pith. sign in

arxiv: 2604.06323 · v2 · submitted 2026-04-07 · 💻 cs.CR · cs.AI

Blockchain and AI: Securing Intelligent Networks for the Future

Pith reviewed 2026-05-10 18:48 UTC · model grok-4.3

classification 💻 cs.CR cs.AI
keywords blockchainartificial intelligencenetwork securityintelligent networkstaxonomyintegration patternsevaluation checklistIoT security
0
0 comments X

The pith

Blockchain and AI strengthen network security through verifiable provenance and adaptive detection, though real-world use stays mostly at the prototype stage.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper brings together scattered studies on blockchain and artificial intelligence for securing intelligent networks into a unified framework. It supplies a taxonomy for organizing their joint uses, reusable patterns for building security workflows that are both verifiable and adaptive, and the BASE checklist for consistent evaluation of such systems. A reader would care because the synthesis separates the distinct roles each technology plays—blockchain for trust and auditability, AI for detection and orchestration—while surveying applications in IoT, smart grids, transportation, and healthcare to reveal where ideas have been tested. The work clarifies gaps and points to priorities like interoperable interfaces and open benchmarks.

Core claim

Blockchain contributes provenance, trust, and auditability while AI contributes detection, adaptation, and orchestration in security for intelligent networks; the authors supply a taxonomy of approaches, integration patterns for verifiable and adaptive workflows, and the Blockchain-AI Security Evaluation Blueprint (BASE) checklist covering AI quality, ledger behavior, service levels, privacy, energy, and reproducibility, with evidence mapping showing strong conceptual alignment but predominantly prototype-stage implementations across domains.

What carries the argument

The Blockchain-AI Security Evaluation Blueprint (BASE) is the central mechanism, serving as a reporting checklist that standardizes evaluation of combined systems across AI quality, ledger behavior, end-to-end service levels, privacy, energy, and reproducibility.

If this is right

  • Designers can assign blockchain to supply data provenance and audit trails while using AI for threat detection and response adaptation in network architectures.
  • The integration patterns support security workflows that combine ledger verification with machine-learning orchestration for improved resilience.
  • Applications in IoT, smart grids, transportation, and healthcare become comparable through consistent use of the BASE checklist on privacy, energy, and service metrics.
  • Future development should prioritize interoperable interfaces between the technologies and creation of open cross-domain benchmarks.
  • Attention to privacy-preserving analytics and bounded agentic automation reduces exposure in automated security systems.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The taxonomy could be extended to emerging settings such as edge computing security to identify integration challenges early.
  • Inclusion of energy metrics in the checklist suggests efficiency will limit scaling on resource-constrained devices without further advances.
  • Proposed open benchmarks could enable head-to-head testing of different blockchain-AI combinations in standardized environments.
  • The patterns might guide construction of systems that record AI decisions on ledgers for auditability in regulated sectors.

Load-bearing premise

The fragmented literature across ledger design, AI-driven detection, cyber-physical applications, and agentic workflows can be synthesized into a complete, reusable taxonomy, patterns, and checklist without significant domain omissions.

What would settle it

A survey documenting multiple production-grade blockchain-AI security deployments in critical infrastructure with measured gains in resilience and transparency beyond lab prototypes would challenge the assessment of uneven, prototype-heavy evidence.

Figures

Figures reproduced from arXiv: 2604.06323 by Hossien B. Eldeeb, Joy Dutta, Tu Dac Ho.

Figure 1
Figure 1. Figure 1: Taxonomy of blockchain-AI security and paper roadmap: Each category maps to the main sections of the paper This paper examines how blockchain and AI can be co-designed to secure intelligent networks. We begin with the technological foundations of each stack in the security context, then present integration frameworks and implementa￾tion strategies that make these technologies work together in verifiable, a… view at source ↗
Figure 2
Figure 2. Figure 2: Overview of AI-driven techniques for enhanced cybersecurity 3.1 Machine Learning for Anomaly Detection Supervised learning approaches have demonstrated remarkable effectiveness in identifying known attack patterns in network traffic. Support Vector Machines (SVMs), Random Forests, and Gradient Boosting algorithms can classify mali￾cious activities with high precision when trained on labeled datasets of nor… view at source ↗
Figure 3
Figure 3. Figure 3: Layered Security Architecture for Blockchain-AI Integrated Systems Intelligence verification layers provide mechanisms for validating the oper￾ations and outputs of AI components within integrated systems. These layers implement techniques such as zero-knowledge proofs of AI operations, repro￾ducible training verification, and decision auditing to create transparency in AI processes [74]. Researchers have … view at source ↗
Figure 4
Figure 4. Figure 4: Overview of proactive threat detection and response strategies enabled by the integration of blockchain and AI this technological integration [PITH_FULL_IMAGE:figures/full_fig_p022_4.png] view at source ↗
Figure 5
Figure 5. Figure 5: Visual breakdown of key challenges in integrating blockchain and AI for intel￾ligent network security 7 Challenges and Limitations in Blockchain-AI Integration While the integration of blockchain and AI offers powerful new capabilities for securing intelligent networks, this integration also presents significant challenges and limitations that must be addressed. This section examines the technical, operati… view at source ↗
Figure 6
Figure 6. Figure 6: Emerging trends and future directions in securing intelligent networks through blockchain and AI integration field, examining quantum-resistant approaches, autonomous and agentic secu￾rity systems, privacy-preserving techniques, and bio-inspired security paradigms [PITH_FULL_IMAGE:figures/full_fig_p032_6.png] view at source ↗
read the original abstract

