﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>jist-2026051923</doi_batch_id><timestamp>20260519232701</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="en"><full_title>Journal of Information Systems and Telecommunication (JIST) </full_title><abbrev_title>jist</abbrev_title><issn media_type="electronic">2322-1437</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>5</month><day>25</day><year>2025</year></publication_date><journal_volume><volume>13</volume></journal_volume><issue>49</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Outage Performance of Cooperative Underlay Cognitive Radio Relay Based NOMA Networks with Energy Harvesting Capability </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>maryam</given_name><surname>najimi</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>25</day><year>2025</year></publication_date><pages><first_page>1</first_page><last_page>11</last_page></pages><doi_data><doi>10.61186/jist.44610.13.49.1</doi><resource>http://jist.ir/en/Article/44610</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/44610</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/44610</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/44610</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/44610</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/44610</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/44610</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/44610</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1] S. M. R. Islam, N. Avazov, O. A. Dobre and K. Kwak, "Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and Challenges," IEEE Communications Surveys &amp; Tutorials, Vol.9, No.2,2017,pp. 721-742.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2] S. Zhang, B. Di, L. Song, and Y. Li, "Radio resource allocation for nonorthogonal multiple access (NOMA) relay network using matching game, " IEEE Int. Conf. Commun. (IEEE ICC), Kuala Lumpur, Malaysia, 2016, pp. 1-6.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3] Y. Saito, A. Benjebbour, Y. Kishiyama, and T. Nakamura, "System level performance evaluation of downlink non-orthogonal multiple access (NOMA), " IEEE Annu. Symp. Pers. Indoor Mobile Radio Commun. (IEEEPIMRC), Japan,2015.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4] Z. Yang, Z. Ding, P. Fan, and G. K. Karagiannidis, "On the performance of non-orthogonal multiple access systems with partial channel information , " IEEE Trans. Commun., Vol.64,No.2,2016, pp.654-667.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5] T. Do, DB. de Costa, TQ. Doung, B. An B, "Improving the performance of cell-edge users in NOMA systems using cooperative relaying,"  IEEE Trans. Commun., Vol.66, No.5,2018, pp. 1883–1901.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6] Z. Ding, M. Peng and H. V. Poor, "Cooperative Non-Orthogonal Multiple Access in 5G Systems, " IEEE Commun. Lett., Vol.19,No.8,2015, pp. 1462- 1465.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7] M. Ghamari Adian, "A novel resource allocation algorithm for heterogeneous cooperative cognitive radio networks, " Journal of Information Systems and Telecommunication (JIST) ,Vol.5, No.2, 2017, pp.138-145.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8] M. Ghamari Adian, " Joint relay selection and power allocation in MIMO cooperative cognitive radio networks, " Journal of Information Systems and Telecommunication(JIST),Vol.3, No.1,2015,  pp.29-40.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9] Z.Doorbash, A. Jamshidi, G. Javidi and A. Sheybani , "Cooperative NOMA in cognitive radio networks: A study on imperfevt CSI, SIC and hardware imparements over Nakagami-m- fading channel, " Physical Commun. Vol.64, 2024.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10] Q. Nhat Le, D.-Th. Do, B. An, "Secure wireless powered relaying networks: Energy harvesting policies and performance analysis, " International Journal of Commun. Sys., Vol.30, No.18,2017,  pp. 1936 – 1947.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11] H. Bany Salameh, Sh. Abdel-Razeq and H. l-Obiedollah, " Integration of cognitive radio technology in NOMA-based 5BG networks: State of art, challenges and enabling technologies, "IEEE Access, Vol.11,2023, pp. 12949 – 12962.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12] F. Zhou, Z. Li, N. C. Norman, J. Cheng, and Y.Wang, "Resource allocation in wideband cognitive radio with SWIPT: Max-min fairness guarantees, " Proc. IEEE GLOBECOM, USA, 2016.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13] H. Zhang, S. Huang, C. Jiang, K. Long, V.C.M. Leung, H. V. Poor  "Energy efficient user association and power allocation in millimeter wave- based ultra dense networks with energy harvesting base stations, " IEEE J. Sel. Areas Commun., Vol.35, No.9,2017, pp. 1936–1947.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14] Y. Chen, N. Zhao, and M.-S. Alouini, "Wireless energy harvesting using signals from multiple fading channels, " IEEE Trans. Commun., Vo.65,No.11, 2017,pp. 5027–5039.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15] S.H. Mostafavi-Amjad , V. Solouk and H. Kalbkhani , "Energy-efficient user pairing and power allocation for granted uplink-NOMA in UAV communication systems, " Journal of Information Systems and Telecommunication (JIST) , Vol.10, No. 4, 2022, pp.312-323.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16] S. Arzykulov, G. Nauryzbayev, T. A. Tsiftsis and B. Maham, "Performance analysis of underlay cognitive radio nonorthogonal multiple access networks, " IEEE Trans. on Vehi. Tech., Vol.68, No.9, 2019,pp.9318-9322.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17] L. Bariah, S. Muhaidat and A. Al-Dweik, "Error performance of NOMA  based cognitive radio networks with partial relay selection and interferencep constraints, " IEEE Trans. on Communications, Vol.68, No.2,2020, pp.765-777.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18] Y. Zhang, and J. Ge. "Impact analysis for user pairing on NOMA based energy harvesting relaying networks with imperfect CSI, " IET Commun., Vol. 12, No. 13, 2018, pp. 1609-1614.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19] S. Arzykulov, T. A. Tsiftsis, G. Nauryzbayev and M. Abdallah, "Outage Performance of Cooperative Underlay CR-NOMA With Imperfect CSI, " IEEE Commun. Letters, Vol.23, No.1, 2019,pp. 176 – 179.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20] G. Im and Jae Hong Lee, "Outage probability for cooperative NOMA systems with imperfect SIC in cognitive radio networks, " IEEE Commun. Letters, Vol.23,No.4,2019,pp. 692 – 695.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21] D. Wang and S. Men, "Secure energy efficiency for NOMA based cognitive radio networks with nonlinear energy harvesting,” IEEE Access, Vol. 6, 2018,pp. 62707 – 62716.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22] B. Li, X. Qi,  K. Huang, Z. Fei, F. Zhou, R.Q.Hu, “Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks, " IEEE Trans. Commun., Vol.67, No.1,2019, pp. 83-96.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23] W. Liang, K. D.Wang, J. Shi , L. Li and G. K. Karagiannidis, "Distributed sequential coalition formation algorithm for spectrum allocation in underlay cognitive radio networks, "IEEE Access, Vol.7, 2019,pp.56803 – 56816.
[24] G. Nauryzbayev, S. Arzykulov, T. A. Tsiftsis and M. Abdallah, "Performance of cooperative underlay CR-NOMA networks over nakagami-m channels, " IEEE International Conference on Communications Work-shops (ICC Workshops), USA, 2018,pp.1-6.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25] D. THUAN Do, A. Tu Le and B. Moo Lee, "NOMA in cooperative underlay cognitive radio networks under imperfect SIC, " IEEE Access, Vol.8, 2020, pp. 86180 – 86195.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26] P. Gosh, S. Dhar Roy and S.Kundu, "Outage of cooperative NOMA with an energy harvesting relay in an underlay cognitive radio network, "International journal of Commun. Sys., Vol.37, No.8, 2024. </unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27] X. Li, X.Gao,  Sh. Ahmed Shaikh, M. Zeng, G. Huang, N. Muhammad Faseeh Qureshi and D. Qiao, " NOMA-based cogtive radio network with hybrid FD/HD rlay in industry 5.0, "Journal of King Saud University- Comp. and Infor. Sciences, Vol.35, No.6, 2023.</unstructured_citation></citation><citation key="ref27"><unstructured_citation> 
[28] D. Samanta, Ch. Kumar De and A. Chandra , "Performance analysis of  NOMA based hybrid cognitive radio network assist by full- duplex relay, " Telecommun. Sys. Journal, Vol.88, No.37, 2025.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29] S. Arzykulov, G. Nauryzbayev and T. A. Tsiftsis, "Underlay Cognitive Relaying System Over α - μ Fading Channels, " IEEE Commun. Lett., Vol.21,No.1, 2017,pp 216–219.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30] Dinh-Thuan Do, H.-S. Nguyen, "A tractable approach to analyze the energy-aware two-way relaying networks in presence of co-channel interference, " EURASIP Journal on Wirel. Commun. and Netw., 2016.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31] S. Boyd, L. Vandenberghe Convex Optimization. Cambridge, U.K.: Cambridge Univ. Press, 2004.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32] W. Yu, R. Lui , "Dual methods for nonconvex spectrum optimization of multicarrier systems, " IEEE Trans. Commun, Vol.54,No.7,2006, pp. 1310-1322.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33] B. Sklar, "Rayleigh fading channels in mobile digital communication systems part1: Characterization, " IEEE Commun. Mag., Vo.35,No.9, 1997,pp.136-146.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34] Y. Ma, D. I. Kim, Zh. Wu, "Optimization of ofdma-based cellular cognitive radio networks, " IEEE Trans. on Commun., Vol.58, No.8, 2010,pp.2265 - 2276 .</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35] M.Najimi, A.Ebrahimzadeh, S.M.Hosseini Andargoli and A. Fallahi, " A novel sensing nodes and decision node selection method for energy efficiency of cooperative sepectrum sensing in cognitive sensor networks, " IEEE Sens. Jour., Vol.13, No.5, 2013,pp. 1610-1621.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>


</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Numerical Study of a Switchable Polarization for Reflect-array Unit-cell for Satellite Communications</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad</given_name><surname>Mansourinia</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ramezan Ali</given_name><surname>Sadeghzadeh</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>25</day><year>2025</year></publication_date><pages><first_page>12</first_page><last_page>23</last_page></pages><doi_data><doi>10.61186/jist.46276.13.49.12</doi><resource>http://jist.ir/en/Article/46276</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/46276</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/46276</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/46276</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/46276</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/46276</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/46276</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/46276</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	H. Luyen, Z. Yang, M. Gao, J. H. Booske and N. Behdad, “A Wideband, Single-Layer Reflectarray Exploiting a Polarization Rotating Unit Cell,” in IEEE Transactions on Antennas and Propagation, vol. 67, no. 2, pp. 872-883, Feb. 2019.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	H. Luyen, Z. Zhang, J. H. Booske and N. Behdad, “Wideband, Beam-Steerable Reflectarrays Based on Minimum-Switch Topology, Polarization-Rotating Unit Cells,” in IEEE Access, vol. 7, pp. 36568-36578, 2019.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	M. Min and L. Guo, “Design of a Wideband Single-Layer Reflectarray Antenna Using Slotted Rectangular Patch With Concave Arms,” in IEEE Access, vol. 7, pp. 176197-176203, 2019.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	P. Nayeri, F. Yang and A. Z. Elsherbeni, “Broadband Reflectarray Antennas Using Double-Layer Subwavelength Patch Elements,” in IEEE Antennas and Wireless Propagation Letters, vol. 9, pp. 1139-1142, 2010.