume":"2023","author":"Moffitt","year":"2023","journal-title":"Netw. Secur."},{"key":"ref92","article-title":"UK royal mail attack exposes Russian crime risks","author":"Analytica","year":"2023","journal-title":"Expert Briefings. UK: Emerald Publishing"},{"key":"ref93","article-title":"A note on machine learning applied in ransomware detection","author":"Horduna","year":"2023","journal-title":"Cryptol. ePrint Arch."},{"key":"ref94","unstructured":"B. Toulas, \u201cCyber security incident regarding historic orders,\u201d LSEG. 2023. Accessed: Aug. 28, 2024. [Online]. Available: https:\/\/www.bleepingcomputer.com\/news\/security\/jd-sports-says-hackers-stole-data-of-10-million-customers\/"},{"key":"ref95","unstructured":"J. S. F. PLC, \u201cCyber security incident regarding historic orders,\u201d 2023. Accessed: Aug. 11, 2024. [Online]. Available: https:\/\/www.londonstockexchange.com\/news-article\/JD.\/cyber-security-incident-regarding-historic-orders\/15815662"},{"key":"ref96","series-title":"2024 IEEE 49th Conf","first-page":"1","article-title":"MTFS: A moving target defense-enabled file system for malware mitigation","author":"Von der Assen","year":"2024"},{"key":"ref97","unstructured":"L. Abrams, \u201cBleepingComputer,\u201d 2023. Accessed: Aug. 28, 2024. [Online]. Available: https:\/\/www.bleepingcomputer.com\/news\/security\/multinational-tech-firm-abb-hit-by-black-basta-ransomware-attack\/"},{"key":"ref98","doi-asserted-by":"crossref","first-page":"36416","DOI":"10.1109\/ACCESS.2022.3162219","article-title":"A survey of interoperability challenges and solutions for dealing with them in IoT environment","volume":"10","author":"Albouq","year":"2022","journal-title":"IEEE Access"},{"key":"ref99","first-page":"129","article-title":"Consideration of cloud-web-concepts for standardization and interoperability: A comprehensive review for sustainable enterprise systems, AI, and IoT integration","volume":"3","author":"Rasheed","year":"2024","journal-title":"J. Inf. Technol. Inform."},{"key":"ref100","series-title":"Internet of Things-Technology, Applications and Standardization","first-page":"53","article-title":"IoT standardization: The road ahead","author":"Pal","year":"2018"},{"key":"ref101","series-title":"2024 IEEE 21st Consum. Commun. Netw. Conf. (CCNC)","first-page":"1","article-title":"A multi-protocol IoT platform for enhanced interoperability and standardization in smart home","author":"Marin","year":"2024"},{"key":"ref102","first-page":"1617","article-title":"Scalability in internet of things: Features, techniques and research challenges","volume":"13","author":"Gupta","year":"2017","journal-title":"Int. J. Comput. Intell. Res."},{"key":"ref103","series-title":"2016 22nd Int. Conf. Automat. Comput. (ICAC)","first-page":"348","article-title":"Performance evaluation of IoT network infrastructure","author":"Rafique","year":"2016"},{"key":"ref104","series-title":"Guide Comput. Netw. Secur. Texts Comput. Sci.","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/978-3-031-47549-8_25","article-title":"Internet of things (IoT): Growth, challenges, and security","author":"Kizza","year":"2024"},{"key":"ref105","doi-asserted-by":"crossref","first-page":"25715","DOI":"10.1109\/JIOT.2022.3197323","article-title":"Complexity measures for IoT network traffic","volume":"9","author":"Liu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref106","doi-asserted-by":"crossref","DOI":"10.1016\/j.ymssp.2019.106564","article-title":"Data management techniques for Internet of Things","volume":"138","author":"Di\u00e8ne","year":"2020","journal-title":"Mech. Syst. Signal Process"},{"key":"ref107","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2021.100420","article-title":"The challenges of IoT addressing security, ethics, privacy, and laws","volume":"15","author":"Karale","year":"2021","journal-title":"Internet Things"},{"key":"ref108","series-title":"33rd USENIX Secur. Symp. (USENIX Secur. 