Privacy preserving blockchain integrated explainable artificial intelligence with two tier optimization for cyber threat detection and mitigation in the internet of things

Cyber threat hunting early hunts for cyberattacks hidden by conventional defence tools. It inspects extreme to recognize mischievous programs (i.e., malware) that evade recognition. It is significant because complicated cyberattacks can evade the mechanisms of cyber security. The performance of cybe...

Full description

Saved in:
Bibliographic Details
Published in:Scientific reports Vol. 15; no. 1; pp. 36520 - 22
Main Authors: Alohali, Manal Abdullah, Aljebreen, Mohammed, Ahmad, Nazir, Alahmari, Sultan, Albouq, Sami Saad, Alqazzaz, Ali, Alkhiri, Hassan, Said, Yahia
Format: Journal Article
Language:English
Published: London Nature Publishing Group UK 21.10.2025
Nature Publishing Group
Nature Portfolio
Subjects:
ISSN:2045-2322, 2045-2322
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first