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	B. Xi, Y. Xiao, K. Zhu, Y. Liu, H. Sun and Z. Chen, “1-Bit Wideband Reconfigurable Reflectarray Design in Ku-Band,” in IEEE Access, vol. 10, pp. 4340-4348, 2022.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Hongya Chen et al, “Ultra-wideband polarization conversion metasurfaces based on multiple plasmon resonances,” in Journal of Applied Physics,2014.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Muhammad Khan, Yixiao Chen, Bin Hu, Naeem Ullah, Syed Bukhari, Shahid Iqbal, “Multiband linear and circular polarization rotating metasurface based on multiple plasmonic resonances for C, X and K band applications,” in Scientific Reports,2020.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Majeed, A.; Zhang, J.; Ashraf, M.A.; Memon, S.; Mohammadani, K.H.; Ishfaq, M.; Sun, M. An Ultra-Wideband Linear-to-Circular Polarization Converter Based on a Circular, Pie-Shaped Reflective Metasurface. Electronics 2022.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	N. Pouyanfar, J. Nourinia, C. Ghobadi, “Multiband and multifunctional polarization converter using an asymmetric metasurface,” in Sci Rep, 2021.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Muhammad Khan, Zobaria Khalid, Farooq Tahir, “Linear and circular-polarization conversion in X-band using anisotropic metasurface,” in  Scientific Reports, 2019.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M.H. Dahri, M.H. Jamaluddin, F.C. Seman, M.I. Abbasi, N.F. Sallehuddin, A.Y. I. Ashyap, M.R. Kamarudin, “Aspects of Efficiency Enhancement in Reflectarrays with Analytical Investigation and Accurate Measurement,” in Electronics, vol. 9, 2020.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	D. M. Pozar, S. D. Targonski and R. Pokuls, “A shaped-beam microstrip patch reflectarray,” in IEEE Transactions on Antennas and Propagation, vol. 47, no. 7, pp. 1167-1173, July 1999.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	Constantine A. Balanis, “Antenna Theory: Analysis and Design,” Third Edition, John Wiley &amp; Sons, Inc., Hoboken, 1136 pages, April 4, 2005.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	D. K. Cheng, “Field and Wave Electromagnetics,” 2nd Edition, Addison Wesley, Inc., Boston, pp. 547- 557, 1989.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Hoang Dang Cuong, Minh Thuy Le, Trong Toan Do and Nguyen Quoc Dinh, “Broadband Multipolarized Reconfigurable Unit Cell for Reflectarray Antennas with One Bit Control,” in International Journal of Antennas and Propagation, 2022.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. -T. Zhang et al., “Design of Novel Reconfigurable Reflectarrays With Single-Bit Phase Resolution for Ku-Band Satellite Antenna Applications,” in IEEE Transactions on Antennas and Propagation, vol. 64, no. 5, pp. 1634-1641, May 2016.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Enhancing IoT Device Behavior Prediction through Machine Learning Models</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Shubham</given_name><surname>Minhass</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ritu</given_name><surname>Chauhan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Harleen</given_name><surname>Kaur</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>25</day><year>2025</year></publication_date><pages><first_page>63</first_page><last_page>76</last_page></pages><doi_data><doi>10.61186/jist.47570.13.49.63</doi><resource>http://jist.ir/en/Article/47570</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/47570</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/47570</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/47570</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/47570</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/47570</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/47570</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/47570</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Bandyopadhyay, D., &amp; Sen, J. (2011). Internet of things: Applications and challenges in technology and standardization. Wireless Personal Communications,58(1),49 69. </unstructured_citation></citation><citation key="ref2"><unstructured_citation>[2]	A. Ghaffari, and A. Mahdavi, “Embedding Virtual Machines in Cloud Computing Based on Big Bang–Big Crunch Algorithm,” Journal of Information Systems and Telecommunication (JIST), vol. 28, no. 7, pp. 305-315, 2020.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>[3]	Gubbi, J., Buyya, R., Marusic, S., &amp; Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660. https://doi.org/10.1016/j.future.2013.01.010</unstructured_citation></citation><citation key="ref4"><unstructured_citation>[4]	Han, B., Zhang, Y., Chen, S., Liu, H., &amp; Yu, Y. (2021). Human-centric IoT: A survey. IEEE Internet of Things Journal, 8(5), 3475–3494.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>[5]	He, L., Huang, X., Wang, Z., &amp; Wang, S. (2019). An IoT-based intelligent home monitoring system using deep learning. Journal of Network and Computer Applications, 126, 9–18.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>[6]	Nazarpour, M., &amp; Shokouhyar, S. (2022). Detection of Attacks and Anomalies in the Internet of Things System using Neural Networks Based on Training with PSO Algorithms, Fuzzy PSO, Comparative PSO and Mutative PSO. Journal of Information Systems and Telecommunication (JIST), 4(40), 270.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>[7]	Islam, M. R., Islam, M. R., Islam, M. R., &amp; Hossain, M. S. (2019). A comparative analysis of machine learning algorithms for the prediction of stock prices. International Journal of Computers and Applications, 179(23), 44–50.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>[8]	Tehrani, Y. H., Fazel, Z., &amp; Atarodi, S. M. (2018). A survey of two dominant low power and long range communication technologies. Journal of Information Systems and Telecommunication, 6(2), 60-66.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>[9]	Kanchan, A, and Agarwal, S. (2021). Internet of Things: A comprehensive review on architecture, applications, and future directions. Journal of Ambient Intelligence and Humanized Computing, 12(1), 1087–1110.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>[10]	Kavitha, M., &amp; Saranya, T. (2018). IoT-based home automation system using deep learning. International Journal of Engineering and Technology, 7(4.22), 33–36.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>[11]	Kim, K. H., Kim, H. G., Kim, T. J., &amp; Kim, S. W. (2019). A survey on IoT security technologies for IoT-based smart homes. Journal of Information Processing Systems, 15(2), 256–276.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>[12]	Kumar, P., Sharma, S., &amp; Kumar, A. (2019). A study on the use of machine learning algorithms in predicting credit scores. Journal of Emerging Technologies and Innovative Research, 6(4), 207–212.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>[13]	Kussul, E., &amp; Baidyk, T. (2020). Satellite big data analytics for disaster management: A review. International Journal of Disaster Risk Reduction, 49, 101759.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>[14]	Li, X., Wang, K., &amp; Ma, J. (2019). A survey of machine learning for big data processing. EURASIP Journal on Wireless Communications and Networking, 2019(1), 1–20.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>[15]	Liu, Y., &amp; Yang, S. (2021). Internet of Things (IoT) for supply chain management: A review. International Journal of Production Research, 59(18)</unstructured_citation></citation><citation key="ref16"><unstructured_citation>[16]	Mukhopadhyay, S., Sung, A. H., &amp; Lu, S. (2021). Internet of things: Challenges, advances, and applications. CRC Press.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>[17]	McGrath, M. J., Hussain, M. S., &amp; Karim, S. (2020). The Internet of things: A review of the literature and future directions. Journal of Industrial Integration and Management, 5(1), 1–23.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>[18]	Atzori, L., Iera, A., &amp; Morabito, G. (2010). The Internet of things: A survey. Computer Networks, 54(15), 2787–2805. https://doi.org/10.1016/j.comnet.2010.05.010</unstructured_citation></citation><citation key="ref19"><unstructured_citation>[19]	Dlay, S. S., Al-Sumaiti, S. A., &amp; Al-Nuaimi, W. A. (2017). Internet of Things (IoT): Review of its security and privacy challenges. IEEE Access, 5, 16667–16677.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>[20]	Khazaei, M. (2022). Dynamic Tree-Based Routing: Applied in Wireless Sensor Network and IOT. Journal of Information Systems and Telecommunication (JIST), 3(39), 191.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>[21]	Suresh, A. M. Shehabeldin, and S. S. Al-Saqabi, "A Comprehensive Review on Internet of Things: Challenges and Future Directions," IEEE Access, vol. 7, pp. 68638-68659, 2019.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>[22]	Zandhessami, H., Alborzi, M., &amp; Khayyatian, M. (2022). Reducing Energy Consumption in Sensor-Based Internet of Things Networks Based on Multi-Objective Optimization Algorithms. Journal of Information Systems and Telecommunication (JIST), 3(39), 180.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>[23]	Hamidi, H. (2016). Safe use of the internet of things for privacy enhancing. Journal of Information Systems and Telecommunication, 4(3), 145-151.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>[24]	Lopes, G. S., Da Silva, M. A., &amp; Guimaraes, J. S. (2018). A survey on Internet of things: Architecture, security, and privacy. Journal of Network and Computer Applications, 108, 82–93.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>[25]	Fernandes, J. P., Gomes, D. A., &amp; Khan, M. S. (2020). A comprehensive review on Internet of things: Applications, challenges, and future directions. Journal of Ambient Intelligence and Humanized Computing, 11(5), 2025–2055.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>[26]	Das, P. R., Pati, N. P., &amp; Nayak, S. K. (2020). A review on the Internet of Things (IoT): Architecture, applications, security, and future directions. Journal of Network and Systems Management, 28(4), 1227–1253.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>[27]	Ahmed, T., Hussain, M., &amp; Karim, S. (2019). Internet of Things (IoT) for smart agriculture: A comprehensive review. IEEE Access, 7, 139934–139951.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>[28]	Wang, Y., Guo, L., Li, Y., &amp; Li, Y. A review of Internet of things.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Turkish Dataset and BERTurk-Contrastive Model for Semantic Textual Similarity</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Somaiyeh</given_name><surname>Dehghan</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mehmet Fatih</given_name><surname>Amasyali</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>25</day><year>2025</year></publication_date><pages><first_page>24</first_page><last_page>32</last_page></pages><doi_data><doi>10.61186/jist.48127.13.49.24</doi><resource>http://jist.ir/en/Article/48127</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/48127</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/48127</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/48127</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/48127</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/48127</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/48127</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/48127</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	T. Mikolov, K. Chen, G. S. Corrado, J. Dean, “Efficient estimation of word representations in vector space,” In Proceedings of the 2013 International Conference on Learning Representations, 2013.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. Pennington, R. Socher, C. Manning, “Glove: Global vectors for word representation,” In Proceedings of the 2014 Conference on Empirical Methods in NLP (EMNLP), pp. 1532–1543. 2014.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. Devlin, JM.-W. Chang, K. Lee, K. Toutanova, “BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding”, In Proceedings of the 2019 Conference of the American Chapter of the Association for Computational Linguistics, Vol. 1, pp. 4171—4186, 2019.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	H. Cheng, S. Yat, "A Text Similarity Measurement Combining Word Semantic Information with TF-IDF Method", Chinese Journal of Computers, 2011.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Albitar, S. Fournier,  B. Espinasse, "An Effective TF/IDF-based Text-to-Text Semantic Similarity Measure for Text Classification", Web Information Systems Engineering, pp. 105-114, 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	J. Chandra, A. Santhanam, A. Joseph, "Artificial Intelligence based Semantic Text Similarity for RAP Lyrics," 2020 International Conference on Emerging Trends in Information Technology and Engineering, pp. 1-5, 2020.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	E. Hindocha, V. Yazhiny, A. Arunkumar, P. Boobalan, "Short-text Semantic Similarity using GloVe word embedding", International Research Journal of Engineering and Technology (IRJET), Volume: 06, Issue: 04, Apr 2019.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Chakraborty, “An Efficient Sentiment Analysis Model for Crime Articles’ Comments using a Fine-tuned BERT Deep Architecture and Pre-Processing Techniques”, Journal of Information Systems and Telecommunication (JIST), Vol. 45, pp. 1-11, 2024.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]     J. Nagesh, “Hierarchical Weighted Framework for Emotional Distress Detection using Personalized Affective Cues,” Journal of Information Systems and Telecommunication (JIST),  Vol.  38, pp. 89-101, 2022