24)","article-title":"Your firmware has arrived: A study of firmware update vulnerabilities","author":"Wu","year":"2023"},{"key":"ref109","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2022.100508","article-title":"Secure firmware Over-The-Air updates for IoT: Survey, challenges, and discussions","volume":"18","author":"Jaouhari","year":"2022","journal-title":"Internet Things"},{"key":"ref110","article-title":"Over-the-air in personam: Purposeful availment through over-the-air updates","volume":"75","author":"Boyd","year":"2023","journal-title":"SCL Rev."},{"key":"ref111","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2021.106771","article-title":"Software security patch management-A systematic literature review of challenges, approaches, tools and practices","volume":"144","author":"Dissanayake","year":"2022","journal-title":"Inf. Softw. Technol."},{"key":"ref112","article-title":"Assessment of zero-day vulnerability using machine learning approach","volume":"10","author":"SakthiMurugan","year":"2024","journal-title":"EAI Endorsed Trans. Internet Things"},{"key":"ref113","first-page":"1","article-title":"Systematic verification of IoT device conformance to IETF manufacturer usage description standard","author":"Zhang","year":"2024","journal-title":"TechRxiv"},{"key":"ref114","doi-asserted-by":"crossref","first-page":"1","DOI":"10.14763\/2024.2.1776","article-title":"Protocol power: Matter, IoT interoperability, and a critique of industry self-regulation","volume":"13","author":"Crawford","year":"2024","journal-title":"Internet Policy Rev."},{"key":"ref115","series-title":"Advances in IoT and Security with Computational Intelligence","first-page":"49","article-title":"Intercompatibility of IoT devices using matter: Next-generation IoT connectivity protocol","author":"Singh","year":"2023"},{"key":"ref116","doi-asserted-by":"crossref","DOI":"10.1016\/j.heliyon.2024.e30357","article-title":"Understanding perspectives on personal data privacy in Internet of Things (IoT): A systematic literature review (SLR)","volume":"10","author":"Coiduras-Sanagust\u00edn","year":"2024","journal-title":"Heliyon"},{"key":"ref117","unstructured":"M. Siddireddy, \u201cA lightweight end-to-end encryption algorithm for IoT data integration: Blockchain framework,\u201d M.S. thesis, SIU Carbondale, Carbondale, IL, USA, 2024."},{"key":"ref118","series-title":"Secur., Priv., Anonym. Comput., Commun., Storage: SpaCCS 2020 Int. Workshops","first-page":"122","article-title":"The dark (and bright) side of IoT: Attacks and countermeasures for identifying smart home devices and services","author":"Hussain","year":"2020"},{"key":"ref119","first-page":"105","article-title":"Research on zero knowledge with machine learning","volume":"12","author":"Zhang","year":"2024","journal-title":"J. Comput. Electron. Inf. Manag."},{"key":"ref120","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12652-017-0494-4","article-title":"Advanced lightweight encryption algorithms for IoT devices: Survey, challenges and solutions","volume":"15","author":"Singh","year":"2024","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref121","doi-asserted-by":"crossref","first-page":"34825","DOI":"10.1007\/s11042-023-15592-7","article-title":"Securing edge computing using cryptographic schemes: A review","volume":"83","author":"Mahato","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref122","first-page":"21","article-title":"A survey on lightweight cryptographic algorithms in IoT","volume":"24","author":"Suryateja","year":"2024","journal-title":"Cybern. Inf. Technol."},{"key":"ref123","first-page":"2212","article-title":"Optimizing incident response in cloud security with AI and big data integration","volume":"18","author":"Reddy Ayyadapu","year":"2023","journal-title":"Chelon. Res. Found."},{"key":"ref124","article-title":"Cyber physical system security by Splunk","volume":"9","author":"Saraf","year":"2020","journal-title":"i-Manag. J. Commun. Eng. Syst."