Blockchain and artificial intelligence (AI) are increasingly proposed together for securing intelligent networks, but the literature remains fragmented across ledger design, AI-driven detection, cyber-physical applications, and emerging agentic workflows. This paper synthesizes the area through three reusable contributions: (i) a taxonomy of blockchain-AI security for intelligent networks, (ii) integration patterns for verifiable and adaptive security workflows, and (iii) the Blockchain-AI Security Evaluation Blueprint (BASE), a reporting checklist spanning AI quality, ledger behavior, end-to-end service levels, privacy, energy, and reproducibility. The paper also maps the evidence landscape across IoT, critical infrastructure, smart grids, transportation, and healthcare, showing that the conceptual fit is strong but real-world evidence remains uneven and often prototype-heavy. The synthesis clarifies where blockchain contributes provenance, trust, and auditability, where AI contributes detection, adaptation, and orchestration, and where future work should focus on interoperable interfaces, privacy-preserving analytics, bounded agentic automation, and open cross-domain benchmarks. The paper is intended as a reference for researchers and practitioners designing secure, transparent, and resilient intelligent networks.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

0 major / 2 minor

Summary. The manuscript synthesizes the fragmented literature on blockchain and AI for securing intelligent networks. It offers three main contributions: (i) a taxonomy of blockchain-AI security approaches for intelligent networks, (ii) reusable integration patterns for verifiable and adaptive security workflows, and (iii) the Blockchain-AI Security Evaluation Blueprint (BASE), a multi-aspect reporting checklist covering AI quality, ledger behavior, end-to-end service levels, privacy, energy, and reproducibility. The paper maps evidence across domains including IoT, critical infrastructure, smart grids, transportation, and healthcare, concluding that the conceptual fit is strong—blockchain supplying provenance, trust, and auditability while AI supplies detection, adaptation, and orchestration—but that real-world evidence remains uneven and predominantly prototype-heavy. It identifies future priorities such as interoperable interfaces, privacy-preserving analytics, bounded agentic automation, and open cross-domain benchmarks.

Significance. If the taxonomy, patterns, and BASE checklist accurately organize the cited literature without major omissions, the paper provides a useful reference framework that could help researchers and practitioners design secure intelligent networks. The explicit mapping of prototype-heavy evidence and the constructive BASE artifact are strengths that promote more systematic evaluation and reporting; the paper's acknowledgment of open challenges (rather than overclaiming coverage) enhances its value as an organizational synthesis in the cs.CR domain.

minor comments (2)
  1. [Abstract and Introduction] Abstract and §1: the synthesis claim would be strengthened by briefly describing the literature search strategy, databases queried, and inclusion/exclusion criteria used to select the mapped studies and avoid selection bias.
  2. [BASE Checklist] BASE checklist section: the checklist items are listed but lack concrete scoring rubrics, example applications to a published prototype, or guidance on weighting the six aspects; adding these would improve usability without altering the central claim.

Simulated Author's Rebuttal

0 responses · 0 unresolved

We thank the referee for their positive and constructive review. We are pleased that the taxonomy, integration patterns, and BASE checklist are viewed as useful organizational contributions that can help researchers and practitioners, and that the paper's honest mapping of prototype-heavy evidence is noted as a strength.

Circularity Check

0 steps flagged

No significant circularity

full rationale

The paper is a literature review synthesizing fragmented work on blockchain-AI security applications. It offers a taxonomy, integration patterns, and the BASE checklist as organizational tools rather than results derived from equations, fitted parameters, or deductive chains. No self-definitional steps, predictions that reduce to inputs, or load-bearing self-citations appear; the central claims are observational mappings of existing evidence with explicit flags for gaps, rendering the synthesis self-contained against external literature.