[10]	 P. Kavehzadeh, “Deep Transformer-based Representation for Text Chunking”, Journal of Information Systems and Telecommunication (JIST), Vol. 43, pp. 176-184, 2023.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	S. Dehghan, B. Yanıkoğlu, “Evaluating ChatGPT’s Ability to Detect Hate Speech in Turkish Tweets,” In Proceedings of the 7th Workshop on Challenges and Applications of Automated Extraction of Socio-political Events from Text (CASE 2024), pages 54–59, St. Julians, Malta. Association for Computational Linguistics, 2024.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	S. Dehghan, B. Yanıkoğlu, “Multi-domain Hate Speech Detection Using Dual Contrastive Learning and Paralinguistic Features,” In Proceedings of the 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024), pages 11745–11755, Torino, Italia. ELRA and ICCL, 2024.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13]	S. Dehghan, M. U. Şen, B. Yanıkoğlu, “Dealing with annotator disagreement in hate speech classification,” Preprint, arXiv:2502.08266, 2025.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	F. B. Fikri, K. Oflazer, B. Yanıkoğlu, “Anlamsal Benzerlik için Türkçe Veri Kümesi (Turkish Dataset for Semantic Similarity)”, In Proceedings of the 29th IEEE Conference on Signal Processing and Communications Applications, Istanbul, Turkey, 2021.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	E. Agirre, D. Cer, M. Diab, A. Gonzalez-Agirre, “Semeval-2012 task 6: A pilot on semantic textual similarity,” In *SEM 2012: The First Joint Conference on Lexical and Computational Semantics (SemEval 2012), Association for Computational Linguistics, pp. 385–393, 2012. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	E. Agirre, D. Cer, M. Diab, A. Gonzalez-Agirre, W. Guo, “*sem 2013 shared task: Semantic textual similarity,” in In Second Joint Conference on Lexical and Computational Semantics (*SEM), Vol. 1, pp. 32–43, 2013.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	E. Agirre, C. Banea, C. Cardie, D. Cer, M. Diab, A. Gonzalez-Agirre, W. Guo, R. Mihalcea, G. Rigau, J. Wiebe, “Semeval-2014 task 10: Multilingual semantic textual similarity,” Association for Computational Linguistics, pp. 81–91, 2014.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	E. Agirre, C. Banea, C. Cardie, D. Cer, M. Diab, A. Gonzalez-Agirre, W. Guo, I. Lopez-Gazpio, M. Maritxalar, R. Mihalcea, G. Rigau, L. Uria, J. Wiebe, “Semeval-2015 task 2: Semantic textual similarity, english, spanish and pilot on interpretability,” Association for Computational Linguistics, pp. 252–263, 2015.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	E. Agirre, C. Banea, D. Cer, M. Diab,A. Gonzalez-Agirre, R. Mihalcea, G. Rigau, J. Wiebe, “Semeval-2016 task 1: Semantic textual similarity, monolingual and cross-lingual evaluation,” Association for Computational Linguistics, pp. 497–511, 2016.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	D. Cer, M. Diab, E. Agirre, I. Lopez-Gazpio, L. Specia, “Semeval-2017 task 1: Semantic textual similarity multilingual and crosslingual focused evaluation,” In Proceedings of the 11th International Workshop on Semantic Evaluation, pp. 1–14, 2017.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	M. Marelli, S. Menini, M. Baroni, L. Bentivogli, R. Bernardi, R. Zamparelli, “A sick cure for the evaluation of compositional distributional semantic models,” in In Proceedings of the International Conference on Language Resources and Evaluation (LREC), pp. 216–223, 2014.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	E. Budur, R. Özçelik, T. Güngör, “Data and Representation for Turkish Natural Language Inference”, Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, Nov. 2020. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	E. Yıldıztepe, V. Uzun, "Olasılıksal Yöntemler ile Türkçe Metinlerin Anlamsal Benzerliğinin Belirlenmesi", Sinop Üniversitesi Fen Bilimleri Dergisi, Sinop Uni J Nat Sci 3 (2): 66-78, 2018.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	T. Gao, X. Yao, D. Chen, “SimCSE: Simple Contrastive Learning of Sentence Embeddings”, In Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	S. Dehghan, M.F. Amasyali, “SupMPN: Supervised Multiple Positives and Negatives Contrastive Learning Model for Semantic Textual Similarity”, Applied Sciences, 12:9659, 2022.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	S. Dehghan, M.F. Amasyali, "SelfCCL: Curriculum Contrastive Learning by Transferring Self-Taught Knowledge for Fine-Tuning BERT", Applied Sciences, Vol. 13(3):1913, 2023.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	A. Conneau, D. Kiela, “SentEval: An evaluation toolkit for universal sentence representations” In Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC), Miyazaki, Japan, 7--12 May, 2018.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	B. Koçer Güldalı, K. U. İşisağ, “A comparative study on google translate: An error analysis of Turkish-to English translations in terms of the text typology of Katherina Reiss”, RumeliDE Dil ve Edebiyat Araştırmaları Dergisi, 2019.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	T. Chen, S. Kornblith, M. Norouzi, G. Hinton, “A simple framework for contrastive learning of visual representations,” arXiv: 2002.05709, 2020. </unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	F. Schroff, D. Kalenichenko, J. Philbin, “FaceNet: A Unified Embedding for Face Recognition and Clustering”, arXiv:1503.03832, 2015.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	S.R. Bowman, G. Angeli, C. Potts, C.D. Manning, “A large annotated corpus for learning natural language inference”, In Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, Portugal, 2015. </unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	A. Williams, N. Nangia, S. Bowman, “A broad-coverage challenge corpus for sentence understanding through inference”, In Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics, Vol. 1, 2018. </unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	N. Reimers, I. Gurevych, “Sentence-bert: Sentence embeddings using siamese bert networks”, In Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP), pp.  3982–3992, 2019. </unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	L.V.D. Maaten, G.E. Hinton, “Visualizing Data Using t-SNE”, Journal of Machine Learning Research, 9, pp. 2579–2605, 2008.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Review on architecture and challenges on smart cities</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mehdi</given_name><surname>Azadimotlagh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Narges </given_name><surname>Jafari</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Reza</given_name><surname>Sharafdini</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>25</day><year>2025</year></publication_date><pages><first_page>33</first_page><last_page>49</last_page></pages><doi_data><doi>10.61186/jist.48360.13.49.33</doi><resource>http://jist.ir/en/Article/48360</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/48360</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/48360</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/48360</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/48360</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/48360</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/48360</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/48360</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	K. Ahmad, M. Maabreh, M. Ghaly, K. Khan, J. Qadir, and A. Al-Fuqaha, "Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges," Computer Science Review, vol. 43, p. 100452, 2022/02/01/ 2022, doi: https://doi.org/10.1016/j.cosrev.2021.100452.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Gharaibeh et al., "Smart Cities: A Survey on Data Management, Security, and Enabling Technologies," IEEE Communications Surveys &amp; Tutorials, vol. 19, no. 4, pp. 2456-2501, 2017, doi: 10.1109/COMST.2017.2736886.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	B. Green, The Smart Enough City: Putting Technology in Its Place to Reclaim Our Urban Future. The MIT Press, 2019.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	I. A. Mohammed, "Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework," SSRN Electronic Journal, vol. 8, pp. 55-59, 01/03 2020.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. AlDairi and L. a. Tawalbeh, "Cyber Security Attacks on Smart Cities and Associated Mobile Technologies," Procedia Computer Science, vol. 109, pp. 1086-1091, 2017/01/01/ 2017, doi: https://doi.org/10.1016/j.procs.2017.05.391.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	T. Guelzim, M. Obaidat, and B. Sadoun, "Introduction and overview of key enabling technologies for smart cities and homes," 2016, pp. 1-16.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H. Habibzadeh, Z. Qin, T. Soyata, and B. Kantarci, "Large-Scale Distributed Dedicated- and Non-Dedicated Smart City Sensing Systems," IEEE Sensors Journal, vol. 17, no. 23, pp. 7649-7658, 2017, doi: 10.1109/JSEN.2017.2725638.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	B. Ali and A. I. Awad, "Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes," Sensors, vol. 18, no. 3, p. 817, 2018. [Online]. Available: https://www.mdpi.com/1424-8220/18/3/817.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	H. Habibzadeh, T. Soyata, B. Kantarci, A. Boukerche, and C. Kaptan, "Sensing, communication and security planes: A new challenge for a smart city system design," Computer Networks, vol. 144, pp. 163-200, 2018/10/24/ 2018, doi: https://doi.org/10.1016/j.comnet.2018.08.001.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. S. Elmaghraby and M. M. Losavio, "Cyber security challenges in Smart Cities: Safety, security and privacy," Journal of Advanced Research, vol. 5, no. 4, pp. 491-497, 2014/07/01/ 2014, doi: https://doi.org/10.1016/j.jare.2014.02.006.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	M. Caţă, "Smart university, a new concept in the Internet of Things," in 2015 14th RoEduNet International Conference - Networking in Education and Research (RoEduNet NER), 24-26 Sept. 2015 2015, pp. 195-197, doi: 10.1109/RoEduNet.2015.7311993. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Razaghi and M. Finger, "Smart Governance for Smart Cities," Proceedings of the IEEE, vol. 106, no. 4, pp. 680-689, 2018, doi: 10.1109/JPROC.2018.2807784.