},{"key":"ref125","unstructured":"Darktrace, \u201cThe next paradigm shift AI-driven cyber-attacks,\u201d UK, 2020. Accessed: Aug. 11, 2024. [Online]. Available: https:\/\/www.oixio.ee\/sites\/default\/files\/the_next_paradigm_shift_-_ai_driven_cyber_attacks.pdf"},{"key":"ref126","first-page":"3","author":"Copeland","year":"2021","journal-title":"Azure Sentinel Overview"},{"key":"ref127","first-page":"94","author":"Sivagami","year":"2024","journal-title":"Secure Communication in Internet of Things"},{"key":"ref128","doi-asserted-by":"crossref","first-page":"259","DOI":"10.3390\/iot1020016","article-title":"IoT network security: Threats, risks, and a data-driven defense framework","volume":"1","author":"Wheelus","year":"2020","journal-title":"IoT"},{"key":"ref129","series-title":"ICBTA 2020 (3rd Int. Conf. Blockchain Technol. Appl.)","author":"Mazzocca","year":"2024"},{"key":"ref130","doi-asserted-by":"crossref","first-page":"178","DOI":"10.30574\/msarr.2024.11.1.0081","article-title":"The role of IoT in boosting supply chain transparency and efficiency","volume":"12","author":"Udeh","year":"2024","journal-title":"Magna Sci. Adv. Res. Rev."},{"key":"ref131","doi-asserted-by":"crossref","first-page":"6222","DOI":"10.1109\/JIOT.2020.3025775","article-title":"A survey on supply chain security: Application areas, security threats, and solution architectures","volume":"8","author":"Hassija","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref132","first-page":"2277","article-title":"Impact and innovations of azure IoT: Current applications, services, and future directions","volume":"13","author":"Borra","year":"2024","journal-title":"Int. J. Recent Technol. Eng."},{"key":"ref133","article-title":"Secure pharmaceutical supply chain using blockchain in IoT cloud systems","volume":"26","author":"Mangala","year":"2024","journal-title":"Internet Things"},{"key":"ref134","doi-asserted-by":"crossref","first-page":"1607","DOI":"10.51594\/ijmer.v6i5.1126","article-title":"Enhancing manufacturing productivity: A review of AI-Driven supply chain management optimization and ERP systems integration","volume":"6","author":"Adenekan","year":"2024","journal-title":"Int. J. Manag. Entrep. Res."},{"key":"ref135","first-page":"1","article-title":"A comprehensive node-based botnet detection framework for IoT network","volume":"27","author":"Aldaej","year":"2024","journal-title":"Clus. Comput."},{"key":"ref136","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1201\/9781003480181-2","author":"Shende","year":"2024","journal-title":"Modelling of Virtual Worlds Using the Internet of Things"},{"key":"ref137","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/MPRV.2020.2966190","article-title":"Betrusted: Improving security through physical partitioning","volume":"19","author":"Huang","year":"2020","journal-title":"IEEE Pervasive Comput."},{"key":"ref138","first-page":"1","article-title":"Securing the Internet of Things: A comprehensive review of security challenges and artificial intelligence solutions","volume":"4","author":"Soofi","year":"2024","journal-title":"Found Univ. J. Eng. Appl. Sci."},{"key":"ref139","doi-asserted-by":"crossref","DOI":"10.3390\/fi14090264","article-title":"A VPN performances analysis of constrained hardware open source infrastructure deploy in IoT environment","volume":"14","author":"Gentile","year":"2022","journal-title":"Future Internet"},{"key":"ref140","series-title":"Proc. 9th ACM Conf. Data Appl. Securr. Priv.","first-page":"85","article-title":"Detection of threats to IoT devices using scalable VPN-forwarded honeypots","author":"Tambe","year":"2019"},{"key":"ref141","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2023.101019","article-title":"Securing IoT devices: A novel approach using blockchain and quantum cryptography","volume":"25","author":"Dhar","year":"2024","journal-title":"Internet Things"},{"key":"ref142","doi-asserted-by":"crossref","first-page":"366","DOI":"10.3390\/iot4030017","article-title":"Global models of smart cities and potential IoT applications: A review","volume":"4","author":"Hassebo","year":"2023","journal-title":"IoT"},{"key":"ref143","author":"Lea","year":"2024","journal-title":"Edge Computing Simplified: Explore All Aspects of Edge Computing for Business Leaders and Technologists"},{"key":"ref144","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/09540091.2021.1936455","article-title":"Applications of federated learning in smart cities: Recent advances, taxonomy, and open challenges","volume":"34","author":"Zheng","year":"2022","journal-title":"Connect. Sci."