Axiom & Free-Parameter Ledger

0 free parameters · 2 axioms · 1 invented entities

The paper rests on the domain assumption that blockchain and AI contributions are complementary in security contexts and that a structured synthesis adds value; it introduces the BASE checklist as a new proposed entity without external validation.

axioms (2)
  • domain assumption The literature on blockchain-AI security for intelligent networks is fragmented across ledger design, AI-driven detection, cyber-physical applications, and agentic workflows.
    Explicitly stated in the abstract as the motivation for the synthesis.
  • ad hoc to paper A taxonomy, reusable integration patterns, and a multi-aspect evaluation checklist can usefully organize the field and guide future work.
    This is the core premise underlying the three stated contributions.
invented entities (1)
  • Blockchain-AI Security Evaluation Blueprint (BASE) no independent evidence
    purpose: A reporting checklist spanning AI quality, ledger behavior, end-to-end service levels, privacy, energy, and reproducibility.
    Newly proposed in the paper as one of its three reusable contributions.

pith-pipeline@v0.9.0 · 5498 in / 1502 out tokens · 39238 ms · 2026-05-10T18:48:43.008817+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

181 extracted references · 181 canonical work pages · 1 internal anchor

  1. [1]

    Systematic survey of advanced metering infrastructure security: Vulnera- bilities, attacks, countermeasures, and future vision.Future Generation Computer Systems, 136:358–377, 2022

    Mostafa Shokry, Ali Ismail Awad, Mahmoud Khaled Abd-Ellah, and Ashraf AM Khalaf. Systematic survey of advanced metering infrastructure security: Vulnera- bilities, attacks, countermeasures, and future vision.Future Generation Computer Systems, 136:358–377, 2022

  2. [2]

    Artificial intelligence in cybersecurity: A comprehensive review and future direction.Applied Artificial Intelligence, 38(1):2439609, 2024

    Lizzy Ofusori, Tebogo Bokaba, and Siyabonga Mhlongo. Artificial intelligence in cybersecurity: A comprehensive review and future direction.Applied Artificial Intelligence, 38(1):2439609, 2024

  3. [3]

    Eldeeb, and Tu Dac Ho

    Joy Dutta, Hossien B. Eldeeb, and Tu Dac Ho. Empowering v2x security: In- tegration of poah 2.0 and edge llm in context-aware blockchain ecosystems. In 2025 IEEE 101st Vehicular Technology Conference (VTC2025-Spring), pages 1–6, 2025

  4. [4]

    Blockchain in internet-of-things: Architecture, applications and research directions

    Farhan Ahmad, Zeeshan Ahmad, Chaker Abdelaziz Kerrache, Fatih Kurugollu, Asma Adnane, and Ezedin Barka. Blockchain in internet-of-things: Architecture, applications and research directions. In2019 International Conference on Com- puter and Information Sciences (ICCIS), pages 1–6, 2019

  5. [5]

    Mohamad Khayat, Ezedin Barka, Mohamed Adel Serhani, Farag Sallabi, Khaled Shuaib, and Heba M. Khater. Empowering security operation center with artificial intelligence and machine learning—a systematic literature review.IEEE Access, 13:19162–19197, 2025

  6. [6]

    Habib Ur Rehman, Nishara Nizamuddin, and Ala Al-Fuqaha

    Khaled Salah, M. Habib Ur Rehman, Nishara Nizamuddin, and Ala Al-Fuqaha. Blockchain for ai: Review and open research challenges.IEEE Access, 7:10127– 10149, 2019

  7. [7]

    Advanced ehealth with explainable ai: Secured by blockchain with ai-empowered block sensitivity for adaptive au- thentication

    Joy Dutta, Hossien Eldeeb, and Tu Dac Ho. Advanced ehealth with explainable ai: Secured by blockchain with ai-empowered block sensitivity for adaptive au- thentication. In2024 IEEE 35th Annual International Symposium on Personal, 44 J. Dutta et al. Indoor and Mobile Radio Communications (PIMRC), pages 1–7, Valencia, Spain,

  8. [8]

    Mohamad Khayat, Ezedin Barka, Mohamed Adel Serhani, Farag Sallabi, Khaled Shuaib, and Heba M. Khater. Blockchain-powered secure and scalable threat intel- ligence system with graph convolutional autoencoder and reinforcement learning feedback loop.IEEE Access, 13:24736–24748, 2025

  9. [9]

    Hussain and Fadi Al-Turjman

    Adedoyin A. Hussain and Fadi Al-Turjman. Artificial intelligence and blockchain: A review.Transactions on Emerging Telecommunications Technolo- gies, 32(9):e4268, 2021

  10. [10]

    Next generation healthcare with explainable ai: Iomt-edge-cloud based advanced ehealth

    Joy Dutta, Deepak Puthal, and Chan Yeob Yeun. Next generation healthcare with explainable ai: Iomt-edge-cloud based advanced ehealth. InIEEE GLOBECOM 2023, Kuala Lumpur, Malaysia, 2023. IEEE

  11. [11]

    Blockchain-based reputation and trust management for smart grids, healthcare, and transportation: A review.IEEE Access, 12:196887–196913, 2024

    Abir Raza, Elarbi Badidi, Mohammad Hayajneh, Ezedin Barka, and Omar El Harrouss. Blockchain-based reputation and trust management for smart grids, healthcare, and transportation: A review.IEEE Access, 12:196887–196913, 2024

  12. [12]