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. Y. Tan and A. Taeihagh, "Smart City Governance in Developing Countries: A Systematic Literature Review," Sustainability, vol. 12, no. 3, p. 899, 2020. [Online]. Available: https://www.mdpi.com/2071-1050/12/3/899.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	G. Pereira, P. Parycek, E. Falco, and R. Kleinhans, "Smart governance in the context of smart cities: A literature review," Information Polity, vol. 23, pp. 1-20, 05/14 2018, doi: 10.3233/IP-170067.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. C. F. De Guimarães, E. A. Severo, L. A. Felix Júnior, W. P. L. B. Da Costa, and F. T. Salmoria, "Governance and quality of life in smart cities: Towards sustainable development goals," Journal of Cleaner Production, vol. 253, p. 119926, 2020/04/20/ 2020, doi: https://doi.org/10.1016/j.jclepro.2019.119926.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	A. Khanna et al., "Blockchain: Future of e-Governance in Smart Cities," Sustainability, vol. 13, no. 21, p. 11840, 2021. [Online]. Available: https://www.mdpi.com/2071-1050/13/21/11840.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	M. Collotta and G. Pau, "A Novel Energy Management Approach for Smart Homes Using Bluetooth Low Energy," IEEE Journal on Selected Areas in Communications, vol. 33, no. 12, pp. 2988-2996, 2015, doi: 10.1109/JSAC.2015.2481203.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	M. Daher, A. Diab, M. E. B. E. Najjar, M. A. Khalil, and F. Charpillet, "Elder Tracking and Fall Detection System Using Smart Tiles," IEEE Sensors Journal, vol. 17, no. 2, pp. 469-479, 2017, doi: 10.1109/JSEN.2016.2625099.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	J. Zhang, Y. Shan, and K. Huang, "ISEE Smart Home (ISH): Smart video analysis for home security," Neurocomputing, vol. 149, pp. 752-766, 2015/02/03/ 2015, doi: https://doi.org/10.1016/j.neucom.2014.08.002.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	E. Zeng, S. Mare, and F. Roesner, "End user security &amp; privacy concerns with smart homes," presented at the Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security, Santa Clara, CA, USA, 2017.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	R. Batayneh, N. Taleb, R. Said, M. Alshurideh, T. Ghazal, and H. Alzoubi, IT Governance Framework and Smart Services Integration for Future Development of Dubai Infrastructure Utilizing AI and Big Data, Its Reflection on the Citizens Standard of Living. 2021, pp. 235-247.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Q. Hu and Y. Zheng, "Smart city initiatives: A comparative study of American and Chinese cities," Journal of Urban Affairs, vol. 43, pp. 1-22, 01/08 2020, doi: 10.1080/07352166.2019.1694413.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	K. Löfgren and C. W. R. Webster, "The value of Big Data in government: The case of ‘smart cities’," Big Data &amp; Society, vol. 7, no. 1, p. 2053951720912775, 2020, doi: 10.1177/2053951720912775.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	F. T. Hartanti, J. H. Abawajy, M. Chowdhury, and W. Shalannanda, "Citizens’ Trust Measurement in Smart Government Services," IEEE Access, vol. 9, pp. 150663-150676, 2021, doi: 10.1109/ACCESS.2021.3124206.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	j. zare and R. Hendijani, "E-Government Service Supply Chain: Identifying Performance Evaluation Indicators (Case Study of e-Customs System in Iran)," (in Fa), Journal of Information and Communication Technology, vol. 14, no. 53, pp. 111-139, 2023. [Online]. Available: https://www.magiran.com/paper/2551823.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	K. Ahmad et al., Artificial Intelligence in Education: A Panoramic Review. 2020.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	Y. Kim, T. Soyata, and R. F. Behnagh, "Towards Emotionally Aware AI Smart Classroom: Current Issues and Directions for Engineering and Education," IEEE Access, vol. 6, pp. 5308-5331, 2018, doi: 10.1109/ACCESS.2018.2791861.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	Z. Asadi, M. Abdekhoda, and H. Nadrian, "Understanding and predicting teachers’ intention to use cloud computing in smart education," Interactive Technology and Smart Education, vol. ahead-of-print, 09/11 2019, doi: 10.1108/ITSE-05-2019-0019.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	O. Díaz-Parra et al., "Smart Education and future trends," International Journal of Combinatorial Optimization Problems and Informatics, vol. 13, no. 1, pp. 65-74, 01/27 2022. [Online]. Available: https://ijcopi.org/ojs/article/view/294.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	S. Ar, S. Panda, and S. Hanumanthakari, "Enabling Smart Education System Using Blockchain Technology," 2021, pp. 169-177.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	R. J. H. Vladimir L. Uskov, Lakhmi C. Jain, Smart Education and e-Learning - Smart Pedagogy Springer.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	A. Qayyum, J. Qadir, M. Bilal, and A. Al-Fuqaha, "Secure and Robust Machine Learning for Healthcare: A Survey," (in eng), IEEE Rev Biomed Eng, vol. 14, pp. 156-180, 2021, doi: 10.1109/rbme.2020.3013489.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	S. Alromaihi, W. Elmedany, and C. Balakrishna, "Cyber Security Challenges of Deploying IoT in Smart Cities for Healthcare Applications," in 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), 6-8 Aug. 2018 2018, pp. 140-145, doi: 10.1109/W-FiCloud.2018.00028.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	L. Catarinucci et al., "An IoT-Aware Architecture for Smart Healthcare Systems," IEEE Internet of Things Journal, vol. 2, no. 6, pp. 515-526, 2015, doi: 10.1109/JIOT.2015.2417684.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	Y. Ren, R. Werner, N. Pazzi, and A. Boukerche, "Monitoring patients via a secure and mobile healthcare system," IEEE Wireless Communications, vol. 17, no. 1, pp. 59-65, 2010, doi: 10.1109/MWC.2010.5416351.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	A. Page, M. Hassanalieragh, T. Soyata, M. K. Aktas, B. Kantarci, and S. Andreescu, "Conceptualizing a Real-Time Remote Cardiac Health Monitoring System," in Enabling Real-Time Mobile Cloud Computing through Emerging Technologies, T. Soyata Ed. Hershey, PA, USA: IGI Global, 2015, pp. 1-34.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	O. Kocabas, T. Soyata, J. P. Couderc, M. Aktas, J. Xia, and M. Huang, "Assessment of cloud-based health monitoring using Homomorphic Encryption," in 2013 IEEE 31st International Conference on Computer Design (ICCD), 6-9 Oct. 2013 2013, pp. 443-446, doi: 10.1109/ICCD.2013.6657078. </unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	A. Page, S. Hijazi, D. Askan, B. Kantarci, and T. Soyata, "Research Directions in Cloud-Based Decision Support Systems for Health Monitoring Using Internet-of-Things Driven Data Acquisition," International Journal of Services Computing, vol. 4, pp. 18-34, 04/01 2016.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	A. Leszkiewicz, T. Hormann, and M. Krafft, "Smart Business and the Social Value of AI," in Smart Industry – Better Management, vol. 28, T. Bondarouk and M. R. Olivas-Luján Eds., (Advanced Series in Management: Emerald Publishing Limited, 2022, pp. 19-34.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	J. Mendling, B. Baesens, A. Bernstein, and M. Fellmann, "Challenges of smart business process management: An introduction to the special issue," Decision Support Systems, vol. 100, pp. 1-5, 2017/08/01/ 2017, doi: https://doi.org/10.1016/j.dss.2017.06.009.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	B. Leavy, "Alibaba strategist Ming Zeng: “Smart business” in the era of business ecosystems," Strategy &amp; Leadership, vol. 47, no. 2, pp. 11-18, 2019, doi: 10.1108/SL-01-2019-0006.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	K. Ćurko, T. Ćurić, and V. Vuksic, "Perspective of smart enterprises development in the Republic of Croatia," WSEAS Transactions on Business and Economics, vol. 14, pp. 378-390, 01/01 2017.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	M. Veres and M. Moussa, "Deep Learning for Intelligent Transportation Systems: A Survey of Emerging Trends," IEEE Transactions on Intelligent Transportation Systems, vol. 21, no. 8, pp. 3152-3168, 2020, doi: 10.1109/TITS.2019.2929020.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	C. Kaptan, B. Kantarci, T. Soyata, and A. Boukerche, "Emulating Smart City Sensors Using Soft Sensing and Machine Intelligence: A Case Study in Public Transportation," in 2018 IEEE International Conference on Communications (ICC), 20-24 May 2018 2018, pp. 1-7, doi: 10.1109/ICC.2018.8422969.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	S. Munder, C. Schnorr, and D. M. Gavrila, "Pedestrian Detection and Tracking Using a Mixture of View-Based Shape–Texture Models," IEEE Transactions on Intelligent Transportation Systems, vol. 9, no. 2, pp. 333-343, 2008, doi: 10.1109/TITS.2008.922943.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	Z. Karami and R. Kashef, "Smart transportation planning: Data, models, and algorithms," Transportation Engineering, vol. 2, p. 100013, 2020/12/01/ 2020, doi: https://doi.org/10.1016/j.treng.2020.100013.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	R. Sahal, S. H. Alsamhi, K. N. Brown, D. O’Shea, C. McCarthy, and M. Guizani, "Blockchain-Empowered Digital Twins Collaboration: Smart Transportation Use Case," Machines, vol. 9, no. 9, p. 193, 2021. [Online]. Available: https://www.mdpi.com/2075-1702/9/9/193.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	C. Zhao, K. Wang, X. Dong, and K. Dong, "Is smart transportation associated with reduced carbon emissions? The case of China," Energy Economics, vol. 105, p. 105715, 2022/01/01/ 2022, doi: https://doi.org/10.1016/j.eneco.2021.105715.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49]	R. A. Gonzalez, R. E. Ferro, and D. Liberona, "Government and governance in intelligent cities, smart transportation study case in Bogotá Colombia," Ain Shams Engineering Journal, vol. 11, no. 1, pp. 25-34, 2020/03/01/ 2020, doi: https://doi.org/10.1016/j.asej.2019.05.002.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50]	M. Ehteshami, M. Cheraghali, B. Tabrizian, and M. Teimourian, "Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics," Journal of Information and Communication Technology, vol. 15, pp. 1-20, 09/26 2022, doi: 10.61186/jict.42076.16.59.1.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51]	R. Bahri and s. zeynali, "Energy procurement of a cellular base station in independent microgrids with electric vehicles and renewable energy sources: Mixed-integer nonlinear programming model," (in Fa), Journal of Information and Communication Technology, vol. 15, no. 57, pp. 266-282, 2023. [Online]. Available: https://www.magiran.com/paper/2640169.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[52]	S. L. Ullo and G. R. Sinha, "Advances in Smart Environment Monitoring Systems Using IoT and Sensors," Sensors, vol. 20, no. 11, p. 3113, 2020. [Online]. Available: https://www.mdpi.com/1424-8220/20/11/3113.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[53]	H. Nandanwar and A. Chauhan, "IOT based Smart Environment Monitoring Systems: A Key To Smart and Clean Urban Living Spaces," in 2021 Asian Conference on Innovation in Technology (ASIANCON), 27-29 Aug. 2021 2021, pp. 1-9, doi: 10.1109/ASIANCON51346.2021.9544596.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[54]	A. Razmjoo, A. Gandomi, M. Pazhoohesh, S. Mirjalili, and M. Rezaei, "The key role of clean energy and technology in smart cities development," Energy Strategy Reviews, vol. 44, 08/20 2022, doi: 10.1016/j.esr.2022.100943.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[55]	K. Sujatha et al., "Smart Vision-Based Sensing and Monitoring of Power Plants for a Clean Environment," in Intelligent Manufacturing Management Systems, 2023, pp. 195-222.</unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[56]	M. Vijarania, V. Jaglan, and A. Sanjay, "Security Surveillance and Home Automation System using IoT," EAI Endorsed Transactions on Smart Cities, vol. 5, p. 165963, 08/06 2020, doi: 10.4108/eai.21-7-2020.165963.