},{"key":"ref145","article-title":"Machine learning enabled industrial IoT security: Challenges, trends and solutions","volume":"38","author":"Ni","year":"2024","journal-title":"J. Ind. Inf. Integr."},{"key":"ref146","series-title":"Internet of Things and Its Applications.","first-page":"523","article-title":"Challenges, security mechanisms, and research areas in IoT and IIoT","author":"Job","year":"2022"},{"key":"ref147","series-title":"2024 IEEE Int. Workshop Metrol. Ind. 4.0 IoT (MetroInd4.0 and IoT)","first-page":"458","article-title":"Security issues in industrial Internet-of-Things: Threats, attacks and solutions","author":"Cec\u00edlio","year":"2024"},{"key":"ref148","unstructured":"T. Ollila, \u201cOverview for capabilities of OT network monitoring tools,\u201d M.S. thesis, Inf. Technol., Jyv\u00e4skyl\u00e4 Univ. Appl. Sci., Jyv\u00e4skyl\u00e4, Finland, 2024."},{"key":"ref149","doi-asserted-by":"crossref","first-page":"531","DOI":"10.23919\/cje.2022.00.103","article-title":"A hybrid entropy and blockchain approach for network security defense in SDN-based IIoT","volume":"32","author":"Su","year":"2023","journal-title":"Chin. J. Electron."},{"key":"ref150","series-title":"Cyber Forens. Investig. Smart Dev.","first-page":"1","article-title":"Smart home forensics","author":"Pullagura","year":"2024"},{"key":"ref151","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/s10603-022-09534-3","article-title":"The ring video doorbell and the entry of amazon into the smart home: Implications for consumer-initiated surveillance","volume":"46","author":"Kelly","year":"2023","journal-title":"J. Consum. Policy."},{"key":"ref152","series-title":"2023 IEEE Int. Conf. Electro Inf. Technol. (eIT)","first-page":"248","article-title":"Fire security systems analysis and internet of things implications","author":"Fuerte","year":"2023"},{"key":"ref153","article-title":"Android based smart security system using Internet of Things (IoT) and firebase","author":"Harvent","year":"2019","journal-title":"Fac. Comput. Syst. Softw. Eng., Univ. Malaysia Pahang"},{"key":"ref154","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2020.102023","article-title":"Security and the smart city: A systematic review","volume":"55","author":"Laufs","year":"2020","journal-title":"Sustain. Cities Soc."},{"key":"ref155","doi-asserted-by":"crossref","first-page":"1675","DOI":"10.1109\/JPROC.2019.2925910","article-title":"Edge video analytics for public safety: A review","volume":"107","author":"Zhang","year":"2019","journal-title":"Proc. IEEE"},{"key":"ref156","doi-asserted-by":"crossref","DOI":"10.3390\/technologies12070099","article-title":"Analysis of the use of artificial intelligence in software-defined intelligent networks: A survey","volume":"12","author":"Ospina Cifuentes","year":"2024","journal-title":"Technologies"},{"key":"ref157","unstructured":"C. W. R. Johnson, \u201cPlatform, application, grid: Synthetic ecologies and everyday surveillance,\u201d Ph.D. dissertation, Univ. Calif., Davis, 2022."},{"key":"ref158","series-title":"2020 Int. Conf. Commun., Signal Process. Appl. (ICCSPA)","first-page":"1","article-title":"IoT security in healthcare using AI: A survey","author":"Gopalan","year":"2021"},{"key":"ref159","first-page":"1484","article-title":"Use of enhanced artificial intelligence in security business management in the digital economy era","volume":"3","author":"Sarika","year":"2023","journal-title":"J. Informatics Educ. Res."},{"key":"ref160","doi-asserted-by":"crossref","first-page":"137","DOI":"10.53771\/ijlsra.2024.6.1.0040","article-title":"A review of emerging trends in telemedicine: Healthcare delivery transformations","volume":"6","author":"Adeghe","year":"2024","journal-title":"Int. J. Life Sci. Res. Arch."