    Eldeeb, Shimaa Naser, Lina Bariah, Sami Muhaidat, and Murat Uysal

    Hossien B. Eldeeb, Shimaa Naser, Lina Bariah, Sami Muhaidat, and Murat Uysal. Digital twin-assisted OWC: Toward smart and autonomous 6G networks.IEEE Network, 38(6):153–162, 2024

  13. [13]

    Yanjun Zuo. Exploring the synergy: Ai enhancing blockchain, blockchain empow- ering ai, and their convergence across iot applications and beyond.IEEE Internet of Things Journal, 12(6):6171–6195, 2025

  14. [14]

    Ai-enhanced blockchain technology: A review of advancements and opportunities.Journal of Network and Computer Applications, 225:103858, 2024

    Dalila Ressi, Riccardo Romanello, Carla Piazza, and Sabina Rossi. Ai-enhanced blockchain technology: A review of advancements and opportunities.Journal of Network and Computer Applications, 225:103858, 2024

  15. [15]

    A survey of blockchain consensus protocols

    Jie Xu, Cong Wang, and Xiaohua Jia. A survey of blockchain consensus protocols. ACM Comput. Surv., 55(13s), July 2023

  16. [16]

    Poah 2.0: Ai-empowered dynamic authentication based adaptive blockchain consensus for iomt-edge workflow.Future Generation Computer Systems, 160:129–142, 2024

    Joy Dutta and Deepak Puthal. Poah 2.0: Ai-empowered dynamic authentication based adaptive blockchain consensus for iomt-edge workflow.Future Generation Computer Systems, 160:129–142, 2024

  17. [17]

    Richard Yu, Peng Zhang, Zhiwei Sun, Weixin Xie, and Xiang Peng

    Xiaoqiang Sun, F. Richard Yu, Peng Zhang, Zhiwei Sun, Weixin Xie, and Xiang Peng. A survey on zero-knowledge proof in blockchain.IEEE Network, 35(4):198– 205, 2021

  18. [18]

    Worrall, Ben Merriman, Jonathan Gilmore, Nick Kitchener, and Salvador E

    Marcos Allende, Diego L´ opez Le´ on, Sergio Cer´ on, Adri´ an Pareja, Erick Pacheco, Antonio Leal, Marcelo Da Silva, Alejandro Pardo, Duncan Jones, David J. Worrall, Ben Merriman, Jonathan Gilmore, Nick Kitchener, and Salvador E. Venegas-Andraca. Quantum-resistance in blockchain networks.Scientific Re- ports, 13(1):5664, 2023

  19. [19]

    Recent advances in sharding techniques for scalable blockchain networks: A review.IEEE Access, 13:21335–21366, 2025

    Brandon Liew Yi Quan, Nur Haliza Abdul Wahab, Arafat Al-Dhaqm, Ahmad Al- shammari, Ali Aqarni, Shukor Abd Razak, and Koh Tieng Wei. Recent advances in sharding techniques for scalable blockchain networks: A review.IEEE Access, 13:21335–21366, 2025

  20. [20]

    Towards blockchain interoperability: A comprehensive survey on cross-chain solutions

    Wenqing Li, Zhenguang Liu, Jianhai Chen, Zhe Liu, and Qinming He. Towards blockchain interoperability: A comprehensive survey on cross-chain solutions. Blockchain: Research and Applications, page 100286, 2025

  21. [21]

    A survey on on- chain-off-chain scalability in blockchain

    Chiedu Charles Chiedu, Keke Gai, Yihang Wei, and Kai Ding. A survey on on- chain-off-chain scalability in blockchain. In2025 IEEE 11th Conference on Big Data Security on Cloud (BigDataSecurity), pages 71–82, 2025

  22. [22]

    On identity, transaction, and smart contract privacy on permissioned and permis- sionless blockchain: A comprehensive survey.ACM Comput

    Wei Liang, Yaqin Liu, Ce Yang, Songyou Xie, Kuanching Li, and Willy Susilo. On identity, transaction, and smart contract privacy on permissioned and permis- sionless blockchain: A comprehensive survey.ACM Comput. Surv., 56(12), July 2024. Blockchain and AI for Intelligent Network Security 45

  23. [23]

    Role-based access control in private blockchain for iot integrated smart contract

    Darwish Al Neyadi, Deepak Puthal, Joy Dutta, and Ernesto Damiani. Role-based access control in private blockchain for iot integrated smart contract. InIFIP IoT 2023, Texas, USA, 2023. Springer

  24. [24]

    El-Fouly, and Hadi Otrok

    Zainab Husain, Joy Dutta, Shakti Singh, Rabeb Mizouni, Tarek H.M. El-Fouly, and Hadi Otrok. Context-aware energy auctions on blockchain for mobile ev charging.Sustainable Cities and Society, page 106548, 2025

  25. [25]

    A systematic re- view on smart contracts security design patterns.Empirical Software Engineering, 30(4):95, 2025

