44005  | 0.902 | Mujlid H.M.; Alshahrani R. | Quantum-Driven Security Evolution In Iot: Ai-Powered Cryptography And Anomaly Detection | Journal of Supercomputing, 81, 9 (2025) |
2510  | 0.893 | Florrence J.M.; Antoinette A.; Buvaneswari S.; Wanare A.L.; Vashistha A.; Mulpuri M.; Rambabu R. | A Mathematical Model For Enhancing Cybersecurity In Iot Networks Using Lstm-Based Anomaly Detection And Optimization | Communications on Applied Nonlinear Analysis, 32, 2 (2025) |
7014  | 0.879 | Reis M.J.C.S. | Ai-Driven Anomaly Detection For Securing Iot Devices In 5G-Enabled Smart Cities | Electronics (Switzerland), 14, 12 (2025) |
41565  | 0.869 | Zhukabayeva T.; Ahmad Z.; Adamova A.; Karabayev N.; Mardenov Y.; Satybaldina D. | Penetration Testing And Machine Learning-Driven Cybersecurity Framework For Iot And Smart City Wireless Networks | IEEE Access, 13 (2025) |
2219  | 0.866 | Alotaibi J. | A Hybrid Software-Defined Networking Approach For Enhancing Iot Cybersecurity With Deep Learning And Blockchain In Smart Cities | Peer-to-Peer Networking and Applications, 18, 3 (2025) |
36064  | 0.865 | Alfahaid A.; Alalwany E.; Almars A.M.; Alharbi F.; Atlam E.; Mahgoub I. | Machine Learning-Based Security Solutions For Iot Networks: A Comprehensive Survey | Sensors, 25, 11 (2025) |
39223  | 0.861 | Kumari S. | Next-Gen Iot Security Using Polar Codes-Based Cryptography For Malware Defence Through Quantum Self-Attention Neural Network | Knowledge-Based Systems, 321 (2025) |
15385  | 0.857 | Khan S.A.; Faisal M.; Alharbe N.; Kumar R.; Khan R.A. | Computational Intelligence Applications In Cyber Security | Computational Intelligence Applications in Cyber Security (2024) |
40871  | 0.856 | Villegas-Ch W.; Govea J.; Gutierrez R.; Mera-Navarrete A. | Optimizing Security In Iot Ecosystems Using Hybrid Artificial Intelligence And Blockchain Models: A Scalable And Efficient Approach For Threat Detection | IEEE Access, 13 (2025) |
1610  | 0.854 | Alghofaili Y.; Rassam M.A. | A Dynamic Trust-Related Attack Detection Model For Iot Devices And Services Based On The Deep Long Short-Term Memory Technique | Sensors, 23, 8 (2023) |