},{"key":"ref161","unstructured":"C. Yorston, \u201cDesign of an interactive generalized testbed for continuous data collection and reduced maintenance downtime in industrial applications: A use case study using siemens mindsphere,\u201d M.S. thesis, Univ. Georgia, Athens, GA, USA, 2023."},{"key":"ref162","doi-asserted-by":"crossref","DOI":"10.1016\/j.energy.2023.129652","article-title":"A hybrid-MPC based energy management system with time series constraints for a bioclimatic building","volume":"287","author":"Topa","year":"2024","journal-title":"Energy"},{"key":"ref163","doi-asserted-by":"crossref","DOI":"10.3390\/s20226458","article-title":"Survey on security threats in agricultural IoT and smart farming","volume":"20","author":"Demestichas","year":"2020","journal-title":"Sensors"},{"key":"ref164","article-title":"Field tests of a John Deere harvester for the purpose of production maps achievement","volume":"66","author":"Arsenoaia","year":"2023","journal-title":"Lucr\u0103ri \u015etiin\u0163ifice"},{"key":"ref165","series-title":"Advances in Clean Energy Technologies. Springer Proceedings in Energy","first-page":"415","article-title":"Smart agricultural robot with real-time data analysis using IBM Watson cloud platform","author":"Thatipelli","year":"2021"},{"key":"ref166","first-page":"50","article-title":"Artificial intelligence versus human intelligence: A new technological race","volume":"4","author":"Zohuri","year":"2020","journal-title":"Acta Sci. Pharm. Sci."},{"key":"ref167","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.gltp.2021.01.004","article-title":"Machine learning and deep learning applications-a vision","volume":"2","author":"Sharma","year":"2021","journal-title":"Glob. Trans. Proc."},{"key":"ref168","author":"Chinnamgari","year":"2019","journal-title":"R Machine Learning Projects: Implement Supervised, Unsupervised, and Reinforcement Learning Techniques Using R 3.5"},{"key":"ref169","doi-asserted-by":"crossref","unstructured":"F. Al-Turjman, Artificial Intelligence in IoT, 1st ed. Cham: Springer, 2019.","DOI":"10.1007\/978-3-030-04110-6"},{"key":"ref170","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1007\/s11277-021-08725-4","article-title":"Grow of artificial intelligence to challenge security in IoT application","volume":"127","author":"Padmaja","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref171","doi-asserted-by":"crossref","first-page":"114066","DOI":"10.1109\/ACCESS.2020.2996214","article-title":"A machine learning security framework for IoT systems","volume":"8","author":"Bagaa","year":"2020","journal-title":"IEEE Access"},{"key":"ref172","doi-asserted-by":"crossref","DOI":"10.3390\/app13158936","article-title":"IoT-based smart surveillance system for high-security areas","volume":"13","author":"Afreen","year":"2023","journal-title":"Appl. Sci."},{"key":"ref173","doi-asserted-by":"crossref","first-page":"4235","DOI":"10.1109\/TII.2019.2902878","article-title":"Artificial intelligence-driven mechanism for edge computing-based industrial applications","volume":"15","author":"Sodhro","year":"2019","journal-title":"IEEE Trans. Ind. Informat."},{"key":"ref174","article-title":"Data governance: Organizing data for trustworthy artificial intelligence","volume":"37","author":"Janssen","year":"2020","journal-title":"Gov. Inform. Q."},{"key":"ref175","series-title":"Int. Conf. Ubiquitous Secur.","first-page":"214","article-title":"Generalizing supervised learning for intrusion detection in IoT mesh networks","author":"Keipour","year":"2021"},{"key":"ref176","article-title":"Supervised learning-a systematic literature review","author":"Dridi","year":"2021","journal-title":"OSF Prepr."},{"key":"ref177","series-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"key":"ref178","doi-asserted-by":"crossref","first-page":"1622","DOI":"10.1109\/COMST.2021.3075439","article-title":"Federated learning for internet of things: A comprehensive survey","volume":"23","author":"Nguyen","year":"2021","journal-title":"IEEE Commun. Surv. Tutorials."