    Sadaf Azimi, Ali Golzari, Naghmeh Ivaki, and Nuno Laranjeiro. A systematic re- view on smart contracts security design patterns.Empirical Software Engineering, 30(4):95, 2025

  26. [26]

    Vulnerability detection techniques for smart contracts: A systematic literature review.Journal of Systems and Software, 217:112160, 2024

    Fernando Richter Vidal, Naghmeh Ivaki, and Nuno Laranjeiro. Vulnerability detection techniques for smart contracts: A systematic literature review.Journal of Systems and Software, 217:112160, 2024

  27. [27]

    Self-sovereign identity: A systematic review, mapping and taxonomy.Sensors, 22(15):5641, 2022

    Frederico Schardong and Ricardo Cust´ odio. Self-sovereign identity: A systematic review, mapping and taxonomy.Sensors, 22(15):5641, 2022

  28. [28]

    Sujihelen

    Smitha Mohan M and L. Sujihelen. An efficient chain code for access control in hyper ledger fabric healthcare system.e-Prime - Advances in Electrical Engineer- ing, Electronics and Energy, 5:100204, 2023

  29. [29]

    A critical analysis of the integration of blockchain and artificial intelligence for supply chain.Annals of Operations Research, 327(1):7–47, 2023

    Vincent Charles, Ali Emrouznejad, and Tatiana Gherman. A critical analysis of the integration of blockchain and artificial intelligence for supply chain.Annals of Operations Research, 327(1):7–47, 2023

  30. [30]

    Ohize, Adeiza James Onumanyi, Buhari U

    Henry O. Ohize, Adeiza James Onumanyi, Buhari U. Umar, Lukman A. Ajao, Rabiu O. Isah, Eustace M. Dogo, Bello K. Nuhu, Olayemi M. Olaniyi, James G. Ambafi, Vincent B. Sheidu, and Muhammad M. Ibrahim. Blockchain for secur- ing electronic voting systems: a survey of architectures, trends, solutions, and challenges.Cluster Computing, 28(2):132, 2024

  31. [31]

    Alrayes, Mohammed Zakariah, Syed Umar Amin, Zafar Iqbal Khan, and Maha Helal

    Fatma S. Alrayes, Mohammed Zakariah, Syed Umar Amin, Zafar Iqbal Khan, and Maha Helal. Intrusion detection in iot systems using denoising autoencoder. IEEE Access, 12:122401–122425, 2024

  32. [32]

    Blockchain-based federated learning for securing internet of things: A comprehen- sive survey.ACM Comput

    Wael Issa, Nour Moustafa, Benjamin Turnbull, Nasrin Sohrabi, and Zahir Tari. Blockchain-based federated learning for securing internet of things: A comprehen- sive survey.ACM Comput. Surv., 55(9), January 2023

  33. [33]

    Privacy-aware adaptive collaborative learning approach for distributed edge networks

    Saeed Alqubaisi, Deepak Puthal, Joy Dutta, and Ernesto Damiani. Privacy-aware adaptive collaborative learning approach for distributed edge networks. InIEEE DSAA 2023, Thessaloniki, Greece, 2023. IEEE

  34. [34]

    Intru- sion detection: A comparison study of machine learning models using unbalanced dataset.SN Computer Science, 5(8):1028, 2024

    Sunday Adeola Ajagbe, Joseph Bamidele Awotunde, and Hector Florez. Intru- sion detection: A comparison study of machine learning models using unbalanced dataset.SN Computer Science, 5(8):1028, 2024

  35. [35]

    Anomaly recognition, diagnosis and prediction of massive data flow based on time-gan and dbscan for power dispatching automation system.Processes, 11(9), 2023

    Wenjie Liu, Pengfei Lei, Dong Xu, and Xiaorong Zhu. Anomaly recognition, diagnosis and prediction of massive data flow based on time-gan and dbscan for power dispatching automation system.Processes, 11(9), 2023

  36. [36]

    Punet: A semi-supervised anomaly detection model for network anomaly detection based on positive unlabeled data.Computers, Materials & Continua, 81(1):327–343, 2024

    Zhaoxin Zhang Gang Long. Punet: A semi-supervised anomaly detection model for network anomaly detection based on positive unlabeled data.Computers, Materials & Continua, 81(1):327–343, 2024

  37. [37]

    Time series analysis and anomaly detection for trustworthy smart homes.Comput

    Ishaani Priyadarshini, Ahmed Alkhayyat, Anita Gehlot, and Raghvendra Kumar. Time series analysis and anomaly detection for trustworthy smart homes.Comput. Electr. Eng., 102(C), September 2022

  38. [38]

    Shadman Wasif, Md

    Md. Shadman Wasif, Md. Palash Miah, Md. Shohrab Hossain, Mohammed J.F. Alenazi, and Mohammed Atiquzzaman. Cnn-vit synergy: An efficient android malware detection approach through deep learning.Computers and Electrical Engineering, 123:110039, 2025. 46 J. Dutta et al