[57]	"IBM Corp., IBM Db2 Database, Database Software, IBM Analytics,." https://www.ibm.com/analytics/us/en/db2/ (accessed 09 March 2018, 2018).</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
[58]	A. Page, O. Kocabas, T. Soyata, M. Aktas, and J.-P. Couderc, "Cloud-Based Privacy-Preserving Remote ECG Monitoring and Surveillance," Annals of Noninvasive Electrocardiology, vol. 20, pp. 328-337, 12/01 2014, doi: 10.1111/anec.12204.</unstructured_citation></citation><citation key="ref58"><unstructured_citation>
[59]	a. dolatkhah, B. D. Yaghouti, and r. hashempour, "Face recognition and Liveness Detection Based on Speech Recognition for Electronical Authentication," (in Fa), Journal of Information and Communication Technology, vol. 15, no. 57, pp. 94-110, 2023. [Online]. Available: https://www.magiran.com/paper/2640158.</unstructured_citation></citation><citation key="ref59"><unstructured_citation>
[60]	J. Henius and J. L. McDonald, Smart Defense: A critical appraisal. NATO defense College, Research division= Collège de défense de l'Otan …, 2012.</unstructured_citation></citation><citation key="ref60"><unstructured_citation>
[61]	B. B. Gupta, P. Chaudhary, X. Chang, and N. Nedjah, "Smart defense against distributed Denial of service attack in IoT networks using supervised learning classifiers," Computers &amp; Electrical Engineering, vol. 98, 02/02 2022, doi: 10.1016/j.compeleceng.2022.107726.</unstructured_citation></citation><citation key="ref61"><unstructured_citation>
[62]	I. Karatas, "Cyber Warfare and NATO's New Security Concept: Smart Defense," 2021, pp. 273-285.</unstructured_citation></citation><citation key="ref62"><unstructured_citation>
[63]	T. FRUNZETI, "THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING," Journal of Defense Resources Management, vol. Vol. 3, no. 2, pp. pp. 3 – 18 2012.</unstructured_citation></citation><citation key="ref63"><unstructured_citation>
[64]	H. Azadi et al., "Rethinking resilient agriculture: From Climate-Smart Agriculture to Vulnerable-Smart Agriculture," Journal of Cleaner Production, vol. 319, p. 128602, 08/01 2021, doi: 10.1016/j.jclepro.2021.128602.</unstructured_citation></citation><citation key="ref64"><unstructured_citation>
[65]	O. Friha, M. A. Ferrag, L. Shu, L. Maglaras, and X. Wang, "Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies," IEEE/CAA Journal of Automatica Sinica, vol. 8, no. 4, pp. 718-752, 2021, doi: 10.1109/JAS.2021.1003925.</unstructured_citation></citation><citation key="ref65"><unstructured_citation>
[66]	B. Sinha and R. Dhanalakshmi, "Recent advancements and challenges of Internet of Things in smart agriculture: A survey," Future Generation Computer Systems, vol. 126, 08/14 2021, doi: 10.1016/j.future.2021.08.006.</unstructured_citation></citation><citation key="ref66"><unstructured_citation>
[67]	V. K. Quy et al., "IoT-Enabled Smart Agriculture: Architecture, Applications, and Challenges," Applied Sciences, vol. 12, no. 7, p. 3396, 2022. [Online]. Available: https://www.mdpi.com/2076-3417/12/7/3396.</unstructured_citation></citation><citation key="ref67"><unstructured_citation>
[68]	R. Stewart, R. Willis, D. Giurco, K. Panuwatwanich, and G. Capati, "Web-based knowledge management system: Linking smart metering to the future of urban water planning," Australian Planner, vol. 47, 06/01 2010, doi: 10.1080/07293681003767769.</unstructured_citation></citation><citation key="ref68"><unstructured_citation>
[69]	M. Phadke. "Smart Water Management – Need of the hour for utility sector." https://www.einfochips.com/blog/smart-water-management-need-of-the-hour-for-utility-sector/ (accessed.</unstructured_citation></citation><citation key="ref69"><unstructured_citation>
[70]	F. Adesola, S. Misra, N. Omoregbe, R. Damaševičius, and R. Maskeliunas, "An IOT-Based Architecture for Crime Management in Nigeria," 2019, pp. 245-254.</unstructured_citation></citation><citation key="ref70"><unstructured_citation>
[71]	S. Jain and N. Kesswani, "Smart Judiciary System: A Smart Dust Based IoT Application," 2019, pp. 128-140.</unstructured_citation></citation><citation key="ref71"><unstructured_citation>
[72]	J. Laufs, H. Borrion, and B. Bradford, "Security and the smart city: A systematic review," Sustainable Cities and Society, vol. 55, p. 102023, 2020/04/01/ 2020, doi: https://doi.org/10.1016/j.scs.2020.102023.</unstructured_citation></citation><citation key="ref72"><unstructured_citation>
[73]	A. Tundis, H. Kaleem, and M. Mühlhäuser, "Detecting and Tracking Criminals in the Real World through an IoT-Based System," Sensors, vol. 20, p. 3795, 07/07 2020, doi: 10.3390/s20133795.</unstructured_citation></citation><citation key="ref73"><unstructured_citation>
[74]	M. S. Khan, M. Woo, K. Nam, and P. K. Chathoth, "Smart City and Smart Tourism: A Case of Dubai," Sustainability, vol. 9, no. 12, p. 2279, 2017. [Online]. Available: https://www.mdpi.com/2071-1050/9/12/2279.</unstructured_citation></citation><citation key="ref74"><unstructured_citation>
[75]	P. Lee, W. C. Hunter, and N. Chung, "Smart Tourism City: Developments and Transformations," Sustainability, vol. 12, no. 10, p. 3958, 2020. [Online]. Available: https://www.mdpi.com/2071-1050/12/10/3958.</unstructured_citation></citation><citation key="ref75"><unstructured_citation>
[76]	N. Habeeb and S. Talib, "HighTech and Innovation Journal Relationship of Smart Cities and Smart Tourism: An Overview," HighTech and Innovation Journal, vol. 1, 12/01 2020, doi: 10.28991/HIJ-2020-01-04-07.</unstructured_citation></citation><citation key="ref76"><unstructured_citation>
[77]	N. Chung, H. Lee, J. Ham, and C. Koo, "Smart Tourism Cities’ Competitiveness Index: A Conceptual Model," 2021, pp. 433-438.</unstructured_citation></citation><citation key="ref77"><unstructured_citation>
[78]	A. Gohar and G. Nencioni, "The Role of 5G Technologies in a Smart City: The Case for Intelligent Transportation System," Sustainability, vol. 13, no. 9, p. 5188, 2021. [Online]. Available: https://www.mdpi.com/2071-1050/13/9/5188.</unstructured_citation></citation><citation key="ref78"><unstructured_citation>
[79]	A. Garcia Crespo, I. Gonzalez-Carrasco, J. Cuadrado, D. Villanueva, and Á. González, "CESARSC: Framework for creating Cultural Entertainment Systems with Augmented Reality in Smart Cities," Computer Science and Information Systems, vol. 13, pp. 6-6, 06/01 2016, doi: 10.2298/CSIS150620006G.</unstructured_citation></citation><citation key="ref79"><unstructured_citation>
[80]	D. Cook, G. Youngblood, and S. Das, A Multi-agent Approach to Controlling a Smart Environment. 2006, pp. 165-182.</unstructured_citation></citation><citation key="ref80"><unstructured_citation>
[81]	P. Pitchai, S. Subramani, K. Usa, K. Raju, M. Alsharif, and M. K. Kim, "Technological Advancements Toward Smart Energy Management in Smart Cities," Energy Reports, vol. 10, pp. 648-677, 06/24 2023, doi: 10.1016/j.egyr.2023.07.021.</unstructured_citation></citation><citation key="ref81"><unstructured_citation>
[82]	A. Braicov et al., "Smart Surveillance Systems and Their Applications," 2020, pp. 179-187.</unstructured_citation></citation><citation key="ref82"><unstructured_citation>
[83]	A. Medjdoubi, M. Meddeber, and K. Yahyaoui, "Smart City Surveillance: Edge Technology Face Recognition Robot Deep Learning Based," International Journal of Engineering, vol. 37, no. 1, pp. 25-36, 2024, doi: 10.5829/ije.2024.37.01a.03.</unstructured_citation></citation><citation key="ref83"><unstructured_citation>
[84]	K. Liao, Z. Zhao, A. Doupe, and G. J. Ahn, "Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin," in 2016 APWG Symposium on Electronic Crime Research (eCrime), 1-3 June 2016 2016, pp. 1-13, doi: 10.1109/ECRIME.2016.7487938.</unstructured_citation></citation><citation key="ref84"><unstructured_citation> 
[85]	J. M. Alonso and C. Mencar, "Building cognitive cities with explainable artificial intelligent systems," in CEx@ AI* IA, 2017.</unstructured_citation></citation><citation key="ref85"><unstructured_citation>
[86]	A. Adadi and M. Berrada, "Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI)," IEEE Access, vol. 6, pp. 52138-52160, 2018, doi: 10.1109/ACCESS.2018.2870052.</unstructured_citation></citation><citation key="ref86"><unstructured_citation>
[87]	R. K. E. Bellamy et al., "AI Fairness 360: An Extensible Toolkit for Detecting, Understanding, and Mitigating Unwanted Algorithmic Bias," ArXiv, vol. abs/1810.01943, 2018.</unstructured_citation></citation><citation key="ref87"><unstructured_citation>
[88]	M. Roy, "Cathy O’Neil. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy . New York: Crown Publishers, 2016. 272p. Hardcover, $26 (ISBN 978-0553418811)," College &amp; Research Libraries, vol. 78, pp. 403-404, 03/01 2017, doi: 10.5860/crl.78.3.403.</unstructured_citation></citation><citation key="ref88"><unstructured_citation>
[89]	A. K. M. B. Haque, B. Bhushan, and G. Dhiman, "Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends," Expert Systems, vol. 39, 2021.</unstructured_citation></citation><citation key="ref89"><unstructured_citation>
[90]	B. Tekinerdogan, Ö. Köksal, and T. Çelik, "System Architecture Design of IoT-Based Smart Cities," Applied Sciences, vol. 13, no. 7, p. 4173, 2023. [Online]. Available: https://www.mdpi.com/2076-3417/13/7/4173.</unstructured_citation></citation><citation key="ref90"><unstructured_citation>
[91]	W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Micro-Sensor Networks," Wireless Communications, IEEE Transactions on, vol. 1, pp. 660-670, 11/01 2002, doi: 10.1109/TWC.2002.804190.</unstructured_citation></citation><citation key="ref91"><unstructured_citation>
