9148  | 0.875 | Munnee R.; Armoogum V.; Armoogum S. | Analysis Of Dos Attacks And Detection Techniques In Smart City Systems | 4th IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2024 (2024) |
47758  | 0.869 | Zhou L.; Gaurav A.; Attar R.W.; Arya V.; Alhomoud A.; Chui K.T. | Securing Iot-Enabled Smart Cities And Detecting Cyber Attacks In Smart Homes For A Greener Future | IEEE Internet of Things Magazine (2025) |
16941  | 0.868 | Chen, DL; Wawrzynski, P; Lv, ZH | Cyber Security In Smart Cities: A Review Of Deep Learning-Based Applications And Case Studies | SUSTAINABLE CITIES AND SOCIETY, 66 (2021) |
19242  | 0.868 | Iqbal M.W.; Issa G.F.; Yousif M.; Atif M. | Detection And Replay Of Distributed Denial Of Service Attacks In Smart Cities Using A Hybrid Deep Learning Approach | 2nd International Conference on Business Analytics for Technology and Security, ICBATS 2023 (2023) |
57853  | 0.866 | Al-Taleb N.; Saqib N.A. | Towards A Hybrid Machine Learning Model For Intelligent Cyber Threat Identification In Smart City Environments | Applied Sciences (Switzerland), 12, 4 (2022) |
45084  | 0.863 | Elsaeidy, AA; Jagannath, N; Sanchis, AG; Jamalipour, A; Munasinghe, KS | Replay Attack Detection In Smart Cities Using Deep Learning | IEEE ACCESS, 8 (2020) |
35103  | 0.862 | Sharma H.; Gupta S. | Leveraging Machine Learning And Sdn-Fog Infrastructure To Mitigate Flood Attacks | 2021 IEEE Globecom Workshops, GC Wkshps 2021 - Proceedings (2021) |
17947  | 0.861 | Bhardwaj T.; Upadhyay H.; Lagos L. | Deep Learning-Based Cyber Security Solutions For Smart-City: Application And Review | Learning and Analytics in Intelligent Systems, 25 (2022) |
60730  | 0.859 | Hoang D.C.; Devi S.; Koner J.; Dhandayuthapani B.; Choudhury S.K.; Sahoo D.R. | Utilizing Deep Learning In Smart Cities For Environmental Monitoring | Proceedings of the 2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024 (2024) |
929  | 0.859 | Khalaf B.A.; Othman S.H.; Razak S.A.; Konios A. | A Comprehensive Review Of Recent Types Of Flooding Attack And Defense Methods In Iot-Based Smart Environments | Journal of Soft Computing and Data Mining, 5, 2 (2024) |