  39. [39]

    Eldeeb, Anshul Pandey, and Sami Muhaidat

    Brahim Mefgouda, Raviha Khan, Omar Alhussein, Hani Saleh, Hossien B. Eldeeb, Anshul Pandey, and Sami Muhaidat. LPUF-authnet: A lightweight PUF-based IoT authentication via tandem neural networks and split learning. In2024 IEEE Globecom Workshops (GC Wkshps), pages 1–7, 2024

  40. [40]

    AboRas, and N

    Nitu Dash, Sujata Chakravarty, Amiya Kumar Rath, Nimay Chandra Giri, Ka- reem M. AboRas, and N. Gowtham. An optimized lstm-based deep learning model for anomaly network intrusion detection.Scientific Reports, 15(1):1554, 2025

  41. [41]

    Transformers and large language models for efficient intru- sion detection systems: A comprehensive survey.Information Fusion, 124:103347, 2025

    Hamza Kheddar. Transformers and large language models for efficient intru- sion detection systems: A comprehensive survey.Information Fusion, 124:103347, 2025

  42. [42]

    Practical autoencoder based anomaly detection by using vector reconstruction error.Cybersecurity, 6(1):1, 2023

    Hasan Torabi, Seyedeh Leili Mirtaheri, and Sergio Greco. Practical autoencoder based anomaly detection by using vector reconstruction error.Cybersecurity, 6(1):1, 2023

  43. [43]

    Deep q- learning based reinforcement learning approach for network intrusion detection

    Hooman Alavizadeh, Hootan Alavizadeh, and Julian Jang-Jaccard. Deep q- learning based reinforcement learning approach for network intrusion detection. Computers, 11(3), 2022

  44. [44]

    Multi-agent reinforce- ment learning for cybersecurity: Classification and survey.Intelligent Systems with Applications, 26:200495, 2025

    Salvo Finistrella, Stefano Mariani, and Franco Zambonelli. Multi-agent reinforce- ment learning for cybersecurity: Classification and survey.Intelligent Systems with Applications, 26:200495, 2025

  45. [45]

    Kyriakopoulos, Siˆ an Jenkins, Iain Phillips, and Tim Dudman

    Tom Purves, Konstantinos G. Kyriakopoulos, Siˆ an Jenkins, Iain Phillips, and Tim Dudman. Causally aware reinforcement learning agents for autonomous cyber defence.Knowledge-Based Systems, 304:112521, 2024

  46. [46]

    On convergence rates of game theoretic reinforcement learning algorithms.Automatica, 104:90–101, 2019

    Zhisheng Hu, Minghui Zhu, Ping Chen, and Peng Liu. On convergence rates of game theoretic reinforcement learning algorithms.Automatica, 104:90–101, 2019

  47. [47]

    Automated emerging cyber threat iden- tification and profiling based on natural language processing.IEEE Access, 11:58915–58936, 2023

    Renato Marinho and Raimir Holanda. Automated emerging cyber threat iden- tification and profiling based on natural language processing.IEEE Access, 11:58915–58936, 2023

  48. [48]

    Cyber threat indicators extraction based on contextual knowledge prompt.Computer Networks, 254:110839, 2024

    Hailiang Tang, Dawei Lin, Wanyu Li, Wenxiao Zhang, and Jun Zhao. Cyber threat indicators extraction based on contextual knowledge prompt.Computer Networks, 254:110839, 2024

  49. [49]

    Hsinchun Chen, Sagar Samtani, Yidong Zhu, and L-C. Wang. Cross-lingual cy- bersecurity analytics in the international dark web with adversarial deep repre- sentation learning.MIS Quarterly, 45(4):1699–1736, 2021

  50. [50]

    A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modelling.Alexandria Engi- neering Journal, 107:374–389, 2024

    Fahad Alqurashi and Istiak Ahmad. A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modelling.Alexandria Engi- neering Journal, 107:374–389, 2024

  51. [51]

    A survey on sentiment and emotion analysis for dark web and cyber- security applications.Frontiers in Big Data, 4:601529, 2021

    Wafa Al-khuzaie, Norah Al-harthi, Abeer Al-harthi, Alanoud Al-subaie, and Nora Al-humaid. A survey on sentiment and emotion analysis for dark web and cyber- security applications.Frontiers in Big Data, 4:601529, 2021

  52. [52]

    Application of large language models in cybersecurity: A systematic literature review.IEEE Access, 12:176751–176778, 2024

    Ismayil Hasanov, Seppo Virtanen, Antti Hakkala, and Jouni Isoaho. Application of large language models in cybersecurity: A systematic literature review.IEEE Access, 12:176751–176778, 2024

  53. [53]

    Asif Shahriar, Syed Jarullah Hisham, K. M. Asifur Rahman, Ruhan Islam, Md. Shohrab Hossain, Ren-Hung Hwang, and Ying-Dar Lin. 5gpt: 5g vulner- ability detection by combining zero-shot capabilities of gpt-4 with domain aware strategies through prompt engineering.IEEE Transactions on Information Foren- sics and Security, 20:7045–7060, 2025