[92]	W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, "Edge Computing: Vision and Challenges," IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637-646, 2016, doi: 10.1109/JIOT.2016.2579198.</unstructured_citation></citation><citation key="ref92"><unstructured_citation>
[93]	"Google Science Journal." https://makingscience.withgoogle.com/science-journal (accessed.</unstructured_citation></citation><citation key="ref93"><unstructured_citation>
[94]	Y. Geng, J. Chen, R. Fu, G. Bao, and K. Pahlavan, "Enlighten Wearable Physiological Monitoring Systems: On-Body RF Characteristics Based Human Motion Classification Using a Support Vector Machine," IEEE Transactions on Mobile Computing, vol. 15, pp. 1-1, 01/01 2015, doi: 10.1109/TMC.2015.2416186.</unstructured_citation></citation><citation key="ref94"><unstructured_citation>
[95]	J. Yin, I. Gorton, and S. Poorva, Toward Real Time Data Analysis for Smart Grids. 2012, pp. 827-832.</unstructured_citation></citation><citation key="ref95"><unstructured_citation>
[96]	D. Neumann, C. Bodenstein, O. Rana, and R. Krishnaswamy, "STACEE: Enhancing storage clouds using edge devices," 06/14 2011, doi: 10.1145/1998561.1998567.</unstructured_citation></citation><citation key="ref96"><unstructured_citation>
[97]	"the International Society for Urban Informatics, The ISUI Smart City " https://www.isocui.org/smart_city_index (accessed.</unstructured_citation></citation><citation key="ref97"><unstructured_citation>
[98]	A. Elmaghraby and M. Losavio, "Cyber Security Challenges in Smart Cities: Safety, security and privacy," Journal of Advanced Research, vol. 5, 07/01 2014, doi: 10.1016/j.jare.2014.02.006.</unstructured_citation></citation><citation key="ref98"><unstructured_citation>
[99]	Y. Zhao, "Research on Data Security Technology in Internet of Things," Applied Mechanics and Materials, vol. 433-435, pp. 1752-1755, 10/01 2013, doi: 10.4028/www.scientific.net/AMM.433-435.1752.</unstructured_citation></citation><citation key="ref99"><unstructured_citation>
[100] A. Page, M. Hassanalieragh, T. Soyata, M. Aktas, B. Kantarci, and S. Andreescu, "Conceptualizing a Real-Time Remote Cardiac Health Monitoring System," 2015, pp. 1-34.</unstructured_citation></citation><citation key="ref100"><unstructured_citation>
[101] T. Soyata, Enabling Real-Time Mobile Cloud Computing through Emerging Technologies. 2015.</unstructured_citation></citation><citation key="ref101"><unstructured_citation>
[102]	G. Honan, A. Page, O. Kocabas, T. Soyata, and B. Kantarci, Internet-of-everything oriented implementation of secure Digital Health (D-Health) systems. 2016, pp. 718-725.</unstructured_citation></citation><citation key="ref102"><unstructured_citation>
[103]	A. Page, S. Hijazi, D. Askan, B. Kantarci, and T. Soyata, "SUPPORT SYSTEMS FOR HEALTH MONITORING USING INTERNET-OF-THINGS DRIVEN DATA ACQUISITION," Services Transactions on Services Computing, vol. 4, pp. 18-34, 10/01 2016, doi: 10.29268/stsc.2016.4.4.2.</unstructured_citation></citation><citation key="ref103"><unstructured_citation>
[104]	K. Cabaj and W. Mazurczyk, "Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall," IEEE Network, vol. 30, 08/23 2016, doi: 10.1109/MNET.2016.1600110NM.</unstructured_citation></citation><citation key="ref104"><unstructured_citation>
[105]	S. Mohurle and M. Patil, "A brief study of Wannacry Threat: Ransomware Attack 2017," INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING &amp; TECHNOLOGY, vol. 8, 06/11 2022.</unstructured_citation></citation><citation key="ref105"><unstructured_citation>
[106]	S. Latif, A. Qayyum, M. Usama, J. Qadir, A. Zwitter, and M. Shahzad, "Caveat Emptor: The Risks of Using Big Data for Human Development," IEEE Technology and Society Magazine, vol. 38, no. 3, pp. 82-90, 2019, doi: 10.1109/MTS.2019.2930273.</unstructured_citation></citation><citation key="ref106"><unstructured_citation>
[107]	K. Zhang, J. Ni, K. Yang, X. Liang, J. Ren, and X. S. Shen, "Security and Privacy in Smart City Applications: Challenges and Solutions," IEEE Communications Magazine, vol. 55, no. 1, pp. 122-129, 2017, doi: 10.1109/MCOM.2017.1600267CM.</unstructured_citation></citation><citation key="ref107"><unstructured_citation>
[108]	H. Ekbia et al., "Big Data, Bigger Dilemmas: A Critical Review," Journal of the Association for Information Science and Technology, vol. 66, 08/01 2015, doi: 10.1002/asi.23294.</unstructured_citation></citation><citation key="ref108"><unstructured_citation>
[109]	K. Crawford and R. Calo, "There is a blind spot in AI research," Nature, vol. 538, pp. 311-313, 10/13 2016, doi: 10.1038/538311a.</unstructured_citation></citation><citation key="ref109"><unstructured_citation>
[110]	L. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H. Gellersen, Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. 2001, pp. 116-122.</unstructured_citation></citation><citation key="ref110"><unstructured_citation>
[111]	S. Mallapuram, N. Ngwum, F. Yuan, C. Lu, and W. Yu, Smart City: The State of the Art, Datasets, and Evaluation Platforms. 2017.</unstructured_citation></citation><citation key="ref111"><unstructured_citation>
[112]	A. Ali, J. Qadir, R. Rasool, A. Sathiaseelan, and A. Zwitter, "Big Data For Development: Applications and Techniques," Big Data Analytics, vol. 1, 07/01 2016, doi: 10.1186/s41044-016-0002-4.</unstructured_citation></citation><citation key="ref112"><unstructured_citation>
[113]	H. Yu, Z. Yang, and R. Sinnott, "Decentralized Big Data Auditing for Smart City Environments Leveraging Blockchain Technology," IEEE Access, vol. PP, pp. 1-1, 12/20 2018, doi: 10.1109/ACCESS.2018.2888940.</unstructured_citation></citation><citation key="ref113"><unstructured_citation>
[114]	A. W Flores, K. Bechtel, and C. Lowenkamp, "False Positives, False Negatives, and False Analyses: A Rejoinder to “Machine Bias: There’s Software Used Across the Country to Predict Future Criminals. And it’s Biased Against Blacks.”," Federal probation, vol. 80, 09/30 2016.</unstructured_citation></citation><citation key="ref114"><unstructured_citation>
[115]	K. Crawford, "Artificial Intelligence's White Guy Problem," 2016. </unstructured_citation></citation><citation key="ref115"><unstructured_citation>
[116]	S. M. Lundberg et al., "Explainable machine-learning predictions for the prevention of hypoxaemia during surgery," (in eng), Nat Biomed Eng, vol. 2, no. 10, pp. 749-760, Oct 2018, doi: 10.1038/s41551-018-0304-0.</unstructured_citation></citation><citation key="ref116"><unstructured_citation>
[117]	R. R. Selvaraju, M. Cogswell, A. Das, R. Vedantam, D. Parikh, and D. Batra, "Grad-CAM: Visual Explanations from Deep Networks via Gradient-Based Localization," in 2017 IEEE International Conference on Computer Vision (ICCV), 22-29 Oct. 2017 2017, pp. 618-626, doi: 10.1109/ICCV.2017.74. </unstructured_citation></citation><citation key="ref117"><unstructured_citation>
[118]	C. Drew, "Data science ethics in government," Philosophical Transactions of The Royal Society A Mathematical Physical and Engineering Sciences, vol. 374, p. 20160119, 12/28 2016, doi: 10.1098/rsta.2016.0119.</unstructured_citation></citation><citation key="ref118"><unstructured_citation>
[119]	F. Samie, L. Bauer, and J. Henkel, "Hierarchical Classification for Constrained IoT Devices: A Case Study on Human Activity Recognition," IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8287-8295, 2020, doi: 10.1109/JIOT.2020.2989053.</unstructured_citation></citation><citation key="ref119"><unstructured_citation>
[120]	C. R. Gregersen. "3 IoT Latency Issues and How to Fix Them." https://builtin.com/articles/how-to-fix-iot-latency (accessed.</unstructured_citation></citation><citation key="ref120"><unstructured_citation>
[121]	R. S. Rajeshwari Adrakatti "Approaches for Managing the Smart Phone Battery Efficiently," International Journal of Engineering Research &amp; Technology (IJERT), vol. 3, no. 27, 2018, doi: 10.17577/IJERTCONV3IS27006.</unstructured_citation></citation><citation key="ref121"><unstructured_citation>
[122]	M. Ali, J. M. Zain, M. F. Zolkipli, and G. Badshah, "Battery efficiency of mobile devices through computational offloading: A review," in 2015 IEEE Student Conference on Research and Development (SCOReD), 13-14 Dec. 2015 2015, pp. 317-322, doi: 10.1109/SCORED.2015.7449347. </unstructured_citation></citation><citation key="ref122"><unstructured_citation>
[123]	A. Qayyum et al., "Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security," Frontiers in Big Data, vol. 3, 12/02 2020, doi: 10.3389/fdata.2020.587139.</unstructured_citation></citation><citation key="ref123"><unstructured_citation>
[124]	A. Qayyum, M. Usama, J. Qadir, and A. Al-Fuqaha, "Securing Connected &amp; Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and the Way Forward," IEEE Communications Surveys &amp; Tutorials, vol. 22, no. 2, pp. 998-1026, 2020, doi: 10.1109/COMST.2020.2975048.</unstructured_citation></citation><citation key="ref124"><unstructured_citation>
[125]	"a guide to anticipating the future impact of today’s technology." https://mediaethics.ca/wp-content/uploads/2019/11/Ethical-OS-Toolkit-2.pdf (accessed.</unstructured_citation></citation><citation key="ref125"><unstructured_citation>
[126]	J. Krimmling and S. Peter, "Integration and evaluation of intrusion detection for CoAP in smart city applications," in 2014 IEEE Conference on Communications and Network Security, 29-31 Oct. 2014 2014, pp. 73-78, doi: 10.1109/CNS.2014.6997468. </unstructured_citation></citation><citation key="ref126"><unstructured_citation>