},{"key":"ref179","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JIOT.2021.3095077","article-title":"A survey on federated learning for resource-constrained IoT devices","volume":"9","author":"Imteaj","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref180","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/OJCS.2020.2992630","article-title":"Federated learning for vehicular internet of things: Recent advances and open issues","volume":"1","author":"Du","year":"2020","journal-title":"IEEE Open J. Comput. Soc."},{"key":"ref181","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MNET.011.1900317","article-title":"Federated learning for data privacy preservation in vehicular cyber-physical systems","volume":"34","author":"Lu","year":"2020","journal-title":"IEEE Netw."},{"key":"ref182","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3501813","article-title":"Federated learning for healthcare: Systematic review and architecture proposal","volume":"13","author":"Antunes","year":"2022","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"ref183","first-page":"1","article-title":"Blockchained federated learning for internet of things: A comprehensive survey","volume":"56","author":"Jiang","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"ref184","doi-asserted-by":"crossref","first-page":"1055","DOI":"10.1109\/TNSE.2020.3014385","article-title":"Learning in the air: Secure federated learning for UAV-assisted crowdsensing","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref185","doi-asserted-by":"crossref","first-page":"3944","DOI":"10.1109\/TVT.2021.3065084","article-title":"UAV communications for sustainable federated learning","volume":"70","author":"Pham","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref186","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/978-3-031-38747-0_12","author":"James","year":"2023","journal-title":"An Introduction to Statistical Learning: With Applications in Python"},{"key":"ref187","series-title":"Proc. 3rd Int. Conf. Data Sci. Inf. Technol.","first-page":"12","article-title":"Physical access log analysis: An unsupervised clustering approach for anomaly detection","author":"Poh","year":"2020"},{"key":"ref188","doi-asserted-by":"crossref","DOI":"10.1002\/widm.1329","article-title":"Frequent itemset mining: A 25 years review","volume":"9","author":"Luna","year":"2019","journal-title":"WIREs Data Min. Knowl."},{"key":"ref189","unstructured":"F. Sanna Passino, \u201cLatent factor representations of dynamic networks with applications in cyber-security,\u201d Ph.D. thesis, Imperial College, London, UK, 2021."},{"key":"ref190","doi-asserted-by":"crossref","first-page":"8693","DOI":"10.1109\/JIOT.2020.3040957","article-title":"Reinforcement learning for IoT security: A comprehensive survey","volume":"8","author":"Uprety","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref191","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2020.102630","article-title":"Machine learning based solutions for security of Internet of Things (IoT): A survey","volume":"161","author":"Tahsien","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref192","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-019-1498-x","article-title":"Q-learning-enabled channel access in next-generation dense wireless networks for IoT-based eHealth systems","volume":"2019","author":"Ali","year":"2019","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref193","series-title":"Adv. Methodol. Technol. Artif. Intell., Comput. Simul., Human-Comput. Interact.","first-page":"40","article-title":"Artificial neural networks","author":"Walczak","year":"2019"},{"key":"ref194","series-title":"2019 11th Int. Congr. Ultra Mod. Telecommun. Control Syst. Workshops (ICUMT)","first-page":"1","article-title":"IoT traffic prediction using multi-step ahead prediction with neural network","author":"Abdellah","year":"2019"},{"key":"ref195","article-title":"Prediction of Urban area expansion with implementation of MLC, SAM and SVMs\u2019 classifiers incorporating artificial neural network using landsat data","volume":"10","author":"Naghadehi","year":"2021","journal-title":"ISPRS Int. J. Geo-Inf."