  54. [54]

    Hamed Meshkin, Joel Zirkle, Ghazal Arabidarrehdor, Anik Chaturbedi, Shilpa Chakravartula, John Mann, Bradlee Thrasher, and Zhihua Li. Harnessing large Blockchain and AI for Intelligent Network Security 47 language models’ zero-shot and few-shot learning capabilities for regulatory re- search.Briefings in Bioinformatics, 25(5):bbae354, 08 2024

  55. [55]

    Fahad Al-mekhlafi, Bander Ali Saleh Al-rimy, Ishak Bin Aris, N. Z. Jhanjhi, and Mamoona Humayun. Sentiment and emotion analysis from dark web text for cyber threat intelligence: A review, 2025

  56. [56]

    When llms meet cybersecurity: a systematic literature review.Cybersecurity, 8(1):55, 2025

    Jie Zhang, Haoyu Bu, Hui Wen, Yongji Liu, Haiqiang Fei, Rongrong Xi, Lun Li, Yun Yang, Hongsong Zhu, and Dan Meng. When llms meet cybersecurity: a systematic literature review.Cybersecurity, 8(1):55, 2025

  57. [57]

    Agir: Automating cyber threat intelligence reporting with natural language gen- eration

    Filippo Perrina, Francesco Marchiori, Mauro Conti, and Nino Vincenzo Verde. Agir: Automating cyber threat intelligence reporting with natural language gen- eration. In2023 IEEE International Conference on Big Data (BigData), pages 979–984, Sorrento, Italy, 2023. IEEE, IEEE.$31.00©2023 IEEE

  58. [58]

    Generative ai in cybersecurity: A comprehensive review of llm applications and vulnerabilities.Internet of Things and Cyber-Physical Systems, 5:1–46, 2025

    Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, Bilel Cherif, Ab- dechakour Mechri, Norbert Tihanyi, Tamas Bisztray, and Merouane Debbah. Generative ai in cybersecurity: A comprehensive review of llm applications and vulnerabilities.Internet of Things and Cyber-Physical Systems, 5:1–46, 2025

  59. [59]

    Actionable Cy- ber Threat Intelligence Using Knowledge Graphs and Large Language Models

    Romy Fieblinger, Md Tanvirul Alam, and Nidhi Rastogi. Actionable Cy- ber Threat Intelligence Using Knowledge Graphs and Large Language Models . In2024 IEEE European Symposium on Security and Privacy Workshops (Eu- roS&PW), pages 100–111, Los Alamitos, CA, USA, July 2024. IEEE Computer Society

  60. [60]

    Prompting large language models for counterfactual generation: An empirical study

    Yongqi Li, Mayi Xu, Xin Miao, Shen Zhou, and Tieyun Qian. Prompting large language models for counterfactual generation: An empirical study. arXiv preprint arXiv:2305.14791v2, 2024. Version 2, posted 23 February 2024

  61. [61]

    Dantas, Lucas C

    Pierre V. Dantas, Lucas C. Cordeiro, and Waldir S. S. Junior. A review of state-of- the-art techniques for large language model compression.Complex & Intelligent Systems, 11(9):407, 2025

  62. [62]

    Janus: Benchmarking commercial and open-source cloud and edge plat- forms for object and anomaly detection workloads

    Karthick Shankar, Pengcheng Wang, Ran Xu, Ashraf Mahgoub, and Somali Chaterji. Janus: Benchmarking commercial and open-source cloud and edge plat- forms for object and anomaly detection workloads. In2020 IEEE 13th Interna- tional Conference on Cloud Computing (CLOUD), pages 590–599, 2020

  63. [63]

    Blockchain- empowered federated learning: Benefits, challenges and solutions.IEEE Trans- actions on Big Data, 2025

    Zeju Cai, Jianguo Chen, Yuting Fan, Zibin Zheng, and Keqin Li. Blockchain- empowered federated learning: Benefits, challenges and solutions.IEEE Trans- actions on Big Data, 2025

  64. [64]

    Federated and edge learning for large language models.Information Fusion, 117:102840, 2025

    Francesco Piccialli, Diletta Chiaro, Pian Qi, Valerio Bellandi, and Ernesto Dami- ani. Federated and edge learning for large language models.Information Fusion, 117:102840, 2025

  65. [65]

    Badr, Mohamed Baza, and Hani Alshahrani

    Ali Alshehri, Mahmoud M. Badr, Mohamed Baza, and Hani Alshahrani. Deep anomaly detection framework utilizing federated learning for electricity theft zero- day cyberattacks.Sensors, 24(10), 2024

  66. [66]

    From llm reasoning to autonomous ai agents: A comprehensive review, 2025

    Mohamed Amine Ferrag, Norbert Tihanyi, and Merouane Debbah. From llm reasoning to autonomous ai agents: A comprehensive review, 2025