[127]	H. Suo, J. Wan, C. Zou, and J. Liu, "Security in the Internet of Things: A Review," Proceedings - 2012 International Conference on Computer Science and Electronics Engineering, ICCSEE 2012, vol. 3, 03/01 2012, doi: 10.1109/ICCSEE.2012.373.</unstructured_citation></citation><citation key="ref127"><unstructured_citation>
[128]	M. J. Covington and R. Carskadden, Threat implications of the Internet of Things. 2013, pp. 1-12.</unstructured_citation></citation><citation key="ref128"><unstructured_citation>
[129]	A. Barua, M. A. A. Alamin, M. Hossain, and E. Hossain, "Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey," IEEE Open Journal of the Communications Society, vol. 3, pp. 1-1, 01/01 2022, doi: 10.1109/OJCOMS.2022.3149732.</unstructured_citation></citation><citation key="ref129"><unstructured_citation>
[130]	N. Ye, Y. Zhu, R.-c. Wang, R. Malekian, and L. Qiao-min, "An Efficient Authentication and Access Control Scheme for Perception Layer of Internet of Things," Applied Mathematics &amp; Information Sciences, vol. 8, 07/01 2014, doi: 10.12785/amis/080416.</unstructured_citation></citation><citation key="ref130"><unstructured_citation>
[131]	D. Puthal,  S. Nepal, R. Ranjan, and J. Chen, "Threats to Networking Cloud and Edge Datacenters in the Internet of Things," IEEE Cloud Computing, vol. 3, pp. 64-71, 05/01 2016, doi: 10.1109/MCC.2016.63.
[132]	M. Aljanabi et al., Data poisoning: issues, challenges, and needs. 2024, pp. 359-363.</unstructured_citation></citation><citation key="ref131"><unstructured_citation>
[133]	W. Li, R. Zhao, T. Xiao, and X. Wang, "DeepReID: Deep Filter Pairing Neural Network for Person Re-identification," in 2014 IEEE Conference on Computer Vision and Pattern Recognition, 23-28 June 2014 2014, pp. 152-159, doi: 10.1109/CVPR.2014.27. </unstructured_citation></citation><citation key="ref132"><unstructured_citation>
[134]	F. Wang, X. Wang, and X. Ban, "Data poisoning attacks in intelligent transportation systems: A survey," Transportation Research Part C Emerging Technologies, vol. 165, p. 104750, 08/01 2024, doi: 10.1016/j.trc.2024.104750.</unstructured_citation></citation><citation key="ref133"><unstructured_citation>
[135]	M. Billah, A. Anwar, Z. Rahman, and S. M. Galib, "Bi-Level Poisoning Attack Model and Countermeasure for Appliance Consumption Data of Smart Homes," Energies, vol. 14, no. 13, p. 3887, 2021. [Online]. Available: https://www.mdpi.com/1996-1073/14/13/3887.</unstructured_citation></citation><citation key="ref134"><unstructured_citation>
[136]	M. A. Ayub, W. A. Johnson, D. A. Talbert, and A. Siraj, "Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning," in 2020 54th Annual Conference on Information Sciences and Systems (CISS), 18-20 March 2020 2020, pp. 1-6, doi: 10.1109/CISS48834.2020.1570617116. </unstructured_citation></citation><citation key="ref135"><unstructured_citation>
[137]	M. Sato, J. Suzuki, H. Shindo, and Y. Matsumoto, Interpretable Adversarial Perturbation in Input Embedding Space for Text. 2018.</unstructured_citation></citation><citation key="ref136"><unstructured_citation>
[138]	N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and A. Swami, The Limitations of Deep Learning in Adversarial Settings. 2016, pp. 372-387.</unstructured_citation></citation><citation key="ref137"><unstructured_citation>
[139]	N. Carlini and D. Wagner, Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. 2018, pp. 1-7.</unstructured_citation></citation><citation key="ref138"><unstructured_citation>
[140]	I. Corona, G. Giacinto, and F. Roli, "Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues," Information Sciences, vol. 239, pp. 201–225, 08/01 2013, doi: 10.1016/j.ins.2013.03.022.</unstructured_citation></citation><citation key="ref139"><unstructured_citation>
[141]	N. Carlini et al., On Evaluating Adversarial Robustness. 2019.</unstructured_citation></citation><citation key="ref140"><unstructured_citation>
[142]	S. Utomo, A. Rouniyar, H.-C. Hsu, and P.-A. Hsiung, "Federated Adversarial Training Strategies for Achieving Privacy and Security in Sustainable Smart City Applications," Future Internet, vol. 15, p. 371, 11/20 2023, doi: 10.3390/fi15110371.</unstructured_citation></citation><citation key="ref141"><unstructured_citation>
[143]	Y. Liu et al., A Survey on Neural Trojans. 2020, pp. 33-39.</unstructured_citation></citation><citation key="ref142"><unstructured_citation>
[144]	Y. Gao, C. Xu, D. Wang, S. Chen, D. Ranasinghe, and S. Nepal, STRIP: a defence against trojan attacks on deep neural networks. 2019, pp. 113-125.</unstructured_citation></citation><citation key="ref143"><unstructured_citation>
[145]	"Trojan Horse Virus." https://www.fortinet.com/resources/cyberglossary/trojan-horse-virus (accessed.</unstructured_citation></citation><citation key="ref144"><unstructured_citation>
[146]	C. Dong, Y. Xu, X. Liu, F. Zhang, G. He, and Y. Chen, "Hardware Trojans in Chips: A Survey for Detection and Prevention," Sensors, vol. 20, no. 18, p. 5165, 2020. [Online]. Available: https://www.mdpi.com/1424-8220/20/18/5165.</unstructured_citation></citation><citation key="ref145"><unstructured_citation>
[147]	M. Juuti, S. Szyller, S. Marchal, and N. Asokan, PRADA: Protecting Against DNN Model Stealing Attacks. 2019, pp. 512-527.</unstructured_citation></citation><citation key="ref146"><unstructured_citation>
[148]	X. W. Minxue Tang, Yitu Wang. "Model Stealing Attacks." https://people.duke.edu/~zg70/courses/AML/Lecture14.pdf (accessed.</unstructured_citation></citation><citation key="ref147"><unstructured_citation>
[149]	https://owasp.org/www-project-machine-learning-security-top-10/docs/ML05_2023-Model_Theft (accessed.</unstructured_citation></citation><citation key="ref148"><unstructured_citation>
[150]	P. Irolla. "What is model stealing and why it matters." https://www.mlsecurity.ai/post/what-is-model-stealing-and-why-it-matters (accessed.</unstructured_citation></citation><citation key="ref149"><unstructured_citation>
[151]	N. Carlini, S. Chien, M. Nasr, S. Song, A. Terzis, and F. Tramèr, "Membership Inference Attacks From First Principles," in 2022 IEEE Symposium on Security and Privacy (SP), 22-26 May 2022 2022, pp. 1897-1914, doi: 10.1109/SP46214.2022.9833649.</unstructured_citation></citation><citation key="ref150"><unstructured_citation> 
[152]	"Membership inference attacks | A new AI security risk." https://www.michalsons.com/blog/membership-inference-attacks-a-new-ai-security-risk/64440 (accessed.</unstructured_citation></citation><citation key="ref151"><unstructured_citation>
[153]	A. Famili and Y. Lao, "Deep Neural Network Quantization Framework for Effective Defense against Membership Inference Attacks," Sensors, vol. 23, no. 18, p. 7722, 2023. [Online]. Available: https://www.mdpi.com/1424-8220/23/18/7722.</unstructured_citation></citation><citation key="ref152"><unstructured_citation>
[154]	M. Abdullahi et al., "Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review," Electronics, vol. 11, no. 2, p. 198, 2022. [Online]. Available: https://www.mdpi.com/2079-9292/11/2/198.</unstructured_citation></citation><citation key="ref153"><unstructured_citation>
[155]	Y. Jia et al., "Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model," Knowledge-Based Systems, vol. 276, p. 110781, 07/01 2023, doi: 10.1016/j.knosys.2023.110781.</unstructured_citation></citation><citation key="ref154"><unstructured_citation>
[156]	M. Chohan, U. Haider, M. Y. Ayub, H. Shoukat, T. Bhatia, and M. Hassan, "Detection of Cyber Attacks using Machine Learning ‎based Intrusion Detection System for IoT Based Smart ‎Cities," EAI Endorsed Transactions on Smart Cities, vol. 7, 06/28 2023, doi: 10.4108/eetsc.3222.</unstructured_citation></citation><citation key="ref155"><unstructured_citation>
[157]	A. Nunn and P. W. C. Prasad, "Using Artificial Intelligence to Defend Internet of Things for Smart City Networks," in Innovative Technologies in Intelligent Systems and Industrial Applications, Cham, S. C. Mukhopadhyay, S. M. N. A. Senanayake, and P. W. C. Prasad, Eds., 2024// 2024: Springer Nature Switzerland, pp. 345-367.</unstructured_citation></citation><citation key="ref156"><unstructured_citation> 
[158]	B. J. Ospina Cifuentes, Á. Suárez, V. García Pineda, R. Alvarado Jaimes, A. O. Montoya Benitez, and J. D. Grajales Bustamante, "Analysis of the Use of Artificial Intelligence in Software-Defined Intelligent Networks: A Survey," Technologies, vol. 12, no. 7, p. 99, 2024. [Online]. Available: https://www.mdpi.com/2227-7080/12/7/99.</unstructured_citation></citation><citation key="ref157"><unstructured_citation>
[159]	M. Songhorabadi, M. Rahimi, A. M. Moghadam Farid, and M. Haghi Kashani, "Fog computing approaches in IoT-enabled smart cities," Journal of Network and Computer Applications, vol. 211, p. 103557, 12/01 2022, doi: 10.1016/j.jnca.2022.103557.</unstructured_citation></citation><citation key="ref158"><unstructured_citation>
[160]	"Introduction to "Discover Emerging Technologies in Trends in 2024"." [Online]. Available: https://www.linkedin.com/pulse/part-1-navigating-future-technology-smart-worlds-lennart-kalwa-qh68e/</unstructured_citation></citation><citation key="ref159"><unstructured_citation>
[161]	C. Bernard Marr. "8 Critical Smart City Trends Reshaping Urban Life In 2025." https://www.forbes.com/sites/bernardmarr/2025/01/09/8-critical-smart-city-trends-reshaping-urban-life-in-2 (accessed.</unstructured_citation></citation><citation key="ref160"><unstructured_citation>