},{"key":"ref196","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-024-72357-4","article-title":"Internet of things based smart framework for the safe driving experience of two wheelers","volume":"14","author":"Chhabra","year":"2024","journal-title":"Sci. Rep."},{"key":"ref197","doi-asserted-by":"crossref","first-page":"128","DOI":"10.21533\/pen.v10i2.2831","article-title":"Implement DNN technology by using wireless sensor network system based on IOT applications","volume":"10","author":"Hameed","year":"2022","journal-title":"Period Eng. Nat. Sci."},{"key":"ref198","article-title":"An efficient machine learning model for malicious activities recognition in water-based industrial internet of things","volume":"4","author":"Selim","year":"2021","journal-title":"Secur. Privacy."},{"key":"ref199","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3561048","article-title":"Explainable AI (XAI): Core ideas, techniques, and solutions","volume":"55","author":"Dwivedi","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"ref200","first-page":"1","article-title":"Explainable AI (XAI) and its applications in building trust and understanding in AI decision making","volume":"7","author":"Tiwari","year":"2023","journal-title":"Int. J. Sci. Res. Eng. Manag."},{"key":"ref201","doi-asserted-by":"crossref","DOI":"10.3390\/fi16010031","article-title":"Investigation of phishing susceptibility with explainable artificial intelligence","volume":"16","author":"Fan","year":"2024","journal-title":"Future Internet"},{"key":"ref202","series-title":"Int. Workshop Extend. Explain. AI Beyond Deep Models Classif.","first-page":"117","article-title":"Explaining the predictions of unsupervised learning models","author":"Montavon","year":"2020"},{"key":"ref203","doi-asserted-by":"crossref","DOI":"10.3390\/app13031252","article-title":"Explainable artificial intelligence (XAI) for intrusion detection and mitigation in intelligent connected vehicles: A review","volume":"13","author":"Nwakanma","year":"2023","journal-title":"Appl. Sci."},{"key":"ref204","doi-asserted-by":"crossref","DOI":"10.3389\/frai.2021.550030","article-title":"Explainable AI and reinforcement learning\u2014A systematic review of current approaches and trends","volume":"4","author":"Wells","year":"2021","journal-title":"Front. Artif. Intell."},{"key":"ref205","doi-asserted-by":"crossref","first-page":"1775","DOI":"10.1109\/COMST.2023.3280465","article-title":"Explainable intrusion detection for cyber defences in the internet of things: Opportunities and solutions","volume":"25","author":"Moustafa","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref206","series-title":"Proc. 39th ACM\/SIGAPP Symp. Appl. Comput.","first-page":"971","article-title":"Explainable artificial intelligence (XAI) approach for reinforcement learning systems","author":"Peixoto","year":"2024"},{"key":"ref207","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2024.128111","article-title":"Explainable artificial intelligence: A survey of needs, techniques, applications, and future direction","volume":"599","author":"Mersha","year":"2024","journal-title":"Neurocomputing"},{"key":"ref208","series-title":"Explainable Artificial Intelligence for Cyber Security. Studies in Computational Intelligence","first-page":"1","article-title":"The past, present, and prospective future of XAI: A comprehensive review","author":"Islam","year":"2022"},{"key":"ref209","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2023.110273","article-title":"Explainable AI (XAI): A systematic meta-survey of current challenges and future opportunities","volume":"263","author":"Saeed","year":"2023","journal-title":"Knowl.-Based Syst."