  67. [67]

    A survey of agentic ai and cybersecurity: Challenges, opportunities and use-case prototypes, 2026

    Sahaya Jestus Lazer, Kshitiz Aryal, Maanak Gupta, and Elisa Bertino. A survey of agentic ai and cybersecurity: Challenges, opportunities and use-case prototypes, 2026

  68. [68]

    Dutta, D

    J. Dutta, D. Puthal, and E. Damiani. Ai-based block identification and classifi- cation in the blockchain integrated iot. In20th OITS International Conference on Information Technology (OCIT), pages 415–421, Bhubaneswar, India, 2022. IEEE. 48 J. Dutta et al

  69. [69]

    A hybrid ai-blockchain security framework for smart grids.Scientific Reports, 15(1):20882, 2025

    Yazeed Yasin Ghadi, Tehseen Mazhar, Tariq Shahzad, Ines Hilali Jaghdam, San- war Khan, Muhammad Amir Khan, and Habib Hamam. A hybrid ai-blockchain security framework for smart grids.Scientific Reports, 15(1):20882, 2025

  70. [70]

    An ai-driven framework for integrated security and privacy in internet of things using quantum-resistant blockchain.Future Internet, 17(6), 2025

    Mahmoud Elkhodr. An ai-driven framework for integrated security and privacy in internet of things using quantum-resistant blockchain.Future Internet, 17(6), 2025

  71. [71]

    Ai-driven dynamic trust management and blockchain-based security in industrial iot.Computers and Electrical Engineering, 123:110213, 2025

    Rajesh Kumar and Rewa Sharma. Ai-driven dynamic trust management and blockchain-based security in industrial iot.Computers and Electrical Engineering, 123:110213, 2025

  72. [72]

    Automated cybersecurity compliance and threat response using ai, blockchain and smart contracts.International Journal of Information Tech- nology, 17(2):767–781, 2025

    Lampis Alevizos. Automated cybersecurity compliance and threat response using ai, blockchain and smart contracts.International Journal of Information Tech- nology, 17(2):767–781, 2025

  73. [73]

    Enhancing data integrity and traceability in industry cyber phys- ical systems (icps) through blockchain technology: A comprehensive approach

    Mohammad Ikbal Hossain, Tanja Steigner, Muhammad Imam Hussain, and Afroja Akther. Enhancing data integrity and traceability in industry cyber phys- ical systems (icps) through blockchain technology: A comprehensive approach. arXiv preprint arXiv:2405.04837, 2024. Cross-listed from cs.CR and eess.SY

  74. [74]

    Tamburri

    Filippo Scaramuzza, Giovanni Quattrocchi, and Damian A. Tamburri. Engineer- ing trustworthy machine-learning operations with zero-knowledge proofs. arXiv preprint arXiv:2505.20136, 2025

  75. [75]

    Blockchain-based multistage continuous authentication for smart devices.Applied Sciences, 13(23), 2023

    Yue Yao, Xiaomei Zhang, Haomin Hu, Huibin Liu, Rong Huang, and Zejie Wang. Blockchain-based multistage continuous authentication for smart devices.Applied Sciences, 13(23), 2023

  76. [76]

    Using blockchain ledgers to record ai decisions in iot.IoT, 6(3), 2025

    Vikram Kulothungan. Using blockchain ledgers to record ai decisions in iot.IoT, 6(3), 2025

  77. [77]

    A Composable Game-Theoretic Framework for Blockchains

    Zeta Avarikioti, Georg Fuchsbauer, Pim Keer, Matteo Maffei, and Fabian Re- gen. A composable game-theoretic framework for blockchains. arXiv preprint arXiv:2504.18214, 2025. Submitted 25 April 2025

  78. [78]

    Cepedaloco: An event-driven architecture for integrating complex event processing and blockchain through low-code.Internet of Things, 22:100802, 2023

    Jes´ us Rosa-Bilbao, Juan Boubeta-Puig, and Adrian Rutle. Cepedaloco: An event-driven architecture for integrating complex event processing and blockchain through low-code.Internet of Things, 22:100802, 2023

  79. [79]

    Exploring the potential of mi- croservices in internet of things: A systematic review of security and prospects

    Abir El Akhdar, Chafik Baidada, Ali Kartit, Mohamed Hanine, Carlos Osorio Garc´ ıa, Roberto Garcia Lara, and Imran Ashraf. Exploring the potential of mi- croservices in internet of things: A systematic review of security and prospects. Sensors, 24(20), 2024

  80. [80]

    Ai for devsecops: A landscape and future opportunities

    Michael Fu, Jirat Pasuksmit, and Chakkrit Tantithamthavorn. Ai for devsecops: A landscape and future opportunities. arXiv preprint arXiv:2404.04839v2, 2024. Version 2, last revised September 13, 2024

Showing first 80 references.