[162]	J. G. B. Miguel Eiras Antunes, Daniela Guerreiro de Oliveira. "Urban Future With a Purpose 12 trends shaping the future of cities by 2030." https://www.deloitte.com/global/en/Industries/government-public/perspectives/urban-future-with-a-purpose.html (accessed.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Novel Hybrid Convolutional-Attention Recurrent Network (HCARN) for Enhanced Cybersecurity Threat Detection</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Archana</given_name><surname>Laddhad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Gurveen </given_name><surname>Vaseer</surname></person_name></contributors><publication_date media_type="online"><month>5</month><day>25</day><year>2025</year></publication_date><pages><first_page>50</first_page><last_page>62</last_page></pages><doi_data><doi>10.61186/jist.48536.13.49.50</doi><resource>http://jist.ir/en/Article/48536</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://jist.ir/en/Article/Download/48536</resource></item><item crawler="google"><resource>http://jist.ir/en/Article/Download/48536</resource></item><item crawler="msn"><resource>http://jist.ir/en/Article/Download/48536</resource></item><item crawler="altavista"><resource>http://jist.ir/en/Article/Download/48536</resource></item><item crawler="yahoo"><resource>http://jist.ir/en/Article/Download/48536</resource></item><item crawler="scirus"><resource>http://jist.ir/en/Article/Download/48536</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://jist.ir/en/Article/Download/48536</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Markevych and M. Dawson, “A review of enhancing intrusion detection systems for cybersecurity using artificial intelligence (AI),” in International Conference Knowledge-Based Organization, vol. 29, no. 3, pp. 30–37, July 2023.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	A. Dunmore, J. Jang-Jaccard, F. Sabrina, and J. Kwak, “A comprehensive survey of generative adversarial networks (GANs) in cybersecurity intrusion detection,” IEEE Access, 2023.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. M. Storm, J. Hagen, and Ø. A. A. Toftegaard, “A survey of using process data and features of industrial control systems in intrusion detection,” in 2021 IEEE International Conference on Big Data (Big Data), Dec. 2021, pp. 2170–2177.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	B. J. Asaju, “Advancements in Intrusion Detection Systems for V2X: Leveraging AI and ML for Real-Time Cyber Threat Mitigation,” Journal of Computational Intelligence and Robotics, vol. 4, no. 1, pp. 33–50, 2024.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	S. Alzughaibi and S. El Khediri, “A cloud intrusion detection systems based on DNN using backpropagation and PSO on the CSE-CIC-IDS2018 dataset,” Applied Sciences, vol. 13, no. 4, p. 2276, 2023.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	L. Göcs and Z. C. Johanyák, “Identifying relevant features of CSE-CIC-IDS2018 dataset for the development of an intrusion detection system,” Intelligent Data Analysis, preprint, 2023.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H. Najafi Mohsenabad and M. A. Tut, “Optimizing cybersecurity attack detection in computer networks: A comparative analysis of bio-inspired optimization algorithms using the CSE-CIC-IDS2018 dataset,” Applied Sciences, vol. 14, no. 3, p. 1044, 2024.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	L. Göcs and Z. C. Johanyák, “Feature selection with weighted ensemble ranking for improved classification performance on the CSE-CIC-IDS2018 dataset,” Computers, vol. 12, no. 8, p. 147, 2023.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Songma, T. Sathuphan, and T. Pamutha, “Optimizing intrusion detection systems in three phases on the CSE-CIC-IDS2018 dataset,” Computers, vol. 12, no. 12, p. 245, 2023.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	M. Khan and M. Haroon, “Artificial neural network-based intrusion detection in cloud computing using CSE-CIC-IDS2018 datasets,” in 2023 3rd Asian Conference on Innovation in Technology (ASIANCON), Aug. 2023, pp. 1–4.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	B. I. Farhan and A. D. Jasim, “Performance analysis of intrusion detection for deep learning model based on CSE-CIC-IDS2018 dataset,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 26, no. 2, pp. 1165–1172, 2022.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	C. F. Tsai and C. Y. Lin, “A triangle area based nearest neighbors approach to intrusion detection,” Pattern Recognition, vol. 43, no. 1, pp. 222–229, 2010.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	R. Bar-Yanai, M. Langberg, D. Peleg, and L. Roditty, “Realtime classification for encrypted traffic,” in Proceedings of the International Symposium on Experimental Algorithms, Springer, Berlin, Heidelberg, May 2010, pp. 373–385.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	W. C. Lin, S. W. Ke, and C. F. Tsai, “CANN: An intrusion detection system based on combining cluster centers and nearest neighbors,” Knowledge-Based Systems, vol. 78, pp. 13–21, 2015.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	P. M. Comar, L. Liu, S. Saha, P. N. Tan, and A. Nucci, “Combining supervised and unsupervised learning for zero-day malware detection,” in Proceedings of the 2013 IEEE INFOCOM, Apr. 2013, pp. 2022–2030.
[16]	A. A. Aburomman and M. B. I. Reaz, “A novel SVM-kNN-PSO ensemble method for intrusion detection system,” Applied Soft Computing, vol. 38, pp. 360–372, 2016.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-an, and H. Ye, “Significant permission identification for machine-learning-based android malware detection,” IEEE Transactions on Industrial Informatics, vol. 14, no. 7, pp. 3216–3225, 2018.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	S. M. H. Bamakan, H. Wang, and Y. Shi, “Ramp loss K-support vector classification-regression; a robust and sparse multi-class approach to the intrusion detection problem,” Knowledge-Based Systems, vol. 126, pp. 113–126, 2017.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	E. De la Hoz, A. Ortiz, J. Ortega, and B. Prieto, “PCA filtering and probabilistic SOM for network intrusion detection,” Neurocomputing, vol. 164, pp. 71–81, 2015.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	S. Dubey and J. Dubey, “KBB: A hybrid method for intrusion detection,” in Proceedings of the 2015 International Conference on Computer, Communication and Control (IC4), Sept. 2015, pp. 1–6.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	M. Jabbar, R. Aluvalu, et al., “RFAODE: A novel ensemble intrusion detection system,” Procedia Computer Science, vol. 115, pp. 226–234, 2017.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	N. Moustafa, B. Turnbull, and K. K. R. Choo, “An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4815–4830, 2018.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	H. H. Pajouh, R. Javidan, R. Khayami, D. Ali, and K. K. R. Choo, “A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks,” IEEE Transactions on Emerging Topics in Computing, vol. 7, no. 2, pp. 314–323, 2016.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	Z. Tan, A. Jamdagni, X. He, P. Nanda, and R. P. Liu, “A system for denial-of-service attack detection based on multivariate correlation analysis,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 447–456, 2013.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	N. Liao, S. Tian, and T. Wang, “Network forensics based on fuzzy logic and expert system,” Computer Communications, vol. 32, no. 17, pp. 1881–1892, 2009.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	R. Masoudi and A. Ghaffari, "Software Defined Networks: A Survey," Journal of Information Systems and Telecommunication, vol. 67, no. 5, pp. 1–25, 2016.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	A. Shirmarz and A. Ghaffari, "Autonomic Software Defined Network (SDN) Architecture With Performance Improvement," Journal of Information Systems and Telecommunication, vol. 8, no. 2, pp. 120-128, April-June 2020.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	A. Shirmarz and A. Ghaffari, "A Novel SDN-Based Architecture for Distributed Denial-of-Service (DDoS) Detection," Journal of Information Systems and Telecommunication, vol. 10, no. 2, pp. 120-131, April-June 2022.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	Canadian Institute for Cybersecurity. (2018). CSE-CIC-IDS2018: A Large-Scale Dataset for Intrusion Detection Systems. Retrieved from https://registry.opendata.aws/cse-cic-ids2018.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	Farhan, R. I., Maolood, A. T., &amp; Hassan, N. (2020). Performance analysis of flow-based attacks detection on CSE-CIC-IDS2018 dataset using deep learning. Indones. J. Electr. Eng. Comput. Sci, 20(3), 1413-1418.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	Elhanashi, A., Gasmi, K., Begni, A., Dini, P., Zheng, Q., &amp; Saponara, S. (2022, September). Machine learning techniques for anomaly-based detection system on CSE-CIC-IDS2018 dataset. In International Conference on Applications in Electronics Pervading Industry, Environment and Society (pp. 131-140). Cham: Springer Nature Switzerland.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	Kim, J., Kim, J., Kim, H., Shim, M., &amp; Choi, E. (2020). CNN-based network intrusion detection against denial-of-service attacks. Electronics, 9(6), 916.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	Mayuranathan, M., Saravanan, S. K., Muthusenthil, B., &amp; Samydurai, A. (2022). An efficient optimal security system for intrusion detection in cloud computing environment using hybrid deep learning technique. Advances in Engineering Software, 173, 103236.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>