},{"key":"ref210","doi-asserted-by":"crossref","DOI":"10.3390\/electronics12041020","article-title":"A survey of explainable artificial intelligence for smart cities","volume":"12","author":"Javed","year":"2023","journal-title":"Electronics"},{"key":"ref211","doi-asserted-by":"crossref","first-page":"2106","DOI":"10.1109\/OJCOMS.2022.3215676","article-title":"Explainable AI over the Internet of Things (IoT): Overview, state-of-the-art and future directions","volume":"3","author":"Jagatheesaperumal","year":"2022","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref212","article-title":"Increasing trust in AI through privacy preservation and model explainability: Federated learning of fuzzy regression trees","volume":"113","author":"B\u00e1rcena","year":"2025","journal-title":"Inf Fusion"},{"key":"ref213","doi-asserted-by":"crossref","DOI":"10.3390\/electronics12051092","article-title":"An empirical survey on explainable AI technologies: Recent trends, use-cases, and categories from technical and application perspectives","volume":"12","author":"Nagahisarchoghaei","year":"2023","journal-title":"Electronics"},{"key":"ref214","doi-asserted-by":"crossref","DOI":"10.1016\/j.egyai.2022.100169","article-title":"Explainable artificial intelligence (XAI) techniques for energy and power systems: Review, challenges and opportunities","volume":"9","author":"Machlev","year":"2022","journal-title":"Energy AI"},{"key":"ref215","first-page":"7","article-title":"What do we mean by GenAI? A systematic mapping of the evolution, trends, and techniques involved in Generative AI","volume":"8","author":"Garc\u00eda-Pe\u00f1alvo","year":"2023","journal-title":"Int. J. Interact. Multimed. Artif. Intell."},{"key":"ref216","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-030-70679-1_5","article-title":"Variational autoencoder","author":"Cinelli","year":"2021","journal-title":"Variational Methods for Machine Learning with Applications to Deep Networks"},{"key":"ref217","article-title":"Generative artificial intelligence: A systematic review and applications","volume":"10","author":"Sengar","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref218","doi-asserted-by":"crossref","DOI":"10.1186\/s13040-023-00339-9","article-title":"ChatGPT and large language models in academia: Opportunities and challenges","volume":"16","author":"Meyer","year":"2023","journal-title":"BioData Min."},{"key":"ref219","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1201\/9781032654829-6","author":"Skarzynska","year":"2024","journal-title":"Regulating Hate Speech Created by Generative AI"},{"key":"ref220","series-title":"Generative AI Security","first-page":"31","article-title":"Navigating the GenAI security landscape","author":"Huang","year":"2024"},{"key":"ref221","series-title":"Generative AI Security","first-page":"133","article-title":"GenAI data security","author":"Huang","year":"2024"},{"key":"ref222","article-title":"Securing the future of GenAI: Policy and technology","author":"Christodorescu","year":"2024","journal-title":"Cryptol. ePrint Arch."},{"key":"ref223","series-title":"Proc. Third Int. Conf. Innov. Comput. Res. (ICR\u201924)","first-page":"269","article-title":"Evaluating generative AI tools for visual asset creation\u2013An educational approach","author":"Essa","year":"2024"},{"key":"ref224","doi-asserted-by":"crossref","DOI":"10.3390\/educsci14020172","article-title":"A primer on generative artificial intelligence","volume":"14","author":"Kalota","year":"2024","journal-title":"Educ. Sci."},{"key":"ref225","doi-asserted-by":"crossref","DOI":"10.1016\/j.jbusres.2024.114542","article-title":"Generative artificial intelligence in innovation management: A preview of future research developments","volume":"175","author":"Mariani","year":"2024","journal-title":"J. Bus. Res."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59050\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T06:09:49Z","timestamp":1741327789000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":225,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.057877","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-08-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-11","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}